Necessary and Sufficient Budgets in Information Source Finding with Querying: Adaptivity Gap

In this paper, we study a problem of detecting the source of diffused information by querying individuals, given a sample snapshot of the information diffusion graph, where two queries are asked: (i) whether the respondent is the source or not, and (ii) if not, which neighbor spreads the information to the respondent. We consider the case when respondents may not always be truthful and some cost is taken for each query. Our goal is to quantify the necessary and sufficient budgets to achieve the detection probability $1-\delta$ for any given $0 < \delta < 1$. To this end, we study two types of algorithms: adaptive and non-adaptive ones, each of which corresponds to whether we adaptively select the next respondents based on the answers of the previous respondents or not. We first provide the information theoretic lower bounds for the necessary budgets in both algorithm types. In terms of the sufficient budgets, we propose two practical estimation algorithms, each of non-adaptive and adaptive types, and for each algorithm, we quantitatively analyze the budget which ensures $1-\delta$ detection accuracy. This theoretical analysis not only quantifies the budgets needed by practical estimation algorithms achieving a given target detection accuracy in finding the diffusion source, but also enables us to quantitatively characterize the amount of extra budget required in non-adaptive type of estimation, refereed to as adaptivity gap. We validate our theoretical findings over synthetic and real-world social network topologies.

[1]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[2]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[3]  Christos H. Papadimitriou,et al.  Locally Adaptive Optimization: Adaptive Seeding for Monotone Submodular Functions , 2016, SODA.

[4]  Devavrat Shah,et al.  Finding Rumor Sources on Random Trees , 2011, Oper. Res..

[5]  Luc Devroye,et al.  Finding Adam in random growing trees , 2014, Random Struct. Algorithms.

[6]  Enhong Chen,et al.  Information Source Detection via Maximum A Posteriori Estimation , 2015, 2015 IEEE International Conference on Data Mining.

[7]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[8]  Lei Ying,et al.  A robust information source estimator with sparse observations , 2014 .

[9]  Jaeyoung Choi,et al.  Rumor source detection under querying with untruthful answers , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[10]  Jinwoo Shin,et al.  Rumor Source Detection: Power of Querying , 2016 .

[11]  Sangwoo Moon,et al.  Rumor Source Detection: Power of Protector , 2016 .

[12]  Jaeyoung Choi,et al.  Estimating the rumor source with anti-rumor in social networks , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[13]  Lei Ying,et al.  Information source detection in networks: Possibility and impossibility results , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[14]  Ashish Khetan,et al.  Achieving budget-optimality with adaptive schemes in crowdsourcing , 2016, NIPS.

[15]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[16]  Po-Ling Loh,et al.  Confidence Sets for the Source of a Diffusion in Regular Trees , 2015, IEEE Transactions on Network Science and Engineering.

[17]  D. Shah,et al.  Finding Rumor Sources on Random Graphs , 2012 .

[18]  Shaojie Tang,et al.  Adaptive Discount Allocation in Social Networks , 2017, MobiHoc.

[19]  Monte Carlo,et al.  Markov Chain , 2017, Encyclopedia of Machine Learning and Data Mining.

[20]  Sujay Sanghavi,et al.  Learning the graph of epidemic cascades , 2012, SIGMETRICS '12.

[21]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[22]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[23]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[24]  Hongyuan Zha,et al.  Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades , 2015, AISTATS.