• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Ensemble Learning Based Approach for Detecting and Tracking COVID19 Rumors

    2022-11-09 08:16:52SultanNomanQasemMohammedAlSaremandFaisalSaeed
    Computers Materials&Continua 2022年1期

    Sultan Noman Qasem,Mohammed Al-Sarem and Faisal Saeed

    1Computer Science Department,College of Computer and Information Sciences,Al Imam Mohammad Ibn Saud Islamic University(IMSIU),Riyadh,11432,Saudi Arabia

    2Computer Science Department,Faculty of Applied Science,Taiz University,Taiz,6803,Yemen

    3College of Computer Science and Engineering,Taibah University,Medina,Saudi Arabia

    4Information System Department,Saba’a Region University,Mareeb,Yemen

    Abstract:Rumors regarding epidemic diseases such as COVID 19,medicines and treatments,diagnostic methods and public emergencies can have harmful impacts on health and political,social and other aspects of people’s lives,especially during emergency situations and health crises.With huge amounts of content being posted to social media every second during these situations,it becomes very difficult to detect fake news(rumors)that poses threats to the stability and sustainability of the healthcare sector.A rumor is defined as a statement for which truthfulness has not been verified.During COVID 19,people found difficulty in obtaining the most truthful news easily because of the huge amount of unverified information on social media.Several methods have been applied for detecting rumors and tracking their sources for COVID 19-related information.However,very few studies have been conducted for this purpose for the Arabic language,which has unique characteristics.Therefore,this paper proposes a comprehensive approach which includes two phases:detection and tracking.In the detection phase of the study carried out,several standalone and ensemble machine learning methods were applied on the Arcov-19 dataset.A new detection model was used which combined two models:The Genetic Algorithm Based Support Vector Machine (that works on users’and tweets’features)and the stacking ensemble method(that works on tweets’texts).In the tracking phase,several similarity-based techniques were used to obtain the top 1%of similar tweets to a target tweet/post,which helped to find the source of the rumors.The experiments showed interesting results in terms of accuracy,precision,recall and F1-Score for rumor detection(the accuracy reached 92.63%),and showed interesting findings in the tracking phase,in terms of ROUGE L precision,recall and F1-Score for similarity techniques.

    Keywords: Rumor detection;rumor tracking;similarity techniques;COVID-19;social media analytics

    1 Introduction

    Social media are commonly used to spread the messages,alerts and other news worldwide and have currently become one of the main news sources,rather than other,more traditional,platforms.In addition,huge advancements in technology,such as the use of smart phones,makes it easy to spread information very fast,regardless of its credibility [1].It is difficult to verify the veracity of information spread on social media,especially during a disaster or similar crisis [2].The information that is usually spread by non-credible sources is called a rumor and can be spread by a huge number of people on social media in a short time [3].Rumors can cause various effects on economic,political and other aspects of the global society and their transmission has an increasing substantial impact on human lives and social stability [4,5].During these situations,governments must play an important role in order to maintain sustainable market development[6-8].For instance,during COVID-19,people in many countries felt scared once the World Health Organization declared it a pandemic and therefore many rumors spread on social media about specific drugs which can prevent the disease or reduce the infection,causing high demand for these drugs which affected the sustainability of the entire healthcare market [8].

    Several studies have focused on the impact of rumors during disasters and crises.For instance,Kim and Kim [9] investigated the factors influencing the rumors associated with the Fukushima nuclear accident.In further studies,on the COVID-19 pandemic [10,11],they also investigated the effects of health beliefs on preventive behaviors and analyzed the belief structure of COVID-19 rumors,which caused what is known as an infodemic.Zhang et al.[12] investigated how healthrelated rumors mislead the perception of people during a public health emergency.According to [13],the efficient and effective detection of rumors is highly important in order to minimize this harmful impact,and that the detection task is not simple.This makes the work on automatic identification of rumors from social media a hot research topic [1].One of the issues that makes rumor detection more challenging is the labeling task,which is time-consuming and requires rigorous labor work [3].The other common challenges are feature extraction from a given dataset,retrieving the data from the sources and database bias and quality [14].

    Several methods have been applied for detecting rumors from social media,including supervised,unsupervised and hybrid machine learning approaches [1].For instance,Alkhodair et al.in [13],introduced a method and trained a recurrent neural network to detect rumors related to breaking news that are propagated on social media..Their experiments used a real-life dataset and applied the proposed method for cross-topic early rumor detection.They found that this method outperforms the previous methods in terms of several metrics,including precision and recall.In addition,Wu et al.[3] investigated the issue from an important angle by studying the ability of knowledge learned from old data to detect new rumors.Using real-world datasets,they found that the applied methods were effective.Another study [15] introduced a model based on Recurrent Neural Networks (RNN) for rumor identification that depends on learning the sequential posts by utilizing its temporal hidden representation.Wu et al.in [16] proposed a hybrid model for rumor detection based on a convolutional neural network (CNN),where the layer of the CNN uses the recurrent structure.In addition,Roy et al.[17] introduced an architecture for rumor detection based on ensemble learning.In order to classify the rumors,they used CNN and Bi-directional Long-Short-term Memory (BI-LSTM).The experimental outcomes of these methods were passed to a multilayered perceptron method for performing the final classification.However,this proposed ensemble architecture obtained an accuracy of only 44.87%.

    Rumor detection and source identification in a social network are considered very important tasks for controlling the diffusion of misinformation and have recently gained the attention of researchers in social media analytics area [18].There are some websites that make tracking simple,such as snopes.com and emergent.info,which manually collect stories and classify them as rumors;however,the task of automatically tracking the source of rumors still challenging.Detecting the accurate sources of rumors is also considered a challenging issue,because of the dynamic evolution of the network of social media.Several methods have been used to investigate this tracking issue;for instance,Shao et al.[19] developed a system to collect,detect and analyze online misinformation for tracking purposes.They collected the data from news websites and social media.They found that rumors are controlled by active users,whereas fact-checking is a more grass-roots activity.In addition,graph-based methods have been applied for tracking the spread of rumors.According to Shelke et al.[18],the main steps for detecting the source of rumors in a Twitter social network start by identifying the rumor and collecting its dataset,which includes sender,receiver and sent post.The data should then be preprocessed in order to remove stop words,hashtags,URLs,and other unnecessary information,and then the data should be annotated.After that,the rumor’s propagation is constructed and the appropriate diffusion model selected.Finally,the sources are classified based on metrics of source detection,and the outcomes are evaluated using actual and estimated sources.Some studies worked with rumor source identification as a tree-like network [19-22].Yu et al.[23] applied a finite graph and use the message-passing approach for source detection,to reduce the search of vertices for estimating the maximum likelihood.In another approach,Xu et al.[24] proposed a source detection method by applying sensor nodes in the network that do not use the rumor’s text.The authors’of [25] introduced a rumor source detection method in a temporal network based on the Susceptible-Infected-Recovered model (SIR).In addition,other approaches were used for detecting the source of rumors on social media such as a query-based approach [26],antirumor-based approach [27],ranking-based approach [28],community-based approach [29] and approximation-based approach [30].

    Rumors become more harmful when they are related to the spread of health misinformation.Several research efforts have investigated detection and tracking of health-related rumors.For instance,in [31] the authors conducted a study to examine the people who are spreading healthrelated rumors,such as publicizing ineffective cancer treatments.The study involved 4,212 Twitter users and 139 ineffective “treatments”.Features such as user writing style and sentiment were used with a classification method that obtained 90% accuracy.In addition,[32] reported a tool for tracking the health-related rumors on Twitter that worked on tweets related to the Zika outbreak.More than 13 million tweets were collected and the tool pipeline,which included health professionals,crowdsourcing and machine learning,provided a method to detect the health-related rumors.In addition,identifying the rumor early during a disaster is considered very important and helps to avoid many health issues.Mondal et al.[33] introduced a probabilistic model,in which the prominent features of rumor propagation are combined.The content-based analysis was then performed to guarantee the contribution of the extracted tweets in terms of the probability of being a rumor.According to [34],several methods worked in detecting rumors from social media using machine learning and other techniques.However,they found that few studies have focused on detecting health-related rumors in Arabic language.Thus,they introduced a process of building a health-related rumors dataset and applied several machine learning techniques to detect health-related rumors in the Arabic language.The applied techniques detected the rumors with an accuracy of 83.50%.During the COVID-19 pandemic,the issue of spreading rumors has become more harmful and affects many aspects of life.Spreading these rumors covering the healthy behaviors and publicizing wrong practices can lead to increasing the rate of spreading the virus.Therefore,advanced technologies such as data mining methods are needed to detect the online posts that include rumors from social media [35].Few studies have addressed this important issue,especially in the Arabic language.In this regard,Haouari et al.[36] built the ArCOV19-Rumors dataset using Arabic language for COVID19 misinformation detection in Twitter.However,detecting and tracking the rumors related to COVID19 using Arabic language still a big challenge and requires more research.

    In this paper,a comprehensive approach for detecting and tracking the source of rumors related to COVID 19 in the Arabic language is proposed.In the rumor-detecting phase,several machine learning methods including Linear Regression,K-nearest Neighbor,Decision Tree(CART),Support Vector Machine and Na?ve Bayes (Bernoulli) were applied and investigated.In addition to individual classifiers,several ensemble learning methods were applied such as Random Forest,AdaBoost,Bagging,Extra-Trees and Stacking that worked on the tweets’texts.In addition,the Genetic Algorithm-based Support Vector Machine model (GA-SVM) was applied on the user’s and tweet’s features.The proposed detection model then combined the ensemble model and the GA-SVM model that obtained the best performance and used these in the second phase,rumor tracking.In previous studies,the Bayesian network-based similarity method was used to identify the rumors of texts and predict the characters of users more accurately and effectively [37].In this proposed approach,several similarity measures such as Cosine,Jaccard,and Chebyshev were used to compare the target query with the detected rumors to obtain its source.

    The organization of this paper is as follows.Section 2 covers the research background.Section 3 describes the materials and methods used in this study,including dataset description,data preprocessing and the proposed model.Section 4 presents the details of the experimental results and the discussion.Section 5 compares the performance of the similarity techniques used in tracking the source of rumors.Section 6 concludes the paper by highlighting the main contributions and suggests future work.

    2 Related Studies

    This section reviews the methods for detecting rumors and the source of rumors and applications related to rumor detection and tracking.Most methods for rumor detection currently use supervised learning.The most popular methods are content-based algorithms.Content-based approaches identify misinformation or false news according to the texts’or pictures’truthfulness.These works presume the material in various types of rumors (or news) varies in some quantifiable manner.In each article with a particular subject matter relating to health-related reporting,the refined features inspired by the theory of graphics and paradigms of social factors were used [38].Rumors sometimes include images.Thus,Vishwakarma et al.[39] suggest a platform-independent validation system to verify news by analyzing the authenticity of photographic information.The news is described by the paradigm in four stages,the first stage is extracting the text from the pictures;then naming the entities from the text in the second stage;and the third stage involvesscrapingthe web for associated information according to the extracted entities and then classification occurs in the final stage.

    Some researchers immediately extracted features by including deep learning algorithms to reduce the deficiencies of conventional approaches based on content.For instance,Kaliyar et al.[40] suggest a false news content-based identification,FNDNet,based on a deep convolutional neural network.The algorithm that they propose is developed to study discriminative features for detection of false media automatically through multiple hidden layers built into a deep neural network.Zhang et al.[41] suggest a multi-layer structural neural network Auto-Encoder (AE) automated detection system for rumor detection.In addition,multiple thresholds to enable rumor identification have been suggested to self-adapt.A novel automated rumor detection system based on a long-/short-term memory classifier is proposed in [42].The algorithm applied in this work not only obtained greater precision,F1 score and accuracy,but also had low false positivity.Ajao et al.[43] proposed a system for identification and classification of false news from Twitter messages,based on mixed convolutional neural networks and long-term recurrent neural networks.Their system helped improve efficiency as it did not need the vast number of training data characteristics required by deep learning models.The analysis of counterfeit news distributed over multiple social media sites poses new problems that render previously applied algorithms inefficient or inaccurate.To address these issues,[44] evaluated four common machine learning algorithms to verify their utility separately,in terms of identification and classification of false news.Many emerging approaches actually classify rumors focused only on language knowledge,without taking temporal dynamics and transmission patterns into account.Another study,by Wu et al.[45] proposed a new way of creating a spreadsheet using a Twitter spreadsheet.A gated graphical neural network algorithm was then used,which can produce powerful images for each propagation graph node.

    Identifying the origins of rumors in social media is also critical.This is required to mitigate the problems created by the dissemination of rumor throughout society.The consequences of pervasive disinformation on individuals and culture can be unacceptable,negative,and even destructive [46].The distribution of knowledge on social media has led to several developments in research,such as identification of disinformation or gossip,social bust awareness,tracking of the propagation of false news,estimation of potential diffusion and rumor detection.To counteract these effects,researchers have performed numerous experiments,including psycholinguistic analysis,computer training and deep learning methods from multiple perspectives.The propagation of misinformation on a network poses a variety of threats,including fear of an epidemic infection among the public and wrong decisions by authorities in a crisis.Thus,it is really important to avoid and monitor the rapid dissemination of rumors in social networks.Early rumor detection [47],verification of the veracity of rumors [48] or misinformation and recognition of the rumor’s source [49] will monitor the rumor propagation in a network.Non-credible material spreads quickly online through social networks.It is extremely difficult to detect the origins of misinformation in a fast and accurate way,due to the complicated distribution process,credible evidence and complex network adjustments in the social network.Most recently,a few social media tools have been developed for rumor identification and analysis.However,these instruments do not track or control the development of diffusion,and are completely unable to detect any particular origins.

    The study by Louni et al.[50] presents a two-phase algorithm which is used for finding the source.The volatility in social networks is quantified using a probabilistic weighted graph.Recently,several algorithms have suggested that clusters in complex networks can be calculated.Thus,the first phase of the process consists of clustering and deciding the most possible cluster,using the Louvain clustering algorithm.The first set of algorithms is based on the division of graphs until the required number of clusters is reached.It has been suggested that the algorithm can classify groups through node similarities.Maryam et al.[51] proposed a heuristic-based approach for identifying the doubtful origin of the deceptive dissemination,while Ji et al.[52]developed a systematic frame and methodology for the identification of multiple sources based on estimators developed for the identification of a single source.Their model is developed to predict when infections will begin,at distinct periods.

    The identification of sources is critical in different fields of operation Because of its wide variety of uses,major advances in the identification of origins have been observed in the last two decades.Significant research has been conducted into sources in a range of application areas,such as healthcare (the first patient to be discovered to monitor an influenza pandemic) [53],surveillance (computer virus sources) [54],and wide interconnected networks (wireless sensor network gas leak source [55],e-mail network source [56],dynamic network propagating sources [57] and social network rumor disinformation sources [23,27]).

    3 Materials and Methods

    To identify the source of rumors,a two-phase approach for rumor detection and tracking was proposed.In the first phase,a detection process was conducted (detecting phase) in which we aimed to classify the collected posts as rumor or non-rumor.Once the post was classified,the set of rumor posts was fed into the second phase (tracking phase).In the detection phase,we conducted extensive experiments with conventional and ensemble machine learning models on a collection of posts (dataset).First,a set of conventional classifiers was applied and tested,which were (i) Logistic Regression (LR),(ii) K-Nearest Neighbor (KNN),(iii) Classification and Regression Tree (CART),(iv) Support Vector Machine (SVM),and (v) Bernoulli Na?ve Bayes(NB).A set of ensemble classifiers was then investigated,which were (i) Random Forest (RF),(ii) AdaBoost,(iii) Bagging,(iv) ExtraTree,(v) stacking-based ensemble classifiers,and (vi) the Stochastic Gradient Descent (SGD) classifier.The best performing method here was the stackingbased ensemble model that worked on the tweet’s texts.In addition,we applied a Genetic Algorithm-based Support Vector Machine model (GA-SVM) on the users’and tweets’features.The proposed method then combined the two models: the stacking-based ensemble model and applied genetic algorithm-based Support Vector Machine model to obtain the best detection for COVID-19 rumors in Arabic.

    In the tracking phase,if the target post was classified as a rumor,the set of predicted rumors from the detection phase along with this target rumor post were fed into the similarity techniques process to identify the most similar posts (rumors) that could be considered as the source for this post (rumor).Three similarity techniques were used: (i) Cosine-based Similarity,(ii) Jaccardbased Similarity,and (iii) Chebyshev Distance.We also investigated the effect of using the Arabic GLoVe [58] pre-trained word embedding vector on the overall similarity techniques.

    3.1 Database Description

    The dataset used is available publicly [59].The data repository was organized to serve analysis of several social network sites.The data available on the “tweet verification” sub-directory were used.This sub-directory holds the contents of all the annotated tweets.The directory also contains information about the propagation of tweets.Therefore,there are two components in this dataset:

    · Tweets file as a tab-separated file.The file stores atitweet asti=〈tid,tι〉,wheretid: a tweet ID andtι: veracity labels (tι∈{True,False}).

    · Propagation networks: contains the IDs of retweets and conversational threads for the tweets.

    Since the Tweets file sorts only the tweets’IDs,the Hydrator1https://github.com/DocNow/hydratorwas used to collect tweets using these IDs,and it was found that a set of tweets was missing2Out of 3612 tweets listed in the original Tweets file,only 3157 tweets were obtaind..At the end,a set of tweetbased features and user-based features was obtained.The obtained tweets’metadata were then concatenated with the veracity labels found in the Tweets file.The process of concatenation is described in Algorithm 1.The overall data statistics can be found in Tab.1.

    Algorithm 1: Dealing with Missing Tweets Input: TweetFile F〈tid,tι〉,tid: TweetsID,tι: VeracityLabel Output: Final Dataset D 1 // Initialization of Tweet Text empty list df ←hydrator_dataset();// obtained metadata using hydrator tool temp ←{};2 for each t ∈df.index do 3 for x in F.index do // Tweets File 4 if F[tid][x]== df [tid][t] then 5 temp.append(F[tid][x]);6 i ←i+1;7 D=Zip(F,df,temp);8 return D;

    3.2 Data Preprocessing

    The Hydrator tool produces 34 linguistic and user features from a tweet.For the proposed model,we used the tweet’s texts (text of the posted tweet by the user) to be trained by individual and ensemble models and the users’ and tweets’ features to be trained by GA-SVM model.Since the dataset used is slightly unbalanced (see Tab.1),the Synthetic Minority Oversampling Technique (SMOTE) was performed in order to augment the number of rumors (Fig.1).

    Table 1:Data statistics of ArCOV-19 dataset

    The extracted texts,including rumor and non-rumor tweets,were then moved to the next stage,where several preprocessing techniques were applied:

    · hashtags were removed and the word after each tag was kept,

    · URL removal and whitespace removal,

    · the word “COVID-19” was replaced with

    · non-Arabic character removal,

    · Normalization3PyArabic library is used:https://github.com/linuxscout/pyarabic,

    · Stemming,using ISRI stemmer and lemmatization4NLTK library.

    Figure 1:Dataset Size after applying SMOTE technique

    The cleaned texts were then used by different standalone classifiers to classify rumor and nonrumor tweets.However,before feeding the text into the classifier,thetf/idftechnique was used as a tokenization method,as we are concerned here about the representation and detection of rumors’texts,while the tweets’texts were represented using the Arabic GLoVe pre-trained word embedding vector,as we are concerned here about the meaning of the tweets and the similarity with the query post (tweet).The detailed description of tweet representation is in the subsection below,while the detailed description of the users’and tweets’features is presented in Section 3.3.3.

    Tweet Representation in the Detection phase

    In the detection phase,we converted the collection of the preprocessed tweets to the matrix of thetf/idffeature using n-gram.The lower and upper boundaries of the n-gram were one and three,respectively.This means that we capture at the same time the unigram,bigram,and trigram.This allows us to catch phrases such as-Corona,-Covid-19 and“novel Coronavirus”.Therefore,given two tweetstiandtj,where the word count in each tweet is l≤240,tf-idf with n-gram is represented as:

    tf_idf={tfidf n=1,tfidf n=2,tfidf n=3},where

    tfidf n=1is thetf_idfmatrix with respect to the unigram,tfidf n=2is thetf_idfmatrix with respect to the bigram,tfidf n=3is thetf_idfmatrix with respect to the trigram,mis the terms in each tweet,andnis the number of tweets in the collection.Thus,the final matrix of the tf_idf feature is presented as follows:

    3.3 Detection Phase

    In this phase,several models that work on the tweets’texts were applied,including standalone machine learning models and ensemble-based machine learning models,.In addition,the GA-SVM model was applied,which worked on both users’and tweets’features.The proposed model was then applied,which combined the stacking ensemble model and the GA-SVM model to obtain the best detection rate for COVID-19 rumors in Arabic.

    3.3.1 Model 1-Standalone Machine Learning Models

    As stated earlier,five machine learning models were used,namely LR,KNN,CART,SVM and NB.These models were used later as base classifiers for ensemble methods.The base classifier was selected based on its ability to deal with high dimensional data,its performance when the dataset size is increased,and its sensitivity to noise data [60].The detailed model configurations and hyper-parameter settings are presented in Tab.2.These models work on the tweets’texts.

    Table 2:Hyper-parameter settings for each of the classifiers

    3.3.2 Model 2-Ensemble-based Machine Learning Models

    In recent years,ensemble learning has gained more interest [61].The ensemble-based model improves the overall classification performance by fusing the output of a set of base classifiers [60].Given a pool of Mbase classifiers,some classifiers usually perform better than others.Thus,finding a way to combine them tends to be more accurate than working with each classifier separately.In literature,ensemble learning models can be either homogeneous ensembles such bagging [62],boosting [63],random forest [64] and a SGD classifier [65] or heterogeneous ensembles such as stacking [66].The detailed model configurations and hyper-parameter settings can be seen in Tab.3.

    Table 3:Detailed model configurations and hyper-parameter settings for ensemble learning methods

    3.3.3 Model 3-Genetic Algorithm-Based Support Vector Machine Model

    In addition to the tweets’texts,a set of user-based features and tweet-based features are extracted.The user-based features are: (i) number of user’s friends,(ii) number of followers,(iii)number of favorites accounts that user likes,(iv) verified user or not,and (v) number of public lists.The tweet-based features are: (vi) retweet count,(vii) favorite count,and (viii) sensitive content.The complete description of the features is shown in Tab.4.

    Since the extracted features have different variances and some of them have missing values,standardization of data and missing data handling techniques were performed.For tuning the proposed classifier,the Support Vector Machine was trained using the aforementioned extracted features with the following parameter settings of GA,as shown in Tab.5.The detailed results of the different classifiers are shown in Section 4.

    3.3.4 Model 4-The Proposed Model:Combined Stacking Classifier(LR)and GA-SVM

    The outcomes of the second and third models were combined by concatenating them to form a new training set,which was later fed to the GA-SVM classifier that was trained and tested using k-fold cross validation.The proposed model is illustrated in Fig.2.

    Table 4:List of user-based features with their type and description

    Table 5:Parameter settings of GA used with the GA-based SVM

    3.4 Tracking Phase

    To track the source of any rumor (tweet),we passed the output of the detection phase into the tracking phase.Since we were concern only with the rumors’texts here,each tweet that was predicted as a rumor was represented using the Arabic GLoVe pre-trained word embedding vector(as shown in Fig.3).The next sections describe how this process was done.

    3.4.1 Tweet Representation at Tracking phase

    The target of the tracking phase is to find those previous rumors that share similar concepts and meanings to a specific tweet.Thus,the Arabic GLoVe pre-trained word embedding vector was used to represent each tweet in a fixed dimension of a real-value vector.GloVe word embedding was used to map each word to a 50-dimensional vector.We averaged the 50 dimensions of each word,wi.Thus,the complete word embedded of a tweettiis mapped from 50 dimensions to 1 dimension as follows:

    Figure 2:Combined GA-based SVM with stacking ensemble model

    3.4.2 Similarity Measures

    With the final average vector of any tweet,finding the similarity between tweettiandtjcan be conducted in several ways.Three similarity techniques were used: (i) Cosine-based similarity,(ii)Jaccard-based similarity,and (iii) Chebyshev distance.Algorithm 2 is used to reduce the number of operations needed.

    Figure 3:Rumor tracking phase

    Algorithm 2: Reduction of Source Set( )Input: RumorTweets Rt,Timestamp of each tweet T,StartingTweet t*Output: Candidate set of source rumors R′1 R′t ←[];t|R′t ∈Rt 2 for i in Rt do 3 if T(Ri) is ealier than T(t*) OR t* is retweet of Ri Then 4 R′t.append(Ri);5 return CandidateSet R′t

    3.4.3 Source Detection

    Assume a tweettiis the target rumor post which was classified by a classifierMas a rumor.To find the most potential sources of rumors,the reduction algorithm is first executed to obtain the candidate setR′t,as shown in Algorithm 2.The similarity betweentiand each tweet in the candidateSetR′tis then computed and only the topKcomponents ofscoresset are returned,as shown in Algorithm 3.

    Algorithm 3: Similarity Between Two Tweets( )Input: RumorTweets Rt,Timestamp of each tweet T,StartingTweet t*Output: SimilarityScore: Scores[]1 Scores←[]RumorsList ←[],Score=0 2 for i in Rt do 3 RumorsList= ReductionOfSourceSet()4 for each i ∈RumorsList do 5 Score ←ComputeSimilarity(t*,Ri) // Apply Cosine/Jaccard/Chebyshev Similarity 6 Scores.append (Score)7 return Top Kcomponents of Scores

    3.4.4 Evaluation Metrics

    The performance of the proposed detection models was evaluated using accuracy,recall,precision and F1-score.Since the repeated stratified k-fold cross validation was used,each evaluation matric was averaged and the standard error computed.Accuracy (Acc),recall (R),precision (P),and F1-score (F1) were computed as shown in Eqs.(1)-(4),respectively.

    · Accuracy: the ratio of accurately predicted tweets,either as rumors or not (TP+TN),to the total data set D.

    · Recall: the number of accurately predicted rumor tweets (TP) to the total number of actual rumor tweets (TP+FN).

    · Precision: the number of accurately predicted rumor tweets (TP) to the total number of predicted rumor tweets (TP+FP)

    · F1-score: the harmonic mean between precision and recall,which gives the balanced evaluation between both precision and recall.

    The average value of any evaluation metric and standard error are computed as in Eqs.(5)and (6) respectively.

    The ROUGE values (ROUGE L precision,recall and F-Measure) were used for the similarity approaches used for evaluating the performance of the proposed tracking algorithm.

    4 Results and Discussion

    This section discusses the results of the proposed two-phase rumor detection and tracking approach.The experimental part of this work was performed on Python 3.8 with Windows 10 operating system.We used sklearn 0.22.2 as the main Python package for implementing the classifiers.The classifiers were evaluated using a repeated stratified k-fold cross validator with 10 folds,which needed to be repeated 3 times.The same preprocessing steps were used for each classifier to make a fair comparison between classifiers.

    4.1 Results of Model 1-Standalone Machine Learning Models

    We started the experiments by passing the cleaned and tokenized tweets’texts to five standalone machine learning classifiers.As stated earlier,the repeated stratified k-fold cross validator with 10 folds was used.The performance of the classifiers was reported in terms of average accuracy,average recall,average precision,and average f-score.

    Out of the five classifiers used,support vector machine,Bernoulli na?ve Bayes and linear regression obtained a very similar performance,where they reached an average accuracy of 90.7%,90.5%,and 90.3% respectively.The worst performance was that of the K-NN classifier,which achieved an average accuracy of 69.4%,average of precision of 0.626,and average F-score of 0.760.In terms of recall,K-NN achieved a recall of 0.917,as shown in bold in Tab.6.

    Table 6:Performance of base classifiers

    In addition,the box plots shown in Fig.4 indicate that SVM gives a robust performance compared to other classifiers.

    As the target of this study was to identify the rumor tweets,the performances achieved by these classifiers still needed further improvements,as we aimed to achieve more accurate classification,especially with respect to the recall measure.Thus,the next section presents the ability of the ensemble classifiers in enhancing the overall recall and other measures when detecting the rumors.

    Figure 4:Boxplots of accuracy performance of the standalone classifiers

    Table 7:Performance of Ensemble models with different base/weak classifier

    4.2 Results of Model 2-Ensemble-based Machine Learning Models

    We employed six ensemble classifiers (i) RF,(ii) AdaBoost,(iii) Bagging,(iv) ExtraTree,(v)Stacking-based ensemble classifiers,and (vi) SGD.Since the standalone classifiers presented in the previous section showed good performance,they can be used as base/weak classifier for the ensemble models.Tab.7 shows the results of different ensemble-based models with different base classifiers.The stacking-based classifier with LR (Stacking-LR) base gives the highest performance in terms of accuracy 91.7%,recall,0.987,and F-score,0.933.It shows that the ensemble model also outperforms the standalone classifiers presented in Tab.6.The results also show that the stacking-LR classifier achieves a robust performance using all repeated folds,as shown in Figs.5-8.

    Figure 5:Boxplot of accuracy performance of Stacking-LR ensemble classifier over 10-fold repetition

    Figure 6:Boxplot of recall performance of Stacking-LR ensemble classifier over 10-fold repetition

    4.3 Results of Model 3-Genetic Algorithm-based Support Vector Machine Model

    As stated earlier,the extracted user-based and tweet-based features are fed into machine learning classifiers.Here,we conducted extensive experiments to select the best classifier that gives the highest performance.The genetic algorithm was used as tuning method for the hyper-parameters of each classifier.The TPOT5http://epistasislab.github.io/tpot/Python library was used for this purpose.The GA-based SVM gave the highest performance,with accuracy of 67.45%,as shown in Tab.8.

    Figure 7:Boxplot of precision performance of Stacking-LR ensemble classifier over 10-fold repetition

    Figure 8:Boxplot of F-score performance of Stacking-LR ensemble classifier over 10-fold repetition

    4.4 Results of the Proposed Model 4-Combined Genetic Algorithm-based Machine Learning Models with Stacking Ensemble

    The proposed model combines the feature maps obtained by the second and third models(Stacking Classifier (LR) and GA-SVM).The classification results presented in Tab.9 show the overall performance of the proposed model.

    Table 8:Performance of ML classifiers with GA tuning

    Table 9:Overall performance of the proposed model

    As a summary,Tab.10 shows the performance of all the applied models (the standalone machine learning model (SVM),ensemble machine learning model (stacking) and GA-SVM)compared with the proposed model.The results show that the proposed model outperforms all other models.

    Table 10:Summarized classifier performance

    5 Performance of the Similarity Techniques in the Tracking Phase

    In order to track the source of the rumors,several similarity techniques were used in order to find the most similar tweets (top 1%) to a given target rumor (query).In this study,Cosinebased similarity,Jaccard-based similarity and Chebyshev distance (with Glove word embedding)were used.Fig.9 shows the similarity score between the first rumor tweet in the dataset and the remaining tweets detected at the previous stage.The Chebyshev distance gives better insight into the similar tweets.

    In order to evaluate the performance of the applied similarity techniques,10 target rumors(queries) were chosen randomly from the tweets that were classified as rumors in the previous stage.For each query,different similarity techniques were then applied to compute the similarity between this query and all tweets that were classified as rumors in the detection phase (about 1371 out of 1480 tweets in the current dataset).The top 1% of similar tweets were then selected for this query and each similarity measure.After that,the ROUGE L values (precision,recall and F-measure) were calculated between this query and the obtained tweets in the top 1% list of each similarity measure.The precision,recall and F-measure values were then averaged for each similarity measure.

    Figure 9:Similarity scores between Tweet ID:12 and remaining tweets

    For instance,the top 1% of similar tweets for the first query (with ID 12) using Jaccard-based similarity were the tweets with IDs: 1479,504,498,507,487,496,495,494,490,489,488,107,62 and 12.The ROUGE L (precision,recall and F-measure) values were computed between this query and these obtained tweets in order to evaluate the performance of Jaccard-based similarity.The ROUGE L values are shown in Tab.11.

    Tabs.12-14 show the summary of the ROUGE L (precision,recall and F-measure) values using Jaccard,Cosine and Chebyshev similarity techniques and the 10 used queries.The results show that the Chebyshev similarity technique obtained the best average ROUGE L (precision,recall and F-score) values using all queries compared to the Jaccard and Cosine similarity measures.

    Thus,in order to detect and track the source of rumor,the target tweet/post will be examined using the proposed model (Combined Stacking Classifier (LR) and GA-SVM) to check whether this tweet is classified as rumor or not.The model proposed in this study is recommended to be used because it obtained the best performance compared to other rumor detection methods.If the tweet/post is classified as a rumor,then the Chebyshev similarity technique will be used to compute the similarity between this tweet and all previously classified rumors.The top 1% of similar tweets will be obtained and the details of these tweets,such as creation date (created at),will help to recognize the source of the target tweet (rumor).

    Table 11:ROUGE measure of query ID12

    Table 12:Jaccard-based similarity with Glove word embedding

    Table 13:Cosine-based similarity with Glove word embedding

    Table 14:Chebyshev-based similarity with Glove word embedding

    Since Twitter APIs provide us with the ability to obtain the time-stamp of each tweet and its retweets,it is easy to track the temporal diffusion of a rumor on Twitter.Fig.10 presents an illustration of diffusion of rumor tweets over the time,where the bird represents the original tweet.and the arrows represent retweets.Thex-axis represents time.Since the number of rumor tweets and retweets in real time can be huge,the algorithm that is presented in Section 3 suggests first reducing the number of examined tweets by eliminating the retweets from the search space,since the algorithm gives all credit to the original tweet,no matter who retweeted to whom.In addition,the algorithm reorders the tweets and their k top similar tweets according to the time when the tweet was posted.In case of two or more tweets shared the same time,we consider these tweets and the users who posted them as candidate rumor sources.

    Figure 10:Diffusion of rumors over time: a) the search space b) an illustrative example of how the Algorithm 2 works

    6 Conclusions and Future Research

    In this study,the issues of detecting and tracking the source of rumors were investigated for COVID 19-related data for enhancing the stability of healthcare.A comprehensive approach was proposed that includes two phases: rumor detecting and tracking.In the first phase,several standalone and ensemble machine learning methods,including Linear Regression,K-nearest Neighbor,Decision Tree (CART),Support Vector Machine,Na?ve Bayes (Bernoulli),Random Forest,AdaBoost,Bagging,Extra-Trees and Stacking were used.A new model was then proposed by combining two models,which are the Stacking Classifier (LR) and GA-SVM.The experimental results showed that the best standalone machine learning method was SVM,which obtained the best accuracy and F1-Score (0.907 and 0.906 respectively) comparing to other standalone machine learning methods.In order to improve the detection performance,ensemble learning methods were used,and the results showed that the Stacking Classifier (LR) could improve the performance in detecting rumors.The obtained accuracy,recall and F1-Score for the Stacking Classifier (LR)were 0.917,0.987 and 0.933 respectively,which are the best findings compared to other standalone and ensemble machine learning methods.The proposed model was then applied,which achieved 0.926,0.930 and 0.935 for accuracy,recall and F1-Score,which outperformed the other models.

    For the second phase,several similarity techniques were used which were Cosine-based similarity,Jaccard-based similarity and Chebyshev (with Glove word embedding).The ROUGE evaluation measure was used to evaluated the effectiveness of these similarity techniques by applying 10 queries and obtaining the top 1% of similar tweets for each query,using each similarity technique.The ROUGE L (precision,recall and F-score) values obtained by applying Chebyshevbased similarity were the best (0.34,0.31 and 0.32 respectively).Therefore,this study recommends applying the proposed model (combined Stacking Classifier (LR and GA-SVM) in the rumor detection phase and the Chebyshev-based similarity technique for the rumor tracking phase for COVID 19 related rumors that are posted in the Arabic language.Future work can examine the performance of different standalone and ensemble classifiers with different hyper-parameter tuning methods.In addition,more tweets can be collected to enrich the dataset used,in order to train the models on larger datasets.

    Acknowledgement: The authors would like to thank Deanship of Scientific Research at Al Imam Mohammad ibn Saud Islamic university,Saudi Arabia,for financing this project under the grant no.(20-12-18-013).

    Funding Statement: This research was funded by the Deanship of Scientific Research,Imam Mohammad Ibn Saud Islamic University,Saudi Arabia,Grant No.(20-12-18-013).

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    99久久精品一区二区三区| 中文天堂在线官网| 亚洲一级一片aⅴ在线观看| 校园人妻丝袜中文字幕| 久久99热6这里只有精品| 久久久久久久亚洲中文字幕| 欧美激情久久久久久爽电影| 26uuu在线亚洲综合色| 舔av片在线| 丝袜脚勾引网站| 国产高清三级在线| 国产免费福利视频在线观看| 亚洲自偷自拍三级| 婷婷色综合www| 亚洲图色成人| 国产老妇女一区| 亚洲精品日韩av片在线观看| 欧美性猛交╳xxx乱大交人| 久久久久国产精品人妻一区二区| 午夜免费男女啪啪视频观看| 2022亚洲国产成人精品| 欧美日韩视频高清一区二区三区二| 久久精品夜色国产| 联通29元200g的流量卡| 午夜福利高清视频| 日韩强制内射视频| 国产成人aa在线观看| 观看免费一级毛片| 老司机影院毛片| 亚洲欧美成人综合另类久久久| 日韩成人av中文字幕在线观看| 一级毛片我不卡| 国产精品久久久久久精品电影小说 | 亚洲自拍偷在线| 噜噜噜噜噜久久久久久91| 久久久久精品性色| 秋霞伦理黄片| 婷婷色麻豆天堂久久| 国产男女内射视频| 在线免费观看不下载黄p国产| 日韩一区二区视频免费看| 国内精品美女久久久久久| 日韩大片免费观看网站| 日本一二三区视频观看| 联通29元200g的流量卡| 成人毛片a级毛片在线播放| 国产成年人精品一区二区| 日韩免费高清中文字幕av| 直男gayav资源| 网址你懂的国产日韩在线| 看非洲黑人一级黄片| 69人妻影院| 91精品国产九色| 内射极品少妇av片p| 亚洲成人精品中文字幕电影| 日本爱情动作片www.在线观看| 啦啦啦啦在线视频资源| 人人妻人人爽人人添夜夜欢视频 | 在线播放无遮挡| 亚洲精品乱码久久久久久按摩| 国产成人福利小说| 日韩一区二区三区影片| 国产精品99久久久久久久久| 日韩精品有码人妻一区| 高清欧美精品videossex| 国产大屁股一区二区在线视频| 色网站视频免费| 亚洲av.av天堂| 日本一二三区视频观看| 成人午夜精彩视频在线观看| 国产精品成人在线| 亚洲精品456在线播放app| 成人二区视频| 精品少妇黑人巨大在线播放| 精品国产三级普通话版| 插阴视频在线观看视频| 日韩电影二区| 天天躁夜夜躁狠狠久久av| 精品久久久久久久久av| 色视频www国产| 人人妻人人爽人人添夜夜欢视频 | 黄色配什么色好看| 久久久久久伊人网av| 欧美xxxx黑人xx丫x性爽| 亚洲av在线观看美女高潮| 亚洲经典国产精华液单| 亚洲av福利一区| 中文乱码字字幕精品一区二区三区| 国产欧美日韩精品一区二区| 91aial.com中文字幕在线观看| 午夜亚洲福利在线播放| av线在线观看网站| 亚洲av日韩在线播放| 欧美精品国产亚洲| 热re99久久精品国产66热6| 麻豆成人av视频| 日本色播在线视频| 一区二区三区乱码不卡18| 国产高清三级在线| 亚洲精品,欧美精品| 国产综合精华液| 91精品国产九色| 网址你懂的国产日韩在线| 又大又黄又爽视频免费| 精品久久久久久久久av| av又黄又爽大尺度在线免费看| 麻豆国产97在线/欧美| 精品久久国产蜜桃| 国产高清有码在线观看视频| 国产亚洲av片在线观看秒播厂| av.在线天堂| 777米奇影视久久| 麻豆成人午夜福利视频| 国产成人freesex在线| 少妇丰满av| 国产免费一区二区三区四区乱码| 一级毛片aaaaaa免费看小| 亚洲精品久久久久久婷婷小说| 一级毛片久久久久久久久女| 97在线人人人人妻| 日韩一本色道免费dvd| 嫩草影院精品99| 免费看av在线观看网站| 一级毛片黄色毛片免费观看视频| 在线观看国产h片| 国产精品久久久久久久久免| 成年女人看的毛片在线观看| 久久ye,这里只有精品| 亚洲精品456在线播放app| 国产精品一区二区在线观看99| 99久久中文字幕三级久久日本| 亚洲最大成人手机在线| 赤兔流量卡办理| 国产午夜精品久久久久久一区二区三区| 国产成人免费无遮挡视频| av在线app专区| 身体一侧抽搐| 欧美日韩视频高清一区二区三区二| 成年av动漫网址| 九九在线视频观看精品| 国产精品爽爽va在线观看网站| 久热久热在线精品观看| 日韩欧美 国产精品| 青春草亚洲视频在线观看| a级毛色黄片| 成人一区二区视频在线观看| 久久精品国产亚洲av涩爱| 亚洲在久久综合| 亚洲无线观看免费| 男女下面进入的视频免费午夜| 婷婷色综合www| 赤兔流量卡办理| 日本午夜av视频| videossex国产| 中文字幕久久专区| 美女主播在线视频| 成年人午夜在线观看视频| 免费看不卡的av| 精华霜和精华液先用哪个| 精品一区在线观看国产| 日韩亚洲欧美综合| 免费看av在线观看网站| 免费少妇av软件| 欧美激情久久久久久爽电影| 两个人的视频大全免费| 日本与韩国留学比较| 久久久国产一区二区| 久久久久久久精品精品| 亚洲精品影视一区二区三区av| av女优亚洲男人天堂| 欧美高清性xxxxhd video| 成人高潮视频无遮挡免费网站| 日日撸夜夜添| 性色av一级| 波野结衣二区三区在线| 日韩av免费高清视频| 国产一级毛片在线| 边亲边吃奶的免费视频| 69av精品久久久久久| 免费黄频网站在线观看国产| 婷婷色综合大香蕉| 简卡轻食公司| 国产毛片a区久久久久| www.色视频.com| av女优亚洲男人天堂| 亚洲欧美成人精品一区二区| 看非洲黑人一级黄片| 国语对白做爰xxxⅹ性视频网站| 精品久久久噜噜| 男女啪啪激烈高潮av片| 婷婷色麻豆天堂久久| 热re99久久精品国产66热6| 日韩视频在线欧美| 国产男女超爽视频在线观看| 亚洲精品视频女| 国产一区二区在线观看日韩| 在现免费观看毛片| 亚洲欧美日韩东京热| 亚洲av男天堂| 99热这里只有是精品在线观看| 国产精品99久久久久久久久| 精品一区二区免费观看| 久久精品国产亚洲网站| 99精国产麻豆久久婷婷| 亚洲最大成人av| 国产v大片淫在线免费观看| 成人亚洲欧美一区二区av| 一边亲一边摸免费视频| 欧美zozozo另类| 真实男女啪啪啪动态图| 一区二区三区精品91| 一个人观看的视频www高清免费观看| 国产大屁股一区二区在线视频| 在线观看av片永久免费下载| 亚洲va在线va天堂va国产| 一级毛片aaaaaa免费看小| 91aial.com中文字幕在线观看| 久久午夜福利片| 青春草视频在线免费观看| 亚洲欧美日韩无卡精品| 五月天丁香电影| 不卡视频在线观看欧美| 男女国产视频网站| 精品久久久噜噜| 3wmmmm亚洲av在线观看| 久久久久性生活片| 成人毛片a级毛片在线播放| 国产免费视频播放在线视频| 亚洲国产精品999| 成人国产av品久久久| www.av在线官网国产| 一级a做视频免费观看| 中文字幕亚洲精品专区| 在线观看av片永久免费下载| 美女内射精品一级片tv| 欧美老熟妇乱子伦牲交| 日韩av免费高清视频| 毛片一级片免费看久久久久| 一级毛片aaaaaa免费看小| 日韩不卡一区二区三区视频在线| 国产一级毛片在线| 在线看a的网站| av在线播放精品| 国产淫语在线视频| av免费在线看不卡| 亚洲图色成人| 99热国产这里只有精品6| 黄色视频在线播放观看不卡| 久久久久久久久久人人人人人人| 69av精品久久久久久| 久久久欧美国产精品| 美女国产视频在线观看| 国产欧美日韩一区二区三区在线 | 国产精品久久久久久久久免| 国产亚洲5aaaaa淫片| 熟女av电影| 久久久成人免费电影| 麻豆精品久久久久久蜜桃| 日本免费在线观看一区| 天天躁日日操中文字幕| 亚洲最大成人中文| 成人漫画全彩无遮挡| 男女那种视频在线观看| 国产成人91sexporn| 日本黄色片子视频| 亚洲精品久久久久久婷婷小说| 亚洲最大成人手机在线| 夜夜看夜夜爽夜夜摸| 久久综合国产亚洲精品| 国产精品不卡视频一区二区| 色哟哟·www| 亚洲国产精品国产精品| 黄片无遮挡物在线观看| 国产 精品1| 一级毛片黄色毛片免费观看视频| 欧美xxxx黑人xx丫x性爽| 在线精品无人区一区二区三 | 国产成人aa在线观看| 欧美区成人在线视频| 观看美女的网站| 美女被艹到高潮喷水动态| 久久久久久久久大av| 国产一级毛片在线| 日韩欧美精品v在线| 亚洲欧美中文字幕日韩二区| 欧美三级亚洲精品| 亚洲欧美清纯卡通| 成人免费观看视频高清| 久久久国产一区二区| 久久精品夜色国产| 夜夜爽夜夜爽视频| 亚洲在久久综合| 日韩欧美 国产精品| 国产精品三级大全| 亚洲最大成人手机在线| 又爽又黄a免费视频| 波野结衣二区三区在线| 亚洲av.av天堂| 国产淫片久久久久久久久| 久久这里有精品视频免费| 神马国产精品三级电影在线观看| 在线观看美女被高潮喷水网站| 国产精品伦人一区二区| 国产毛片a区久久久久| 一区二区av电影网| 99久久精品国产国产毛片| 免费av观看视频| 国产精品成人在线| 国产精品久久久久久av不卡| 中文在线观看免费www的网站| 欧美精品人与动牲交sv欧美| 日韩成人av中文字幕在线观看| 另类亚洲欧美激情| 国产亚洲最大av| 国产成人精品一,二区| 亚洲美女视频黄频| 国产爽快片一区二区三区| 亚洲欧美日韩无卡精品| 免费看日本二区| 亚洲av中文av极速乱| 国产精品熟女久久久久浪| 国产成人精品福利久久| 在线观看免费高清a一片| 麻豆成人av视频| 噜噜噜噜噜久久久久久91| 99久久精品一区二区三区| 777米奇影视久久| 真实男女啪啪啪动态图| 国产成年人精品一区二区| 中文在线观看免费www的网站| 日韩不卡一区二区三区视频在线| 免费黄网站久久成人精品| 3wmmmm亚洲av在线观看| 99热这里只有精品一区| 又大又黄又爽视频免费| 久久精品国产a三级三级三级| 26uuu在线亚洲综合色| 如何舔出高潮| 22中文网久久字幕| 色播亚洲综合网| 欧美潮喷喷水| 成人国产麻豆网| 亚洲精品日本国产第一区| 亚洲精华国产精华液的使用体验| av在线蜜桃| 亚洲国产欧美人成| 狂野欧美激情性bbbbbb| 不卡视频在线观看欧美| 亚洲av免费在线观看| 少妇人妻精品综合一区二区| 亚洲av二区三区四区| 久久久久久久午夜电影| 在线亚洲精品国产二区图片欧美 | 高清日韩中文字幕在线| 亚洲精品成人av观看孕妇| 一个人看的www免费观看视频| 欧美少妇被猛烈插入视频| 国产免费一级a男人的天堂| 免费观看无遮挡的男女| 亚洲性久久影院| 久久综合国产亚洲精品| 亚洲最大成人中文| 一个人观看的视频www高清免费观看| www.av在线官网国产| av在线播放精品| 久久久久国产网址| 嫩草影院入口| 全区人妻精品视频| 一区二区三区乱码不卡18| .国产精品久久| 18禁在线无遮挡免费观看视频| 成年版毛片免费区| 午夜老司机福利剧场| 波野结衣二区三区在线| 亚洲欧美清纯卡通| 两个人的视频大全免费| 久久精品夜色国产| 久久99蜜桃精品久久| 热re99久久精品国产66热6| 日韩欧美精品v在线| 成人二区视频| 成人国产麻豆网| 日本三级黄在线观看| 成人国产麻豆网| 丝瓜视频免费看黄片| 久久久久精品久久久久真实原创| 亚洲不卡免费看| 久久久成人免费电影| 极品少妇高潮喷水抽搐| 啦啦啦在线观看免费高清www| 天堂网av新在线| 高清av免费在线| 人妻 亚洲 视频| 丰满乱子伦码专区| 欧美人与善性xxx| 免费观看性生交大片5| 久久久久国产网址| 欧美成人一区二区免费高清观看| 在线天堂最新版资源| 一本久久精品| 国产高潮美女av| 欧美xxxx性猛交bbbb| 午夜福利在线在线| 国产精品蜜桃在线观看| 亚洲怡红院男人天堂| 亚洲天堂国产精品一区在线| 亚洲一级一片aⅴ在线观看| 成人美女网站在线观看视频| 精品久久久久久久久av| 熟女av电影| 校园人妻丝袜中文字幕| 波野结衣二区三区在线| 日本欧美国产在线视频| 永久免费av网站大全| 在线免费十八禁| 国内少妇人妻偷人精品xxx网站| 少妇人妻精品综合一区二区| 亚洲天堂av无毛| 内地一区二区视频在线| 国产一区亚洲一区在线观看| 久久这里有精品视频免费| 久久久精品欧美日韩精品| 欧美+日韩+精品| 亚洲aⅴ乱码一区二区在线播放| 夫妻性生交免费视频一级片| 毛片女人毛片| 日韩av在线免费看完整版不卡| 一级黄片播放器| 精品人妻视频免费看| 午夜精品国产一区二区电影 | 亚洲精品中文字幕在线视频 | 三级男女做爰猛烈吃奶摸视频| 能在线免费看毛片的网站| 日本黄大片高清| 久久久久国产精品人妻一区二区| 亚洲天堂av无毛| 内地一区二区视频在线| 777米奇影视久久| 国产午夜精品一二区理论片| 校园人妻丝袜中文字幕| 精品国产一区二区三区久久久樱花 | 国产男女内射视频| 亚洲性久久影院| 在线观看免费高清a一片| 99视频精品全部免费 在线| 色婷婷久久久亚洲欧美| freevideosex欧美| 国产欧美日韩一区二区三区在线 | 成人美女网站在线观看视频| 狂野欧美激情性xxxx在线观看| 久久精品国产亚洲av涩爱| 性插视频无遮挡在线免费观看| 肉色欧美久久久久久久蜜桃 | 精品国产乱码久久久久久小说| 精品亚洲乱码少妇综合久久| 欧美精品国产亚洲| 国产毛片在线视频| videossex国产| 我的老师免费观看完整版| 久久精品夜色国产| 免费观看a级毛片全部| 97在线人人人人妻| 2018国产大陆天天弄谢| 中国美白少妇内射xxxbb| 国产高清有码在线观看视频| 熟女电影av网| 秋霞在线观看毛片| 欧美bdsm另类| 午夜精品一区二区三区免费看| 免费观看a级毛片全部| 国产69精品久久久久777片| 精品国产乱码久久久久久小说| 国产综合懂色| 国产精品爽爽va在线观看网站| 日韩,欧美,国产一区二区三区| 一区二区三区免费毛片| 日韩欧美 国产精品| 干丝袜人妻中文字幕| 亚洲欧美成人综合另类久久久| 成人美女网站在线观看视频| 深爱激情五月婷婷| 国产精品一区二区在线观看99| 男人爽女人下面视频在线观看| 国产精品偷伦视频观看了| 日本三级黄在线观看| 一边亲一边摸免费视频| 国产成人freesex在线| 18禁裸乳无遮挡免费网站照片| 日韩欧美 国产精品| 成人二区视频| 亚州av有码| 午夜免费男女啪啪视频观看| 毛片一级片免费看久久久久| 午夜福利高清视频| 国产欧美日韩一区二区三区在线 | 高清视频免费观看一区二区| 一区二区三区免费毛片| 久久精品人妻少妇| 成人亚洲精品av一区二区| 最近最新中文字幕免费大全7| 欧美变态另类bdsm刘玥| 国精品久久久久久国模美| 在线天堂最新版资源| 一级黄片播放器| 搡女人真爽免费视频火全软件| 联通29元200g的流量卡| 国产高清有码在线观看视频| 日本黄大片高清| 免费看av在线观看网站| 亚洲精品乱久久久久久| 久久亚洲国产成人精品v| videossex国产| 日韩av在线免费看完整版不卡| 亚洲人成网站在线播| 亚洲av福利一区| 欧美人与善性xxx| 日韩免费高清中文字幕av| 汤姆久久久久久久影院中文字幕| 亚洲精品一区蜜桃| 欧美少妇被猛烈插入视频| 白带黄色成豆腐渣| av女优亚洲男人天堂| 亚洲精品成人久久久久久| 天堂网av新在线| 日本av手机在线免费观看| 在线天堂最新版资源| 国产精品国产三级国产专区5o| 久久久成人免费电影| 小蜜桃在线观看免费完整版高清| 欧美成人a在线观看| 午夜福利高清视频| 免费黄网站久久成人精品| 国产黄a三级三级三级人| 欧美激情久久久久久爽电影| 简卡轻食公司| 少妇人妻 视频| 久久久精品免费免费高清| 91精品伊人久久大香线蕉| 国产乱人视频| 久久精品国产鲁丝片午夜精品| 亚洲精品国产色婷婷电影| av天堂中文字幕网| 午夜激情福利司机影院| 久久久久久伊人网av| 熟女av电影| 亚洲综合精品二区| 国产精品无大码| 天堂网av新在线| av在线播放精品| 成人毛片a级毛片在线播放| 久久久久久久国产电影| 97在线视频观看| 久久久久久久久久久免费av| 在线免费观看不下载黄p国产| 精品一区二区免费观看| 亚洲无线观看免费| 禁无遮挡网站| 精品人妻视频免费看| 成人综合一区亚洲| 亚洲aⅴ乱码一区二区在线播放| 欧美精品人与动牲交sv欧美| 18禁在线播放成人免费| 亚洲电影在线观看av| 干丝袜人妻中文字幕| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲欧美成人精品一区二区| 亚洲精品国产av成人精品| 国产真实伦视频高清在线观看| 国产色婷婷99| 听说在线观看完整版免费高清| 熟女电影av网| 蜜桃亚洲精品一区二区三区| 麻豆国产97在线/欧美| 波野结衣二区三区在线| 国产视频内射| 爱豆传媒免费全集在线观看| 久久鲁丝午夜福利片| 丝袜脚勾引网站| 久久99热这里只有精品18| 免费看不卡的av| 高清欧美精品videossex| 97人妻精品一区二区三区麻豆| 一级毛片aaaaaa免费看小| 好男人视频免费观看在线| 自拍偷自拍亚洲精品老妇| 欧美一级a爱片免费观看看| 亚洲国产精品成人综合色| 亚洲一区二区三区欧美精品 | 亚洲内射少妇av| av福利片在线观看| 啦啦啦啦在线视频资源| 国产国拍精品亚洲av在线观看| 网址你懂的国产日韩在线| 久久99热6这里只有精品| 久久人人爽人人爽人人片va| 五月开心婷婷网| 三级国产精品片| 国产亚洲91精品色在线| 三级经典国产精品| 国产视频内射| 2018国产大陆天天弄谢| 国产男女超爽视频在线观看| 婷婷色av中文字幕| 精品久久国产蜜桃| 国产av码专区亚洲av| 久热久热在线精品观看| 精品一区在线观看国产| 国产有黄有色有爽视频| 91精品国产九色| av一本久久久久| 国产精品久久久久久久电影| 国产欧美日韩一区二区三区在线 | 三级男女做爰猛烈吃奶摸视频| 成人二区视频| av一本久久久久|