Figure - available from: World Wide Web
This content is subject to copyright. Terms and conditions apply.
A graphical representation of topology-based, content-based and hybrid methods for social network analysis

A graphical representation of topology-based, content-based and hybrid methods for social network analysis

Source publication
Article
Full-text available
The massive adoption of social networks increased the need to analyze users’ data and interactions to detect and block the spread of propaganda and harassment behaviors, as well as to prevent actions influencing people towards illegal or immoral activities. In this paper, we propose HURI, a method for social network analysis that accurately classif...

Similar publications

Article
Full-text available
Analisa-se uma propaganda da Sinaf (empresa de seguros e assistência funeral), postada na página do Twitter da empresa, que, desde 1996, se destacou por usar o humor como estratégia de venda de assistência funerária. Para tal, tomam-se como base as teorias da superioridade, do alívio e da incongruência (Nunes, 2022; Tabacaru, 2015), aliadas ao arca...
Preprint
Full-text available
Detecting Twitter Bots is crucial for maintaining the integrity of online discourse, safeguarding democratic processes, and preventing the spread of malicious propaganda. However, advanced Twitter Bots today often employ sophisticated feature manipulation and account farming techniques to blend seamlessly with genuine user interactions, posing sign...
Article
Full-text available
A marca Amazônia gera várias discussões sobre consumo, representações, repercussão e significância. Neste artigo, procura-se discutir a Amazônia enquanto marca, em primeiro lugar, além de apontar as relações de poder, a partir das ações do governador do Pará, Helder Barbalho (MDB). Em 2023, ele iniciou seu segundo mandato como chefe do poder execut...
Article
Full-text available
Intervention-based mitigation methods have become a common way to fight misinformation on Social Media (SM). However, these methods depend on how information spreads are modeled in a diffusion model. Unfortunately, there are no realistic diffusion models or enough diverse datasets to train diffusion prediction functions. In particular, there is an...
Article
Full-text available
La simbiosis estratégica y operacional entre el marketing y la comunicación política alcanza su máxima expresión durante las campañas electorales. Los medios digitales han transformado la forma de hacer política, obligando a los partidos y candidatos a adaptarse a la nueva realidad. Esta circunstancia motiva el objetivo principal de la presente inv...

Citations

... The work in [5] performs multivariate data fusion via Independent Vector Analysis (IVA) with sparse inverse covariance estimation and demonstrates its usefulness in detecting misinformation during high-impact events. The issue of safe vs. risky user classification in social networks is addressed in [6], where a hybrid method is devised to consider user network topology and text contents in a joint manner. The authors in [7] integrate novelty detection, sentiment prediction, and misinformation detection within the same deep multi-task learning architecture. ...
Conference Paper
Full-text available
Social media content can present a number of threats, including misinformation and hate speech towards specific demographic groups. One challenge is to effectively discriminate between benign and malicious posts, given the massive amount of available content. In this context, predictive models for malicious content detection can be extremely valuable, leading to the automatic removal of posts and user accounts or content being flagged for subsequent moderation. However, some of the existing detection models are limited to the analysis of a single data modality. At the same time, most multi-modal approaches operate in a fully supervised learning setting that assumes the availability of labeled data for both benign and malicious content. In this paper, we fill this gap by proposing a multimodal one-class learning approach for malicious online content detection. Our approach leverages feature extraction, dimensionality reduction, and one-class learning models to analyze text and image data in online posts simultaneously. Models learn their decision function in the challenging scenario where only benign online content is used as training data, overcoming the limitations of a fully supervised setting. Our experiments with two real-world datasets containing misinformation and hate speech posts reveal the effectiveness of different combinations of one-class learning models and dimensionality reduction techniques.
... These state-of-the-art approaches can be categorized as neural network-based methods [5] [6] [7] [8]. [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] and feature-based methods, which often rely on linguistic features, including text-based [22] [23], repetitiveness [24] [25] [26], and emotional semantics [27]. However, existing research works present some limitations, including the inability to effectively combine information from multiple modalities, the exclusive use of English as the primary language for detection, and a focus on addressing specific topics, e.g. ...
... Authors in [9] adopt Doc2Vec embeddings of emails and RF/SVM models to classify emails as phishing or legitimate. A similar approach is used in [10] to predict COVID-19 vaccine hesitancy, and in [11] to classify social network users in risky and safe. The authors in [12] leverage BERT embeddings and a CNN classifier to detect spam tweets combining topic-based features with contextual BERT embeddings. ...