Saturday, August 9, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

Detecting influence campaigns on X with AI and network science

May 16, 2024
in Technology and Engineering
Reading Time: 4 mins read
0
Detecting influence campaigns on X with AI and network science
67
SHARES
608
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT

In the age of generative-AI and large language models (LLMs), massive amounts of inauthentic content can be rapidly broadcasted on social media platforms. As a result, malicious actors are becoming more sophisticated, hijacking hashtags, artificially amplifying misleading content, and mass resharing propaganda. 

In the age of generative-AI and large language models (LLMs), massive amounts of inauthentic content can be rapidly broadcasted on social media platforms. As a result, malicious actors are becoming more sophisticated, hijacking hashtags, artificially amplifying misleading content, and mass resharing propaganda. 

These actions are often orchestrated by state-sponsored information operations (IOs), which attempt to sway public opinion during major geopolitical events such as the US elections, the Covid-19 pandemic, and more. 

Combating these IOs has never been more crucial. Identifying influence campaigns with high-precision technology will significantly reduce the misclassification of legitimate users as IO drivers, ensuring social media providers or regulators do not mistakenly suspend accounts while trying to curb illicit activities. 

In light of this, USC Information Sciences Institute (ISI) researcher Luca Luceri is co-leading an effort funded by the Defense Advanced Research Project Agency (DARPA) to identify and characterize influence campaigns on social media. His most recent paper “Unmasking the Web of Deceit: Uncovering Coordinated Activity to Expose Information Operations on Twitter” was presented at the Web Conference on May 13, 2024. 

“My team and I have worked on modeling and identifying IO drivers such as bots and trolls for the past five to ten years,” Luceri said. “In this paper, we’ve advanced our methodologies to propose a suite of unsupervised and supervised machine learning models that can detect orchestrated influence campaigns from different countries within the platform X (formerly Twitter).” 

A fused network of similar behaviors 
Drawing from a comprehensive dataset of 49 million tweets from verified campaigns originating in six countries – China, Cuba, Egypt, Iran, Russia, and Venezuela – Luceri and his team have honed in on five sharing behaviors on X that IO drivers participate in. 

These include co-retweeting (sharing identical tweets), co-URL (sharing the same links or URLs), hashtag sequence (using an identical sequence of hashtags within tweets), fast retweeting (quickly re-sharing content from the same users), and text similarity (tweets with resembling textual content). 

Previous research focused on building networks that mapped out each type of behavior, examining the similarities between individual users on X. However, Luceri and his team noticed that these accounts often employ many strategies at the same time, which meant that monitoring one behavioral trace was not enough. 

“We found that co-retweeting was massively used by campaigns in Cuba and Venezuela,” Luceri explained. “However, if we only examine co-retweeting without considering other behaviors, we would perform well in identifying some campaigns, such as those originating from Cuba and Venezuela, but poorly where co-retweeting was used less, such as in Russian campaigns.” 

To capture a broader range of coordinated sharing behaviors, the researchers constructed a unified similarity network called a Fused Network. Then, they applied machine learning algorithms fed by topological properties of the fused network to classify these accounts’ similarities and predict their future participation in IOs.

Luceri and his team found that this method could be applicable to campaigns across the world. Multiple X users within the same campaign, no matter where they are from, exhibited remarkable collective similarity in their actions. 

“I consider our work a paradigm shift in research methods, giving a new perspective in the identification of influence campaigns and their drivers,” said Luceri. 

Unlocking new opportunities 
The unsupervised machine learning model leverages well-known, yet underutilized network features achieving a 42% higher precision than other traditional approaches to detect influence campaigns. Luceri views this paper as a starting point that could open the way to further avenues of research.

“We can train models on the topological features of this similarity network, and make them work in complex scenarios: for instance, if different users from different countries interacted with each other, or more challenging situations where we have limited information about the campaigns,” Luceri remarked. 

Luceri also presented another paper “Leveraging Large Language Models to Detect Influence Campaigns in Social Media” at the Web Conference, which received the best paper award from the International Workshop on Computational Methods for Online Discourse Analysis (BeyondFacts’24). The paper examines the potential of using LLMs to recognize the signs of AI-driven influence campaigns. This is particularly crucial in the current climate, where AI-created media is pervasive. 

“These coordinated activities have consequences in real life,” said Luceri. “They have the power to spread misinformation and conspiracy theories that might lead to protests or attacks on our democracy, such as the interference of Russian trolls in the 2016 US election.” 

Luceri and his team are committed to continuing the search for alternative strategies to identify influence campaigns and protect users susceptible to influence.



Method of Research

Computational simulation/modeling

Subject of Research

Not applicable

Article Title

Uncovering Coordinated Activity to Expose Information Operations on Twitter

Article Publication Date

13-May-2024

Share27Tweet17
Previous Post

2024 SIAM Annual Meeting (AN24) with online component including SIAM Conference on Discrete Mathematics (DM24) and the SIAM Conference on Applied Mathematics in Education (ED24)

Next Post

A new ‘rule of biology’ may have come to light, expanding insight into evolution and aging

Related Posts

blank
Technology and Engineering

UCLA Research Uncovers Intricate Mechanisms Governing Blinking and Eyelid Function

August 8, 2025
blank
Technology and Engineering

Boosting Magnesium Ion Conductivity in PVA Capacitors

August 8, 2025
blank
Technology and Engineering

A Breakthrough Solution for Heart Health

August 8, 2025
blank
Technology and Engineering

Enhancing MOFs with Lithium Salts for Superior Batteries

August 8, 2025
blank
Technology and Engineering

Exploring the Connection: How Wildfire Smoke Intensifies Ozone Pollution

August 8, 2025
blank
Technology and Engineering

SFU’s Indoor Berry Research Expands and Diversifies Thanks to Homegrown Innovation Challenge Support

August 8, 2025
Next Post
An example of a beneficial instability in biological structures.

A new ‘rule of biology’ may have come to light, expanding insight into evolution and aging

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27531 shares
    Share 11009 Tweet 6881
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    943 shares
    Share 377 Tweet 236
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    310 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Revolutionizing Fetal Congenital Heart Disease: MRI’s Impact
  • Distinct Coral Reef Regions Identified in Red Sea
  • Scientists Discover Novel Mechanism Behind Cellular Tolerance to Anticancer Drugs
  • Enhancing Pediatric Abdominal MRI Quality with Deep Learning

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,860 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading