Multi-verifier: A novel method for fact statement verification

被引:0
|
作者
Teng Wang
Qing Zhu
Shan Wang
机构
[1] Renmin University of China,The 54th Research Institute of China Electronics Technology Group Corporation
[2] Renmin University of China,Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering
来源
World Wide Web | 2015年 / 18卷
关键词
Fact statements; Credibility ranking; Semantic inclusion; Support score; Trustful verification;
D O I
暂无
中图分类号
学科分类号
摘要
Untruthful information spreads on the web, which may mislead users or have a negative impact on user experience. In this paper, we propose a method, called Multi-verifier, to determine the truthfulness of a fact statement. The basic idea is that whether a fact statement is truthful or not depends on the information related to the fact statement. We utilize a popular search engine to collect the top-K search results that are most related to the target fact statement. We then propose support score to measure the extent to which a search result supports the fact statement based on semantic constituent analysis, and we make use of credibility ranking to rank the search results. At last, we combine the support score and credibility ranking value of a search result to evaluate its contribution to a fact statement determination. Based on the contributions of the search results, we determine the fact statement. Our proposals are evaluated by experiments and results show availability and high precision of the proposed method.
引用
收藏
页码:1463 / 1480
页数:17
相关论文
共 50 条
  • [1] Multi-verifier: A novel method for fact statement verification
    Wang, Teng
    Zhu, Qing
    Wang, Shan
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2015, 18 (05): : 1463 - 1480
  • [2] Multi-Verifier Signatures
    Tom Roeder
    Rafael Pass
    Fred B. Schneider
    Journal of Cryptology, 2012, 25 : 310 - 348
  • [3] Multi-Verifier Signatures
    Roeder, Tom
    Pass, Rafael
    Schneider, Fred B.
    JOURNAL OF CRYPTOLOGY, 2012, 25 (02) : 310 - 348
  • [4] Cryptanalysis and repair of the multi-verifier signature with verifier specification
    Yen, SM
    COMPUTERS & SECURITY, 1996, 15 (06) : 537 - 544
  • [5] Two Efficient Generic Patterns for Convertible Limited Multi-Verifier Signature
    Avizheh, Sepideh
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 103 - 110
  • [6] A multi-signer universal designated multi-verifier signature scheme in the standard model
    Ming, Yang
    Jin, Qiang
    Zhao, Xiangmo
    Journal of Computational Information Systems, 2013, 9 (09): : 3751 - 3758
  • [7] A Multi-Signer Convertible Limited Multi-Verifier Signature Scheme in the Standard Model
    Rastegari, Parvin
    Berenjkoub, Mehdi
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 143 - 148
  • [8] A Quantum Image Secret Sharing Scheme Based on Designated Multi-Verifier Signature
    Wang, Ye
    Xu, Guang-Bao
    Jiang, Dong-Huan
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (01)
  • [9] An ID-based multi-signer universal designated multi-verifier signature scheme
    Chang, Ting-Yi
    INFORMATION AND COMPUTATION, 2011, 209 (07) : 1007 - 1015
  • [10] Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group
    Deng, Lunzhi
    Yang, Yixian
    Chen, Yuling
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5625 - 5641