key: cord-0911818-bpiz4rav authors: Cheng, Mingxi; Yin, Chenzhong; Nazarian, Shahin; Bogdan, Paul title: Deciphering the laws of social network-transcendent COVID-19 misinformation dynamics and implications for combating misinformation phenomena date: 2021-05-17 journal: Sci Rep DOI: 10.1038/s41598-021-89202-7 sha: bd5657b1ce778489c05b0560ba79c4506fc75715 doc_id: 911818 cord_uid: bpiz4rav The global rise of COVID-19 health risk has triggered the related misinformation infodemic. We present the first analysis of COVID-19 misinformation networks and determine few of its implications. Firstly, we analyze the spread trends of COVID-19 misinformation and discover that the COVID-19 misinformation statistics are well fitted by a log-normal distribution. Secondly, we form misinformation networks by taking individual misinformation as a node and similarity between misinformation nodes as links, and we decipher the laws of COVID-19 misinformation network evolution: (1) We discover that misinformation evolves to optimize the network information transfer over time with the sacrifice of robustness. (2) We demonstrate the co-existence of fit get richer and rich get richer phenomena in misinformation networks. (3) We show that a misinformation network evolution with node deletion mechanism captures well the public attention shift on social media. Lastly, we present a network science inspired deep learning framework to accurately predict which Twitter posts are likely to become central nodes (i.e., high centrality) in a misinformation network from only one sentence without the need to know the whole network topology. With the network analysis and the central node prediction, we propose that if we correctly suppress certain central nodes in the misinformation network, the information transfer of network would be severely impacted. have noticed for decades that many measured data retrieved from biological and social sciences can be described by log-normal distribution 28, 29 and power-law distribution 30 . In this work, we estimate the log-normal and power-law models for 5 types of COVID-19 misinformation 31 : unreliable, political, bias, conspiracy, and clickbait misinformation (Data was retrieved from https:// usc-melady. github. io/ COVID-19-Tweet-Analy sis/ misin fo. html. Detailed dataset information can be found in Methods section "COVID-19 Misinformation Data"). We use a hypothesis test 32, 33 to estimate model parameters and model plausibility ( p KS ). Estimation methodology can be found in Method section "Power-law and log-normal analysis". The estimated log-normal model has 3 parameters: x min , which represents the smallest value above which the log-normal pattern holds, µ , which is the expected value, and σ , the standard deviation. Similarly, the estimated power-law model has 3 parameters: x min , which represents the smallest value above which the power-law pattern holds, α , which indicates the scaling parameter, and σ , the standard error of the fitted parameter α . The parameters of estimated log-normal and power-law models are included in Fig. 1 . However, these distribution fitting estimates do not represent that the empirical data, i.e., mean popularity of misinformation in our case, are independent and identically drawn (iid) from the fitted models 30 . We need to evaluate the plausibility of the fitted models quantitatively. Following a standard assessment process, goodness-of-fit test 33 , we find that p KS of log-normal distribution for all 5 types of misinformation and the overall misinformation are much greater than 0.1. That is, log-normal distribution cannot be rejected as a data-generating process. To further ensure that log-normal rather than power-law distribution is the plausible data generating process, we compare the log-normal distribution and power-law distribution using an appropriately defined likelihood ratio test 32 . The likelihood ratio test provides two values: R, the log-likelihood ratio between the two candidate distributions (log-normal and power-law in our case), and p, the significance value for the favored direction. If the empirical data is more likely to obey the first distribution, then R is positive; otherwise, R is negative. The favored distribution is a strong fit if p > 0.05 32 . As we reported in Fig. 1 , log-normal is the favored distribution since the R values are all positive and p in all likelihood ratio tests are much greater than 0.05. These findings could suggest that the popularity of COVID-19 misinformation could obey a multiplicative process and resembles the generalized Lotka-Volterra (GLV) system 34 . GLV systems are often used to model direct competition and trophic relationships between an arbitrary number of species, e.g., a predator-prey relationship 35 . In this potential misinformation GLV, all kinds of misinformation and individual misinformation generators, e.g., social bots, may be constantly created (and distinguished), and compete with other members in the system for attention. Misinformation networks optimize the network information transfer overtime. To characterize misinformation on the semantic level, we construct misinformation networks where nodes and corresponding edges represent the sentences and their sentence similarity, respectively (see Methods section "Misinformation network formulation I" for network formulation details). The new misinformation captured in a day form a distinct misinformation network. In order to investigate the network information transfer characteristics associated with the dynamics of misinformation networks, we quantify their degree-, closeness-and second order-centrality metrics 36, 37 . Due to the complex networks' highly heterogeneous structure, some nodes can be recognized as more significant than others, and centrality measures how important a node is. For instance, in a social network, influencers, recognized as influential nodes with higher centrality, have a lot of followers and can easily propagate specific messages to other nodes. Therefore, calculating the centrality about networks sheds light on information transfer analysis in complex networks 38 . There are various centrality measures in complex network literature. Degree centrality measures the number of links connected upon a target node and can be utilized to determine the throughput capacity or network www.nature.com/scientificreports/ localized transmission. The higher the degree centrality is, the higher the chance to receive the information transmitted over a network. Closeness centrality of a node quantifies the average length of the shortest path between the node and all other nodes in a graph and reflects the information transmission latency across a complex network. Thus, the higher the closeness centrality of a node is, the closer it is to other nodes. Second order centrality is a random walk-based betweenness centrality which measures the average time for revisiting a node if following a random walk on a complex network. The standard process of random walk is defined by Newman 39 where a single node has a probability to direct to a neighbor node (the probability is picked uniformly at random). The higher the second order centrality of a node is, the more information paths pass through it and the less robust the network is to targeted attacks on this node (for details on the degree-, closeness-, and second order-centrality, see Methods section "Networks centrality measures"). Figure 2a illustrates the mean degree centrality estimated from 60 misinformation networks. Over the first 10 days, the degree centrality of the misinformation networks exhibits an increase tendency towards higher values. It is known that a node achieves an increase in degree centrality by establishing new connections to its neighboring nodes. The high degree centrality of a node means that this node can propagate the received information in an efficient way. Thus, the increasing phenomenon in the first 10 days demonstrates that the misinformation networks tend to optimize their network topology to support higher information flow across the network over time. In addition, when it comes to the last 50 days, the degree centrality enters a relatively stable state which means that after increasing the degree centrality, misinformation networks try to maintain the high speed spread property. Along the same lines, Fig. 2b shows that the mean of the closeness centrality among 60 misinformation networks across 5 different misinformation categories. In the first 10 days, the mean value of the closeness centrality for misinformation networks is increasing. Higher closeness centrality means that the target node is closer to other nodes and the information sent by the target node can reach other nodes faster. Consequently, this result shows that the misinformation network tends to optimize their network topology to minimize the information transmission latency. In the last 50 days, the mean of the closeness centrality tends to stay stable, which indicates that misinformation networks try to maintain superior transmission latency to keep the network in a high-speed transport state. It is worth noting that the degree-and closeness-centrality are two dual approaches for quantifying information transmission across a network and show a similar network performance optimization behavior in the period of our observation. Figure 2c shows the second order centrality mean value curves for the 5 misinformation categories in 60 days. On social media, some people periodically delete some old posts. If a post that removed from the network has high second order centrality, the misinformation network has a higher chance to be disconnected. In the first 10 www.nature.com/scientificreports/ days in Fig. 2c , we observe that the second order centrality exhibits an irregular fluctuation behavior. When it comes to the last 50 days, the second order centrality shows a saturation (slowing in increasing rate) trend, which means that misinformation networks become less-robust/unhealthy over time (a graph is robust/healthy if it is robust to multiple targeted/random attacks 40 ). In addition, empirically, a robust graph has most of its elements lying close to each other, and linked by many paths. We conclude that since misinformation networks tend to increase the second order centrality after the early irregular fluctuation, the topology of the misinformation networks becomes more vulnerable to targeted/random attacks over time. In conclusion, the study of the degree-, closeness-and second order-centrality shows that the COVID-19 misinformation networks tend to optimize the information transmission and the topology of the networks becomes more fragile over time. Co-existence of fit get richer and rich get richer phenomena in misinformation network. Various mechanisms have been studied to explain the complex network evolution, such as preferential attachment (PA), node fitness theory, node birth/death process. The mapping of network growth onto a Bose-Einstein condensation phenomenon elucidated three phases in the network evolution 41 : a scale-free phase, where all nodes in a network have the same fitness; a fit get richer phase, where nodes with high fitness/quality are more likely to draw new connections; and a Bose-Einstein condensate phase, where the node with largest fitness becomes a clear winner and takes all the new links. In contrast to fit get richer effect, PA is a rich get richer mechanism where nodes with more connections are likely to win more new connections in link competition 42 . The General Temporal model 43 unifies both PA and node fitness by defining the probability of a node with degree k getting new links as P ∝ A k × η , where A k is the PA function and η is node fitness (both A k and η are time-invariant). To show the first evidence of how misinformation network evolves under the assumption of co-existence of PA and node fitness mechanism, we construct the misinformation network by taking the first day's sentences and construct a base network where nodes are sentences and links represent the sentence similarity. We then grow the network by adding nodes and links as a function of time (days). New misinformation sentences appearing in the next day connect to nodes in the base network if the sentence similarity is over 80% . We analyze the PA function A k and node fitness η with PAFit 43 and the results are shown in Fig. 3 (detailed network growth and analysis methods are described in Methods section "Misinformation network formulation II"). The estimated node fitnesses in day 10, 20 and 30 are all centered around 1, while there exists some nodes with slightly higher node fitness. The heavy-tailed distributions serve as a clear sign of fit get richer effect. From Fig. 3a -c, the maximum node fitness increases, which suggests that fit get richer effect becomes stronger, while the overall effect remains low (the maximum value remains in a medium fitness range [1, 2] ). By inspecting the estimated PA function in the in-plots shown in Fig. 3 , we make the following two observations: (1) the estimated PA functions A k 's in day 10, 20 and 30 are all increasing with respect to degree k, which suggests the existence of a rich get richer effect; and (2) the estimated PA functions are exhibiting a log-linear trend, which matches the widely used log-linear assumption of PA function A k = k α as in extended BA model 44 . In misinformation network with node deletion mechanism, node fitness is time-varying and probability of attachment is linear to node degree. While the complex network evolution is heavily studied in the literature, the www.nature.com/scientificreports/ popular models are mostly based on assumptions that PA function and node fitness are time-invariant, and the fundamental network evolution does not consider node deletion mechanism or includes random node deletion mechanism 45 . However, these assumptions are not fully applicable to rapidly changing misinformation networks where people switch attention from one hot topic to another quickly. Under this consideration, we form our misinformation network with a realistic node deletion mechanism, i.e., when a node's degree is not changing for three days, we delete the node (and its attaching links) from the network with the assumption that this sentence/ topic is no longer active or popular at the time. (Detailed network formulation and analysis methods are described in Methods section "Misinformation network formulation III".) Based on this network formulation method, we estimate the probability of attachment of nodes, node fitness, and network centrality measures and the results are demonstrated in Fig. 4 . Firstly, we estimate the probability of attachment of node j as k i j k j as in the BA model 46 , where k represents the degree of a node. We find that different from other real-world networks, such as WWW, citation networks, the attachment probability in misinformation networks is linear with respect to node's degree as shown in Fig. 4a instead of log-linear. This implies that the misinformation network evolution with the consideration of node deletion has weak rich get richer phenomenon. In addition, we observe that the misinformation network evolution experiences expansion-shrink cycles. The slope of the probability of attachment first decreases from day 0 to day 50, then increases to the similar values as in day 0 on day 55. This sudden change between days 50 and 55 shows that the network experiences a destruction and reconstruction phase. We verify this observation by inspecting the network size as shown in Fig. 4b , where the light purple bars represent the cumulative sum of newly emerged misinformation on Twitter (i.e., the afore-mentioned misinformation network constructed in Methods section "Misinformation network formulation I"), and the dark purple bars are the node numbers in the misinformation network constructed with node deletion mechanism. The light purple bars equivalently demonstrate how the misinformation network expands under classical network formulation, which cannot reflect the rapidly changing nature of misinformation network. On the other hand, the dark purple bars demonstrate the network evolution under our realistic misinformation network construction method. It is verified by the dark purple bars that the network does experience a shrink-expand phase between day 50 and 55. In addition, the fluctuations in node centrality measures in Fig. 4f also provide verification. Furthermore, we hypothesize that topic/attention shifting on social media causes this destruction and reconstruction, and we provide evidence in the following discussion and in Fig. 5 . Next, we investigate the node fitness and observe that on day 51, all sentences from day 0 (used for base network) were deleted except one. It is worth noting that we construct our network based on sentence similarity, if some nodes (sentences) in the network do no relate to the newly emerged misinformation, then these nodes are removed from the network. Equivalently speaking, topics or misinformation that are not gaining attention do not fit anymore and will be removed from the misinformation network. If a large-scale node deletion appeared, the misinformation network may experience a destruction phase as we observed previously. Node fitness measures the node quality and reflects the node competitiveness 41 , therefore, we inspect all sentences that survived by day 50 (denoted as S [0, 50] ) and disappear on day 51, and estimate their fitness by tracking the node's accumulated degree over time k(t). The slope of k(t) in a log-log scale, i.e., growth exponent, is therefore equivalent to node fitness 45 (detailed estimation strategy of node fitness is given in Methods section "Misinformation network formulation III"). Figure 4c -e present the estimated node fitness values and distributions of S [0, 50] . We find that before a node deletion, its fitness is increasing until two days before deletion. This observation is distinct from the fit get richer phenomenon usually assumed in traditional complex networks without node deletions. When rich get richer and fit get richer are both in play, nodes with high fitness have a higher probability to attract new links and become rich nodes; then, rich nodes reinforce the effect. However, in our network, the rich get richer effect becomes weaker in a cycle, while fitness grows higher. Then, suddenly the nodes with high fitness 30] , which correspond to the misinformation network (with node deletion) on day 10, 20, and 30. We find that these non-heavy tail distributions again indicate that there is no clear sign of fit get richer effect. (f-h) Network centrality measures. Degree centrality first increases then becomes stable until day 50. This confirms that the rich get richer effect is weak. The closeness is slightly increasing with regard to time and indicates that the newly added nodes lower the average of the shortest path . Nodes with low fitness are deleted in the process, and nodes that survived must maintain high fitness to be close to new nodes. This matches the observations in (b-c). www.nature.com/scientificreports/ are deleted at the end of one network evolution cycle. This distinct misinformation network behavior cannot be explained by conventional network models, and may be caused by the rapid attention shift characteristic of social media as we discussed. We further investigate several hot topics in order to validate the above-mentioned hypothesis on misinformation network evolution. We manually inspect the sentences that survived in the network from day 0 to day 50, noted as S [0, 50] . Since S [0, 50] are all deleted from the network on day 51, and considering our misinformation network construction method, there will be no new links attached to S [0, 50] . We also study sentences collected on day 49 that managed to survive to day 55, denoted by S [49, 55] . We compare the top words, i.e., the words with highest TF-IDF (term frequency-inverse document frequency 47 ) scores, in S [0,50] and S [49, 55] as shown in Fig. 5 . We find that political words appear the most in the top 30 words of S [0,50] (e.g., "Trump", "president", "white house"-related phrases appear about 9 times). In comparison, no political words exist in S [49, 55] 's top 30 words. This evidence shows that public attention shifts from political-related content to non-political in the time period we investigated. Furthermore, we find that "New York"-related phrases along with medical words such as "deaths", "killed", "patients", "cases" represent the majority of the top 30 words of S [49, 55] . Which matches the COVID-19 break out in New York from April 18 th to 24 th . These examples confirm that our network construction method with node deletion mechanism can capture the actual misinformation network evolution. In addition, our network formulation is more sensitive to rapid network changes, e.g., the public attention shift, than classical PA or fitness-based network models. the misinformation network. Complex network measures such as centrality are calculated based on network topology, i.e., adjacency matrix. However, these metrics are highly computationally expensive and require the adjacency matrix information. In this work, we construct misinformation networks where nodes are sentences, hence, we hypothesize that network measures can be predicted by deep learning and natural language processing (NLP) methods by considering as inputs only the sentences (without adjacency matrix). We verify that complex network metrics of misinformation networks can be easily predicted with high accuracy using deep neural networks (DNNs). In our centrality prediction, to predict day(s) t's central nodes, we take daily misinformation networks from day t=0 up to day t-1 as training data, and the trained DNN outputs predictions for day(s) t. Specifically, we perform 1-day, 5-day, and 10-day prediction, meaning that for example, in 5-day prediction, if we predict central nodes from day 20 to day 25, we take daily misinformation networks from day 0 to day 19 as training data. In addition, instead of feeding DNN with adjacency matrix, we utilize techniques from natural language processing and feed the DNN with sentence embeddings, specifically, BERT embeddings (training setup can be found in Methods section "Deep learning-based misinformation network measures prediction"). Throughout this process, there is no need to run time-consuming network analysis algorithms, and DNNs predict network measures with high accuracy in real time. Specifically, in 1-day prediction, our DNN predicts degree centrality, closeness centrality, and betweenness centrality, with 94.19 ± 0.03% , 94.25 ± 0.04% , 83.25 ± 0.22% accuracies, and 98.54 ± 0.01% , 98.47 ± 0.01% , 90.44 ± 0.21% AURoCs, respectively, as shown in Fig. 6 . The key contributor to this outstanding result is the extracted natural language features in rumors. We believe that the trained neural network learns the syntactic and semantic patterns of influential tweets. This finding enables real time misinformation combat by online identification of fast-spreading and influential misinfor- [49, 55] (b). Top words are the words with the highest TF-IDF scores and represent the most influential and important words/topics in sentences. We take n = 1 and 2 for n-grams, therefore, in the results there exist unigrams and bigrams. We find that sentences that survived from day 0 to 50 mainly discussed political-related topics, and sentences that survived from day 49 to 55 are more discussing non-political-or medical-related topics. Specifically, 75.31% in S [0, 50] , and 41.50% in S [49, 55] are discussing political-related topics, respectively. This shift of topic may in fact is the reason for cyclical behavior of probability of attachment we discovered in Fig. 4a www.nature.com/scientificreports/ mation. With an online misinformation detection mechanism, we can utilize the proposed deep learning-based network measure predictor to quickly identify, filter, and delete significant sentences before they actually become the central nodes. Therefore, break the misinformation network before it forms. Researchers have noticed for a very long time that many measured data retrieved from biological and social systems can be described by log-normal distribution 28,29 , e.g., survival time after cancer diagnosis 48 , number of words per sentence for writers 49 , and size of holes in cocoa cake 29 . During the last decade, power-law distributions are often observed as well, e.g., size of wars 30 . In this work, we analyze the trends of COVID-19 misinformation spread and discover that the log-normal distribution cannot be rejected as a plausible model for misinformation mean popularity data. With COVID-19 credible and unreliable information pushed to smart devices in real time across the globe, the true/false information constantly competes for finite collective attention in this COVID-19 infodemic. The log-normal distribution may suggest that the popularity of COVID-19 misinformation can obey a multiplicative process and resembles to the GLV, where individual misinformation and generators born and die, and compete for attention. These inspirations could contribute to the future analysis of misinformation collective attention and GLV related modeling and control. To further decipher the laws behind COVID-19 misinformation network evolution, we construct misinformation networks through three different strategies and analyze these networks from information flow and network evolution aspects. We first construct misinformation networks where nodes are misinformation sentences collected within one day, and links represent their sentence similarity. Each network represents the misinformation that appeared on Twitter within one day and the inspection of these networks shows how the COVID-19 misinformation evolves. Analysis of the network centrality measures, i.e., degree centrality, closeness centrality, and second-order centrality, shows that misinformation first learns to optimize information transfer to be more efficient and then maintains the fast-spreading property. Compared to true information, researchers found that misinformation/fake news spreads differently even in early stages 50 . In addition, false news is discovered to be more novel and spread faster than true news 51 . In our work, we showed from the information transfer aspect Figure 6 . Centrality predictions of daily misinformation networks. To predict day(s) t's central nodes with respect to degree, closeness, or betweenness centrality, daily misinformation networks prior to day(s) t are used as training data. Instead of network topology, e.g., adjacency matrix, we take the natural language embedding of each misinformation as the input to the DNN. The DNN then predicts which nodes are going to be the top 100 central nodes in day(s) t. E.g., in 1-day prediction, we predict day 10's top nodes based on day 0-9's information; and in 5-day prediction, we predict days 5-10's top nodes based on day 0-5's information. www.nature.com/scientificreports/ that misinformation does evolve to be fast-spreading. However, the optimization of information transfer comes with a price, sacrificing the network robustness. In addition, centrality measures reveal the important nodes/ influential misinformation in the network, which lay down the foundation of misinformation control. Currently, the estimation of centrality measures is not only time-consuming, but also requires complete information about the topology (e.g., adjacency matrix) of the misinformation networks. Therefore, with sentences as nodes and sentence similarity as links, we propose a deep learning method to predict the centrality measures with the input of sentence only. Utilizing this method, we can predict the next hot topics or central nodes without the need of knowing the whole network topology 52 , which allows us to filter the potential influential misinformation before it actually becomes a center of attention. Researchers have expressed the concern about blocking information on COVID-19 that blocking can in turn fuel the spread of misinformation 53 . This can be true from the perspective of network information flow revealed in this work. If wrong nodes, e.g., certain nodes with low centrality measures, are deleted from the network, the information transfer of the whole network might be enhanced. In contrast, if we correctly remove certain central nodes, then the information transfer of network would be severely impacted. After inspecting the misinformation evolution in terms of information transfer, we construct the second series of misinformation networks, where we grow the network from a base network. We first form the base network with day 0's misinformation. Then we add day 1's misinformation to the base network; and we grow the network with regard to time (days). With the well-established network science methods, PA and node fitness theory, we find the co-existence of fit get richer and rich get richer phenomena. However, this way of network construction may not capture the true nature of the fast-changing feature of misinformation network due to lack of node deletion mechanism. Without node deletion, the time measure is ignored and a hot topic will remain popular regardless of time, and this is in contradiction with the fact that public attention may shift. To reveal the true nature of the rapidly evolving misinformation network, we propose a third way of misinformation network construction which grows the topology from the base network, while including the node deletion mechanism to reflect that public may forget things. The determination of the node fitness and probability of attachment show distinct evolution behavior that is not fully explainable by fit get richer and rich get richer effects, i.e., some nodes with high fitness do not attract new connections and are deleted from the network. This distinct behavior may be caused by the public attention shift from one hot topic to another. We also find that different from the time-invariant assumptions in node fitness and PA theories, our misinformation network changes rapidly as well as the node fitness and the probability of attachment. These observations reveal the need for new theoretical network models that can characterize and explain the real world fast-evolving networks such as misinformation networks; and also link the collective attention with network science. Furthermore, rumors are likely to have fluctuations over time 54 . With the node deletion mechanism, we observe evolution cycles of the misinformation network. The size of the misinformation expands and shrinks cyclically. We also find that the misinformation topics that survived in the network are mostly politically motivated. Our study provides a comprehensive data-driven and data science validation and invalidation of the hypotheses enunciated in 55 . Determining in advance potential targets for fake news is an important aspect of misinformation control 56 . We hope by identifying long-lasting, influential, fast-spreading misinformation in the network, we can help fight the COVID-19 and future infodemics by breaking the network before the increasingly popular nodes become influential; and control the misinformation by inserting combating information into the network. Lastly, through three different network formulations, we find limitations of current widely-used network models and researchers should study alternative novel strategies to properly construct networks from observations. We believe the findings and analysis of this work contribute new knoledge to the current state-of-the-art fake news/rumor/misinformation research and inter-discipline studies of natural language processing and complex networks. In the future, we foresee that our findings and models can also contribute to fruitful technologies that help combat misinformation, identify fake news in early stages, forecast how popular fake news evolves, spreads, and shifts the public opinion during important events. For instance, as we have exemplified with our deep learning framework, these results can be exploited for developing a technology for detecting and forecasting popular opinions that are likely to become dominant or influential in a fast-evolving heterogeneous network. With our network analysis, to make fake news network to destroy itself, we can insert real news in the network at the lowest price and remove significantly influential false news nodes from the network with the highest reward. However, aside from the positives, more problems need solutions, and more questions require answers. In reality, given that we can only partially observe the misinformation or information network, how can we design accurate and efficient algorithms to reconstruct the whole network from partial, scarce, uncertain, and noisy observations? With strategies to monitor accounts and information flow, how to control the network to make users aware of something? How can we control multiple interacting opinion dynamics that are evolving rapidly? In our future work, we will make an effort to tackle these issues, and in particular, misinformation combating problem, study the interaction between true and false information. We analyzed a COVID-19 misinformation dataset containing misinformation collected from Twitter from March 1st to May 3rd 31 . The data was retrieved with Twitter API service (https:// devel oper. twitt er. com/ en/ docs/ tweets/ filter-realt ime/ guides/ basic-stream-param eters) using keywords related to COVID-19: 'Covid19' , 'coronavirus' , 'corona virus' , '2019nCoV' , 'CoronavirusOutbreak' , 'coronapocalypse' , from the platform in real time. We used in total 60798 pieces of misinformation identified to build our misinformation networks. There are 6 categories in the retrieved dataset: unreliable, clickbait, satire, bias, political, and conspiracy. More specifically, the unreliable category is defined to include false, questionable, rumorous and unreliable news. Conspiracy category includes conspiracy theories and scientifically dubious news. Clickbait www.nature.com/scientificreports/ news is misleading, distorted or exaggerated to attract attention. Political and biased news are in support of a particular point of view or political orientation. In addition, satire is based on the consideration that satire has the potential to perpetuate misinformation 57, 58 . However, due to the fact that satire category is extremely small (only 29 tweets are labeled as satire), our analysis only focuses on the other five types. We note that in Fig. 1 , the last category "misinformation" contains all the misinformation categories including satire. Power-law and log-normal analysis. In this section, we describe the methodology of power-law and log-normal fitting of misinformation mean popularity data. The popularity of a misinformation sentence (tweet) is the number of times it appears on Twitter in the time span of dataset, March 1st to May 3rd. The mean popularity is taken across all misinformation records. There are 5 major types of COVID-19 misinformation in the dataset: unreliable, political, bias, conspiracy, and clickbait. We analyze the power-law and log-normal fits with regard to all 5 types individually and as a whole. By using the powerlaw Python package 33 , we perform a statistical hypothesis test analysis as follows: (i) we estimate the parameters, e.g., x min , α , of the power-law model and the log-normal model via powerlaw. (ii) We calculate the goodness-of-fit between mean popularity data and the power-law (and log-normal). Specifically, we inspect a plausibility value p KS in goodness-of-fit test. If p KS is greater than 0.1, the power-law (or log-normal) is a plausible hypothesis for the data. (We will describe how to calculate p KS in detail later.) (iii) We compare hypotheses, power-law and log-normal, via a likelihood ratio test provided in powerlaw, e.g., R, p = distribution_compare( ′ lognormal ′ , ′ powerlaw ′ ) , where R is the log-likelihood ratio between the two candidate distributions. If R > 0 , then the data are more likely to follow the first distribution, otherwise the data are more likely to obey the second distribution. p is the significance value for that direction. The favored distribution is a strong fit if p > 0.05. Now we describe the procedure of goodness-of-fit test and the calculation strategy of p KS 32 . Given a dataset and the hypothesized distribution, e.g., power-law, from which the data are drawn, we calculate p KS based on measurement of the "distance" between the distribution of the empirical data and the hypothesized model. This distance D is given by powerlaw when we fit the data, which is the "Kolmogorov-Smirnov (KS)" statistic. Next, we generate a large number of power-law synthetic data with the estimated parameters and we fit the synthetic data using powerlaw. After fitting the synthetic data, we get the distance of synthetic data and the hypothesized power-law model (fitted by the synthetic data), noted as D syn . Then we repeat this procedure by generating 50 sets of synthetic data with 50 D syn 's. Finally we calculate p KS as the percentage of D < D syn . Misinformation network formulation I. We form networks of new misinformation with respect to time (days). We construct 60 COVID-19 misinformation networks based on misinformation identified on Twitter from March 1st to May 3rd 31 (days with missing data are discarded). Nodes in a network are sentences, i.e., COVID-19 misinformation, appearing within one day on Twitter. Nodes are connected if two sentences have similarities more than 70% . We provide a sample network in Fig. 7 , along with original sentences of the top 10 most connected nodes in Table 1 . To calculate sentence similarity, we first encode sentences by sentence Transformer model 59 into vectors with length 786. Then, we measure sentence similarity based on cosine distance. Each misinformation network contains new misinformation that appeared on Twitter per day, and we analyze Misinformation network formulation III (with node deletion) with the probability of attachment and node fitness analysis. Similarly to the network growth procedure without a node deletion mechanism, we have a base network containing misinformation collected on March 1 st . Then differently than the afore-mentioned monotonic growing process, we include a node deletion mechanism as follows: if a node (sentence) does not attract new connections in δ consecutive days, we remove this node from the network along with its all edges. The statistics comparison between networks extracted using formulation I-III are shown in Fig. 8 . We take δ = 3 in this work and links exist only when the text similarity of two nodes is over 80% to keep the reasonable size of the misinformation network. We keep track of this misinformation network from March 1st to May 3rd and estimate the probability of attachment and node fitness. The general temporal model, PAFit, used to measure the misinformation network without node deletion assume the co-existence of fit get richer and fit get richer based on time-invariant PA function and node fitness. However, it may not be applicable to the misinformation network with node deletion. Therefore, we estimate the probability of attachment of each node everyday as k i j k j using Barabasi-Albert model, where i is the target node and j represents all other nodes in the network. Node fitness represents how attractive a node is in the network, and it can be estimated as the growth exponent β 45 . Following Kong et al's work 45 , assume the cumulative degree of a node i at time t is k(i, t), and its logarithm reads: where A and c are constants, B is some timeinvariant offset. From this equation, node fitness and the growth exponent are related by a linear transformation, hence the slope of k(i, t) gives an estimation of node fitness value. Deep learning-based misinformation network measures prediction. We utilize both deep learning and natural language processing techniques to enable fast network measures prediction. Our DNN takes daily misinformation networks from day 0 to day t − 1 as training data and predicts which misinformation in day(s) t will end up as central node. The input to our DNN is misinformation sentence embeddings, i.e., BERT embeddings with length 786. The output of our DNN is binary where 0 and 1 indicate a tweet (i.e., a node in a misinformation network) is with low centrality or high centrality, respectively. Our training data is obtained as follows. With 60 misinformation networks, we calculate the centralities via traditional complex network analysis mechanism and take nodes with top 100 centrality measures and label them as 1, otherwise label them as 0. Hence, the training data are misinformation sentences with binary labels. With this way of labeling, the training data end up with imbalanced classes, therefore, we up-sample the minor class to balance the data prior to training. After data balancing, we train a DNN with 3 hidden layers to do binary classification, i.e., to classify if a Network centrality measures. The network centrality measures the importance of a node across a complex network. In this study, the network centralities are calculated by the NetworkX package in the Python library 60 . The degree-, closeness-, and second order-centrality are introduced as follows: Degree centrality 61 is of node n is defined as: where deg(n) is the number of edges connected with the node n. Closeness centrality 62 of a node measures its average inverse distance to all other nodes and is a way of detecting nodes that can transport information across the network efficiently. The closeness centrality of a node n can be defined as follows: where d(u, n) is the distance between node u and node n. Of note, u = v. Second order centrality 37 is a kind of random walk based centrality which measures the robustness of the networks. The centrality of a given node n is the expectation of the standard deviation of the return times to the node n of a perpetual random walk on graph G, where the lower that deviation, the more central the node n is. (1) Degree(n) = deg(n) We can see that the cumulated misinformation networks (with and without node deletion mechanism) are larger in scale and contain much more nodes and edges compared to daily misinformation networks. www.nature.com/scientificreports/ Social-media companies must flatten the curve of misinformation Facebook will remove misinformation about coronavirus Pseudoscience and covid-19-we've had enough already Fighting the coronavirus misinformation epidemic From rumor to genetic mutation detection with explanations: a GAN approach A COVID-19 Rumor Dataset Facebook: combating misinformation Updates to our work on covid-19 vaccine misinformation Google to spend 6.5 million in fight against coronavirus misinformation Fighting fake news in the covid-19 era: Policy insights from an equilibrium model Influence of fake news in twitter during the 2016 US presidential election Cognitive attraction and online misinformation Rumor has it: Identifying misinformation in microblogs Topology comparison of twitter diffusion networks effectively reveals misleading information Vroc: Variational autoencoder-aided multi-task rumor classifier based on text The evolutions of the rich get richer and the fit get richer phenomena in scholarly networks: The case of the strategic management journal Statistical mechanics of complex networks The large-scale structure of semantic networks: Statistical analyses and a model of semantic growth Fitness model for the Italian interbank money market A mathematical theory of evolution, based on the conclusions of Dr Competition and multiscaling in evolving networks Controlling the multifractal generating measures of complex networks Reliable multi-fractal characterization of weighted complex networks: Algorithms and implications Global organization of the wordnet lexicon Patterns in syntactic dependency networks Novel keyword co-occurrence network-based methods to foster systematic reviews of scientific literature Representation of texts as complex networks: A mesoscopic approach Explanation of log-normal distributions and power-law distributions in biology and social science Log-normal distributions across the sciences: Keys and clues: On the charms of statistics, and how mechanical models resembling gambling machines offer a link to a handy way to characterize log-normal distributions, which can provide deeper insight into variability and probability-normal or log-normal: That is the question Trends and fluctuations in the severity of interstate wars Coronavirus on social media: Misinformation analysis Power-law distributions in empirical data Powerlaw: A python package for analysis of heavy-tailed distributions Generalized lotka-volterra (glv) models Adaptive dynamics: A geometrical study of the consequences of nearly faithful reproduction Node centrality in weighted networks: Generalizing degree and shortest paths Second order centrality: Distributed assessment of nodes criticity in complex networks Network science characteristics of brain-derived neuronal cultures deciphered from quantitative phase imaging data A measure of betweenness centrality based on random walks Error and attack tolerance of complex networks Bose-Einstein condensation in complex networks Joint estimation of preferential attachment and node fitness in growing complex networks A statistical method for measuring preferential attachment in temporal complex networks Connectivity of growing random networks Experience versus talent shapes the structure of the web Emergence of scaling in random networks Mining of massive datasets Age at onset of Alzheimer's disease: Clue to the relative importance of etiologic factors? A note on the statistical analysis of sentence-length as a criterion of literary style Fake news propagates differently from real news even at early stages of spreading The spread of true and false news online Reconstructing missing complex networks against adversarial interventions Blocking information on covid-19 can fuel the spread of misinformation Prominent features of rumor propagation in online social media Coronavirus misinformation, and how scientists can help to fight it Polarization and fake news: Early warning of potential misinformation targets Covid-19 on social media: Analyzing misinformation in twitter conversations. arXiv e-prints arXiv-2003 Combating fake news: A survey on identification and mitigation techniques Sentence-bert: Sentence embeddings using siamese bert-networks Exploring network structure, dynamics, and function using networkx The structure and dynamics of networks The authors gratefully acknowledge the support by the National Science Foundation under the Career AwardCPS/ CNS-1453860, the NSF award under Grant Numbers CCF-1837131, MCB-1936775, CNS-1932620, andCMMI 1936624, the DARPA Young Faculty Award and DARPA Director's Fellowship Award, under GrantNumber N66001-17-1-4044, and a Northrop Grumman grant. The views, opinions, and/or findings contained inthis article are those of the authors and should not be interpreted as representing the official views or policies,either expressed or implied by the Defense Advanced Research Projects Agency, the Department of Defense orthe National Science Foundation. M.C., S.N., and P.B. contributed to the design of the research including simulations and experiments. M.C., C.Y., S.N. and P.B. contributed to the writing/revision of the manuscript. M.C. contributed to the implementation of the simulator, running experiments, preparing the figures, tables, and their captions, and organizing the information in the main text. The authors declare no competing interests. Correspondence and requests for materials should be addressed to P.B.Reprints and permissions information is available at www.nature.com/reprints.Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.