JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (6): 99-104.doi: 10.6040/j.issn.1671-9352.2.2016.165

Previous Articles     Next Articles

Rumor spreading on dynamic complex networks with curious psychological mechanism

WANG Ya-qi, WANG Jing*   

  1. Department of Electronic Technology, Engineering College of the Chinese Armed Police Force, Xian 710086, Shaanxi, China
  • Received:2016-08-18 Online:2017-06-20 Published:2017-06-21

Abstract: Considering the influence of curious psychological mechanism,this paper proposes a dynamic complex network evolution model. Based on this model, the dynamical behaviors of rumor spreading are investigated by using the numerical simulations. The research shows that the existence of the curious psychological mechanism reduces the propagation critical thresholds of the networks, increases the spreading velocity and the final propagation extent of rumors. It is also found that the dynamic connection probability has a great influence on the propagation mechanism of rumors, but the effect of the additional infection rate is negligible. In addition, under the influence of the curious psychological mechanism, the rumor spreading time on the networks is obviously shortened, and the reasonable suggestions for effective prevention and control of rumor spreading are given.

Key words: complexnetwork, rumorspreading, curious psychological mechanism, propagation critical threshold

CLC Number: 

  • TP393
[1] BHAVNANI R, FINDLEY M G, KUKLINSKI J H. Rumor dynamics in ethnic violence[J]. The Journal of Politics, 2009, 71(3): 876-892.
[2] GALAM S. Modeling rumors: the no plane pentagon French hoax case[J]. Physica A, 2003, 320(15): 571-580.
[3] KNAPP P H. A psychology of rumors[J]. Public Opinion Quarter, 1994, 8(1): 22-37.
[4] SUDBURY A. The proportion of population never hearing a rumour[J]. Journal of applied probability, 1985, 22(2): 443-446.
[5] DOROGOVTSEV S N, GOLTSEV A V, MENDES J F F. Critical phenomena in complex networks[J]. Reviews of Modern Physics, 2008, 80(4): 1275-1335.
[6] PASTOR-SATORRAS R, VESPIGNANI A. Epidemic dynamics and endemic states in complex networks[J]. Physical Review E, 2001, 63(6): 066117.
[7] 王亚奇,蒋国平.考虑网络流量的无标度网络病毒免疫策略研究[J]. 物理学报,2011, 60(6): 060202.1-060202.8. WANG Yaqi, JIANG Guoping. Epidemic immunization on scale-free networks with traffic flow[J]. Acta Physica Sinica, 2011, 60(6): 060202.1-060202.8.
[8] LIU C, ZHANG Z K. Information spreading on dynamic social networks[J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(4): 896-904.
[9] KAWACHI K, SEKI M, YOSHIDA H, et al. A rumor transmission model with various contact interactions[J]. Journal of Theoretical Biology, 2008, 253(1): 55-60.
[10] ZANETTE D H. Dynamics of rumor propagation on small-world networks[J]. Physical Review E, 2002, 65(4): 041908.
[11] WANG J, WANG Y Q. SIR rumor spreading model with network medium in complex social networks[J]. Chinese Journal of Physics, 2015, 53(1): 1-21.
[12] CLEMENTI, A, CRESCENZI P, DOERR C, et al. Rumor spreading in random evolving graphs[J]. Lecture Notes in Computer Science, 2013, 8125: 325-336.
[13] ZHAO Z J, LIU Y M, WANG K X. An analysis of rumor propagation based on propagation force[J]. Physica A, 2016, 443: 263-271.
[14] JIE R L, QIAO J, XU G J, et al. A study on the interaction between two rumors in homogeneous complex networks under symmetric conditions[J]. Physica A, 2016, 454: 129-142.
[15] LUO W, TAY W P, LENG M. Infection spreading and source identification: a hide and seek game[J]. arXiv preprint arXiv:1504.04796, 2015.
[16] CHEN P, GAO N. The simulation of rumors spreading and controlling in micro-blog users network[J]. Journal of Software Engineering and Applications, 2013, 6: 102-105.
[17] ZHAO L, WANG J, HUANG R. Immunization against the spread of rumors in homogenous networks[J]. PLoS One, 2015, 10(5): e0124978.
[18] WANG Y Q, YANG X Y, HAN Y L, et al. Rumor spreading model with trust mechanism in complex social networks[J]. Communications in Theoretical Physics, 2013, 59(4): 510-516.
[19] ZHAO L, WANG J, CHEN Y, et al. SIHR rumor spreading model in social networks[J]. Physica A, 2012, 391(7): 2444-2453.
[20] WANG Xiaoli, ZHAO Laijun. Rumor spreading model with skepticism mechanism in social networks[J]. J University of Shanghai for Science and Technology, 2012, 34(5): 424-428.
[21] XIA L L, JIANG G P, SONG B, et al. Rumor spreading model considering hesitating mechanism in complex social networks[J]. Physica A, 2015, 437: 295-303.
[22] WATTS D J, STROGATZ S H. Collective dynamics of ‘small-world’ networks[J]. Nature, 1998, 393(6684): 440-442.
[23] BARABÁSI A L, ALBERT R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439):509-512.
[24] 王亚奇, 蒋国平. 复杂网络中考虑不完全免疫的病毒传播研究[J]. 物理学报, 2010, 59(10): 6733-6743. WANG Yaqi, JIANG Guoping. Virus spreading on complex networks with imperfect immunization[J]. Acta Physica Sinica, 2010, 59(10): 6733-6743.
[25] NEKOVEE M, MORENO Y, BIANCONI G. Theory of rumour spreading in complex social networks[J]. Physica A, 2007, 374: 457-470.
[1] LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84.
[2] ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82.
[3] LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88.
[4] ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110.
[5] HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43.
[6] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[7] ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73.
[8] SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81.
[9] ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120.
[10] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[11] LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91.
[12] SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105.
[13] LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126.
[14] . Construction of expert relationship network based on random walk strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 30-34.
[15] ZHANG Wen-ya, SONG Da-wei, ZHANG Peng. An ontology-based readability model for vertical search [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 23-29.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!