英文摘要
|
In recent years, threats such as "fake news" and "disinformation" have reached the level of national security in information warfare, and have become an important research issue. For example, as early as 2014, Russia intervened to influence Ukraine's Crimea referendum, and in the recent Ukrainian-Russian War, we can see that in many communities, whether Russia or the others, the media takes the wind. This article focuses on the accounts and posts that publish suspicious information, and uses Twitter's official project website-Transparency website. Twitter defines suspicious accounts as accounts that manipulate disinformation related to the government or state, and publishes them after investigation and confirmation. Different from the previous identification methods, in this paper we use the "anomaly detection" technology in machine learning to train a classifier that can distinguish abnormal messages and abnormal accounts with high accuracy. For the dataset, we established a data crawling system based on the ETL framework, and crawled official accounts and tweets of celebrities. And use the normal posts posted by the accounts with blue tick, whose identities have been officially confirmed, to verify the performance of the classifier. From the experimental results, we found that the accuracy of our identification method reached 96%.
|
参考文献
|
-
陳彥翔,林祝興(2022)。利用異常偵測技術於可疑帳號辨識之研究。第三十二屆全國資訊安全會議
連結:
-
Twitter Transparency:https://transparency.twitter.com/en/reports/information-operations.html
-
Anomaly Detection 2020:https://medium.com/學以廣才/異常檢測-anomaly-detection-fa300fe6df71
-
Global Vectors for Word Representation: https://nlp.stanford.edu/projects/glove/
-
V-Dem for digital society project 2018: http://digitalsocietyproject.org/foreign-intervention-on-social-media/
-
Du, B.,Liu, C.,Zhou, W.,Hou, Z.,Xiong, H.(2016).Catch Me If You Can: Detecting Pickpocket Suspects from Large-scale Transit Records.22nd ACM SIGKDD International Conference
-
Guarino, S.,Trino, N.,Celestini, A,Chessa, A.,Riotta, G.(2020).,未出版
-
Im, J.,Chandrasekharan, E.,Sargent, J.,Lighthammer, P.,Demby, T.,Bhargava, A.,Hemphill, L.,Jurgens, D.,Gilbert, E.(2020).Still Out There: Modeling and Identifying Russian Troll Accounts on Twitter.12th ACM Conference on Web Science
-
Kipf, T. N.,Welling, M.(2016).Variational Graph Auto-Encoders.Bayesian Deep Learning Workshop
-
Liu, Y.,Yi-Fang, W.(2018).Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks.Thirty-Second AAAI Conference on Artificial Intelligence
-
Mazza, M.,Cresci, S.,Avvenutil, M.,Quattrociocchi, W.,Tensconi, M.(2019).Rtbust: Exploiting temporal patterns for botnet detection on twitter.Proceedings of the 10th ACM Conference on Web Science
-
Mikolov, T.,Chen, K.,Corrado, G.,Dean, J.(2013).,未出版
-
Shu, K.,Mahudeswaran, D.,Wang, S.,Liu, H.(2020).Hierarchical propagation networks for fake news detection: Investigation and exploitation.Proceedings of the International AAAI Conference on Web and Social Media
-
Tony, L. Fei,Ming, T. Kai,Zhi-Hua, Z.(2012).Isolation-based Anomaly Detection.ACM Transactions on Knowledge Discovery from Data (TKDD)
-
林祝興。,國家科學及技術委員會。
|