Temporally Agnostic Rumor-Source Detection

We revisit the problem of inferring the source of a rumor on a network, given a snapshot of the extent of its spread. We differ from prior work in two aspects: We consider settings where additional relative information about the infection times of a fraction of node pairs is also available to the estimator and instead of only considering the most likely spreading pattern, we take a complementary approach where our estimator for general networks ranks each node based on counting the number of possible spreading patterns with a given node as root that are compatible with the observations. We first consider the case where additional information is available about infection incidents in the form of a set of directed pairs of neighboring nodes with the implication that the first is known to have infected the second. Under this hypothesis, we derive an estimator for the most likely rumor source based on the Markov chain tree theorem and propose a Markov Chain Monte Carlo scheme to find it. Empirical studies of various performance measures are provided, along with comparisons with the popular scheme of Shah and Zaman adapted to this framework. A further variant of the problem considered is when such pairwise temporal precedence is known for a fraction of pairs of nodes which, however, are not necessarily neighbors. For this case, we again propose a Markov Chain Monte Carlo based scheme for rumor source detection, which combines Aldous's algorithm for uniform sampling of arborescences with rejection sampling.

[1]  V. Anantharam,et al.  A proof of the Markov chain tree theorem , 1989 .

[2]  Yue M. Lu,et al.  A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.

[3]  Aditya Gopalan,et al.  Epidemic Spreading With External Agents , 2014, IEEE Transactions on Information Theory.

[4]  Ravi Montenegro,et al.  Mathematical Aspects of Mixing Times in Markov Chains , 2006, Found. Trends Theor. Comput. Sci..

[5]  Pramod Viswanath,et al.  Spy vs. Spy , 2014, SIGMETRICS.

[6]  Peter W. Glynn,et al.  Stochastic Simulation: Algorithms and Analysis , 2007 .

[7]  Devavrat Shah,et al.  Finding Rumor Sources on Random Trees , 2011, Oper. Res..

[8]  Sujay Sanghavi,et al.  Learning the graph of epidemic cascades , 2012, SIGMETRICS '12.

[9]  Shie Mannor,et al.  On identifying the causative network of an epidemic , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[10]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[11]  Wuqiong Luo,et al.  How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.

[12]  P. Donovan How Idle is Idle Talk? One Hundred Years of Rumor Research , 2007 .

[13]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[14]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[15]  Alessandro Ingrosso,et al.  The patient-zero problem with noisy observations , 2014, 1408.0907.

[16]  D. Shah,et al.  Finding Rumor Sources on Random Graphs , 2012 .

[17]  David Aldous,et al.  The Random Walk Construction of Uniform Spanning Trees and Uniform Labelled Trees , 1990, SIAM J. Discret. Math..

[18]  Bruno Sinopoli,et al.  Network observability and localization of the source of diffusion based on a subset of nodes , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[19]  Massimo Franceschetti,et al.  Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.

[20]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[21]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[22]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[23]  Dragomir R. Radev,et al.  Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.

[24]  David Bruce Wilson,et al.  Generating random spanning trees more quickly than the cover time , 1996, STOC '96.

[25]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[26]  Lei Ying,et al.  Source Localization in Networks: Trees and Beyond , 2015, ArXiv.

[27]  A. Barabasi,et al.  Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .

[28]  Lei Ying,et al.  Locating the contagion source in networks with partial timestamps , 2015, Data Mining and Knowledge Discovery.

[29]  Christos Faloutsos,et al.  Efficiently spotting the starting points of an epidemic in a large graph , 2013, Knowledge and Information Systems.

[30]  Lei Ying,et al.  Locating Contagion Sources in Networks with Partial Timestamps , 2014, ArXiv.

[31]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[32]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[33]  Shie Mannor,et al.  Network forensics: random infection vs spreading epidemic , 2012, SIGMETRICS '12.

[34]  Randall Berry,et al.  Spotting trendsetters: Inference for network games , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[35]  Paul Erdös,et al.  On random graphs, I , 1959 .

[36]  João M. F. Xavier,et al.  Selecting observers for source localization via error exponents , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[37]  Aleksander Madry,et al.  Faster Generation of Random Spanning Trees , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[38]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[39]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[40]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.