An Algorithmic Framework for Estimating Rumor Sources With Different Start Times

We study the problem of identifying multiple rumor or infection sources in a network under the susceptible-infected model, and where these sources may start infection spreading at different times. We introduce the notion of an abstract estimator that, given the infection graph, assigns a higher value to each vertex in the graph it considers more likely to be a rumor source. This includes several of the single-source estimators developed in the literature. We introduce the concepts of a quasi-regular tree and a heavy center, which allows us to develop an algorithmic framework that transforms an abstract estimator into a two-source joint estimator, in which the infection graph can be thought of as covered by overlapping infection regions. We show that our algorithm converges to a local optimum of the estimation function if the underlying network is a quasi-regular tree. We further extend our algorithm to more than two sources, and heuristically to general graphs. Simulation results on both synthetic and real-world networks suggest that our algorithmic framework outperforms several existing multiple-source estimators, which typically assume that all sources start infection spreading at the same time.

[1]  William F. Ogburn,et al.  Are Inventions Inevitable? A Note on Social Evolution , 1922 .

[2]  Chris Arney Social Physics: How Good Ideas Spread - the Lessons from a New Science , 2014 .

[3]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[4]  Lei Ying,et al.  Information source detection in networks: Possibility and impossibility results , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[5]  Wuqiong Luo,et al.  Infection Spreading and Source Identification: A Hide and Seek Game , 2015, IEEE Transactions on Signal Processing.

[6]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[7]  Alireza Louni,et al.  A two-stage algorithm to estimate the source of information diffusion in social media networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[8]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[9]  Edwin K. P. Chong,et al.  Robust Decentralized Detection and Social Learning in Tandem Networks , 2015, IEEE Transactions on Signal Processing.

[10]  Feng Ji,et al.  Estimating the number of infection sources in a tree , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[11]  Wuqiong Luo,et al.  How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.

[12]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2013, ITA.

[13]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[14]  Wenyi Zhang,et al.  Rooting our Rumor Sources in Online Social Networks: The Value of Diversity From Multiple Observations , 2015, IEEE Journal of Selected Topics in Signal Processing.

[15]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[16]  Sinan Aral,et al.  Identifying Influential and Susceptible Members of Social Networks , 2012, Science.

[17]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[18]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[19]  Santhanakrishnan Anand,et al.  Identification of Source of Rumors in Social Networks with Incomplete Information , 2015, ArXiv.

[20]  Wee-Peng Tay,et al.  The Value of Feedback in Decentralized Detection , 2011, IEEE Transactions on Information Theory.

[21]  R. Merton Priorities in scientific discovery: A chapter in the sociology of science. , 1957 .

[22]  M. Newman,et al.  Epidemics and percolation in small-world networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[23]  Riccardo Zecchina,et al.  Bayesian inference of epidemics on networks via Belief Propagation , 2013, Physical review letters.

[24]  Tony Q. S. Quek,et al.  Randomized Information Dissemination in Dynamic Environments , 2013, IEEE/ACM Transactions on Networking.

[25]  Hung-Lin Fu,et al.  Optimal detection of influential spreaders in online social networks , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[26]  Gaoxi Xiao,et al.  Network infection source identification under the SIRI model , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[28]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[29]  Franziska Hoffmann,et al.  Spatial Tessellations Concepts And Applications Of Voronoi Diagrams , 2016 .

[30]  Philip D O'Neill,et al.  A tutorial introduction to Bayesian inference for stochastic epidemic models using Markov chain Monte Carlo methods. , 2002, Mathematical biosciences.

[31]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[32]  Wuqiong Luo,et al.  Rumor Spreading and Source Identification: A Hide and Seek Game , 2015, ArXiv.

[33]  M. Newman Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[34]  Wuqiong Luo,et al.  On the Universality of Jordan Centers for Estimating Infection Sources in Tree Networks , 2014, IEEE Transactions on Information Theory.

[35]  Wee Peng Tay Whose Opinion to Follow in Multihypothesis Social Learning? A Large Deviations Perspective , 2014, IEEE Journal of Selected Topics in Signal Processing.

[36]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[37]  Rolf Klein,et al.  Abstract Voronoi Diagrams and their Applications , 1988, Workshop on Computational Geometry.

[38]  Stanford,et al.  Learning to Discover Social Circles in Ego Networks , 2012 .

[39]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.

[40]  Dimitrios Gunopulos,et al.  Finding effectors in social networks , 2010, KDD.

[41]  Franz Aurenhammer,et al.  Power Diagrams: Properties, Algorithms and Applications , 1987, SIAM J. Comput..

[42]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..