Locating the contagion source in networks with partial timestamps

This paper studies the problem of identifying a single contagion source when partial timestamps of a contagion process are available. We formulate the source localization problem as a ranking problem on graphs, where infected nodes are ranked according to their likelihood of being the source. Two ranking algorithms, cost-based ranking and tree-based ranking, are proposed in this paper. Experimental evaluations with synthetic and real-world data show that our algorithms significantly improve the ranking accuracy compared with four existing algorithms.

[1]  David S. Johnson,et al.  Computers and Inrracrobiliry: A Guide ro the Theory of NP-Completeness , 1979 .

[2]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[3]  Jure Leskovec,et al.  Correcting for missing data in information cascades , 2011, WSDM '11.

[4]  Stephen P. Boyd,et al.  Accuracy at the Top , 2012, NIPS.

[5]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[7]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[8]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[9]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[10]  Wuqiong Luo,et al.  How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.

[11]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[12]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[13]  Laks V. S. Lakshmanan,et al.  SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model , 2011, 2011 IEEE 11th International Conference on Data Mining.

[14]  Ramanathan V. Guha,et al.  Information diffusion through blogspace , 2004, WWW '04.

[15]  J. Char Generation of Trees, Two-Trees, and Storage of Master Forests , 1968 .

[16]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[17]  Nam P. Nguyen,et al.  Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[18]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[19]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[20]  Yue M. Lu,et al.  A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.

[21]  Jure Leskovec,et al.  Information diffusion and external influence in networks , 2012, KDD.

[22]  Massimo Franceschetti,et al.  Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.

[23]  Bruno Sinopoli,et al.  Network observability and localization of the source of diffusion based on a subset of nodes , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[24]  Huan Liu,et al.  Seeking provenance of information using social media , 2013, CIKM.

[25]  Christos Faloutsos,et al.  Rise and fall patterns of information diffusion: model and implications , 2012, KDD.

[26]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[27]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[28]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[29]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[30]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[31]  P. Pattison,et al.  Cumulated social roles: The duality of persons and their algebras☆ , 1986 .

[32]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[33]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.