AIResearch AIResearch
Back to articles
AI

AI Blocks Harmful Social Media Spread in Real Time

A new algorithm can counteract misinformation and harmful content on social networks by strategically seeding positive information, achieving up to three orders of magnitude faster performance than previous methods.

AI Research
March 26, 2026
3 min read
AI Blocks Harmful Social Media Spread in Real Time

In an era where misinformation and harmful content can spread up to six times faster than normal information on social networks, researchers have developed a to strategically counteract this negative influence in time-critical scenarios. This approach, known as Time-Critical Adversarial Influence Blocking Maximization (TC-AIBM), addresses urgent situations like political campaigns or public emergencies where interventions must occur within strict deadlines to be effective. By selecting positive seed nodes that propagate synchronously with known negative seeds, aims to block harmful spread before it reaches a damaging scale, offering a proactive defense against viral threats.

The key finding from the research is a novel algorithm called Bidirectional Influence Sampling (BIS), which combines forward and reverse sampling techniques to efficiently identify the best positive seeds for blocking negative influence. BIS achieves an approximation guarantee of (1 - 1/e - ε)(1 - γ) to the optimal solution, meaning it provides a theoretical lower bound that ensures near-optimal performance. In experiments, BIS consistently outperformed state-of-the-art baselines across different settings, including varying negative seeds, time constraints, and tie-breaking rules, while improving efficiency by up to three orders of magnitude compared to greedy algorithms.

Ology involves extending the classical Independent Cascade (IC) model to include time constraints, creating the Time-Critical IC (TC-IC) model that better simulates real-world scenarios. Researchers formulated the TC-AIBM problem and proved the submodularity of its objective function under three tie-breaking rules: Positive Dominance, Negative Dominance, and Fixed Dominance. This submodularity property allows the greedy algorithm to guarantee a (1 - 1/e - ε) approximation, providing a foundation for algorithm design. BIS works by generating a Susceptibility List through Forward Influence Sampling (FIS) to estimate infection probabilities and Reverse Influence Sampling (RIS) to create RR sets, then combining these into a Rescue List and Union Table to select positive seeds iteratively.

From comprehensive experiments on four real-world datasets—net-sci, edit-kw, marvel, and amazon—demonstrate BIS's effectiveness. For instance, as shown in Figure 4, BIS outperformed all baselines under different tie-breaking rules and closely matched the performance of Greedy-B, the strongest baseline. In parameter sensitivity tests, BIS maintained stable performance when varying negative seed selection s (e.g., using IMM or PageRank), number of negative seeds (set to 50, 100, or 200), and time constraints (τ = 2, 3, or 4), as illustrated in Figures 5, 6, and 7. Efficiency evaluations in Figure 8 revealed that BIS runs significantly faster than other s, with runtime improvements of up to three orders of magnitude over Greedy-B, making it practical for large-scale networks.

Of this research are significant for real-world applications where timely intervention is crucial, such as during elections or rumor outbreaks. By enabling rapid and effective blocking of negative influence, BIS can help maintain public discourse and social stability. 's ability to handle time constraints means it can be deployed in scenarios where delays render interventions worthless, offering a tool for platforms and authorities to mitigate harmful content spread. Additionally, the theoretical guarantees and efficiency gains make it a scalable solution for modern social networks with millions of users.

Limitations of the study include its focus on the Independent Cascade model, which may not capture all complexities of real-world information diffusion. The research assumes known negative seed sets, which might not always be available in practice, and the tie-breaking rules are simplified models of how nodes resolve conflicting information. Future work could explore extensions to other diffusion models, dynamic networks, or scenarios with uncertain negative seeds, as well as investigate the ethical of such influence-blocking techniques in diverse social contexts.

Original Source

Read the complete research paper

View on arXiv

About the Author

Guilherme A.

Guilherme A.

Former dentist (MD) from Brazil, 41 years old, husband, and AI enthusiast. In 2020, he transitioned from a decade-long career in dentistry to pursue his passion for technology, entrepreneurship, and helping others grow.

Connect on LinkedIn