A robust information source estimator with sparse observations

Purpose/BackgroundIn this paper, we consider the problem of locating the information source with sparse observations. We assume that a piece of information spreads in a network following a heterogeneous susceptible-infected-recovered (SIR) model, where a node is said to be infected when it receives the information and recovered when it removes or hides the information. We further assume that a small subset of infected nodes are reported, from which we need to find the source of the information.MethodsWe adopt the sample path-based estimator developed in the work of Zhu and Ying (arXiv:1206.5421, 2012) and prove that on infinite trees, the sample path-based estimator is a Jordan infection center with respect to the set of observed infected nodes. In other words, the sample path-based estimator minimizes the maximum distance to observed infected nodes. We further prove that the distance between the estimator and the actual source is upper bounded by a constant independent of the number of infected nodes with a high probability on infinite trees.ResultsOur simulations on tree networks and real-world networks show that the sample path-based estimator is closer to the actual source than several other algorithms.ConclusionsIn this paper, we proposed the sample path-based estimator for information source localization. Both theoretic analysis and numerical evaluations showed that the sample path-based estimator is robust and close to the real source.

[1]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[2]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[3]  Devavrat Shah,et al.  Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.

[4]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[5]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[6]  Paulo Shakarian,et al.  Geospatial Abduction: Principles and Practice , 2011 .

[7]  Randall Berry,et al.  Spotting trendsetters: Inference for network games , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Paulo Shakarian,et al.  GAPs: Geospatial Abduction Problems , 2011, TIST.

[9]  Lenka Zdeborová,et al.  Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Nam P. Nguyen,et al.  Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[11]  Shie Mannor,et al.  Network forensics: random infection vs spreading epidemic , 2012, SIGMETRICS '12.

[12]  T. E. Harris,et al.  The Theory of Branching Processes. , 1963 .