Next Article in Journal
A Novel Methodology for Developing Troubleshooting Chatbots Applied to ATM Technical Maintenance Support
Next Article in Special Issue
Single vs. Multi-Label: The Issues, Challenges and Insights of Contemporary Classification Schemes
Previous Article in Journal
Tensile Stress Evolution Outside Deformation Zone of Cold Rolled Strip
Previous Article in Special Issue
Decision Support System for Predicting Mortality in Cardiac Patients Based on Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ExoFIA: Deep Exogenous Assistance in the Prediction of the Influence of Fake News with Social Media Explainability

1
Department of Electrical Engineering, National Cheng Kung University, Tainan 70101, Taiwan
2
English Language, Tesol and Applied Linguistics, Swansea University, Swansea SA2 8PP, UK
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2023, 13(11), 6782; https://doi.org/10.3390/app13116782
Submission received: 20 April 2023 / Revised: 19 May 2023 / Accepted: 30 May 2023 / Published: 2 June 2023
(This article belongs to the Special Issue Opinion Mining and Sentiment Analysis Using Deep Neural Network)

Abstract

:
The growth of social platforms has lowered the barrier of entry into the media sector, allowing for the spread of false information and putting democratic politics and social security at peril. Preliminary analysis shows that posts sharing real news and fake news are disseminated on social media. Moreover, posts pointing to fake news spread faster, so this paper aims to predict the impact of posts citing fake news on social platforms. In this study, we take into account that exogenous factors, in addition to endogenous factors, can potentially determine how influential a post is. For example, the occurrence of social events can generate public resonance and discussion, thereby increasing the impact of relevant posts. Given that Google Trends can obtain search trends that reflect social popularity, this work aims to use Google Trends as the source of our exogenous factors. We propose a deep learning model called the deep exogenous aid in fake news (ExoFIA) model, which combines multi-modal features and utilizes an attention mechanism to provide model interpretability and analyze the influencing factors. Applying the model to real-world data from Twitter demonstrates that our model outperforms existing diffusion models. Furthermore, further examination of the relevant aspects of true and fake news reveals that the two are influenced by distinct variables.

1. Introduction

1.1. Introduction

Social media, e.g., Facebook, Twitter, and Sina Weibo, has changed the way we consume news because of its low cost, ease of access, and rapid dissemination [1]. Yet these factors have made social media a breeding ground for fake news. The term ‘fake news’ became popularized during Donald Trump’s presidential election campaign in 2016 [2]. In recent years, in addition to the COVID-19 pandemic, we have also been battling an “infodemic” [3]. Fake news poses a direct threat to free speech, public awareness, and democratic societies. A significant amount of false information is disseminated on social media via hyperlinks in posts, as illustrated in Figure 1.
Fortunately, numerous works have paid attention to the detection of false news [4,5,6], aiding in the fight against online fake news. However, most works dealing with fake news focus on detection rather than gauging the influence of fake news on social media, which is also crucial for mitigating its impact on society.
Our work does not build a new fake news detection model. We aim to predict the future popularity of an online post linked to fake news, i.e., the size of a cascade (the term used to describe a posting’s diffusion tree created by the original tweet that included the URL and all of its retweets). The cascade instances we defined are at the post level, not the news level (one or multiple cascades with a singular origin). An example is shown in Figure 2. Fake news is spread via links in posts. The estimator should have the ability to gauge the influence of each post and sort all posts by their estimated influence, which executives can use as a measure of priority for reviewing posts. This can help organizations mitigate the spread of disinformation at an early stage. For example, online service providers such as Twitter or other forums can use the estimator to detect possible outbreaks of posts containing fake news, thereby safeguarding healthy conversations. Therefore, this work can be used in subsequent efforts to detect false news.
This work faces the following challenges. (1) Data collection and processing: the API limitations of Twitter make data acquisition time-consuming. Features used for forecasting are heterogeneous and are of multiple types, including social relationships, fake news content, news metadata, and user contexts. These types of features should be captured from different sources and require different retrieval processes and fusion methods to link the data together to reconstruct the whole picture. (2) Exogenous stimuli: the factors that cause large cascades are complex and are both endogenous (internal) and exogenous (external). Endogenous factors come from social platforms. However, exogenous factors are uncertain events outside the social platform that stimulate cascaded diffusion. To conclude, exogenous factors make modeling difficult. (3) Unbalanced distributions: the number of retweets of posts in real life exhibits a power-law distribution, with the bulk of posts not being retweeted and only a few posts receiving a large number of retweets. This characteristic makes the training process difficult.
Recently, several efforts have been devoted to popularity prediction on social media, which can be categorized into three main categories: generative approaches, feature-based approaches, and deep-learning-based approaches. Probabilistic statistical generative approaches, such as the Poisson process and Hawkes process, aim to model the arrival/occurrence of event sequences or the participation time series, e.g., information retweeting [7,8,9,10,11].
Because the intricate underlying mechanisms governing the success of a cascade are oversimplified, these studies cannot fully leverage the implicit information in cascade dynamics for effective prediction.
Feature-based approaches employ features from user characteristics [12,13], temporal information [14,15,16,17], content features [12,14,18], and the structures of propagation networks [14,15,19,20,21]. These methods heavily depend on domain knowledge and hand-crafting, making the models hard to generalize. Deep-learning-based methods can automatically capture the dynamics of information dissemination [22,23,24] without requiring strong prior knowledge and feature engineering. Deep-learning-based models are powerful enough to extract representative features, yet they usually work as black-box models. The prediction results derived from deep-learning-based models for cascade popularity lack interpretability and are, as a result, of little value for decision making. Furthermore, most diffusion models of the above-mentioned work have never considered exogenous factors, such as burst events.

Endogenous and Exogenous Influences

Endogenous factors are the variables we can directly extract from the social platform of the target news item, such as when a news item is shared on Twitter. Endogenous factors, such as the number of likes or the news content of the post, can be further analyzed. On the other hand, exogenous factors can be extracted outside the post’s social platform. For example, from the Google Trends service, we can know how many people are searching for news stating that U.S. President Joe Biden said he has decided to run for a second term.
As shown in Figure 3, both tweets come from the same person, but one has a smaller cascade size than the other. The search trend of Figure 3b peaked around the time before the source tweet was posted, which means that the news topic was quite popular at the time. In the case shown in Figure 3a, the first keyword, “disqualified”, does not fluctuate much. In contrast, the second keyword, “Alabama”, and the third keyword, “Crimson Tide”, have a peak on the same day, but this was ten days before the tweet was posted, which shows that the discussion has declined. This result indicates that the search trend also plays a crucial role in predicting the influence of the tweets. Social media is inseparable from life, so information on social media is bound to be influenced by external platforms. Furthermore, the event will most likely occur outside of the social platform, implying that information will erupt on the social platform in the future. In conclusion, exogenous influences must also be considered.

1.2. Present Work and Contributions

In this paper, we propose a multi-modal attention model called the ExoFIA model that predicts the influence of a post by forecasting the size of the cascade using both endogenous data (i.e., the post itself, the social network, and user information) and exogenous data (i.e., the trend of the news to which the post has linked). We adopt a graph convolution network (GCN) [25] and gated recurrent unit (GRU) [26] to encode the dynamic propagation of the post, and we use Google Trends as exogenous sources and extract trends with 1D convolutional neural networks (1D-CNN) [27]. We further adopt attention mechanisms and extract the learned weights to enhance the interpretability of the model and explain why a post sharing fake news causes a large cascade. To evaluate our proposed model, we use large-scale real-world Twitter data.

Diffusion Patterns of Tweets Linked to Fake News vs. Posts Linked to Real News

First, we looked into the numerous ways that verified real news and fake news were being distributed on Twitter. Although many works have analyzed the dissemination differences between fake and real news [28,29,30], most of the studies performed their analysis at the news level (Figure 2). The cascade size of the tweet post related to real news is larger than fake news, as shown in Figure 4c. The average time difference between adjacent nodes (retweet nodes) indicates how fast a post is retweeted. Figure 4a shows that posts citing fake news are retweeted faster. On average, 40% of fake news cascades have a time difference exceeding 100 min, compared to 60% of real news cascades. In Figure 4b, it can be seen that the time difference between the source tweet and the first retweet is similar across different veracity sets.
Due to the aforementioned differences, we also investigated the difference in variable importance between real and fake news posts by testing the framework on a dataset of ’real’ news propagation.
To summarize, the main contributions of this paper are four-fold:
  • This work studies a novel topic of predicting the influence of fake news on social media in an early stage, which is crucial for mitigating the impact of fake news.
  • We propose a comprehensive framework named ExoFIA, which jointly models multi-modal features, including exogenous factors, such as public trends, and endogenous factors, such as the contents of posts, user characteristics, and the social network being posted on. ExoFIA is able to capture temporal and structural dynamics along the propagation of posts.
  • Our proposed framework provides explainability with the aid of an attention mechanism for better understanding. We further examine the difference of feature importance between real and fake news.
  • Extensive experiments are conducted on a real-world Twitter dataset, demonstrating the effectiveness of our proposed model. A comparison with existing prediction methods shows the superiority of ExoFIA.

2. Related Work

Many efforts have been made to anticipate the popularity of social media content based on information dissemination. This section briefly overviews popularity prediction and exogenous influences on social media.

2.1. Information Diffusion and Macroscopic Prediction

Previous research on information prediction can be divided into two categories based on the granularity of the tasks: the micro-level and the macro-level. Micro-level models focus on individual responses to information, whereas macro-level models predict how much attention information will receive in the future. Therefore, information prediction methods can be divided into the following categories.

2.1.1. Generative Process Approaches

We look at information retweeting as a series of events taking place within a continuous time period and model the impact of each event. The model observes every event and learns the parameters by maximizing the probability of events occurring during the observation time window [7,8,9,11,31]. Typically, the solutions fall into two categories. The first one is the Poisson process [8,10], which predicts the item’s popularity by employing the reinforced Poisson process (RPP) and incorporating it into the Bayesian framework for external variable inference and parameter estimation. The second one is the Hawkes process adopted in [7,9,11], which constructs predictors that combine a self-exciting point process that regards the rate of events (e.g., retweets or citations) as a function of time and the previous history of events. The predictor leverages a feature-driven method to fit a memory kernel for estimating user influence, memory decay, and content virality [9].
These models are incapable of modeling important structural information that could aid in understanding the pathways of information diffusion.

2.1.2. Feature-Based Approaches

A variety of features are extracted from the raw data, which can be mainly divided into four types: temporal data [15,16,17,22], structural data [14,15,19,20,21], user information [12,13], and content features [12,14,18]. These features are used in a machine learning model to predict popularity. Temporal features are usually extracted using the peeking strategy, i.e., observing a small number of early participants and their active time. Temporal consideration in cascades has been identified as one of the most important factors in popularity prediction [14]. However, some studies claim that their advantages diminish over time [16]. Structural features extracted from graphs can be classified as [32]: (i) participants only, i.e., only cascade graphs are involved [20]; (ii) global graphs, i.e., both participants and non-participants are considered [21]; and (iii) r-reachable graphs, i.e., a compromise that extends the cascade graph within the scope of the global graph [14,15]. Furthermore, different platforms have unique diffusion mechanisms, which might result in dynamics that differ from well-studied social network scenarios [19]. Opinions of recent studies differ on the validity of content features. The study [14] found that content features became less important when more participants were observed, and ref. [12] found that their model did not improve its effectiveness by the addition of content features.
These hand-crafted features are difficult to build and rely on subject knowledge, and the conclusion of previous works may differ depending on the community platform.

2.1.3. Deep-Learning-Based Approaches

Inspired by the recent success of deep learning in many fields, cascade prediction has achieved significant performance gains using deep neural networks. DeepCas [23] is the first method based on graph representation learning to model and forecast the popularity of information cascades. It uses DeepWalk [33] concepts to sample cascaded graphs via random walks.
Unlike the DeepWalk concepts in DeepCas, Topo-LSTM [24] employs a directed acyclic graph(DAG)-structured recurrent neural network to model diffusion topologies. CasCN [22] leverages GCN and LSTM to extract both structural and temporal information from the cascade graph. By considering a cascade graph as a sequence of sub-cascade graphs, CasCN first learns each sub-cascade’s local structure through graph convolutions and then adopts long short-term memory neural networks (LSTM) to model the evolving process of the cascade’s structure.
Deep learning has good predictive power, but deep learning models lack model interpretability due to the “black box” nature of neural networks [34]. In addition, the computational cost of deep learning models is considerably greater than that of generative models and feature-based models.

2.2. Endogenous and Exogenous Influences

Exogenous (or external) factors are uncertain events that provide a stimulus for cascade diffusion. As shown in previous work [35], about one-third of tweets have been significantly affected and even manipulated by exogenous forces. Furthermore, burst events are more likely to first appear on newspapers and video-sharing sites and then spread to other microblogging platforms, such as Twitter and Weibo. This inspired later works to predict the popularity of a field via other information sources and dissemination platforms to model the external stimuli responsible for popularity. For example, the study [36] retrieved information from Twitter and YouTube to predict the “views” and “ratings” of movies in IMDB. With regard to social media discourse, the work [37] confirmed the superiority of models of chatter prediction that consider exogenous influences. In a recent study [38], Masud et al. became the first to propose a retweet prediction model to consider external influences. They used the news events as exogenous factors and modeled hate speech diffusion on Twitter. However, the use of “news events” as exogenous factors is relatively limited because news events are usually influenced by one-sided media or only cover topics that most people are interested in. In contrast, Google Trends is a more comprehensive collection of topics of interest to users across a region. Therefore, we believe Google Trends can be a strong representation of the popularity of people’s engagement. A press release can only represent that an event occurred at that time, but its popularity is unknown. Modeling external stimuli can significantly enrich data diversity and improve model robustness.

3. Preliminaries

3.1. Dataset

3.1.1. Twitter Data

We conducted our experiments on the most well-known fake news data repository: FakeNewsNet [31]. The repository contains diverse features that can be categorized into three categories: news content, social context, and spatiotemporal information.
News content includes the meta-attributes of news (e.g., body text and title), collected from two reliable fact-checking platforms: GossipCop and PolitiFact. Each piece of news is reviewed by domain experts and annotated as real or fake news.
Social context includes the social engagements of news items. This includes, for instance, the posts that directly spread news pieces and the detailed information of the users, such as their Twitter profile description and the list of Twitter followers of each user.
As for spatiotemporal information, the spatial information indicates the location explicitly provided in user profiles or posts, and the temporal information indicates the timestamps of user engagements, which can be used to study how news pieces propagate on social media. The detailed statistics of the dataset are illustrated in Table 1.
In the retweet data crawled from the official Twitter API, the retweet of a retweet points to the original tweet, as Figure 5 has shown. As a result, we cannot establish who discovered a tweet that a user later retweeted when reconstructing interactions. For the above reasons, we could not use the dataset directly to build the network, so we built networks by crawling the corresponding “follower network” from FakeNewsNet. The details are described in Section 3.2.
As shown in Figure 6, the distribution of cascade sizes (popularity) is approximately a power-law distribution, implying that most source tweets do not spread at all, while a small fraction are reposted thousands of times. Source tweets sharing fake news have an average cascade size of 2.92, with a median of 1; tweets sharing real news had an average cascade size of 4.40, with a median of 1.

3.1.2. Exogenous Source

As exogenous information, we queried Google Trends, which reflects real-world public concerns since it comprehensively collects the keywords searched by users across the region on Google’s search engine. Google Trends is a valuable tool that displays trending search queries and the popularity of various keyword phrases over time. However, it only gives relative numbers, and there is no way to obtain absolute numbers. Users can select a certain period and location, and the Google engine will show the trend according to the specific conditions selected. More information will be provided in Section 4.1.4.

3.2. Reconstructing Cascades

We can infer the source of a retweet and identify the possible user’s friends who retweeted the tweet based on a retweet. We assume that if the user’s retweet timestamp is later than the retweet timestamp of one of the user’s friends (following), the user most likely saw the tweet from one of his/her friends and retweeted it.
When a tweet is retweeted by multiple friends, we consider the earliest retweet the source. As shown in Figure 7a, if user E has followed both user B and user D, and user B’s retweet is earlier than user D, as shown in Figure 5, we believe that user E has received information from user B’s retweet. Thus, we connect retweet B to E as a cascade in Figure 7b.
In the absence of an immediate retweet from a user’s friend, we can assume that the retweet is from the original tweet rather than a retweet of another retweet. For instance, we can see that user C has no friends who have retweeted this tweet; thus, we link the source tweet to retweet C.

3.2.1. Diffusion Network and Social Network among Users

Figure 7b illustrates the process of a news post spreading in Twitter by retweeting the source tweet, which then shares the news link and can be further converted into a diffusion network and social network among users.
The diffusion path among users is shown in Figure 8, which is directly converted from the post’s cascade. The social network among users can be converted from the post’s cascade via the spreaders’ follower lists. However, the direction is from the followed to the followers, which is in line with the information dissemination direction (information is spread from the followed to the followers).
A diffusion path is a tree structure with a single root node (i.e., the source tweet). In contrast, a social network built from the posts’ cascade is not necessarily a tree structure.

3.3. Problem Statement

Let us say we have S source tweets containing the fake news link,  S = { s i } ( 1 i S ) .
Fake News. Two key factors are used to define fake news: authenticity and intent [2]. First, fake news contains claims that can be verified by users as wrong information. Second, fake news is created with malicious intentions to mislead readers. Based on these two key features, the definition of fake news can be divided into two categories: narrow and broad. News needs to satisfy both key characteristics in order to meet the narrow definition of fake news. On the other hand, a broader definition of fake news focuses on the content’s authenticity or intent. In this paper, we have adopted the broad definition to involve more data instances, such as inadvertently created false news content or biased news articles for political propaganda purposes.
Cascade. An information cascade can be viewed as a diffusion topology, which is depicted in the tree’s structure. Each node in the tree represents one step of information propagation. For example, we refer to the post’s diffusion tree generated by the source tweet  s i  referencing the URL and all its retweets as the cascade.
Observed Cascade. For each source tweet  s i , the observed cascade is recorded as the set of early spreaders u within the observation time window T, i.e.,  C t = T s i = { u 1 , u 2 , , u n T s i } , in which  n T s i  is the number of users propagating the source tweet  s i  within the observation time window T.
Popularity of Post. If the tweet is retweeted, then the retweet will become a child node of the source tweet. Therefore, we can define the size of a post cascade in social media as the number of users involved in the retweeting process, which is the post’s total number (including source tweets and retweets). We quantify the popularity of a post using the cascade size, as defined in [8,14].
Future Popularity Prediction. Given an observation time T and a source tweet s with the news link, we have the observed cascade  C T s  and underlying network  G T s = ( V T s , E T s ) , in which  V T s  is the set of users associated with s within the observation time window T, and  E T s V T s × V T s  is the set of relationships between all users. For each user in the cascade, the profile and the historical tweets are retrieved as well. In this work, we aim to predict the natural logarithm of the final popularity  l o g ( Y t p = s + 1 )  of the source tweet s. Figure 9 shows that when approaching seven days after publications, the cascade saturates. Thus, in this work, we consider seven days as a good approximation to the final popularity; i.e., we choose seven days as the prediction time,  t p .

4. Methodology

In this section, we provide the details of our proposed framework, ExoFIA. The architecture of ExoFIA is illustrated in Figure 10. Our method consists of two major components, uni-modal representation extraction and multi-modal attention fusion to learn the popularity. The features are categorized into endogenous and exogenous classes, which can be further divided into four categories: the network, the tweet post, the user’s information, and the trend. The representation of each feature type is extracted through the uni-modal extraction module. Finally, the multi-modal fusion is in charge of performing our regression task.

4.1. Uni-Modal Representation Extraction

4.1.1. Network Module

We intended to capitalize on the process of information propagation among users during the growth of the post’s cascade over time. The architecture of Network Module is illustrated in Figure 11. And the input features of this module is shown in Table 2.
Dynamic graphs. Given the observation time  [ 0 , T ) , we divided the observation time into n intervals, so the length of an interval was denoted as  T n . Then, we transformed the original graph into a sequence of sub-graphs, i.e.,  G T s = { g T n 1 s , g T n 2 s , , g T n k s } , k [ 1 , n ] , in which  g T n k s  is the snapshot of the original graph at the time-instant  T n k . The dynamic graphs afford us a glimpse of the speed of spread and the scale of the early cascade.
We leveraged GCN [25] to exploit the local structure of each sub-graph and then used GRU [26] to capture the evolving process of the graph structure. We adopted a heterogeneous graph convolutional network to jointly learn the structural characteristics of the diffusion graph and social graph mentioned in Section 3.2.1. Diffusion graphs are important for understanding representations of structural and temporal patterns, while social networks provide a structure for understanding the relationships between users. Social graphs are the basic means of tweets dissemination, which can reveal community information.
GCN is a convolutional neural network that can work on a non-Euclidean structure and take advantage of a graph’s structural information. Given an adjacency matrix  A  and node feature matrix  X , the convolution layers capture spatial features between nodes by their first-order neighborhoods. The GCN model can be built by stacking multiple convolution layers, which can be expressed as
H ( + 1 ) = σ ( D ^ 1 2 A ^ D ^ 1 2 H ( ) W ( ) ) ,
in which  H ( )  is the output of the layer,  A ^ = A + I  denotes the matrix with added self-connections,  D ^ i i = j = 0 A ^ i j  is the diagonal degree matrix,  W ( )  are learnable parameters of the layer, and  σ ( · )  represents the ReLU function.
We stacked one convolution layer for each graph.  H ( 0 )  was set as a node feature matrix  X H ( 0 )  was fed into the GCN layer to compute the output matrix of the next layer. Seven user traits are specified in Section 4.1.3, as well as a time gap between the retweet node and the source tweet node. The new node feature matrix was denoted by  H ( + 1 ) R n t s × d , in which  n t s  is the node number of a graph and d is the dimensionality of the node embedding.
H s o c i a l ( + 1 ) = σ ( D ^ 1 2 A ^ s o c i a l D ^ 1 2 H ( ) W s o c i a l ( ) ) ,
H d i f f ( + 1 ) = σ ( D ^ 1 2 A ^ d i f f D ^ 1 2 H ( ) W d i f f ( ) ) .
After convolution, average pooling was applied to generate the graph representation  o R d . To fuse two types of graph representations, we used element-wise addition for aggregation, as shown in Equation (4). Thus far, each time interval’s network structure has been properly encoded.
o n e t w o r k = o s o c i a l o d i f f .
GRU was then adopted to capture temporal dependence. The GRU hidden vector output was at step t h t  (Equation (6)). For the input sequence  O = { o 1 , o 2 , , o n }  is given by
u t = σ ( W u · [ h t 1 , o t ] ) ,
r t = σ ( W r · [ h t 1 , o t ] ) ,
h ˜ t = σ ( W h ˜ [ r t h t 1 , o t ] ) ,
h t = ( 1 u t ) h t 1 + u t h ˜ t ,
in which ⊙ denotes the element-wise product;  u t  functions as an update gate (Equation (5b)) and determines which portions of the previous hidden state must be transmitted to the future;  r t  indicates the reset gate (Equation (5c)), which decides what parts of the previous hidden state to consider or ignore at the current step;  h ˜ t  in Equation (5c) computes new hidden state content using the parts of the previous hidden state, as dictated by  r t ; and  W u W r , and  W h ˜  are learnable weights.
To further enhance the network representation, the last hidden state of GRU was further concatenated with structural features and temporal features as the auxiliary network representation.

4.1.2. Tweet Module

It is worth using information from the post itself to predict the size of a post cascade. We fetched the tweet object through the Twitter API, including the tweet content and meta-information of the tweet. The metadata of the post have also been confirmed to affect the spread of the post. However, the effectiveness of the content is a point of contention. We did not use content features in the final tweet component for two reasons. First, we used DistilBERT [34] as an encoder to obtain semantic vectors, and the performance did not improve by including content features. The results of this are similar to the work [14,39]. Second, the amount of time spent training DistilBERT was significant.
We further classified features into three categories: statistical, temporal, and sentiment, as shown in Table 3. For the sentiment features, we use dValence Aware Dictionary and sEntiment Reasoner (VADER) [40], a dictionary and rule-based sentiment analysis tool that specializes in sentiments expressed in social media. A sentence’s sentiment score was the total of the sentiment scores of each sentiment-bearing word. The average sentiment score of every sentence in the source tweet was used as the source tweet’s  s e n t i m e n t s c o r e , and the value ranged between −1 and 1, from most negative to most positive.
Then, we concatenated statistical, temporal, and sentiment features as the source tweet representation, as shown in Table 3.

4.1.3. User Module

User profile. User behavior plays an important role in the propagation of the cascade, and the most obvious factor is the user’s follower count. The greater the number of followers, the greater the user’s influence, and the more widely the post spreads [13]. Therefore, we also fed users’ information into the model, such as how active they are on social media, including their number of followers, their number of friends, whether their account is officially verified, and so on. This information can be seen in the user’s attributes via Twitter API, as shown in Table 4 below.
User timeline. The user’s posting habits and followers’ feedback to the user can also be observed from the user’s historical posts. We used the Twitter API to collect the ten tweets preceding the target tweet and observed the user’s posting habits from the historical timeline. We extracted two categories of features that shown in Table 5: statistical, such as avg_time_diff, which can provide a glimpse into the user’s posting habits, and  a v g _ f a v o r i t e _ c o u n t , which can be used to observe the response of followers. The sentiment feature was the average sentiment score of the timeline acquired through VADER, allowing one to witness whether the content leans towards extremes.
In this module, we simply combined all features as a single feature representation, i.e.,  E n e t  in Figure 10. This representation was fed into the multi-modal attention fusion module together with the other representations obtained from the other modules.

4.1.4. Trend Module

The dissemination of information on social media is affected by internal signals, such as user engagement with posts, as well as endogenous signals, such as sudden occurrences outside the platform. Our aim is to measure public reactions to the news contained in a tweet at that very moment and use it as an exogenous signal. Utilizing Google Trends, we were able to accomplish our objectives. The architecture of Trend Module is illustrated in Figure 12.
Exogenous features. Using TF-IDF, we pulled out three relevant keywords from the title of the news. Not all of these were accurate, however, so we manually sorted through them to replace any unreasonable ones. To obtain their corresponding trending values, we used the Google Trends API to take data from 15 days prior to the date of the source tweet up until the day before. Finally, the geographical location was set to the United States area.
One-dimensional convolutional neural network (1D-CNN) models can be used to encode trending values. 1D filters were employed in each convolutional layer to capture the local features of the input data, followed by a ReLU function for non-linear transformation of the data.
The mathematical representation of the convolutional operation is given by
c i = σ ( x i : i + h 1 w i + b ) , c i R ,
in which  w i R h × 1  denotes a filter that is applied to a window of h days’ trending values to produce a new feature, i corresponds to the trending value index, and b is the bias. The convolution operator is represented by ∗, and  σ ( · )  corresponds to the activation function. The feature  c i  is generated from windows of trending values  x i : i + h 1 . This filter was applied to each possible window of trending values to produce a feature map, as shown in Equation (8).
c = [ c 1 , c 2 , , c n h + 1 ] .
The model employed multiple filters (with a diverse range of window sizes) to extract multiple features. To capture the public’s attention at different intervals, we set filter windows of 3, 5, and 7. We set up distinct numbers of layers for each branch of the window sizes so that the output size of the final layer was consistent; i.e., it had the same proportion of features regardless of time scale. Then, we applied channel-wise mean and concatenated the features from different time scales.
The trend representation was obtained and further concatenated with statistical features and trend features, as shown in Table 6 below.

4.2. Multi-Modal Attention Fusion

In order to incorporate the multi-modal information, we introduce an attention mechanism to focus on specific features, since each feature contributes differently to the model. The architecture is show in Figure 13. This is followed by multiple layers of the perceptron. Taking the concatenation of the representation encoded by different modules denoted as  Z R 1 × D  as input, it outputs one final unit y, i.e., a cascade size level ( y = l o g ( Y t p = s + 1 ) ). D represents the sum of the dimensions of the four output embeddings of the uni-modal representation extraction, i.e.,  D = d n + d t w + d u + d t r .
The neural network architecture that implements the attention mechanism can be formulated as
y = σ ( W 2 ( σ ( W 1 ( Z α ) + b 1 ) ) + b 2 ) ,
in which  σ  corresponds to the activation function ReLU, ⊙ refer to the element-wise product, and  W 1 , W 2 , b 1 , b 2  are learnable weights.
α = s o f t m a x ( W l a t t n Z + b l a t t n ) ,
where  W l a t t n R D × D b l a t t n R 1 × D α R 1 × D  denotes the attention score vector, with the value of each dimension in the vector  α i R , 1 < i < D  representing the importance of the feature corresponding to this dimension. To obtain our target, the cascade size level  y ^ , we applied a multilayer perceptron (MLP) with one hidden layer on  Z α R 1 × D  to obtain the target.
Objection function. The objective function to minimize is defined as follows:
L ( Y ^ , Y ) = 1 S i S ( l o g ( y ^ i + 1 ) l o g ( y i + 1 ) ) 2 ,
in which S is the total number of cascades,  Y ^  is the predicted value, and  Y  is the ground-truth label. The cascade size, or popularity of a tweet, is measured on a natural logarithmic scale. This is because tweet popularity can vary greatly, ranging from just one retweet to thousands. Most tweets have very few retweets, resulting in a heavy and long-tailed distribution, as illustrated in Figure 6. When using logarithmic scaling, the model is not impacted by extreme values, which ensures stability for the loss function.

5. Experiments

We first present the experimental setup in Section 5.1, including the dataset partition and evaluation metrics. Section 5.2, Section 5.3 and Section 5.4 contain various experiments that evaluate the effectiveness of our proposed framework, ExoFIA. Specifically, we aim to answer the following research questions:
  • RQ 1. Can our proposed framework, ExoFIA, achieve robust effectiveness in fake news popularity prediction by taking into account multi-modal contents, such as networks, user characteristics, tweets, and trends?
  • RQ 2. How critical are exogenous features to improving ExoFIA’s prediction performance? Does the use of both diffusion and social networks improve performance?
  • RQ 3. Can ExoFIA exploit the features extracted from endogenous and exogenous sources to explain why a tweet sharing fake news leads to a massive information cascade? Is there a discrepancy between real news and fake news?
To answer RQ 1 and RQ 2, we compared the performance of our model, ExoFIA, to several baselines in Section 5.2.1, followed by a few variants of ExoFIA in Section 5.2.2. In addition, we measured the performance of these models under different observation time windows, as detailed in Section 5.3. To address RQ 3, we explored the differences in feature importance between real and fake news propagation by testing our framework on a dataset of posts sharing ‘real’ news, as seen in Section 5.4.

5.1. Experimental Setup

We sampled 10% of the entire data as a testing set and used the remaining 90% to tune parameters by stratified 5-fold cross-validation on a parameter grid. This 90% was further split into a 9:1 ratio for training and validation, respectively. The performance is reported on the testing set.

5.1.1. Baselines

We selected methodologies from the following categories to be competitors: (1) statistics-based approaches, (2) feature-based approaches, and (3) deep-learning-based approaches.
Statistics-based approahches:
  • Node_num_at_T: We counted the number of posts observed within the observation time and used the values as the predictive cascade size.
Feature-based approaches:
Deep-learning-based approaches:
  • Topo-LSTM [24]: A DAG (directed acyclic graph)-structured recurrent neural network was used to model diffusion topologies. The original application of Topo-LSTM is tailored for tasks related to node activation, so we replaced the logistic classifier with a regressor to predict the cascade size. Additionally, Topo-LSTM only depends on the order of nodes in each cascade. To ensure fairness in comparison, richer node features were incorporated by taking into account user information.
  • CasCN [22]: CasCN leverages GCN and LSTM to extract both structural and temporal information from the cascade graph. By considering the cascade graph as a sequence of sub-cascade graphs, it studies the local structure of each sub-cascade through graph convolutions. After that, it applies LSTM to model the development of the cascade structure.

5.1.2. Variants of ExoFIA

In addition to our comparison with existing baselines, we also derived a few variants of ExoFIA:
  • ExoFIA-trend: In ExoFIA-trend, the exogenous signal of public search interest in news is not taken into consideration.
  • ExoFIA-diff: In ExoFIA-diff, the diffusion network among users is disregarded.
  • ExoFIA-social: In ExoFIA-social, the social network among users is disregarded.

5.1.3. Parameter Setting

In the following experiments, all neural network were optimized by the Adam optimizer [41] with a learning rate of 1 3 . The batch size of the training set was set to 4096, and early stopping was employed when the validation loss did not decline for three consecutive epochs. Regarding the tuning of the hyper-parameters, we used the 5-fold validation method with the brute force method to find the best hyper-parameters. In other words, we set 5 different learning rates and 5 different batch sizes using 5 different training–validation sets to find the most suitable values.
The observation time T for all models was set to three hours and divided into three intervals, i.e., n = 3. For Topo-LSTM, CasCN, and ExoFIA, the node-embedding dimension was 8. All other hyper-parameters for each model were set to their default values. For ExoFIA, the dimensionality of node embedding,  d n , is 8 as shown in Figure 10, and the hidden vector dimension of GRU is 8. The size of the source tweet feature  d t w  is 12. The size of the user features  d u  is 16. For the 1D-CNN in the trend module, we used three different filters with sizes 3, 5, and 7, each with two feature maps, and output three embeddings of dimension 3, which we then concatenated. Thus, the dimension of the Google Trends embedding,  d t r , is 9, as seen in Figure 10.

5.1.4. Evaluation Metric

For the evaluation metric, we used the mean square error (MSE) as defined in Equation (12) [22,24,42].
M S E = 1 S i S ( y ^ i y i ) 2 ,
in which S is the total number of cascades,  y ^ i  is the predicted value, and  y i  is the ground-truth label.
In the real-life setting, our focus is more on identifying a relatively large cascade rather than the exact value of its size. That is, we should be more concerned about whether the model predicts a higher ranking of relative values when the source tweets have larger cascades. Therefore, in addition to regression metrics, we also use two metrics commonly employed for ranking: normalized discounted cumulative gain on the top k ( N D C G @ k ) and hit ratio on the top k ( H R @ k ).  H R @ k  is defined as follows:
H R @ k = N u m b e r o f H i t s @ k T o t a l n u m b e r @ k ,
in which ’hits’ means that if a tweet is predicted to be in the top k, it is also in the top k of the ground-truth label.
N D C G @ k  is defined as follows:
N D C G @ k = D C G @ k I D C G @ k ,
where  D C G @ k  and  I D C G @ k  are defined as
D C G @ k = i = 1 k r e l ( i ) l o g 2 ( i + 1 ) ,
I D C G @ k = i = 1 | R E L | r e l ( i ) l o g 2 ( i + 1 ) ,
in which i is the index of the i-th highest predicted label.  r e l ( i )  represents the corresponding true cascade size of the i-th cascade.  | R E L |  indicates that the results are sorted in descending order based on relevance, and the set of the first k results is selected, allowing for enhanced efficiency.
Both evaluation measures enabled us to examine our model from different perspectives. The MSE determines how accurate our model is in terms of cascade size (when comparing the true and predictive values), while NDCG is used to compare the level of similarity between true and predictive cascade orders in terms of cascade size.
We varied k in {1%, 5%, 10%, 15%} since only about 15% of cascades contain retweets. The distribution is shown in Figure 14.

5.2. Performance Comparison

5.2.1. Baselines Performance

To address RQ 1, we conducted experiments on several baselines. From Table 7, we can summarize the following points:
  • Our proposed method, ExoFIA, outperformed the baselines according to the NDCG and MSE metrics. Additionally, our model had a higher hit rate than other models when considering HR@1P and HR@5P. It appears that our model was successful in capturing the outbreak cascades of interest. We also noticed that the simpler model measured better on HR@15P (statistics-based approaches > feature-based approaches > deep-learning-based approaches) because the distribution of this dataset is skewed. The first 15% of the cascades equate to all the cascades with propagation (i.e., the remaining 85% of cascades were not propagated, and their cascade size was 1).
  • When all metrics are taken into consideration, ExoFIA > the future-deep method > the future-linear method. The future-deep method employs multiple non-linear functions to model the relationship between the predicted values and the actual cascade size levels and performs better than the future-linear method. However, it overlooks the dynamic data implicitly stored in networks.
  • When all metrics are considered, ExoFIA > CasCN > Topo-LSTM. All of these models analyze the cascade structure. However, Topo-LSTM does not consider time information, so it performs poorly. ExoFIA performs better than CasCN because ExoFIA incorparates both endogenous factors, such as user history, as well as exogenous signals.
  • The performance of CasCN in terms of hit rate is superior to that of the future-deep method, yet it lags behind with respect to the NDCG metric. This demonstrates that while dynamic features play a crucial role in capturing burst tweets, other features are still needed to effectively accomplish the sorting task.

5.2.2. Ablation Study

In order to address RQ 2, we demonstrated the effectiveness of each module in the ExoFIA model. Table 8 shows the performance of different variants from Section 5.1.2.
Studies have shown that integrating multi-modal information (as in ExoFIA) yields the greatest performance among all variants. If we exclude exogenous factors(ExoFIA-Trend), the performance declines. Likewise, omission of either the social network (ExoFIA-Social) or diffusion network (ExoFIA-Diff) also reduces performance.

5.3. Observation Time Window Study

To provide a more comprehensive answer to whether our model is more robust than other models regarding RQ 1, we conducted experiments using observation time windows of various sizes.
For the observation time window T, we made four settings, namely T = 0.5 h, 1 h, 2 h, and 3 h; these corresponded to the time when the popularity reaches roughly 50%, 60%, 65%, and 70% (Fake) (45%, 55%, 60%, and 65%, Real) of the final popularity, respectively, as depicted in Figure 9.
  • Observation time window T = 3 h, time interval  T n = 3  = 1 h;
  • Observation time window T = 2 h, time interval  T n = 3  = 40 min;
  • Observation time window T = 1 h, time interval  T n = 3  = 20 min;
  • Observation time window T = 0.5 h, time interval  T n = 3  = 10 min.
·  means the floor operation.
The evaluation results are shown in Table 9. We visualize this table for illustration.
Focusing on just ExoFIA, as visualized in Figure 15, we observe that the value of 1P (prediction on larger cascades) is most affected by observation time. This is because larger cascades usually have a longer growth period, and thus, a longer observation time window can adequately capture the growth of its lifespan.
Moreover, as the size of the observation time window increases, the cascade becomes saturated; thus, the prediction errors decline and ranking metrics ascend for all models (see Figure 16). Furthermore, the proposed ExoFIA performs better than these baselines under a variety of circumstances related to different windows, further validating the robustness of our model.
We observe an interesting phenomenon in Figure 16b. Node_num_at_T has the worst performance when the observation time is 0.5 h, but its performance abruptly increases with the observation time and surpasses most models. For clarity, we only chose node_num_at_T and Feature-deep for illustration. In Table 10, we find that as the observation time increases, the  H R @ k  (with k varying from small to large) of node_num_at_T gradually exceeds the value of Feature-deep. As the observation time increases, saturation of the cascade is likely to occur, and node_num_at_T will become closer and closer to the final size of the cascade. Most of the cascades are still spreading and growing when the observation period is short. Only relying on the node numbers at instant T is not enough to predict future predictions, so deep learning models must be used to extract representative information. However, when the observation period lasts longer, more cascades stop spreading, and only those with larger sizes continue to grow.).

5.4. Interpretability and Case Study

To address RQ 3, we extracted the attention vector from the attention layer and used it to calculate feature importance.  α ( s i )  denotes the attention vector of the instance i.
α = s o f t m a x ( W l a t t n Z + b l a t t n ) , α R 1 × D .
We aggregated attention vectors on the instance level [43] as
I M P = 1 S i S α ( s i ) ,
in which  I M P R 1 × D  denotes feature importance.
We evaluated the value of each feature in the construction of an attention network by summing their relevant feature importances. For example,  I M P i : i + n 1  denotes the n feature importance related to the tweet post, and the feature importance of the post is formulated as  k = i i + n 1 I M P k . From Figure 17, we can see the importance of each feature set. It is clear that in both real news and fake news datasets, the two most significant feature sets are network and user timeline. Tweet posts and user profiles are less influential, while the trend is the least impactful.
Moreover, we divided the cascades arranged by size into five sequential intervals on the p-quantile ( p = [ 0 , 0.87 , 0.95 , 0.997 , 0.999 , 1 ] ). In Figure 18, the x-axis tick indicates the size of a cascade on a scale of 0 to 4. We wanted to know which feature sets would become more important as the cascades size increased.
In two datasets of different veracities, we found that the same pattern appeared in the changes in the importance of networks, tweet posts, user timeline (history), and trends, whereas the user profile took an opposite route.
Generally, the network importance increases then decreases for both datasets because the more significant the post, the less important the dissemination structure of early hours. This implies that the initial structural features become less important as cascades grow, which is consistent with previous work [14].
Trends (public concern) tend to be more important on large-scale than on small-scale cascades. However, both user timelines (history) and tweet posts decrease as scale increases. The visualization of the chart corresponds with common sense; as the cascade size increases, more attention is paid to the trend rather than the post itself and the user timeline.
In the real dataset, the importance of user profiles steadily rises, but in fake datasets, it is just the reverse. We believe that even if the information posted by ordinary people is accurate, very few people will retweet it. As a result, when the cascade size increases, the user’s data also becomes more valued.

6. Conclusions and Future Work

6.1. Conclusions

Existing research on online fake news mainly focuses on fake news detection, with few attempts to analyze the dissemination dynamics of fake news on large-scale information networks. This led us to combine rich features to predict the cascade level when sharing a post containing fake news. Our neural framework, ExoFIA, takes into account exogenous information, i.e., extra-Twitter information, which has been rarely considered in previous popularity prediction studies. It adopts attention mechanisms to explore social network characteristics, user characteristics, post content, and public interest. Additionally, we explore the differences in feature importance between the propagation of real and fake news. Comparisons with multiple state-of-the-art prediction models reveal the overall advantages of ExoFIA.

6.2. Future Work

This work presents a prediction model to predict the cascade size of a source tweet with fake news. The cascade size of the source tweet can be treated as the influence or the impact of fake news. However, there is still room for improvement. First, we should consider features that provide rich information on news influence on social media, such as pictures from news articles, the geographical correlations between events and online users, etc. Second, when considering exogenous factors, using TF-IDF to find news keywords is challenging, as they require manual intervention. If the keywords do not map aptly to the news, the trends derived from Google Trends will be inaccurate. In future work, we plan to employ deep learning methods to accurately extract these keywords. Finally, exogenous sources need to be diversified, such as other microblogging platforms (e.g., Facebook and Instagram), video-sharing sites (e.g., YouTube), or news channels. Various kinds of platforms can be used alternately to explore which platform is paramount. Does the combination of different types of platforms result in better prediction performance? Or is it more beneficial to use only one kind of platform?

Limitation

Dataset decay. The drawback is that fake news datasets can quickly become obsolete as the hyperlinks and social media accounts associated with the news at the time of its publication may no longer be accessible due to deletion or privacy issues. We look forward to conquering this limitation if the new version of Twitter API is released in the future.

Author Contributions

Supervision, H.-P.H.; methodology, H.-P.H., P.-X.L. and Y.-Y.H.; validation, Y.-Y.H.; investigation, H.-P.H., P.-X.L. and Y.-Y.H.; writing—original draft preparation, Y.-Y.H. and P.-X.L.; writing—review and editing, H.-P.H. and C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Science and Technology Council of Taiwan under grants 111-2636-E-006 -026.

Data Availability Statement

Not applicable.

Acknowledgments

This work was partially supported by the National Science and Technology Council of Taiwan under grants 111-2636-E-006 -026—(NSTC Young Scholar Fellowship).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gottfried, J.; Shearer, E. News use across social media platforms 2016. Pew Research Center, 26 May 2016. [Google Scholar]
  2. Allcott, H.; Gentzkow, M. Social media and fake news in the 2016 election. J. Econ. Perspect. 2017, 31, 211–236. [Google Scholar] [CrossRef] [Green Version]
  3. Thomas, Z. WHO Says Fake Coronavirus Claims Causing ‘Infodemic’. BBC News, 13 February 2020. [Google Scholar]
  4. Nguyen, V.H.; Sugiyama, K.; Nakov, P.; Kan, M.Y. Fang: Leveraging social context for fake news detection using graph representation. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management, Virtual Event, 19–23 October 2020; pp. 1165–1174. [Google Scholar]
  5. Ruchansky, N.; Seo, S.; Liu, Y. Csi: A hybrid deep model for fake news detection. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, Singapore, 6–10 November 2017; pp. 797–806. [Google Scholar]
  6. Shu, K.; Wang, S.; Liu, H. Beyond news contents: The role of social context for fake news detection. In Proceedings of the twelfth ACM International Conference on Web Search and Data Mining, Melbourne, Australia, 11–15 November 2019; pp. 312–320. [Google Scholar]
  7. Crane, R.; Sornette, D. Robust dynamic classes revealed by measuring the response function of a social system. Proc. Natl. Acad. Sci. USA 2008, 105, 15649–15653. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Gao, S.; Ma, J.; Chen, Z. Modeling and predicting retweeting dynamics on microblogging platforms. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, Shanghai, China, 2–6 February 2015; pp. 107–116. [Google Scholar]
  9. Mishra, S.; Rizoiu, M.A.; Xie, L. Feature driven and point process approaches for popularity prediction. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, Indianapolis, IN, USA, 24–28 October 2016; pp. 1069–1078. [Google Scholar]
  10. Shen, H.; Wang, D.; Song, C.; Barabási, A.L. Modeling and predicting popularity dynamics via reinforced poisson processes. In Proceedings of the AAAI Conference on Artificial Intelligence, Québec City, QC, Canada, 27–31 July 2014; Volume 28. [Google Scholar]
  11. Zhao, Q.; Erdogdu, M.A.; He, H.Y.; Rajaraman, A.; Leskovec, J. Seismic: A self-exciting point process model for predicting tweet popularity. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 10–13 August 2015; pp. 1513–1522. [Google Scholar]
  12. Bakshy, E.; Hofman, J.M.; Mason, W.A.; Watts, D.J. Everyone’s an influencer: Quantifying influence on twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, Hong Kong, China, 9–12 February 2011; pp. 65–74. [Google Scholar]
  13. Zaman, T.; Fox, E.B.; Bradlow, E.T. A bayesian approach for predicting the popularity of tweets. arXiv 2014, arXiv:1304.6777. [Google Scholar] [CrossRef]
  14. Cheng, J.; Adamic, L.; Dow, P.A.; Kleinberg, J.M.; Leskovec, J. Can cascades be predicted? In Proceedings of the 23rd International Conference on World Wide Web, Seoul, Republic of Korea, 7–11 April 2014; pp. 925–936. [Google Scholar]
  15. Gao, S.; Ma, J.; Chen, Z. Popularity prediction in microblogging network. In Proceedings of the Web Technologies and Applications: 16th Asia-Pacific Web Conference, APWeb 2014, Changsha, China, 5–7 September 2014; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2014; pp. 379–390. [Google Scholar]
  16. Xie, D.; Xu, J.; Lu, T.C. What’s trending tomorrow, today: Using early adopters to discover popular posts on Tumblr. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 2168–2176. [Google Scholar]
  17. Yang, J.; Leskovec, J. Modeling information diffusion in implicit networks. In Proceedings of the 2010 IEEE International Conference on Data Mining, Sydney, Australia, 13–17 December 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 599–608. [Google Scholar]
  18. Naveed, N.; Gottron, T.; Kunegis, J.; Alhadi, A.C. Bad news travel fast: A content-based analysis of interestingness on twitter. In Proceedings of the 3rd International Web Science Conference, Koblenz, Germany, 15–17 July 2011; pp. 1–7. [Google Scholar]
  19. Anderson, A.; Huttenlocher, D.; Kleinberg, J.; Leskovec, J.; Tiwari, M. Global diffusion via cascading invitations: Structure, growth, and homophily. In Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, 18–22 May 2015; pp. 66–76. [Google Scholar]
  20. Galuba, W.; Aberer, K.; Chakraborty, D.; Despotovic, Z.; Kellerer, W. Outtweeting the twitterers-predicting information cascades in microblogs. WOSN 2010, 10, 3–11. [Google Scholar]
  21. Huberman, B.A.; Romero, D.M.; Wu, F. Social networks that matter: Twitter under the microscope. arXiv 2008, arXiv:0812.1045. [Google Scholar]
  22. Chen, X.; Zhou, F.; Zhang, K.; Trajcevski, G.; Zhong, T.; Zhang, F. Information diffusion prediction via recurrent cascades convolution. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, 8–11 April 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 770–781. [Google Scholar]
  23. Li, C.; Ma, J.; Guo, X.; Mei, Q. Deepcas: An end-to-end predictor of information cascades. In Proceedings of the 26th International Conference on World Wide Web, Perth, Australia, 3–7 April 2017; pp. 577–586. [Google Scholar]
  24. Wang, J.; Zheng, V.W.; Liu, Z.; Chang, K.C.C. Topological recurrent neural network for diffusion prediction. In Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM), New Orleans, LA, USA, 18–21 November 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 475–484. [Google Scholar]
  25. Kipf, T.N.; Welling, M. Semi-supervised classification with graph convolutional networks. arXiv 2016, arXiv:1609.02907. [Google Scholar]
  26. Bai, S.; Kolter, J.Z.; Koltun, V. An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv 2018, arXiv:1803.01271. [Google Scholar]
  27. Kiranyaz, S.; Avci, O.; Abdeljaber, O.; Ince, T.; Gabbouj, M.; Inman, D.J. 1D convolutional neural networks and applications: A survey. Mech. Syst. Signal Process. 2021, 151, 107398. [Google Scholar] [CrossRef]
  28. Juul, J.L.; Ugander, J. Comparing information diffusion mechanisms by matching on cascade size. Proc. Natl. Acad. Sci. USA 2021, 118, e2100786118. [Google Scholar] [CrossRef] [PubMed]
  29. Shu, K.; Mahudeswaran, D.; Wang, S.; Liu, H. Hierarchical propagation networks for fake news detection: Investigation and exploitation. In Proceedings of the International AAAI Conference on Web and Social Media, Atlanta, GA, USA, 1–5 June 2020; Volume 14, pp. 626–637. [Google Scholar]
  30. Vosoughi, S.; Roy, D.; Aral, S. The spread of true and false news online. Science 2018, 359, 1146–1151. [Google Scholar] [CrossRef] [PubMed]
  31. Shu, K.; Mahudeswaran, D.; Wang, S.; Lee, D.; Liu, H. Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big Data 2020, 8, 171–188. [Google Scholar] [CrossRef] [PubMed]
  32. Zhou, F.; Xu, X.; Trajcevski, G.; Zhang, K. A survey of information cascade analysis: Models, predictions, and recent advances. ACM Comput. Surv. 2021, 54, 1–36. [Google Scholar] [CrossRef]
  33. Perozzi, B.; Al-Rfou, R.; Skiena, S. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 24–27 August 2014; pp. 701–710. [Google Scholar]
  34. Sanh, V.; Debut, L.; Chaumond, J.; Wolf, T. DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter. arXiv 2019, arXiv:1910.01108. [Google Scholar]
  35. Myers, S.A.; Zhu, C.; Leskovec, J. Information diffusion and external influence in networks. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, London, UK, 19–23 August 2012; pp. 33–41. [Google Scholar]
  36. Oghina, A.; Breuss, M.; Tsagkias, M.; De Rijke, M. Predicting IMDB Movie Ratings Using Social Media. In Proceedings of the ECIR, Barcelona, Spain, 1–5 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 503–507. [Google Scholar]
  37. Dutta, S.; Masud, S.; Chakrabarti, S.; Chakraborty, T. Deep exogenous and endogenous influence combination for social chatter intensity prediction. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Virtual Event, 6–10 July 2020; pp. 1999–2008. [Google Scholar]
  38. Masud, S.; Dutta, S.; Makkar, S.; Jain, C.; Goyal, V.; Das, A.; Chakraborty, T. Hate is the new infodemic: A topic-aware modeling of hate speech diffusion on twitter. In Proceedings of the 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 19–22 April 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 504–515. [Google Scholar]
  39. Kupavskii, A.; Umnov, A.; Gusev, G.; Serdyukov, P. Predicting the audience size of a tweet. In Proceedings of the International AAAI Conference on Web and Social Media, Cambridge, MA, USA, 8–11 July 2013; Volume 7, pp. 693–696. [Google Scholar]
  40. Hutto, C.; Gilbert, E. Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Proceedings of the International AAAI Conference on Web and Social Media, Ann Arbor, MI, USA, 1–4 June 2014; Volume 8, pp. 216–225. [Google Scholar]
  41. Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
  42. Cao, Q.; Shen, H.; Cen, K.; Ouyang, W.; Cheng, X. Deephawkes: Bridging the gap between prediction and understanding of information cascades. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, Singapore, 6–10 November 2017; pp. 1149–1158. [Google Scholar]
  43. Škrlj, B.; Džeroski, S.; Lavrač, N.; Petkovič, M. Feature importance estimation with self-attention networks. arXiv 2020, arXiv:2002.04464. [Google Scholar]
Figure 1. Modified examples (for anonymity) of tweets.
Figure 1. Modified examples (for anonymity) of tweets.
Applsci 13 06782 g001
Figure 2. Illustration of fake news propagating on social media.
Figure 2. Illustration of fake news propagating on social media.
Applsci 13 06782 g002
Figure 3. The Google search trends of three keywords of two source tweets.
Figure 3. The Google search trends of three keywords of two source tweets.
Applsci 13 06782 g003
Figure 4. CCDFs for different veracities. (a) Average time difference between adjacent nodes (retweet nodes). Cascades related to fake news have an average of 381.01, with a median of 64.44; cascades related to real news have an average of 390.99, with a median of 103.69. (b) Time difference between the source tweet and the first retweet. Cascades related to fake news have an average of 248.25, with a median of 9.58; cascades related to real news have an average of 229.30, with a median of 9.50. (c) Cascade size. Cascades related to fake news have an average of 2.92, with a median of 1; cascades related to real news have an average of 4.40, with a median of 1.
Figure 4. CCDFs for different veracities. (a) Average time difference between adjacent nodes (retweet nodes). Cascades related to fake news have an average of 381.01, with a median of 64.44; cascades related to real news have an average of 390.99, with a median of 103.69. (b) Time difference between the source tweet and the first retweet. Cascades related to fake news have an average of 248.25, with a median of 9.58; cascades related to real news have an average of 229.30, with a median of 9.50. (c) Cascade size. Cascades related to fake news have an average of 2.92, with a median of 1; cascades related to real news have an average of 4.40, with a median of 1.
Applsci 13 06782 g004
Figure 5. An example of retweets crawled from Twitter API.
Figure 5. An example of retweets crawled from Twitter API.
Applsci 13 06782 g005
Figure 6. Distribution of cascade sizes.
Figure 6. Distribution of cascade sizes.
Applsci 13 06782 g006
Figure 7. An example of a cascade constructed from (a) Follower network. A directed edge from user A to user B means that user A follows user B. (b) Post cascades with size = 5, depth = 3.
Figure 7. An example of a cascade constructed from (a) Follower network. A directed edge from user A to user B means that user A follows user B. (b) Post cascades with size = 5, depth = 3.
Applsci 13 06782 g007
Figure 8. Diffusion network and social network among users. Yellow lines depict the diffusion paths among users. Blue lines depict the users’ social networks. The direction of the arrow is the direction of information flow.
Figure 8. Diffusion network and social network among users. Yellow lines depict the diffusion paths among users. Blue lines depict the users’ social networks. The direction of the arrow is the direction of information flow.
Applsci 13 06782 g008
Figure 9. Percentage distribution.
Figure 9. Percentage distribution.
Applsci 13 06782 g009
Figure 10. The architecture of our ExoFIA framework. We first enter information about a source tweet, including a dynamic graph constructed from the propagation of the tweets at the time of observation, the characteristics of the source tweets, information about the user who posted the source tweet, and Google Trends information. Then, the following embeddings are obtained by each representation extraction module:  E n e t , the dynamic graph embedding with size  d n E t w , the source tweet feature with size  d t w E u s e r , a feature of the user who posted the source tweet, with size  d u ; and  E t r , the Google Trends embedding with size  d t r . Finally, these four embeddings will be fed into the fusion module to predict the answers.
Figure 10. The architecture of our ExoFIA framework. We first enter information about a source tweet, including a dynamic graph constructed from the propagation of the tweets at the time of observation, the characteristics of the source tweets, information about the user who posted the source tweet, and Google Trends information. Then, the following embeddings are obtained by each representation extraction module:  E n e t , the dynamic graph embedding with size  d n E t w , the source tweet feature with size  d t w E u s e r , a feature of the user who posted the source tweet, with size  d u ; and  E t r , the Google Trends embedding with size  d t r . Finally, these four embeddings will be fed into the fusion module to predict the answers.
Applsci 13 06782 g010
Figure 11. The architecture of the network component.
Figure 11. The architecture of the network component.
Applsci 13 06782 g011
Figure 12. The architecture of the trend component.
Figure 12. The architecture of the trend component.
Applsci 13 06782 g012
Figure 13. Thearchitecture of attention fusion.
Figure 13. Thearchitecture of attention fusion.
Applsci 13 06782 g013
Figure 14. Cumulative distribution function (CDF) of number of posts per cascade for different veracities.
Figure 14. Cumulative distribution function (CDF) of number of posts per cascade for different veracities.
Applsci 13 06782 g014
Figure 15. Prediction performance of ExoFIA for top-K cascade sizes under different observation times.
Figure 15. Prediction performance of ExoFIA for top-K cascade sizes under different observation times.
Applsci 13 06782 g015
Figure 16. Comparisons for all competitors under different observation times.
Figure 16. Comparisons for all competitors under different observation times.
Applsci 13 06782 g016
Figure 17. Feature importance for each component on different veracity.
Figure 17. Feature importance for each component on different veracity.
Applsci 13 06782 g017
Figure 18. Attention weight for each component of different veracities.
Figure 18. Attention weight for each component of different veracities.
Applsci 13 06782 g018
Table 1. The statistics of PolitiFact dataset of different veracities.
Table 1. The statistics of PolitiFact dataset of different veracities.
FakeReal
# News432624
# News having related tweets319359
# Users141,336419,545
# Tweets117,360316,871
# Retweets104,762427,666
Table 2. Network features.
Table 2. Network features.
FeatureDescription
Structural
features
max_degThe maximum out-degree of the social graph.
avg_degThe average out-degree of the social graph.
min_degThe minimum out-degree of the social graph.
edge_numberThe number of edges of the social graph.
node_numberThe number of nodes of the social graph.
diff_pathThe depth of the diffusion graph.
Temporal
features
min_timediffTime elapsed between the source tweet and the first retweet.
max_timediffTime elapsed between the source tweet and the last retweet.
avg_timediffThe average time elapsed between the adjacent retweets.
time_diff_at_max_degTime elapsed between the source tweet and the retweets with the maximum out-degree.
Table 3. Tweet features.
Table 3. Tweet features.
FeatureDescription
Statistical
features
user_countThe number of mentioned users in the source tweet.
tag_countThe number of hashtags in the source tweet.
symbol_countThe number of symbols in the source tweet.
url_countThe number of URLs in the source tweet.
sentence_countSentence count of the source tweet.
Temporal
features
hourThe hour when the source tweet was created.
weekdayDay of the week when the source tweet was created.
is_holidayBoolean. When true, the created time of the source tweet is on a holiday.
Statistical
features
sentiment_scoreThe source tweet’s sentiment score. The value is between −1 and 1, from the most negative to the most positive.
pos_countThe number of positive sentences in the source tweet.
neg_countThe number of negative sentences in the source tweet.
sentiment_ratioThe ratio of positive sentences to negative sentences.
Table 4. User profile features.
Table 4. User profile features.
FeatureDescription
Statistical
features
geo_enabledBoolean. If true, then the user agrees to have location data posted in his tweets.
verifiedBoolean. If true, it indicates that the user has a verified account.
followers_countThe number of followers this account currently has.
friends_countThe number of users this account is following.
listed_countThe number of public lists that this user is a member of.
statuses_countThe number of tweets (including retweets) that a user has posted.
favourites_countThe number of tweets this user has marked as favorite in the account’s lifetime.
Table 5. User timeline features.
Table 5. User timeline features.
FeatureDescription
Statistical
features
avg_rt_countThe average number of retweets of historical posts.
avg_favorite_countThe average number of times the historical posts have been marked as favorites.
avg_time_diffThe average time between posts of historical posts.
avg_sentence_countThe average sentence count of historical posts.
sensitive_tweet_ratioThe ratio of historical posts marked as sensitive.
Sentiment
features
avg_sentiment_scoreThe average value of sentiment_score from historical posts.
avg_pos_countThe average value of pos_count from historical posts.
avg_neg_countThe average value of neg_count from historical posts.
avg_sentiment_ratioThe average value of sentiment_ratio from historical posts.
Table 6. Trend features.
Table 6. Trend features.
FeatureDescription
Statistical features i m g _ c o u n t Number of images in the news article.
Trend
features
R S I _ M e a n R e l a t i v e s t r e n g t h i n d e x : A momentum indicator that measures the magnitude of recent trend changes. The average is the three keywords’ RSI values.
R S I _ M a x There are three variables for different time-scales.
We use the largest RSI value of the three keywords.
There are three variables for different time-scales.
M A _ M e a n M A : moving average is a statistic that captures the average change in a data series over time. The average is the three keywords’  M A  values.
M A _ M a x There are three variables for different time-scales.
We use the largest  M A  value of the three keywords.
There are three variables for different time-scales.
Table 7. Prediction performance of ExoFIA and baselines when observation time is set to 3 h. The best result in each column is in boldface.
Table 7. Prediction performance of ExoFIA and baselines when observation time is set to 3 h. The best result in each column is in boldface.
TypesModel NameHR@1PHR@5PHR@10PHR@15PNDCG@1PNDCG@5PNDCG@10PNDCG@15PMSE
StatisticsNode_num_at_T0.6770.7910.7980.8080.7120.7660.7870.7840.077
Feature
-based
Future-linear0.6450.7780.7910.7580.7110.7800.8020.8450.069
Future-deep0.7070.7860.7850.7570.7610.8000.8250.8530.062
Deep-learning
-based
Topo-LSTM0.6990.7710.7120.7280.7400.7930.8180.8440.067
CasCN0.7200.7910.7970.7290.7570.7920.8180.8490.065
ExoFIA0.7530.7990.7970.7540.8250.8530.8680.8820.049
Table 8. Prediction performance of variants of ExoFIA when observation time is set to 3 h. The best result in each column is in boldface.
Table 8. Prediction performance of variants of ExoFIA when observation time is set to 3 h. The best result in each column is in boldface.
VariantsHR@1PHR@5PHR@10PHR@15PNDCG@1PNDCG@5PNDCG@10PNDCG@15PMSE
ExoFIA-Trend0.7240.7870.7910.7530.7970.8310.8490.8690.056
ExoFIA-Social0.7290.7920.7910.7480.7650.8070.8300.8570.061
ExoFIA-Diff0.7150.7860.7920.7560.7740.8170.8430.8690.059
ExoFIA0.7530.7990.7970.7540.8250.8530.8680.8820.049
Table 9. Prediction performance within different observation times (T). The best result in each row is in boldface.
Table 9. Prediction performance within different observation times (T). The best result in each row is in boldface.
TypesModel NameT (hrs)HR@1PHR@5PHR@10PHR@15PNDCG@1PNDCG@5PNDCG@10PNDCG@15PMSE
Statistics-basedNode_
num_at_T
30.6770.7910.7980.8080.7120.7660.7870.7840.077
20.6560.7760.7770.7870.7000.7480.7730.7690.083
10.5910.7360.7190.7310.6540.7240.7460.7440.094
0.50.4840.5860.5540.5700.6130.6740.7010.7030.109
Feature
-based
Future-linear30.6450.7780.7910.7580.7110.7800.8020.8450.069
20.5810.7530.7780.7370.6960.7690.7970.8390.072
10.5590.7230.7540.6950.6690.7540.7970.8200.078
0.50.4840.6760.7090.6530.6420.7190.7770.7980.087
Future-deep30.7070.7860.7850.7570.7610.8000.8250.8530.062
20.6810.7700.7730.7350.7370.7890.8170.8510.066
10.6400.7380.7470.6890.7420.7890.8370.8490.069
0.50.5340.6870.7140.6540.6630.7330.7880.8010.085
Deep
Learning
-based
Topo-LSTM [24]30.6990.7710.7120.7280.7400.7930.8180.8440.067
20.6770.7520.6770.7100.7140.7620.7890.8210.080
10.6130.7430.6170.6680.6920.7570.8090.8200.081
0.50.5410.6790.5680.6350.6790.7460.7930.8130.083
CasCN [22]30.7200.7910.7970.7290.7570.7920.8180.8490.065
20.6850.7710.7930.7140.7250.7770.8080.8360.070
10.6290.7380.7410.6700.6890.7580.8040.8140.077
0.50.5700.6820.6940.6330.6690.7290.7880.8010.085
ExoFIA30.7530.7990.7970.7540.8250.8530.8680.8820.049
20.7340.7740.7910.7320.8000.8340.8500.8650.058
10.6640.7370.7580.6860.7740.8180.8410.8550.066
0.50.5730.6910.7150.6410.7230.7860.8280.8260.076
Table 10. Partial of Table 9. The best result in each row is in boldface.
Table 10. Partial of Table 9. The best result in each row is in boldface.
Model NameT (hrs)HR@1PHR@5PHR@10PHR@15P
Node_
num_at_T
30.6770.7910.7980.808
20.6560.7760.7770.787
10.5910.7360.7190.731
0.50.4840.5860.5540.570
Future-deep30.7070.7860.7850.757
20.6810.7700.7730.735
10.6400.7380.7470.689
0.50.5340.6870.7140.654
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, P.-X.; Huang, Y.-Y.; Shei, C.; Hsieh, H.-P. ExoFIA: Deep Exogenous Assistance in the Prediction of the Influence of Fake News with Social Media Explainability. Appl. Sci. 2023, 13, 6782. https://doi.org/10.3390/app13116782

AMA Style

Li P-X, Huang Y-Y, Shei C, Hsieh H-P. ExoFIA: Deep Exogenous Assistance in the Prediction of the Influence of Fake News with Social Media Explainability. Applied Sciences. 2023; 13(11):6782. https://doi.org/10.3390/app13116782

Chicago/Turabian Style

Li, Pei-Xuan, Yu-Yun Huang, Chris Shei, and Hsun-Ping Hsieh. 2023. "ExoFIA: Deep Exogenous Assistance in the Prediction of the Influence of Fake News with Social Media Explainability" Applied Sciences 13, no. 11: 6782. https://doi.org/10.3390/app13116782

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop