{"id":"https://openalex.org/W6910645334","doi":"https://doi.org/10.48550/arxiv.2504.07135","title":"SINCon: Mitigate LLM-Generated Malicious Message Injection Attack for Rumor Detection","display_name":"SINCon: Mitigate LLM-Generated Malicious Message Injection Attack for Rumor Detection","publication_year":2025,"publication_date":"2025-04-07","ids":{"openalex":"https://openalex.org/W6910645334","doi":"https://doi.org/10.48550/arxiv.2504.07135"},"language":"en","primary_location":{"id":"doi:10.48550/arxiv.2504.07135","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2504.07135","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2504.07135","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhang, Mingqing","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhang, Mingqing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Liu, Qiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Qiang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Tao, Xiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao, Xiang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wu, Shu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Shu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Wang, Liang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Liang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.009200000204145908,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.004999999888241291,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rumor","display_name":"Rumor","score":0.7263000011444092},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6309000253677368},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5277000069618225},{"id":"https://openalex.org/keywords/conversation","display_name":"Conversation","score":0.490200012922287},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4341999888420105}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7347999811172485},{"id":"https://openalex.org/C2780469804","wikidata":"https://www.wikidata.org/wiki/Q878352","display_name":"Rumor","level":2,"score":0.7263000011444092},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6309000253677368},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5277000069618225},{"id":"https://openalex.org/C2777200299","wikidata":"https://www.wikidata.org/wiki/Q52943","display_name":"Conversation","level":2,"score":0.490200012922287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4810999929904938},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4341999888420105},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3939000070095062},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3483000099658966},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33079999685287476},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27469998598098755},{"id":"https://openalex.org/C3018263672","wikidata":"https://www.wikidata.org/wiki/Q1296251","display_name":"Efficient algorithm","level":2,"score":0.26579999923706055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2504.07135","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2504.07135","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2504.07135","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2504.07135","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,107],"the":[1,28,34,60,88,113,127,148],"era":[2],"of":[3,68,116],"rapidly":[4],"evolving":[5],"large":[6],"language":[7],"models":[8],"(LLMs),":[9],"state-of-the-art":[10],"rumor":[11],"detection":[12],"systems,":[13],"particularly":[14],"those":[15],"based":[16,58],"on":[17,59,70,143,147,162],"Message":[18],"Propagation":[19],"Trees":[20],"(MPTs),":[21],"which":[22],"represent":[23],"a":[24,122,139],"conversation":[25],"tree":[26],"with":[27,75,118,135],"post":[29],"as":[30,36,79],"its":[31,37],"root":[32],"and":[33,51,82,150],"replies":[35],"descendants,":[38],"are":[39,57],"facing":[40],"increasing":[41],"threats":[42],"from":[43],"adversarial":[44],"attacks":[45],"that":[46,62,125,154],"leverage":[47],"LLMs":[48],"to":[49,101,129],"generate":[50],"inject":[52],"malicious":[53],"messages.":[54],"Existing":[55],"methods":[56],"assumption":[61],"different":[63],"nodes":[64,74,81,134],"exhibit":[65],"varying":[66,136],"degrees":[67],"influence":[69,78,93,105,142],"predictions.":[71,144],"They":[72],"define":[73],"high":[76,103,159],"predictive":[77,92,104,114],"important":[80],"target":[83,102],"them":[84],"for":[85],"attacks.":[86,174],"If":[87],"model":[89,128],"treats":[90],"nodes'":[91],"more":[94,140],"uniformly,":[95],"attackers":[96],"will":[97],"find":[98],"it":[99],"harder":[100],"nodes.":[106],"this":[108],"paper,":[109],"we":[110],"propose":[111],"Similarizing":[112],"Influence":[115],"Nodes":[117],"Contrastive":[119],"Learning":[120],"(SINCon),":[121],"defense":[123],"mechanism":[124],"encourages":[126],"learn":[130],"graph":[131],"representations":[132],"where":[133],"importance":[137],"have":[138],"uniform":[141],"Extensive":[145],"experiments":[146],"Twitter":[149],"Weibo":[151],"datasets":[152],"demonstrate":[153],"SINCon":[155],"not":[156],"only":[157],"preserves":[158],"classification":[160],"accuracy":[161],"clean":[163],"data":[164],"but":[165],"also":[166],"significantly":[167],"enhances":[168],"resistance":[169],"against":[170],"LLM-driven":[171],"message":[172],"injection":[173]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
