Skip to main content
Erschienen in: Journal of Combinatorial Optimization 1/2017

01.08.2015

A novel approach for detecting multiple rumor sources in networks with partial observations

verfasst von: Zhao Zhang, Wen Xu, Weili Wu, Ding-Zhu Du

Erschienen in: Journal of Combinatorial Optimization | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Locating source of information diffusion in networks has very important applications such as locating the sources of epidemics, news/rumors in social networks or online computer virus. In this paper, we consider detecting multiple rumor sources from a deterministic point of view by modeling it as the set resolving set (SRS) problem. Let G be a network on n nodes. A node subset K is an SRS of G if all detectable node sets are distinguishable by K. The problem of multiple rumor source detection (MRSD) in the network can be modeled as finding an SRS K with the smallest cardinality. In this paper, we propose a polynomial-time greedy algorithm for finding a minimum SRS in a general network, achieving performance ratio \(O(\ln n)\). This is the first work establishing a relation between the MRSD problem and a deterministic concept of SRS, and a first work to give the minimum SRS problem a polynomial-time performance-guaranteed approximation algorithm. Our framework suggests a robust and efficient approach for estimating multiple rumor sources independent of diffusion models in networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Agaskar A, Lu YM (2013) A fast monte carlo algorithm for source localization on graphs. In: SPIE optical engineering and applications Agaskar A, Lu YM (2013) A fast monte carlo algorithm for source localization on graphs. In: SPIE optical engineering and applications
Zurück zum Zitat Berman P, DasGupta B, Kao M (2005) Tight approximability results for test set problems in bioinformatics. J Comput Syst Sci 71:145–162MathSciNetCrossRefMATH Berman P, DasGupta B, Kao M (2005) Tight approximability results for test set problems in bioinformatics. J Comput Syst Sci 71:145–162MathSciNetCrossRefMATH
Zurück zum Zitat Chen X, Wang C (2014) Approximability of the minimum weighted doubly resolving set problem. In: COCOON 2014, LNCS 8591, pp 357368 Chen X, Wang C (2014) Approximability of the minimum weighted doubly resolving set problem. In: COCOON 2014, LNCS 8591, pp 357368
Zurück zum Zitat Dong W, Zhang W, Tan CW (2013) Rooting out the rumor culprit from suspects. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul, pp 2671–2675 Dong W, Zhang W, Tan CW (2013) Rooting out the rumor culprit from suspects. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul, pp 2671–2675
Zurück zum Zitat Du D-Z, Ko K-I, Hu X (2012) Design and analysis of approximation algorithms. Springer, New YorkCrossRefMATH Du D-Z, Ko K-I, Hu X (2012) Design and analysis of approximation algorithms. Springer, New YorkCrossRefMATH
Zurück zum Zitat Ganesh A, Massouli L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: IEEE INFOCOM Ganesh A, Massouli L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: IEEE INFOCOM
Zurück zum Zitat Gerschenfeld A, Montanari A (2007) Reconstruction for models on random graphs. In: Proceedings of the 48th IEEE symposium on foundations of computer science, pp 194–204 Gerschenfeld A, Montanari A (2007) Reconstruction for models on random graphs. In: Proceedings of the 48th IEEE symposium on foundations of computer science, pp 194–204
Zurück zum Zitat Karamchandani N, Franceschetti M (2013) Rumor source detection under probabilistic sampling. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul Karamchandani N, Franceschetti M (2013) Rumor source detection under probabilistic sampling. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul
Zurück zum Zitat Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5CrossRef Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5CrossRef
Zurück zum Zitat Lokhov AY, Mezard M, Ohta H, Zdeborova L (2013) Inferring the origin of an epidemic with dynamic message-passing algorithm. arXiv:1303.5315 Lokhov AY, Mezard M, Ohta H, Zdeborova L (2013) Inferring the origin of an epidemic with dynamic message-passing algorithm. arXiv:​1303.​5315
Zurück zum Zitat Luo W, Tay WP (2012) Identifying multiple infection sources in a network. In: Proceedings of the asilomar conference on signals, systems and computers Luo W, Tay WP (2012) Identifying multiple infection sources in a network. In: Proceedings of the asilomar conference on signals, systems and computers
Zurück zum Zitat Luo W, Tay WP (2013) Finding an infection source under the SIS model. In: Proceedings of the IEEE international conference on acoustics, speech and signal (ICASSP), Vancouver Luo W, Tay WP (2013) Finding an infection source under the SIS model. In: Proceedings of the IEEE international conference on acoustics, speech and signal (ICASSP), Vancouver
Zurück zum Zitat Luo W, Tay WP (2013) Estimating infection sources in a network with incomplete observations. In: Proceedings of the IEEE global conference on signal and information processing (GlobalSIP), Austin, pp 301–304 Luo W, Tay WP (2013) Estimating infection sources in a network with incomplete observations. In: Proceedings of the IEEE global conference on signal and information processing (GlobalSIP), Austin, pp 301–304
Zurück zum Zitat Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. IEEE Trans Signal Process 61:2850–2865MathSciNetCrossRef Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. IEEE Trans Signal Process 61:2850–2865MathSciNetCrossRef
Zurück zum Zitat Moore C, Newman MEJ (2000) Epidemics and percolation in smallworld networks. Phys Rev E 61:5678–5682CrossRef Moore C, Newman MEJ (2000) Epidemics and percolation in smallworld networks. Phys Rev E 61:5678–5682CrossRef
Zurück zum Zitat Pinto PC, Thiran P, Vetterli M (2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109:068–702CrossRef Pinto PC, Thiran P, Vetterli M (2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109:068–702CrossRef
Zurück zum Zitat Prakash BA, Vreeken J, Faloutsos C (2012) Spotting culprits in epidemics: how many and which ones? In: IEEE international conference data mining (ICDM), Brussels, pp 11–20 Prakash BA, Vreeken J, Faloutsos C (2012) Spotting culprits in epidemics: how many and which ones? In: IEEE international conference data mining (ICDM), Brussels, pp 11–20
Zurück zum Zitat Seo E, Mohapatra P, Abdelzaher T (2012) Identifying rumors and their sources in social networks. In: SPIE defense, security, and sensing Seo E, Mohapatra P, Abdelzaher T (2012) Identifying rumors and their sources in social networks. In: SPIE defense, security, and sensing
Zurück zum Zitat Shah D, Zaman T (2010) Finding sources of computer viruses in networks: theory and experiment. Proc ACM Sigmetrics 15:5249–5262 Shah D, Zaman T (2010) Finding sources of computer viruses in networks: theory and experiment. Proc ACM Sigmetrics 15:5249–5262
Zurück zum Zitat Shah D, Zaman T (2012) Rumor centrality: a universal source detector. In: Proceedings of the ACM SIGMETRICS conference, London, pp 199–210 Shah D, Zaman T (2012) Rumor centrality: a universal source detector. In: Proceedings of the ACM SIGMETRICS conference, London, pp 199–210
Zurück zum Zitat Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In: Proceedings of the information theory and applications workshop (ITA) Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In: Proceedings of the information theory and applications workshop (ITA)
Zurück zum Zitat Zhu K, Ying L (2014) A robust information source estimator with sparse observations. In: Proceedings of the IEEE international conference on computer communications (INFOCOM), Toronto. arXiv:1309.4846v1 Zhu K, Ying L (2014) A robust information source estimator with sparse observations. In: Proceedings of the IEEE international conference on computer communications (INFOCOM), Toronto. arXiv:​1309.​4846v1
Metadaten
Titel
A novel approach for detecting multiple rumor sources in networks with partial observations
verfasst von
Zhao Zhang
Wen Xu
Weili Wu
Ding-Zhu Du
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Journal of Combinatorial Optimization / Ausgabe 1/2017
Print ISSN: 1382-6905
Elektronische ISSN: 1573-2886
DOI
https://doi.org/10.1007/s10878-015-9939-x

Weitere Artikel der Ausgabe 1/2017

Journal of Combinatorial Optimization 1/2017 Zur Ausgabe

Premium Partner