Abstract
The proliferation of abnormal text information in social networks has become an important challenge for digital social governance. Traditional detection methods are unable to cope with increasingly complex semantic camouflage and dissemination strategies due to excessive reliance on one-dimensional analysis. Therefore, this research develops a detection method for abnormal text information in social networks that integrates the Graph-based User Interaction and Diffusion Evaluation (GUIDE) module and the Natural Language Ontology-driven Textual Anomaly Classification Engine (NOTICE) module. The GUIDE module captures anomalous propagation patterns through dynamic propagation tracking and network modeling, while the NOTICE module identifies semantic risks using a multilingual ontology library and deep semantic understanding. By combining structural and semantic analysis through a dual-attention fusion mechanism, the proposed framework simultaneously detects semantic anomalies and propagation topology anomalies, thereby improving detection accuracy and practicality. The experimental results show that the framework achieves F1 score of 91.2%, 89.7%, and 88.3% in detecting fake news, junk advertising, and hate speech tasks, respectively, which is 5.5–17.8 percentage points higher than the optimal baseline model. These evaluations are conducted on a comprehensive dataset from ZN Lab, containing real-world samples from major platforms like Twitter and Weibo. In actual deployment, the system maintains an accuracy rate of 89.4% when processing 230 million pieces of content per day, and reduces manual review by 43%. In terms of resource consumption, the memory usage remains stable at 645 MB and the response time is 76 ms, significantly better than traditional models. The above results indicate that the proposed model has excellent accuracy and applicability in detecting abnormal text information in social networks, effectively solving the problem of lack of accuracy and reliability in current detection methods. It provides an efficient and reliable technical solution for content governance on social platforms, especially in scenarios such as false information prevention and network violence governance, which has important application value.
References
Silva G R S, Canedo E D. Towards user-centric guidelines for chatbot conversational design. International Journal of Human–Computer Interaction, 2024, 40(2): 98–120. DOI: 10.1080/10447318.2022.2118244.
Chefer H, Alaluf Y, Vinker Y, Wolf L, and Cohen-Or D. Attend-and-excite: Attention-based semantic guidance for text-to-image diffusion models. ACM transactions on Graphics (TOG), 2023, 42(4): 1–10. DOI: 10.1145/3592116.
Chung W, Zhang Y, Pan J. A theory-based deep-learning approach to detecting disinformation in financial social media. Information Systems Frontiers, 2023, 25(2): 473–492. DOI: 10.1007/s10796-022-10327-9.
Balshetwar S V, Rs A, R D J. Fake news detection in social media based on sentiment analysis using classifier techniques. Multimedia tools and applications, 2023, 82(23): 35781–35811. DOI: 10.1007/s11042-023-14883-3.
Zhao, J., An, K. and Wang, X. 2024. Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network. Journal of Cyber Security and Mobility. 13, 6 (Nov. 2024), 1331–1356. DOI: 10.13052/jcsm2245-1439.1365.
Khan W, Mohd A, Suaib M, Ishrat M, Shaikh A A, and Faisal S M. Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks. Data Science and Management, 2025, 8(2): 137–146. DOI: 10.1016/j.Dsm.2024.09.002.
Sufi F K, Alsulami M, Gutub A. Automating global threat-maps generation via advancements of news sensors and AI. Arabian Journal for Science and Engineering, 2023, 48(2): 2455–2472. DOI: 10.1007/s13369-022-07250-1.
Ravichandran B D, Keikhosrokiani P. Classification of Covid-19 misinformation on social media based on neuro-fuzzy and neural network: A systematic review. Neural Computing and Applications, 2023, 35(1): 699–717. DOI: 10.1007/s00521-022-07797-y.
Madani M, Motameni H, Roshani R. Fake news detection using feature extraction, natural language processing, curriculum learning, and deep learning. International Journal of Information Technology & Decision Making, 2024, 23(03): 1063–1098. DOI: 10.1142/S0219622023500347.
Zkik K, Sebbar A, Fadi O, Kamble S, and Belhadi A. Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach. Electronic Commerce Research, 2024, 24(1): 497–533. DOI: 10.1007/s10660-023-09702-8.
Wu K, Zhou Y, Shi H, Li X & Ran B. Graph-based interaction-aware multi-modal 2D vehicle trajectory prediction using diffusion graph convolutional networks. IEEE Transactions on Intelligent Vehicles, 2023, 9(2): 3630–3643. DOI: 10.1109/TIV.2023.3341071.
Chen X, Xie R, Qiu Z, Cui P, Zhang Z, Liu S,& Lin L. Group-based social diffusion in recommendation. World Wide Web, 2023, 26(4): 1775–1792. DOI: 10.1007/s11280-022-01079-2.
Li Y, Zhao M, Zhang J, Xie Z, Liu Y & Zhan Q. GDDRec: graph neural diffusion model for diversified recommendation. Knowledge and Information Systems, 2025, 67(5): 4401–4430. DOI: 10.1007/s10115-025-02348-y.
Ci Y, Wu H, Sun Y, and Wu L A prediction model with wavelet neural network optimized by the chicken swarm optimization for on-ramps metering of the urban expressway. Journal of Intelligent Transportation Systems, 2022, 26(3): 356–365. DOI: 10.1080/15472450.2021.1890070.
Jesi P M, Antony Asir Daniel V, Rajagopal R, and Femila L Cluster Head Selection Using Multi-Dilation Convolutional Neural Network Optimized with BCMO for IoT Networks. IETE Journal of Research, 2024, 70(8): 6702–6710. DOI: 10.1080/03772063.2024.2315208.
Yang Y, Yang R, Li Y, Cui K, Yang Z, Wang Y, and Xie H. Rosgas: Adaptive social bot detection with reinforced self-supervised gnn architecture search. ACM Transactions on the Web, 2023, 17(3): 1–31. DOI: 10.1145/3572403.
Bacanin N, Zivkovic M, Antonijevic M, Venkatachalam K, Lee J, Nam Y, and Abouhawwash M. Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection. Complex & Intelligent Systems, 2023, 9(6): 7269–7304. DOI: 10.1007/s40747-023-01118-z.
Krishnasamy B, Muthaiah L, Kamali Pushparaj J E, and Pandey P S. DIWGAN optimized with Namib Beetle Optimization Algorithm for intrusion detection in mobile ad hoc networks. IETE Journal of Research, 2024, 70(5): 4422–4441. DOI: 10.1080/03772063.2023.2223181.
Bandewad G, Datta K P, Gawali B W, and Pawar, S. N. Review on Discrimination of Hazardous Gases by Smart Sensing Technology. Artificial Intelligence and Applications. 2023, 1(2): 86–97. DOI: 10.47852/bonviewAIA3202434.
M. Hasanvand, M. Nooshyar, E. Moharamkhani, and A. Selyari. “Machine Learning Methodology for Identifying Vehicles Using Image Processing,” AIA, vol. 1, no. 3, pp. 170–178, Apr, 2023, DOI: 10.47852/bonviewAIA3202833.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2026 Journal of Cyber Security and Mobility
