IEEE Organizations related to Disinformation

Back to Top

No organizations are currently tagged "Disinformation"



Conferences related to Disinformation

Back to Top

2020 IEEE 23rd International Conference on Information Fusion (FUSION)

The International Conference on Information Fusion is the premier forum for interchange of the latest research in data and information fusion, and its impacts on our society. The conference brings together researchers and practitioners from academia and industry to report on the latest scientific and technical advances.


2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)

All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.


2019 IEEE 44th Conference on Local Computer Networks (LCN)

The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. For the past 43 years, major developments from high-speed networks to the global Internet to specialized sensor networks have been reported at thisconference.

  • 2018 IEEE 43rd Conference on Local Computer Networks (LCN)

    The IEEE LCN conference is the premier conference on the leading edge of theoreticaland practical aspects of computer networking. LCN is a highly interactive conferencethat enables an effective interchange of results and ideas among researchers, users,and product developers. For the past 42 years, major developments from high-speednetworks to the global Internet to specialized sensor networks have been reported at thisconference.

  • 2017 IEEE 42nd Conference on Local Computer Networks (LCN)

    The IEEE LCN conference is the premier conference on theoretical and practical aspects of computer networking. LCN is highly interactive, enabling an effective interchange of results and ideas among researchers, users, and product developers. Major developments from high-speed networks to the global Internet to specialized sensor networks have been reported at past LCNs.

  • 2016 IEEE 41st Conference on Local Computer Networks (LCN)

    The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. For the past 40 years, major developments from high-speed networks to the global Internet to specialized sensor networks have been reported at this conference.

  • 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)

    The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. For the past 40 years, major developments from high-speed networks to the global Internet to specialized sensor networks have been reported at this conference.

  • 2014 IEEE 39th Conference on Local Computer Networks (LCN)

    TheIEEELCNconferenceisthepremierconferenceontheleadingedgeoftheoreticalandpracticalaspectsofcomputernetworking.LCNisahighlyinteractiveconferencethatenablesaneffectiveinterchangeofresultsandideasamongresearchers,users,andproductdevelopers.Forthepast37years,majordevelopmentsfromhigh-speednetworkstotheglobalInternettospecializedsensornetworkshavebeenreportedatthisconference.

  • 2013 IEEE 38th Conference on Local Computer Networks (LCN 2013)

    The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. During 35 years of this conference, major developments from high-speed local networks to the global Internet to specialized sensor networks have been reported at this conference.

  • 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)

    The IEEE LCN Conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. For the past 36 years, major developments from high-speed local networks to the global Internet to specialized sensor networks have been reported at this conference.

  • 2011 IEEE 36th Conference on Local Computer Networks (LCN 2011)

    The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. During 35 years of this conference, major developments from high-speed local networks to the global Internet to specialized sensor networks have been reported at this conference.

  • 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010)

    The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. During 34 years of this conference, major developments from high-speed local networks to the global Internet to specialized sensor networks have been reported at this Organizing Committee: conference. We encourage you to submit

  • 2009 IEEE 34th Conference on Local Computer Networks (LCN 2009)

    The IEEE LCN conference is the premier conference on the leading edge of practical computer networking. Major developments from high-speed local networks to the global internet to specialized sensor networks have been reported in this conference.

  • 2008 IEEE 33rd Conference on Local Computer Networks (LCN 2008)

    The IEEE LCN conference is the premier conference on the leading edge of practical computer networking. Major developments from high-speed local networks to the global internet to specialized sensor networks have been reported in this conference.

  • 2007 IEEE 32nd Conference on Local Computer Networks (LCN 2007)

  • 2006 IEEE 31st Conference on Local Computer Networks (LCN 2006)

  • 2005 IEEE 30th Conference on Local Computer Networks (LCN 2005)


2019 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinaryunderstanding of aerospace systems, their underlying science, and technology


2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering

QR2MSE2019 is an international forum for exchange of innovative ideas,cutting-edge research results, and applications of asset management, reliability and quality tools in design, manufacturing, and operation and maintenance of engineering systems.

  • 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE)

    The 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE 2013) aims to provide an international forum for exchange of innovative ideas, cutting edge research results and applications of reliability results, and quality tools in design, manufacturing, and operation and maintenance of engineering systems.

  • 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE)

    The objective of QR2MSE 2012 is to bring together leading academics, industry practitioners, and research scientists from around the world to advance the body of knowledge in quality, reliability, maintenance, and safety of engineering systems, to establish and strengthen the link between academia and industry, to promote applications of research results in practice, and to showcase state of the art industrial technologies.

  • 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE)

    ICQR2MSE 2011 is to bring together leading academics, industry practitioners, and research scientists from around the world to advance the body of knowledge in quality, reliability, maintenance, and safety of engineering systems, to establish and strengthen the link between academia and industry, to promote applications of research results.


More Conferences

Periodicals related to Disinformation

Back to Top

No periodicals are currently tagged "Disinformation"


Most published Xplore authors for Disinformation

Back to Top

Xplore Articles related to Disinformation

Back to Top

Disinformation: A Taxonomy

IEEE Security & Privacy, 2011

This article outlines steps towards a disinformation theory, a simplified and generalized notion of communication that is intended to be, in some way, misleading or deceptive. The model is derived from Shannon's communications model, but with an intentional “noise source” and an unintended receiver. Alterations of an image containing a message are used to illustrate a variety of disinformation techniques.


Analyzing Disinformation and Crowd Manipulation Tactics on YouTube

2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018

YouTube, since its inception in 2005, has grown to become largest online video sharing website. It's massive userbase uploads videos and generates discussion by commenting on these videos. Lately, YouTube, akin to other social media sites, has become a vehicle for spreading fake news, propaganda, conspiracy theories, and radicalizing content. However, lack ineffective image and video processing techniques has hindered ...


Leveraging Archival Theory to Develop A Taxonomy of Online Disinformation

2018 IEEE International Conference on Big Data (Big Data), 2018

One of the principal difficulties in classifying and interpreting online disinformation is that the data arrive rapidly and evolve dramatically. The core challenges of classification and interpretation are not unique to contemporary disinformation; the problem of classifying documented information as authentic or inauthentic has been the focus of archivists for centuries. However, the rate of information creation and dissemination enabled ...


Object defense strategy with imperfect false targets and disinformation

2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2012

This paper considers defending a single object with imperfect false targets and disinformation actions. Existing papers have assumed that the false targets are either perfect or with a constant detection probability. In practice, intelligent attacker may allocate part of its budget into detecting the false targets. Analogously, the defender can allocate part of its budget into disinformation actions in order ...


Real World Examples Suggest a Path to Automated Mitigation of Disinformation

2018 IEEE International Conference on Big Data (Big Data), 2018

The concept of disinformation as a tactic to gain advantage over an opponent is ancient with examples of its use referenced in Sun Tzu's the Art of War written in the sixth century BC. The wide spread use of social media has amplified the power of disinformation to affect our lives and the nation. In addition, social media has increased ...


More Xplore Articles

Educational Resources on Disinformation

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Disinformation"

IEEE-USA E-Books

  • Disinformation: A Taxonomy

    This article outlines steps towards a disinformation theory, a simplified and generalized notion of communication that is intended to be, in some way, misleading or deceptive. The model is derived from Shannon's communications model, but with an intentional “noise source” and an unintended receiver. Alterations of an image containing a message are used to illustrate a variety of disinformation techniques.

  • Analyzing Disinformation and Crowd Manipulation Tactics on YouTube

    YouTube, since its inception in 2005, has grown to become largest online video sharing website. It's massive userbase uploads videos and generates discussion by commenting on these videos. Lately, YouTube, akin to other social media sites, has become a vehicle for spreading fake news, propaganda, conspiracy theories, and radicalizing content. However, lack ineffective image and video processing techniques has hindered research on YouTube. In this paper, we advocate the use of metadata in identifying such malicious behaviors. Specifically, we analyze metadata of videos (e.g., comments, commenters) to study a channel on YouTube that was pushing content promoting conspiracy theories regarding World War III. Identifying signals that could be used to detect such deviant content (e.g., videos, comments) can help in stemming the spread of disinformation. We collected over 4,145 videos along with 16,493 comments from YouTube. We analyze user engagement to assess the reach of the channel and apply social network analysis techniques to identify inorganic behaviors.

  • Leveraging Archival Theory to Develop A Taxonomy of Online Disinformation

    One of the principal difficulties in classifying and interpreting online disinformation is that the data arrive rapidly and evolve dramatically. The core challenges of classification and interpretation are not unique to contemporary disinformation; the problem of classifying documented information as authentic or inauthentic has been the focus of archivists for centuries. However, the rate of information creation and dissemination enabled by the Internet requires a new approach to categorization and archival examination of disinformation of documented information. This paper provides a survey of the archival problems facing disinformation researchers and proposes a taxonomy of disinformation that will aid future discussion and classification of disinformation.

  • Object defense strategy with imperfect false targets and disinformation

    This paper considers defending a single object with imperfect false targets and disinformation actions. Existing papers have assumed that the false targets are either perfect or with a constant detection probability. In practice, intelligent attacker may allocate part of its budget into detecting the false targets. Analogously, the defender can allocate part of its budget into disinformation actions in order to prevent the false targets from being detected. In this paper, the detection probability of each false target is assumed to be a function of the intelligence and disinformation efforts allocated on the false target. The optimal resource allocation between target identification/disinformation and attack/protection efforts is studied for the case of constrained defense and attack resources.

  • Real World Examples Suggest a Path to Automated Mitigation of Disinformation

    The concept of disinformation as a tactic to gain advantage over an opponent is ancient with examples of its use referenced in Sun Tzu's the Art of War written in the sixth century BC. The wide spread use of social media has amplified the power of disinformation to affect our lives and the nation. In addition, social media has increased the scope of the task to mitigate the effects of disinformation beyond what is possible by manual processes. This paper summarizes interviews with and presentation by security officials at several diverse organizations including a financial institution, a large retail corporation, and state and federal law enforcement. The findings included proven mitigation techniques. These findings, combined with known techniques to measure social norms, suggest a possible research path to at least partially automate the identification of, and the mitigation against disinformation on social media.

  • Time Critical Disinformation Influence Minimization in Online Social Networks

    If a piece of disinformation released from a terrorist organization propagates on Twitter and this adversarial campaign is detected after a while, how emergence responders can wisely choose a set of source users to start the counter campaign to minimize the disruptive influence of disinformation in a short time? This practical problem is challenging and critical for authorities to make online social networks a more trustworthy source of information. In this work, we propose to study the time critical disinformation influence minimization problem in online social networks based on a continuous-time multiple campaign diffusion model. We show that the complexity of this optimization problem is NP-hard and provide a provable guaranteed approximation algorithm for this problem by proving several critical properties of the objective function. Experimental results on a sample of real online social network show that the proposed approximation algorithm outperforms various heuristics and the transmission temporal dynamics knowledge is vital for selecting the counter campaign source users, especially when the time window is small.

  • Education of society as a tool to counteract disinformation in implementing new technologies. On the example of 5G mobile telecommunications network and Warsaw sewage system.

    The article presents the role of social education in preventing disinformation in the implementation of new technologies. On the example of two technological breakthroughs in the 20th century and their social reception process, the authors show the importance of social valuation in preventing disinformation and introducing new technologies. (Social education as a tool to counteract disinformation in the implementation of new technologies. On the example of the construction of the Warsaw sewage system in XIX century and the ongoing development of 5G mobile communications networks).

  • Propagation From Deceptive News Sources Who Shares, How Much, How Evenly, and How Quickly?

    As people rely on social media as their primary sources of news, the spread of misinformation has become a significant concern. In this large-scale study of news in social media, we analyze 11 million posts and investigate the propagation behavior of users that directly interact with news accounts identified as spreading trusted versus malicious content. Unlike previous work, which looks at specific rumors, topics, or events, we consider all content propagated by various news sources. Moreover, we analyze and contrast population versus subpopulation behavior (by demographics) when spreading misinformation, and distinguish between the two types of propagation, i.e., direct retweets and mentions. Our evaluation examines how evenly, how many, how quickly, and which users propagate content from various types of news sources on Twitter. Our analysis has identified several key differences in propagation behavior from trusted versus suspicious news sources. These include high inequity in the diffusion rate based on the source of disinformation, with a small group of highly active users responsible for the majority of disinformation spread overall and within each demographic. Analysis by demographics showed that users with lower annual income and education share more from disinformation sources compared to their counterparts. News content is shared significantly more quickly from trusted, conspiracy, and disinformation sources compared to clickbait and propaganda. Older users propagate news from trusted sources more quickly than younger users, but they share from suspicious sources after longer delays. Finally, users who interact with clickbait and conspiracy sources are likely to share from propaganda accounts, but not the other way around.

  • Intelligence and impact contests in defending a single object with imperfect false targets

    Introducing false targets is a common approach to protect important facilities. In this paper we assume that the defender has deployed a single object that can be destroyed by the attacker and deployed several false targets in order to misinform the attacker. The false targets are imperfect and can be detected by the attacker independently. In order to detect the false targets the attacker allocates part of his budget into intelligence actions. The optimal resource distribution between target identification/disinformation and attack/ protection efforts is studied for the case of constrained defense and attack resources.

  • Models of Trust and Disinformation in the Open Press from Model-Driven Linguistic Pattern Analysis

    The TRAQ-M (tracking analysis, quantification-mitigation) platform is a computational system that applies Social Science Models and nonparametric statistical methods to understand complex human behavior patterns. The system focuses on understanding patterns in language and is capable of ingesting millions of documents per day and identifying linguistic patterns. In this paper we focus on source modeling, especially determination of which sources pass false information or are otherwise biased We use nonparametric statistical models to compare document content histograms and linguistic pattern analysis to identity disinformation.



Standards related to Disinformation

Back to Top

No standards are currently tagged "Disinformation"


Jobs related to Disinformation

Back to Top