1. Introduction
Epidemic diffusion processes in complex networks are ubiquitous in natural and technological systems. Examples include disease or epidemic spreading in the human society, virus invasion in computer and mobile phone networks, behavior propagation in online social networks [1]. Epidemic source detection is the problem that identifies the initial seed node of the diffused information (We use the terms “information” and “epidemic” interchangeably through the paper.) in the network. This is clearly of practical importance, because harmful diffusion can be mitigated or even blocked, e.g., by vaccinating humans or installing security updates. In the prior work, Shah and Zaman [2] showed that in the regular tree topologies, the detection probability cannot be above 31% under the Maximum Likelihood Estimator (MLE), and even worse, in other realistic topologies such as Facebook graphs, scale-free graphs and Internet Autonomous System (AS) graphs, the detection probability is less than 5% under a MLE-based heuristic due to a complex structure of networks. After this, extensive research attention for this problem has been focused on various network topologies and diffusion models [2,3,4,5,6,7,8,9], whose major interests lie in constructing an efficient estimator and providing theoretical analysis of its detection performance. Prior works revealed that finding the information source turns out to be a challenging task unless sufficient side information is provided. There have been several research efforts that use multiple snapshots [7] or side information about a restricted suspect which set the true source belongs [8], thereby the detection performance is significantly improved. Another type of side information is the one obtained from querying, i.e., asking questions to a subset of infected nodes and gathering more hints about who would be the true information source [10,11]. However, most of the works have assumed the static network topology, that is the connections between nodes do not change over time. This is impractical because many nodes have some mobility in the network, or the connections can be changed over time [12]. For example, users frequently changed their social contacts via meetings, emails, phone, and several online software. Hence, in this paper, we focus on the dynamic network, where the connections between node pairs are changed over time as in Figure 1. In this case, the information source may lose a graphical centrality of the snapshot from the frequent changes of connections. Under this consideration, we design a proper estimator, which is reflected in the dynamics of connection changes. This is not an easy task because it is no longer possible to estimate the location of the source of information through a snapshot of diffusion were most estimators are designed using this fact in static networks. To overcome this, we use some investigation process to obtain the contact information between nodes which propagating the information. Different to existing work [13], which assumed the infected node has side information of exact parent node of the spreading (i.e., who gives the information) over the time varying network, in our work, we focus on only the contact information for the diffusion without knowing the exact parent (This is a more practical scenario than that of [13] because we may not have the information about who spread it to me under some probabilistic diffusion process).
Our main contributions are summarized in what follows.
(1)
First, we consider a dynamic scenario for the source finding problem. To do that, we design a network dynamic model, named by k-flip dynamic, where the connectivity between node pair changes with some probability at each time among the k selected node pairs from the Erdös-Rényi (ER) random graph. This model covers various cases of changing the connections by varying the parameterk.For example, a large k indicates a large portion of connections will changes, that captures more dynamical scenario of the connections whereas small k indicates a scenario where only a few changes occur in the network.
(2)
Second, we propose a source estimation algorithm. Based on frequent changes of connections in the network, we design the algorithm by two parts: (i) reconstruct contact graph and (ii) estimation of the source. In the first part, we rebuild the contact graph by some investigation process among selected nodes with the assumption that the investigator has budgetB>0. In the second part, we use a Short-Fat Tree (SFT) algorithm in [14] as a greedy estimator for the true source in reconstructed contact graph, which uses the node’s degree information for the ER random graph.
(3)
Third, we run various simulations using the proposed estimator. As comparison estimation algorithms, we use Jordan Center (JC) [5], Rumor Center (RC) [3], NETSLEUTH (NE) [15], Dynamic Importance (DI) [16] and Distance Center (DC) [2]. As a result, we see that our proposed method outperforms to others and the detection probability for our proposed algorithm can be above 45% when we use budgets to investigate the contact information between infected nodes under some practical setting of k whereas the fact that it is hard to beyond 50% even for static networks.
The remainder of this paper is organized as follows. Section 2 discusses related literature. In Section 3, we will introduce the network dynamic model, epidemic diffusion model, and investigation approach. Next, we propose a source estimation algorithm with its computational complexity. In Section 4, we depict the simulation results and some future works with a limitation of the paper, and we conclude the paper in Section 5.
2. Related Work
In this section, we summarize related studies by dividing them into the following two categories: (i) static networks, (ii) random and dynamic networks as describe in Table 1.
(i) Static Networks. As a first study with a static network, Shah et al. considered this problem [2,3,4] based on the rumor spreading over the network and introduced the metric called rumor centrality, a simple graphical metric for a given diffusion snapshot. They called a node that has maximum rumor centrality by rumor center the MLE. They proved that the rumor centrality implies the likelihood function when the underlying network is a regular tree, and the diffusion follows the Susceptible–Infected (SI) model, which is extended to a random graph network in [3]. Zhu et al. [5] solved the source detection problem under the Susceptible-Infected-Removed (SIR) diffusion model and considered a sample path approach to solve the problem, where the Jordan center was used, being extended to the case of limited observations [6].
In addition to this, there were several approaches to boost the detection probability using some side information. Wang et al. [7] showed that multiple different epidemic instances can significantly increase the detection probability. Dong et al. [8] assumed that there exist a prior set of source candidates, where they showed the increased detection probability based on the Maximum a Posterior Estimator (MAPE). Choi et al. [9] showed that the anti-rumor spreading under some distance distribution of rumor and anti-rumor sources helps to find the rumor source by using the MAPE. Choi et al. [10,11] studied the effects of querying to find the source and showed how many queries are sufficient to achieve a target detection probability. The authors in [17,18] introduced the notion of set estimation and provided the analytical results on the detection performance. Luo et al. [19] considered the problem of estimating an infection source for the SI model, in which not all infected nodes can be observed.
Several studies tried to solve the problem of finding multiple source problems by appropriate set estimation methods. Prakash et al. [20] proposed to employ the Minimum Description Length (MDL) principle to identify the best set of sources and virus propagation ripple, which describes the infected graph most succinctly. They proposed an efficient algorithm to identify likely sets of source nodes given a snapshot and showed that it can optimize the virus propagation ripple in a principled way by maximizing the likelihood. Zhu et al. [21] proposed a new source localization algorithm, named Optimal Jordan Cover (OJC). The algorithm first extracts a subgraph using a candidate selection algorithm that selects source candidates based on the number of observed infected nodes in their neighborhoods. Then, in the extracted subgraph, OJC finds a set of nodes that cover all observed infected nodes with the minimum radius. Considering the heterogeneous SIR diffusion in the ER random graph, they proved that OJC can locate all sources with unit probability asymptotically with partial observations. Ji et al. [22] developed a theoretical framework to estimate rumor sources, given an observation of the infection graph and the number of rumor sources.
(ii) Random and Dynamic Networks. For the dynamic and random increasing network, Fuchs et al. [23] considered the rumor spreading over several random growing graphs such as binary search trees, recursive trees, and plane-oriented recursive trees. They derived asymptotic formulas for the detection probability of grown such simple families of random increasing trees using the rumor centrality. Further, they discussed a brief discussion of the rumor center for unordered trees. Zhu et al. [14] considered the source detection problem on the ER random graph. They presented a new source localization algorithm, called the SFT algorithm for the independent cascade (IC) diffusion model. The algorithm selects the node such that the breadth-first search (BFS) tree from the node has the minimum depth but the maximum number of leaf nodes. Performance guarantees of SFT. They obtained the analysis of fundamental limits by considering the infection duration.
Jiang et al. [13] considered the time-varying topology to infer the rumor source. To do this, they reduced the time-varying networks to a series of static networks by introducing a time-integrating window. Then, instead of inspecting every individual in traditional techniques, they adopted a reverse dissemination strategy to specify a set of suspects of the real rumor source. This process addressed the scalability issue of source identification problems, and therefore dramatically promoted the efficiency of rumor source identification. To determine the real source from the suspects, they employed a novel microscopic rumor spreading model to calculate the maximum likelihood for each suspect. The one who can provide the largest MLE was considered as the real source. However, they assumed that all infected node saves the parent node information i.e., who gives the information to him. In practice, knowing the exact parent node may be difficult for the contact diffusion process due to multiple candidate parent nodes among infected neighbors. Hu et al. [1] considered the problem of locating multiple diffusion sources in time-varying networks. They developed a general framework to locate diffusion sources in time-varying networks based solely on sparse data from a small set of messenger nodes. They found that large degree nodes produced more valuable information than small degree nodes, which contrasts static networks. Choosing large degree nodes as the messengers, they also found that sparse observations from a few such nodes are often sufficient for any number of diffusion sources to be located for a variety of models and empirical networks.
To the best of our knowledge, our paper is the first to design the reconstruction of the contact graph, which is more practical than the existing one [13] from the perspective of using only contact information rather than knowing the exact parent. This is because we may not know the true parent among infected neighbors in the situation that the diffusion proceeds probabilistic. Further, our proposed method performs well in the simple flip dynamic model, where each connection can be changed with some probability in the network.
3. Model and Estimator 3.1. Network Model
We consider an undirected graphG=(V,E),where V is a set of nodes with|V|=nand E is the set of edges of the form(i,j)fori,j∈V . Each node represents an individual in human social networks or a computer host in the Internet, and each edge corresponds to a social relationship between two individuals or a physical connection between two Internet hosts [10]. As a network dynamic model, we may consider many sophisticated and practical models, but as an initial approach, we consider the simple flip dynamic as follows. Before defining our interesting model, we denote the state of node pair (or state of connection) by “on” and “off”. The state “on” means there is a connection (edge) between the nodes, and the state “off” means there is no connection for the pair of nodes. Based on this, we define a simple dynamic model as follows.
Definition 1.
(k-flip dynamic) Initially, at timet=0, each edge between arbitrary two nodes is generated with probabilityp0>0.At any time stept>0, arbitraryk>0pair of nodes are selected and flip each state with probability p.
We will call k as a dynamic parameter and p as a flipping parameter through the paper. Now, we see that the k-flip dynamic model becomes an ER random graph ifp=0. The dynamic at each time depends on two parameters k and p. The parameter k describes which connection will be changed, and the parameter p describes the willingness to change the state of pair. For example, ifp=1, all connection in the selected set of k pairs will be changed in the network at each time. Hence, the reason why we consider this simple dynamic model is that it captures various connection-changing scenarios based on the willingness to change among the selected connections.
3.2. Diffusion Model
As the information spreading model, we consider a well-known Independent Cascade (IC) model for both information spreadings where the description is as follows. In this model, nodes have three possible states, susceptible (S), active (A) and inactive (I). At the susceptible state, a node is allowed to be activated. An active state is the one which is activated at the previous time slot, being able to activate other susceptible child nodes, while an inactive state denotes a state which is once activated earlier, but unable to activate other susceptible nodes anymore. The activated nodes are active for only one time slot, and they become inactive at the next time slot. Once a node becomes inactive, it maintains the state until the end of the cascade process. More precisely, if a node i received one information (we call this by “Infection”) at time t from one of its infected nodes, it tries to spread its own information to its neighbor j with probabilityqijat the next timet+1. Under the above network model, we assume that the diffusion occurs after the connection is made between two nodes at time t. In other words, if the connection is generated at time t, the node who has the information tries to spread to other nodes using the connected edge at the same time t. (This can be interpreted by introducing an arbitrary small numberϵ>0such that the diffusion is performed aftert+ϵ<t+1.) Further, if there is no connection from a node i to j at timet+1 , the node i does not try to spread the information to node j any more. This assumption makes sense for the case that the power of information of spread decays as the time goes on [24], so the diffusion does not happen later even when the connection is generated. We denotev*∈Vby the information source, which acts as a node that initiates diffusion and denoteVt⊂Vof infected nodes and the observed snapshotGtat time t. Further, we denoteItby the infection subgraph, which is consists of infected nodes and edges at time t.
3.3. Contact Investigation
Since the network dynamic hides the information of source location, in this paper, we assume that the network adversary (the person who wants to find the source) investigates the history of connection (or contact) between some pair of nodes to track the information flow over the connection. For example, by asking the question, “did you contact him before?” or by checking the log of the internet connection. Different to the setting in [1,10], which assumes that a node knows who is the parent node of the information among the neighbors, we assume that a node only remembers the contact event. In other words, it has information of whether it contacted the other node or not (In some practical cases, a node cannot check whether the contacted node spread the information or not). In other words, at the observation step t, the adversary can obtain the information whether the infected node contact a specific node or not. For the investigation, we assume that the investigator has a budgetB>0. Hence, using this investigation, we reconstruct the contact graph, which has a possibility for information flow and infer the true source as following the estimation algorithm in the next subsection.
3.4. Estimation Algorithm
As an estimator of the epidemic source, we may consider a MLE for the observed graph (snapshot)Gtat time t by:
v^ml=argmaxv∈VtP(Gt|v),
i.e., the MLE is the node that maximizes the likelihoodP(Gt|v)of the diffusion snapshotGt. Computing the likelihood is quite difficult due to the dynamic network, which requires an infection time tracking of all infected nodes. To see this, consider that the diffusion process under the dynamic model is a Markov chain. LetΩtbe the set of all possible diffusion snapshots at time t under the dynamic connectivity model, the likelihood is given by
P(Gt|v)=∑Gt−1∈Ωt−1∑Gt−2∈Ωt−2⋯∑G2∈Ω2∑G1∈Ω1P(Gt|Gt−1)P(Gt−1|Gt−2)⋯P(G2|G1)P(G1|v).
This is a NP-hard problem because there are exponentially many number of possible snapshots inΩtfor each t due to the connection dynamics. Hence, we propose a heuristic approach to estimate the source for such a dynamic scenario by reconstructing the contact graph (possible paths of the information flow).
We now describe our source estimation algorithm, named DNSE(k), where k is the dynamic parameter in the algorithm in Algorithm 1 for the dynamic model. The algorithm consists of two parts: (i) Reconstruction the connection graph and (ii) Estimation of the source.
3.4.1. Reconstruction the Contact Graph (Phase 1)
In this step, our objective is to rebuild the contact graph of nodes for tracking the information flow. To do this, we use the network dynamic model until the current connection. The reconstruction step will be performed over the infected nodes set because we need to know the actual diffusion snapshot among the infected nodes to infer the information flow from the true source. Since the k-flip dynamic considers the connection changes by choosing k node pairs over the totaln(n−1)/2node pairs in the network, we first compute the ratiokt, which is the portion of connection changes only among the infected nodes by:
kt=knt(nt−1)n(n−1),
which is from the relationn(n−1):k=nt(nt−1):ktwherent=|Vt|.Ifp=1, the algorithm skips phase 1 because it remains as the initial ER random graph. Hence, our interesting part is for the casep<1. In this phase, we setCt^:=Ct\Etas a candidate possible edge set, whereCtis set of edges of complete graph forVtand we setEnewandEt^by empty sets. Then, the algorithm works as the following five steps:
-
At the first step, the algorithm checks whetherkt>|Ct^|or not. Ifkt>|Ct^|,it setskt=|Ct^|.
-
At the second step, it selectsktinfected nodes pairs uniformly at random fromCt^.
-
At the third step, it reconstructs new edges among all thektnode pairs with probabilitypqand put them into the setEt^. The reason why we consider this probability is described as follows. First, we need to find the contact probability between nodes pair for spreading the information. To obtain this, we letAτbe the event that an infected node’s state is active at timeτ≤t−1and letCτ+1be the event of connection between node pairs at timeτ+1.
Algorithm 1 Dynamic Network Source Estimation (DNSE(k)) Input: Number of nodes n, diffusion snapshotGt, investigation budget B, dynamic parameter k, flip parameter p, diffusion rate q. Output: Estimated nodev^dns Phase 1. (Contact Graph Reconstruction) Setnt=|Vt|and a candidate edge setCt^=Ct\Et, whereCtis set of edges of complete graph forVt; Compute the ratioktby: kt=knt(nt−1)n(n−1).
Ifp=1, go to phase 2 (Source Estimation phase); SetEnew←∅andEt^←∅; whileB>0and|Ct^|>0do
(a)
Ifkt>|Ct^|then setkt=|Ct^|;
(b)
Selectktinfected nodes pairs uniformly at random fromCt^;
(c)
Reconstruct new edges among all thektnode pairs with probabilitypqand put into the setEt^. SetBt=|Et^|;
(d)
Investigate whether each connection e is true (i.e., contacted) or not onEt^. If it is true, insert a connection setEnew←Enew∪{e}and otherwise, remove the connection. SetCt^←Ct^\Et^;
(e)
B←B−BtandEt^←∅;
end while SetGtreb=(V,Et∪Enew); Phase 2. (Source Estimation) for eachv∈Itrebdo Step1: Set the boundary nodes of BFS treeTv,B(v,Vt), on the infection graphItreb; Step2: Compute the weighted boundary node degreeW(v) in [14] by
W(v)=∑u∈B(v,Vt)d(v)−|B(v,Vt)||log(1−q)|,
whered(v)is degree of node v inGtreb; end for Returnv^dns=argmaxv∈VtW(v);
Then, the probability that the actual information flow can occur over the connected edge isP(Aτ∩Cτ+1). Hence, to approximate this probability, consider that
P(Aτ∩Cτ+1)=(a)∑τ=1ntP(Cτ+1)P(Aτ)≃(b)∑τ=1ntp1nt=p,
where the inequality(a)comes from the fact that the connection and activation (diffused from the previous parent) events are independent. In(b), we simply approximate the activation probability at each time by1/nt, i.e., uniformly distributed over the spread timent>0. Note that there is at least one connection with probability p because the current state is not connected. Second, the active node during the connection spreads the information with probability q by the IC-diffusion model. Hence, in our approach, we set the connection probability for the true diffusion byqpas the possibility of actual diffusion. Next, we setBt=|Et^|and investigate whether each connection e is true (i.e., contacted) or not onEt^.
-
At the forth step, it inserts the edge e to a connection setEnew←Enew∪{e}if it is true and otherwise, it removes the connection. Then, it omits the constructed edge setEt^from the candidate edge setCt^by settingCt^←Ct^\Et^to repeat the same procedure.
-
At the fifth step, it initializes the setEt^by an empty set and removes the used budgetBtfor the investigation in the remained budgetB.We repeat this procedure until finishing to confirm the connection of every infected node.
Finally, we obtain the contact graph which is set toGtreb=(V,Et∪Enew) as shown in Figure 2.
3.4.2. Estimation of the Source (Phase 2)
As a source estimator, we will adapt the SFT algorithm, which was first introduced in [14]. This uses the node’s degree information to track the source on the ER random graph. In our case, we also considere the degree information by the contact between nodes, which means more contacted nodes have more chances to diffuse the information. To formally describe this, we letItrebbe the infection graph after reconstruction from Phase 1. We then introduce an infection eccentricity of an infected nodev∈Vt, by the maximum distance (Here, the distance means the shortest number of hops between two nodes.) from the node to all infected nodes on theItreb(Line 18). Under this setting, we consider a Breath First Search (BFS) treeTvrooted at a node v on the infection subgraphItrebin step 1. We define a boundary nodes ofTv, denoted byB(v,Vt), as the set of nodes that the distance from the node v is the infection eccentricity on the infection graphItreb, which is the set of infected nodes furthest away from the node v in the infection subgraph. Next, in step 2, we setW(v)=∑u∈B(v,Vt)d(v)−|B(v,Vt)||log(1−q)|by the weighted boundary node degree with respect to the node v (Line 19), whered(v)is the degree of the node v and q is the diffusion probability. This measurement guarantees the minimum infection eccentricity (−|B(v,Vt)| term in (5)), which implies the Jordan center over the infection graphItreb, with the degree information (∑d(v) in (5)). Finally, the algorithm finds the maximumW(v)among the infected nodes by (Line 20):
v^dns=argmaxv∈VtW(v).
Using this estimator, we will obtain various simulation results in the next section. Before that, we first depict the algorithm complexity of DNSE(k) in the following theorem.
Theorem 1.
The computational complexity of the algorithm DNSE(k) isO(max{B,|Vt|deg(Vt)})wheredeg(Vt)is the total degree of nodes inVtover the infection graphIt.
Proof.
First, the actual computational complexity of the phase 1 in DNSE(k) wasmin{B,|Ct^|}. This impliesO(B)sincemin{B,|Ct^|}≤B . Next, from the result in [14], the computational complexity for the phase 2 in DNSE(k) isO(|Vt|deg(Vt)), wheredeg(Vt)is the total degree of nodes inVtover the infection graphIt. Hence, the total complexity isO(max{B,|Vt|deg(Vt)})and this completes the proof of Theorem 1. □
4. Numerical and Simulation Results
In this section, we will provide various simulation results for the detection probabilities as varying: (i) model dynamic parameter k, (ii) flipping parameter p, and (iii) diffusion parameter q, respectively. We setn=1000 and the wiring probabilityp0=0.01to generate the initial ER random graph. This indicates that the average number of degrees is 10. Next, we propagate the information from a randomly chosen source. We run the diffusion until time stept=100with 500 iterations. As detection evaluation measures, we consider the following two metrics:
(1) Detection rate: the probability that the estimated node by the algorithm is the actual source. This is computed by counting the ratio for detecting events over the total number of diffusion iterations.
(2)
γ%-accuracy: the probability that the source is ranked among topγ % as used in [14]. This may be useful when the detection rate is law by comparing it as a highγ%-accuracy guarantee.
4.1. Comparison Algorithms Considering the dynamic scenario, the network can be divided by some sub-networks without any connection to some of them. Hence, the existing source inference algorithms may not perform well in our setting. To deal with this, we apply other estimation algorithms after finishing the contact graph reconstruction phase in our algorithm. For the comparison results, we consider the following five additional source inference algorithms:
-
Jordan Center (JC): algorithm [5] chooses a node that has a minimum infection eccentricity with tie breaking rule. This is called a Jordan center, where it is shown that the optimal sample path estimator on a tree under SIR diffusion model.
-
Rumor Center (RC): algorithm [3] chooses a node that has a maximum rumor centrality with tie breaking rule. The RC was proved to be a MLE on regular trees for a homogeneous SI diffusion model.
-
NETSLEUTH (NE): algorithm [15] chooses a node with a maximum value of eigenvector corresponding to the largest eigenvalue of a submatrix constructed from the infected nodes based on the graph Laplacian matrix.
-
Dynamic Importance (DI): algorithm [16] chooses an infected node that has a maximal reduction of the largest eigenvalue of the adjacent matrix after it is removed from the network.
-
Distance Center (DC): algorithm selects an infected node which has a minimal distance centrality as an estimator. DC is a sum of the shortest distance from a node to others, as in [2].
With these existing methods for inferring the epidemic source, we will obtain various simulation results for our dynamic scenario in the following subsections. 4.2. Effects of Model K
In Figure 3, we first obtain the detection performance for various valuesk.To do this, we set the flipping parameterp=0.3and diffusion parameterq=0.4 . In Figure 3a, we obtain the detection probability fork=102,103,104,105by increasing the budget of investigationB=[500,5000].For example, ifk=100,000, about 20% of connections are selected and flip their state with probability p in the network simultaneously at each time step. As a result, we see that fork=100, the detection probability increases up to 0.5 when we use the budgetB=5000. This is because of the portion of selected connection pairs quite low, which means the network remains as an initial ER random graph with high probability. The used source estimatorv^dns is known that it has a good performance for ER random graph in [14]. For largek,the overall detection performance degraded due to high changes of connections. However, we see that if we use the investigation budget up to 5000, the detection probability increases up to 0.2 even fork= 100,000. This is due to the reconstruction of the contact network by considering the dynamic model with diffusion flow in the network in our algorithm. In Figure 3b, we obtain theγ%-accuracy forγ∈[2,20]using the investigation budgetB=5000. We see that fork=100,the source is at least top 10% with probability one among the infected nodes whereas it is included in the top 10% with probability 0.4 fork=100,000. Fork=1000 , the probability that the source is in the top 10% was above 0.9. This comes from the effect of reconstruction of the contact graph using the budget as well as the proper estimator for the source in the algorithm. Finally, we obtain the detection probabilities for various estimation algorithm as described in the earlier subsection in Table 2 by increasingk.We use the dynamic parameterp=0.3and investigation budgetB=2500. We see that our proposed algorithm outperforms others even though all estimators are used after the contact graph reconstruction step in our algorithm. This is because the reconstructed contact graph is good for the estimator in the DNSE(k), which uses the node degree information, i.e., high contact makes a large degree of the node and this promote the flow of information or virus with high probability.
4.3. Effects of Connection Parameter P
In Figure 4, we obtain the detection performance for various flipping probabilityp.For the simulation, we set the dynamic parameterk=5000and diffusion parameterq=0.4 . In Figure 4a, we obtain the detection probability forp=0,0.2,0.5,0.8by increasing the budget of investigationB=[500,5000].Ifp=0, there is no change of connections in the network regardless of the dynamic parameter k. Hence, it remains as an ER random graph, which is initially generated. In this case, we see that the detection probability is about 0.32 regardless of the budget B due to using the source estimatorv^dns , which was designed for ER random graph in [14]. As increasingp,the overall detection performance degraded due to frequent changes in current connections. However, we see that if we use the investigation budget up to 5000, the detection probability also increases up to 0.2 even forp=0.8 by reconstruction of the contact graph. In Figure 4b, we also obtain theγ%-accuracy. We also check that for the casesp=0,0.2,the source is at least in the top 10% with probability 0.99 among the infected nodes whereas it is included in top 10% with probability 0.38 forp=0.8. Finally, we obtain the detection probabilities for various estimation algorithm as described in the earlier subsection in Table 3 by increasingp.We use the dynamic parameterk=5000and investigation budgetB=2500and we see that our proposed algorithm DNSE(k) also outperforms to others.
4.4. Effects of Diffusion Rate Q
In Figure 5, we obtain the detection performance for various infection probabilityq(q=0.2,0.5,0.8,1).To do this, we set the flipping parameterp=0.3and dynamic parameterk=5000 . In Figure 5a, we obtain the detection probabilities by increasing the budget of investigationB=[500,5000]for different q. As a result, we see that forq=0.2,the detection probability increases up to 0.9 when we use the budgetB=5000.This is because the number of infected nodes is small by terminating the diffusion process with high probability. For largeq,the overall detection performance degraded due to the increasing number of infected nodes in the network. However, if we use the investigation budget up to 5000, the detection probability increases up to 0.3 even forq=1. In Figure 5b, we obtain theγ%-accuracy forB=3000. We also check that forq=0.2,the source is at least in the top 10% with probability one among the infected nodes whereas it is included in top 10% with probability 0.43 forq=1. Finally, we obtain the detection probabilities for various estimation algorithms as described in the earlier subsection in Table 4 by increasingq.We use the dynamic parameterk=5000, flipping parameterp=0.3, and investigation budgetB=2500. The result shows that our proposed algorithm DNSE(k) outperforms to others even though all estimators are used after the contact graph reconstruction step in our algorithm.
4.5. Limitation and Future Works
Most works [2,5,7,8,10,15,25] for static networks design some efficient inference algorithms for detecting the source using the current diffusion snapshot information. Unlike the static network, it is hard to find the diffusion source under the dynamic network due to the loss of information of diffusion history from changing the connections. Hence, tracking or reconstructing the past connection is a fundamental issue in the source estimation problem over the dynamic network. However, if the infected nodes have some side information of the diffusion such as id of the parent node (the node who spreads the information to her) as in [13] or contact node information (our work), a proper query process or some investigation enables us to improve the detection performance by using this information properly.
As future works, some theoretical results of our proposed algorithm can be concerned such that how many investigations will be sufficient to reconstruct the contact graph and study the effects on the performance guarantee for finding the source using the algorithm. Further, it also remains to find a more efficient or an optimal algorithm for reconstructing the contact information for estimation the source in a more practical dynamic setting. For example, from the fact that a single contact does not completely guarantee the flow of information, the graph is recovered from multiple times of contacts. However, as in the example of COVID-19, tracking the contact information requires many resources, so an appropriate trade-off analysis also will be one of the important work in future research. Finally, some of hidden information scenarios should be studied because some of the contact information is hard to obtain by the investigation, which includes the cases that the nodes may not reveal the true information or some nodes cannot be investigated (hidden contact information). 5. Conclusions In this paper, we consider an epidemic source detection problem under the dynamic network where the connections are changed over time. We design a proper estimation algorithm using some investigation for the true contact information between infected nodes, named by DNSE(k), where the k connections can be changed with some probability at each time. To do that, we use some investigation process to obtain the contact graph between nodes which has a possibility of propagation of the information, and we perform various simulation using this algorithm compared to exciting several source estimation methods. As a result, we see that our proposed algorithm’s detection probability can be above 45% when we use the budget to investigate the contact information between infected nodes under some practical setting of k. Further, our results show that the proposed algorithm outperforms and efficient for finding the epidemic source under the considered dynamic network.
Single Source | Multiple Sources | |
---|---|---|
Static network | Rumor center [2,3,4], Jordan center [5,6], Multi-snapshots [7], Prior set [8], Decaying diffusion rate [9], Querying [10,11], Set estimator [17,18], Limit observation [19] | Minimum description length [20], Jordan Cover [21], Different diffusion time [22] |
Random and dynamic network | Random growing graph [23], ER random network [14], Time varying network [13], this paper | Time varying network with sparse observation [1] |
k | DNSE | JC | RC | NE | DI | DC |
---|---|---|---|---|---|---|
101 | 0.49 | 0.21 | 0.22 | 0.31 | 0.33 | 0.17 |
102 | 0.41 | 0.17 | 0.19 | 0.27 | 0.31 | 0.14 |
103 | 0.35 | 0.14 | 0.16 | 0.21 | 0.27 | 0.09 |
104 | 0.21 | 0.11 | 0.12 | 0.18 | 0.23 | 0.06 |
105 | 0.12 | 0.06 | 0.09 | 0.14 | 0.18 | 0.03 |
p | DNSE | JC | RC | NE | DI | DC |
---|---|---|---|---|---|---|
0 | 0.32 | 0.17 | 0.21 | 0.25 | 0.23 | 0.15 |
0.2 | 0.26 | 0.15 | 0.18 | 0.22 | 0.21 | 0.11 |
0.4 | 0.18 | 0.11 | 0.14 | 0.18 | 0.17 | 0.08 |
0.6 | 0.15 | 0.09 | 0.11 | 0.16 | 0.13 | 0.05 |
0.8 | 0.12 | 0.08 | 0.09 | 0.11 | 0.09 | 0.04 |
q | DNSE | JC | RC | NE | DI | DC |
---|---|---|---|---|---|---|
1 | 0.22 | 0.06 | 0.07 | 0.15 | 0.13 | 0.15 |
0.8 | 0.31 | 0.19 | 0.20 | 0.27 | 0.21 | 0.21 |
0.6 | 0.45 | 0.33 | 0.32 | 0.38 | 0.37 | 0.28 |
0.4 | 0.56 | 0.45 | 0.49 | 0.46 | 0.53 | 0.35 |
0.2 | 0.81 | 0.56 | 0.61 | 0.51 | 0.71 | 0.44 |
Funding
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No.2019R1G1A1099466).
Conflicts of Interest
The author declares no conflict of interest.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Epidemic source detection is one of the most crucial problems in statistical inference. For example, currently, the debate continues to reveal when and where the first spread of COVID-19 occured. For this problem, most of the works have assumed a static network topology, that is, the connections between nodes do not change over time. This is impractical because many nodes have some mobility in the network, or the connections can be changed. In this paper, we focus on the dynamic network, in the sense that the node connectivity varies over time. We first introduce a simple dynamic model, named k-flip dynamic such thatk>0connections in the network may be changed with some probability at each time. Next, we design a proper estimation algorithm using some investigation for the contact information between infected nodes, named dynamic network source estimation (DNSE)(k) for the dynamic model. We perform various simulations for the algorithm compared to several existing source estimation methods. Our results show that the proposed algorithm outperforms and is efficient for finding the epidemic source compared to other methods. Further, we see that the detection probability for our proposed algorithm can be above 45% when we use budget to investigate the contact information from the infected nodes under some practical setting of k.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer