How to Identify an Infection Source With Limited Observations

A rumor spreading in a social network or a disease propagating in a community can be modeled as an infection spreading in a network. Finding the infection source is a challenging problem, which is made more difficult in many applications where we have access only to a limited set of observations. We consider the problem of estimating an infection source for a Susceptible-Infected model, in which not all infected nodes can be observed. When the network is a tree, we show that an estimator for the source node associated with the most likely infection path that yields the limited observations is given by a Jordan center, i.e., a node with minimum distance to the set of observed infected nodes. We also propose approximate source estimators for general networks. Simulation results on various synthetic networks and real world networks suggest that our estimators perform better than distance, closeness, and betweenness centrality based heuristics .

[1]  Jonathan Currie,et al.  Opti: Lowering the Barrier Between Open Source Optimizers and the Industrial MATLAB User , 2012 .

[2]  Jure Leskovec,et al.  The dynamics of viral marketing , 2005, EC '06.

[3]  Harald Haas,et al.  Asilomar Conference on Signals, Systems, and Computers , 2006 .

[4]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[5]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[6]  Gueorgi Kossinets,et al.  Empirical Analysis of an Evolving Social Network , 2006, Science.

[7]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[8]  Martin Vetterli,et al.  Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.

[9]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[10]  Steffen Staab,et al.  Social Networks Applied , 2005, IEEE Intell. Syst..

[11]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[12]  Lei Ying,et al.  Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).

[13]  Ying-Hai Wang,et al.  Role of diffusion in an epidemic model of mobile individuals on networks , 2012, The European Physical Journal B.

[14]  L. Allen Some discrete-time SI, SIR, and SIS epidemic models. , 1994, Mathematical biosciences.

[15]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[16]  Ray-Guang Cheng,et al.  Modeling Information Dissemination in Generalized Social Networks , 2013, IEEE Communications Letters.

[17]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[18]  John Scott What is social network analysis , 2010 .

[19]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[20]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[21]  Ramanathan V. Guha,et al.  Information diffusion through blogspace , 2004, WWW '04.

[22]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[23]  Yilun Shang,et al.  Mixed SI (R) epidemic dynamics in random graphs with general degree distributions , 2013, Appl. Math. Comput..

[24]  S. M. Hedetniemi,et al.  Linear Algorithms for Finding the Jordan Center and Path Center of a Tree , 1981 .

[25]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[26]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[27]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[28]  Yu Zhang,et al.  Identifying Key Users for Targeted Marketing by Mining Online Social Network , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[29]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[30]  Thomas H. Cormen,et al.  Introduction to algorithms [2nd ed.] , 2001 .

[31]  Jure Leskovec,et al.  Inferring networks of diffusion and influence , 2010, KDD.

[32]  Huan Liu,et al.  Synthesis Lectures on Data Mining and Knowledge Discovery , 2009 .

[33]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[34]  Wuqiong Luo,et al.  Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[35]  Gonzalo Camarillo,et al.  Towards the Convergence between IMS and Social Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[36]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[37]  Tao Zhou,et al.  Immunization of susceptible–infected model on scale-free networks , 2006, physics/0610138.

[38]  Tobias Achterberg,et al.  SCIP: solving constraint integer programs , 2009, Math. Program. Comput..

[39]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[40]  Pedro M. Domingos Mining Social Networks for Viral Marketing , 2022 .

[41]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[42]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[43]  Chee Wei Tan,et al.  Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.