Abstract

Aiming to achieve efficient and accurate network rumor detection, this paper proposes a rumor detection method based on deep learning network. First, this method uses API interface and web crawler to construct a large data set of information samples on the microblog platform. Then, this method processes and analyzes the large data set through multiple embedded layers to provide a complete and reliable analysis data set for the detection model. The rumor detection model is composed of bidirectional long- and short-term memory (Bi-LSTM) network and convolutional neural network (CNN), which can realize deep and efficient feature extraction for the analysis data set and ensure the optimal performance of rumor detection method. The simulation results show that the precision and accuracy of the proposed method are 0.9771 and 0.9726, respectively, which are better than the comparison algorithms. The proposed method has effective network rumor screening and identification performance.

1. Introduction

In recent years, with the rise of social media, more and more people tend to get information on social media. Social media has now surpassed traditional media as the main news source [13]. This change may be due to the characteristics of social media: (1) news on social media is usually more timely than traditional news media such as newspapers or television [4]; (2) users can further share with friends on social media, and it becomes easy to discuss news [5].

However, it should also be noted that due to the complexity of information on the Internet, supervision is difficult. Because some social media platforms lack information review systems [6], it creates fertile soil for the emergence and spread of rumors. These rumors contain unconfirmed or even false information, which may cause public panic, cause serious economic losses, and have a negative impact on society [7].

According to the statistics in China New Media Development Report (2013), more than one-third of the 100 popular events on microblog in 2012 were false. At the same time, the report said that more than 59% of users will use microblog as the preferred platform for publishing information and spreading news [8]. Therefore, the comments on microblog are mixed and easy to be used by criminals to threaten social security.

At present, rumors on social media have become a serious concern, and researchers have made great contributions on how to detect rumors and try to eliminate their negative effects [911].

In most of the existing researches on rumor detection, researchers regard rumor detection task as a classification task, and it is usually a two classification task, that is, to judge whether a message or an event is “rumor” or “non-rumor” [12, 13]. At present, the method based on machine learning has begun to take effect. Reference [14] proposed a dual-supervised machine learning framework to detect rumors by filtering and then analyzing their language attributes. Reference [15] took support vector machine as a binary classification technology and compared it with social media content and news media to realize rumor detection and identification. However, researchers need to have a sufficient understanding of the scene and devote a lot of effort to designing distinguishing features. The designed features often have limitations, which may be limited to some specific scenes and do not have good generalization performance.

With the development of deep learning methods, the method based on deep neural network has become the research focus in the field of rumor detection. Compared with traditional machine learning methods, the deep learning model tends to rely less on complex feature engineering. It uses the multidimensional information of events and combines various source features to predict whether a message is a rumor [1618]. Reference [19] proposed a convolution neural network method based on deterministic factors, which effectively classified events into rumors by using the inherent features of information sets. Reference [20] judged the rumor of the Cantonese sample set on Twitter based on the two-way gated cyclic unit network with attention mechanism. Reference [21] used convolution neural network and sentence embedding technology to determine whether the network information is correct or not. However, the above methods have few levels of network information sample processing and analysis, and only use a single embedded layer to process the sample data, which lacks a certain reliability of the training sample data. In addition, the feature extraction of the sample data set by the detection model is inaccurate, which makes it difficult to ensure the precision and accuracy of rumor recognition.

Based on the above analysis, aiming at the low identification ability of current network rumor detection methods, a network rumor detection and analysis method based on fusion depth network model is proposed. In this method, the sentence segmentation embedding layer and the position embedding layer are introduced into the embedding layer, which is cascaded with the word embedding layer to realize the reliable processing of the sample data set. Through Bi-LSTM and CNN combined network model, the data features of the tested sample set are continuously extracted for high-performance network rumor identification and analysis.

The rest of this paper is arranged as follows: the second section introduces the construction process of the data set used. The third section introduces the rumor detection model based on deep learning network. In Section 4, the proposed method is verified by experiments. The fifth section is the conclusion.

2. Data Set Construction

In the rumor detection model, the data set to be used is timely and effective [22]. Microblog is currently the social media platform with top traffic in China, with more than 556 million user resources and an average daily consumption of more than 33 billion per day. Therefore, this paper uses microblog data set to realize rumor detection research, in which crawler or API technology is used to grab the data set on microblog.

At present, there are two methods to collect microblog data; one is the API interface exposed through the microblog open platform, and the other is the crawler-based crawling method.

2.1. API-Based Method

The microblog open platform provides a public API interface. Users first register as developer users on the microblog open platform and obtain the permission to call the interface after review.

Developers can obtain relevant information about communication features, such as returning the latest forwarded microblog of an original microblog, obtaining comment content in batch, and obtaining the relevant information of user characteristics, such as the number of fans, followers, and microblogs of the user. The obtained information is returned in JSON format, and the developer can analyze it to get the corresponding information [23]. The APIs provided by microblog open platform are sorted as shown in Table 1.

Although developers can use public API interfaces, the microblog open platform limits the number of visits of developers, which brings difficulties to collection. At the same time, although the API collection method is relatively simple and easy to implement, the microblog limits the number of search contents. Generally, it will only display the search contents within one page and adopts the shielding or nondisplay strategy for other relevant information. Therefore, the data collection method using API interface is difficult to meet the real-time and large-scale collection of microblogs.

2.2. Web Crawler Method

Web crawler is a kind of network robot, which can crawl the page content according to certain rules [24].

Firstly, the content of microblog can only be accessed after the user logs in, so the crawler must simulate the process of user login to obtain page information. Secondly, microblog has restrictions on the frequency of users accessing the page in unit time. Generally, users or IP access the page only a limited number of times and will not visit a website frequently in a short time. For users with abnormal access, microblog will adopt the strategy to close account. Therefore, for the above two cases, this paper provides two optimization methods: antiblocking login strategy and antiblocking task scheduling strategy.

Figure 1 shows the data collection framework based on web crawler.

2.2.1. Antiblocking Login

The collection of microblog data requires account login. In order to prevent a single user from being targeted, it is necessary to prepare a large number of user IPs and assign the tasks to multiple accounts for alternating collection, so as to alleviate the collection pressure and overcome the search restrictions.

2.2.2. Antiblocking Task Scheduling

A user has limited access to the page in a short time and will not visit the page frequently. Therefore, distributed task scheduling can be adopted to distribute the page search task to different crawlers, so as to ensure that the collection system can search and collect different pages continuously and stably.

The optimization measures of web crawler based on antiblocking login and antiblocking task scheduling can solve the problem that single IP collection is targeted and frequently visited pages are blocked.

3. Rumor Detection Model Based on Deep Learning Network

In this paper, the detection and analysis of network rumors are realized based on the improved convolutional neural network framework. The rumor detection problem is generally regarded as a classification problem. In the existing rumor detection methods, the shallow machine learning algorithm is mainly used, and the network structure of learning is represented by features, which is difficult to realize the in-depth extraction of the data features of the sample set, and can not ensure the effective and accurate detection of network rumor [25].

The rumor detection method proposed in this paper combines the deep memory network and convolutional neural network. On the premise of ensuring the deep network model, it can learn longer time series information through the complex gating structure, screen and extract the sample feature information, and complete the rumor detection task.

3.1. Problem Description

Generally speaking, the ultimate purpose of research on rumor detection is to predict which information is true, which is rumor or false information in a timely and accurate manner in many unmarked information. Therefore, the rumor detection task in this paper actually belongs to a binary classification task; that is, the model can predict the authenticity of the unmarked test data after training on the input data with label “rumor” or “non-rumor” [26]. In this paper, the formal definition of rumor detection is as follows.

First, a labeled training data set is given:

where indicates the size of the data set; that is, the data set contains a total of records. The form of each record is , in which, indicates the text information recorded in , indicates the label of , and the label values and indicate the category of “rumor” and “non-rumor”, respectively.

For the network rumor detection task in this paper, after training a given data set , a binary classification model is obtained: , represented as the mapping from text to a label value or . The input data of the network rumor detection model is the text information to be judged, and the output of the model is the category label corresponding to the input text data, that is, whether the judged result is “rumor” or “non-rumor.”

3.2. Overall Structure of the Model

The rumor detection method proposed in this paper combines the bidirectional long- and short-term memory network and convolutional neural network, proposes an improved deep learning network architecture Bi-LSTM-CNN for feature extraction, and then completes the classification and prediction of rumor through a combination of feed-forward neural network and Softmax normalized output layer.

In order to realize the early detection of rumors, each piece of data in the labeled training data set used is composed of text information and the label corresponding to the information. The input data of the model is only the content of the information itself and does not contain other relevant information such as the publisher of the information. The output of the model is the category label value of the predicted input text [27].

The overall architecture of the rumor detection model proposed in this paper is shown in Figure 2. According to the internal operation process of the model, the model can be roughly divided into four parts.

The first part is the processing of data text. Firstly, the input text is cleaned; then, the data is enhanced by means of synonym replacement, and finally, the text is segmented.

The second part is the embedding layer, which changes each marker symbol after word segmentation into the input vector representation of the converter.

The third part is the Bi-LSTM-CNN module, which is mainly used to extract text features and predict text categories.

The fourth part is classified output, which judges the category of input information through the predicted value.

3.3. Embedded Layer

The rumor detection model based on Bi-LSTM-CNN is a sentence-level binary classification model. Its input is a linear sequence, and the input data content is a single sentence text.

Different from other models, this paper adds two special embedding layers on the basis of word embedding layer, namely, sentence segmentation embedding layer and position embedding layer. Finally, the three vector representations obtained in the three embedded layers will simply sum the elements to obtain the data input of the detection model.

3.3.1. Word Embedding Layer

The number of hidden layer units in the rumor detection model in this paper is 698. Taking the input text in Figure 2 as an example, after word segmentation, the sentence will become 15 marker symbols. Therefore, if the example sentence in Figure 2 passes through the word embedding layer, each marker symbol in the sentence will be converted into a 698 dimensional vector. In other words, this sentence is converted into a matrix with a size of (15, 698). If batch size is included, it will be converted into a tensor with a size of (batch size, 15, 698).

The output result of the example sentence after passing through the word embedding layer is shown in Figure 3.

3.3.2. Sentence Segmentation Embedding Layer

The main function of the sentence segmentation embedding layer is to distinguish two sentences in an input sentence pair. There are only two vector representations of 0 and 1 in the sentence segmentation embedding layer. The former vector assigns 0 to each marker in the first sentence, and the latter vector assigns 1 to each marker in the second sentence. The input of the rumor detection model in this paper is a single sentence text, so after the sentence segmentation and embedding layer processing, each sentence vector is 0.

The output result of the example sentence after sentence segmentation and embedding layer is shown in Figure 4.

3.3.3. Location Embedded Layer

In a sentence sequence, if the same word appears in different positions, the semantic information contained in the word may be different. Therefore, if a corresponding position vector is added to each word in the sequence, it can help the model better understand the order of input text.

The position vector in the position embedding layer is obtained through learning, and the maximum sequence length that the model can support processing is 256 marker symbols. Therefore, the position embedding layer here is essentially an embedded lookup table with the size of (256, 698), and the vector representation of words at the same position in different sequences is the same; that is, the first row of the table is the vector representation of any word in the first position, the second row is the vector representation of any word in the second position, and so on.

The output result of the example sentence after passing through the position embedding layer is shown in Figure 5.

After processed by the above three embedding layers, the word vector , text vector , and position vector are obtained in each layer. These three vectors are summed by adding elements to obtain a single vector with a size of (batch_size, 15, 698).

The calculation formula of is shown in the following formula.

This vector representation is the input vector of the bidirectional conversion encoder in the next rumor detection model.

3.4. Rumors Detection Based on Bi-LSTM-CNN

Although the convolution neural network can easily extract the local information in the text through the convolution operation, the performance of the sequence information for the text is not outstanding. Continuous sequence data such as text and voice usually use recurrent neural network to learn context information.

The long and short memory model, as one of the classical model in recurrent neural network, can learn longer time series information through complex gating structure and can also screen these information, which has strong feature extraction ability for sequence data. Therefore, this paper combines Bi-LSTM with CNN to extract text features, and the bidirectional recurrent neural network structure adds the influence of subsequent sequence information to the learning task. The short text classification algorithm based on Bi-LSTM-CNN model is shown in Figure 6.

As can be seen from Figure 6, the first step of the algorithm is the embedding layer. The words in the sentence are replaced by vectors through the look-up table operation, so as to obtain the vector representation of the text. The input of the model is , where represents the -th word in the text sentence and represents the word vector corresponding to the word in the vocabulary. Then, the sentence vector is obtained through the word embedding layer, as shown as follows:

In the second step, each word vector in the sentence vector passes through the forward LSTM model and the reverse LSTM model in turn, and the two results are combined and input into the next layer of neural network. The internal operation of Bi-LSTM has been introduced in the relevant technologies in Section 2. This step can be described by the following formula:

where represents the feature information extracted from the sentence vector after processing by Bi-LSTM model and is a two-dimensional plane vector.

In the third step, the extracted feature information further extracts local features through convolution neural network, which passes through convolution layer and pooling layer. The specific convolution operation and pooling operation are also described in detail in the relevant technologies in Section 2. Here, formulas (5) and (6) are used to describe these processes.

where is the convolution result of feature vectors using convolution kernel and is the pooling result of . After pooling, the features also need to be concatenate, which is expressed by a one-dimensional vector .

Finally, the output of the pooling layer is put into the fully connected layer based on the Softmax function to output the probability that the text data belongs to a certain category, as shown as follows:

where represents the linear parameter of the fully connected layer, represents the offset, and represents the probability that the text belongs to a certain category, that is, the final output of the model.

4. Experiments and Result Discussion

In order to explore the performance of each rumor detection method, experiments were carried out on WeChat rumor data set. In order to obtain a model with stronger generalization ability, this paper divides all data set into training set, validation set, and test set according to the ratio of 8 : 1 : 1.

In the training stage, in order to make the training more stable, the learning rate is set to 0.0015. The model optimization method uses the random gradient descent algorithm and uses 100 texts as a batch for training. Each round uses all training texts and trains 350 rounds.

4.1. Model Evaluation Index

In order to evaluate the effectiveness of each rumor detection algorithm, four indicators are used here: precision , recall , , and accuracy .

where is the true negative rate, indicating the number of real events determined as real events; is the false positive rate, which indicates the number of events that are actually real events but are judged as rumor events; is a false negative rate, indicating the number of events that are actually rumored events but are judged to be true events; and is the true positive rate, which indicates the number of rumor events determined as rumor events.

Specifically, the precision is the proportion of rumor events among all events judged as rumor. However, in general, the number of positive samples in the data set is far less than the number of negative samples; that is, the positive and negative samples are unbalanced. The model can easily achieve high precision by making all predictions negative. Therefore, the recall is used to represent the proportion of all rumor events judged as rumor, which is used to evaluate the sensitivity of the model. is the harmonic average of the first two, indicating the comprehensive detection performance of the rumor detection method. Accuracy measures the similarity between events judged as rumors and true rumors. Please note that for these four indicators, the higher the value, the better the detection performance.

4.2. Sensitivity Analysis of Detection Model

TensorFlow framework is used to build various models in detection and analysis experiments. It is one of the mainstream deep learning model frameworks at present. In the improved embedding layer, the dimension of word vector is 350, so the dimension of hidden layer parameter vector in Bi-LSTM model is also set to 350.

In Bi-LSTM-CNN model, the different size of convolution kernel affects the size of each feature information, so the size of convolution kernel needs to be optimized according to the effect. Similarly, the number of convolution kernels will affect the number of channels after convolution, so the number of convolution kernels also needs to be optimized.

In this paper, the size and number of convolution kernels are optimized, and the average value of text classification on the validation set of the improved model is used as the index to find out a set of parameters with the highest classification accuracy as the final parameters of the model. The influence of different convolution kernel parameters on the model is shown in Table 2.

As shown in Table 2(a), when the size combination of convolution kernel is (4,6,8), the classification accuracy of the model is the highest on the validation set, and the index is 0.8775, indicating that the effect of the model is the best at this time. Therefore, in the Bi-LSTM-CNN model, the size combination of convolution kernel is set to (4,6,8).

At the same time, as can be seen from Table 2(b), when the number of convolution kernels is set to 256, the classification accuracy of the model on the validation set is the highest, and the evaluation index value is 0.8511, which is higher than the performance of the model when the convolution kernel is 512. Therefore, in the rumor detection model, the number of convolution kernels is set to 256.

4.3. Performance Analysis of Detection Model

This paper introduces reference [15] and reference [21] as comparative experiments. All detection run in the same environment to confirm the performance optimization of the proposed network rumor detection model based on deep learning network.

Figure 7 shows the rumor detection results of different detection methods for the same data set.

As shown in Figure 7, the model proposed in this paper has the best performance in all the comparison models, followed by reference [21], and the worst performance is reference [15]. When the number of iterations of the proposed detection model reaches 500, the accuracy has reached 97.0%, while the accuracies of reference [21] and reference [15] are still less than 96.0% after 700 iterations. This shows that it is correct to improve the embedding layer in this paper. In addition, sentence segmentation embedding layer and position embedding layer are added to optimize and analyze the sample data set, so as to provide effective and reliable data input support for Bi-LSTM-CNN model and ensure that the proposed model can effectively identify rumors.

Further, the loss value of each model is analyzed, as shown in Figure 8.

It can be seen in Figure 8 that the convergence of the proposed detection model is stronger than that of the comparative methods, making the classification faster. Bi-LSTM-CNN model combines Bi-LSTM with CNN to extract text features and adds the influence of subsequent sequence information to the learning task. With in-depth learning, the wider the data features obtained, the more accurate the text representation, and the better the classification effect. Therefore, it is confirmed that the improvement of embedded layer and the model fusion of Bi-LSTM-CNN can realize the accurate and efficient identification of network rumors.

At the same time, this paper also analyzes each model by synthesizing each evaluation index, as shown in Table 3.

As shown in Table 3, compared with the current rumor detection methods, the network rumor detection method based on deep learning network proposed in this paper has better performance. The precision of the method proposed in this paper is 0.9771, the recall is 0.8563, the is 0.8723, and the accuracy is 0.9726. All indexes are higher than those in the comparative methods. This is because the proposed method integrates Bi-LSTM and CNN, realizes the effective screening of data features of rumor sample set, has strong feature extraction ability for sequence data, and ensures high precision and high accuracy.

5. Conclusion

In order to improve the reliability of social media information, this paper proposes a network rumor detection and judgment method based on deep learning network. When the proposed detection method retains the original word embedding layer in the embedding layer, the sentence segmentation embedding layer and position embedding layer are introduced, and the multilayer embedding hierarchical processing analysis is realized for the original sample data set, so as to provide reliable and complete data support for the subsequent rumor detection model. The experimental results show that the proposed method can effectively detect network rumors and is of great significance to the construction of green network.

With the advent of 5G era, it is easy for people to choose to use video and pictures to spread information. According to the statistics of microblog platform, the microblog messages with pictures or video information are eleven times more than those only with texts. The vectorization representation of video and picture is very different from that of text. How to efficiently detect video information and picture content and realize multimodal rumor detection has become the focus and difficulty in the current research and will also become the direction and content of the next research in this paper.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The author declares that there is no conflict of interest regarding the publication of this paper.