Maximum a Posteriori Estimation for Information Source Detection

Information source detection is to identify nodes initiating the diffusion process in a network, which has a wide range of applications including epidemic outbreak prevention, Internet virus source identification, and rumor source tracing in social networks. Although it has attracted ever-increasing attention from research community in recent years, existing solutions still suffer from high time complexity and inadequate effectiveness, due to high dynamics of information diffusion and observing just a snapshot of the whole process. To this end, we present a comprehensive study for single information source detection in weighted graphs. Specifically, we first propose a maximum a posteriori (MAP) estimator to detect the information source with other methods as the prior, which ensures our method can be integrated with others naturally. Different from many related works, we exploit both infected nodes and their uninfected neighbors to calculate the effective propagation probability, and then derive the exact formation of likelihood for general weighted graphs. To further improve the efficiency, we design two approximate MAP estimators, namely brute force search approximation (BFSA) and greedy search bound approximation (GSBA), from the perspective of likelihood approximation. BFSA tries to traverse the permitted permutations to directly compute the likelihood, but GSBA exploits a strategy of greedy search to find a surrogate upper bound of the likelihood, and thus avoids the enumeration of permitted permutations. Therefore, detecting with partial nodes and likelihood approximation reduces the computational complexity drastically for large graphs. Extensive experiments on several data sets also clearly demonstrate the effectiveness of our methods on detecting the single information source with different settings in weighted graphs.

[1]  C. Jordan Sur les assemblages de lignes. , 1869 .

[2]  B. R. Heap Permutations by Interchanges , 1963, Comput. J..

[3]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[4]  Mark S. Granovetter Threshold Models of Collective Behavior , 1978, American Journal of Sociology.

[5]  W. O. Kermack,et al.  Contributions to the mathematical theory of epidemics—II. The problem of endemicity , 1991, Bulletin of mathematical biology.

[6]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[7]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[8]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[9]  Edward Ott,et al.  Characterizing the dynamical importance of network nodes and links. , 2006, Physical review letters.

[10]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[11]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[12]  Jure Leskovec,et al.  Predicting positive and negative links in online social networks , 2010, WWW '10.

[13]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[14]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[15]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[16]  Esteban Moro Egido,et al.  Branching Dynamics of Viral Information Spreading , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[18]  L. D. Costa,et al.  Identifying the starting point of a spreading process in complex networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Nam P. Nguyen,et al.  Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[20]  Enhong Chen,et al.  On Approximation of Real-World Influence Spread , 2012, ECML/PKDD.

[21]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[22]  Vincenzo Fioriti,et al.  Predicting the sources of an outbreak with a spectral technique , 2012, ArXiv.

[23]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[24]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[25]  Hui Xiong,et al.  Influential seed items recommendation , 2012, RecSys '12.

[26]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[27]  Huan Liu,et al.  Seeking provenance of information using social media , 2013, CIKM.

[28]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[29]  Yue M. Lu,et al.  A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.

[30]  Huan Liu,et al.  Recovering information recipients in social media via provenance , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[31]  Hui Xiong,et al.  Learning to annotate via social interaction analytics , 2013, Knowledge and Information Systems.

[32]  Hui Xiong,et al.  Influence Maximization over Large-Scale Social Networks: A Bounded Linear Approach , 2014, CIKM.

[33]  Alessandro Ingrosso,et al.  The patient-zero problem with noisy observations , 2014, 1408.0907.

[34]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[35]  Reza Zafarani,et al.  Social Media Mining: An Introduction , 2014 .

[36]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[37]  Riccardo Zecchina,et al.  Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.

[38]  Enhong Chen,et al.  Maximizing the Coverage of Information Propagation in Social Networks , 2015, IJCAI.

[39]  Qi Liu,et al.  Modeling Social Attention for Stock Analysis: An Influence Propagation Perspective , 2015, 2015 IEEE International Conference on Data Mining.

[40]  Wenyi Zhang,et al.  Rooting our Rumor Sources in Online Social Networks: The Value of Diversity From Multiple Observations , 2015, IEEE Journal of Selected Topics in Signal Processing.

[41]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[42]  Enhong Chen,et al.  Information Source Detection via Maximum A Posteriori Estimation , 2015, 2015 IEEE International Conference on Data Mining.

[43]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[44]  Vivek S. Borkar,et al.  Fast rumor source identification via random walks , 2016, Social Network Analysis and Mining.

[45]  Wen-Xu Wang,et al.  Locating the source of diffusion in complex networks by time-reversal backward spreading. , 2016, Physical review. E.

[46]  Preetam Ghosh,et al.  Multiple Infection Sources Identification with Provable Guarantees , 2016, CIKM.

[47]  Hui Xiong,et al.  An Influence Propagation View of PageRank , 2017, ACM Trans. Knowl. Discov. Data.

[48]  Vivek S. Borkar,et al.  Temporally Agnostic Rumor-Source Detection , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[49]  Joy Kuri,et al.  Using Node Centrality and Optimal Control to Maximize Information Diffusion in Social Networks , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[50]  Manuel Roveri,et al.  A Cognitive Monitoring System for Detecting and Isolating Contaminants and Faults in Intelligent Buildings , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[51]  Hui Xiong,et al.  Price Shock Detection With an Influence-Based Model of Social Attention , 2017, ACM Trans. Manag. Inf. Syst..

[52]  Qipeng Liu,et al.  Competitiveness Maximization on Complex Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[53]  Yongli Li,et al.  Utility-Based Model for Characterizing the Evolution of Social Networks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.