Table 3: Precision/recall results at the 1
st
and 10
th
iteration.
Method Precision Recall
It-1 It-10 It-1 It-10
Belief-App 0.38 0.8 0.4 0.82
Baseline 0.27 0.6 0.3 0.63
k-nn 0.5 0.51 0.41 0.43
5 CONCLUSION
The majority of researches in the literature about the
evolution in time of a social network focused more
on the prediction of entities than the removal of the
latter. In this work, we propose a belief approach that
detects spammed links in a social network. This work
will allow everyone connected to sort out the types
of its relationships in the social network and decide
which links is spammed and should be deleted.
Throughout this work, we first recalled some re-
lated works of the literature as well as some ba-
sic notions of the theory of belief functions. Then,
we presented our method which consists of detecting
spammed links using the information of the nodes,
links and messages. In order to test our approach, we
performed two types of illustrations: first, we added
noise on the messages only, and then we added noise
on both messages and links. Second, we selected
randomly spammed links and observed if our model
manages to detect them.
Experiments have shown that the number of
spammed links increases with the noise level. In ad-
dition, the results showed that the belief approach is
better than the probabilistic one since the latter delete
many links of the network. Furthermore, the accu-
racy, precision and recall results prove that our model
is able to detect the majority of spammed links and
gives better results than the considered baseline and
the k-nn algorithm.
As future work, we will elaborate a strategy to
deal with the outliers. Indeed, we will fix a threshold
that represents the minimum number of occurrences
for a link to be considered spammed. We remind that
an outlier is a link that its initial class can be modified
but not in all iterations.
Second, we intend to test our proposed algorithm
on large and real social networks. To do so, we will
associate a simple mass function to each node, link
and message of the network based on the community
structure. In terms of scaling up, there are several
strategies that can reduce complexity such as repre-
senting only the focal elements or grouping them to-
gether if their values are negligible (Martin, 2009).
In addition, the combination rule proposed by (Zhou
et al., 2018) can be used to combine mass functions
from a large number of sources.
REFERENCES
Al Hasan, M. and Zaki, M. J. (2011). A survey of link
prediction in social networks. In Social network data
analytics, pages 243–275. Springer.
Altman, N. S. (1992). An introduction to kernel and nearest-
neighbor nonparametric regression. The American
Statistician, 46(3):175–185.
Dempster, A. P. (1967). Upper and lower probabilities in-
duced by a multivalued mapping. The annals of math-
ematical statistics, pages 325–339.
Lancichinetti, A., Fortunato, S., and Radicchi, F. (2008).
Benchmark graphs for testing community detection
algorithms. Physical review E, 78(4):046110.
Lee, H. (2011). Context reasoning under uncertainty based
on evidential fusion networks in home-based care.
Liu, F., Liu, B., Sun, C., Liu, M., and Wang, X. (2015).
Deep belief network-based approaches for link predic-
tion in signed social networks. Entropy, 17(4):2140–
2169.
Martin, A. (2009). Implementing general belief function
framework with a practical codification for low com-
plexity. Advances and applications of DSmT for In-
formation Fusion-Collected works, 3:217–273.
Martinez-Romo, J. and Araujo, L. (2013). Detecting mali-
cious tweets in trending topics using a statistical anal-
ysis of language. Expert Systems with Applications,
40(8):2992–3000.
Shafer, G. (1976). A mathematical theory of evidence, vol-
ume 1. Princeton university press Princeton.
Shafer, G. (2016). Dempster’s rule of combination. Interna-
tional Journal of Approximate Reasoning, 79:26–40.
Washha, M., Qaroush, A., and Sedes, F. (2016). Leveraging
time for spammers detection on twitter. In Proceed-
ings of the 8th International Conference on Manage-
ment of Digital EcoSystems, pages 109–116. ACM.
Zadeh, L. A. (1999). Fuzzy sets as a basis for a theory of
possibility. Fuzzy sets and systems, 100(1):9–34.
Zheng, X., Zeng, Z., Chen, Z., Yu, Y., and Rong, C. (2015).
Detecting spammers on social networks. Neurocom-
puting, 159:27–34.
Zhou, K., Martin, A., and Pan, Q. (2018). A belief combi-
nation rule for a large number of sources. Journal of
Advances in Information Fusion, 13(2).
A Belief Approach for Detecting Spammed Links in Social Networks
609