Abstract
The source detection task, which targets at finding the most likely source given a snapshot of the information diffusion, has attracted wide attention in theory and practice. However, due to the hardness of this task, traditional techniques may suffer biased solution and extraordinary time complexity. Specially, source detection task based on the widely used Linear Threshold (LT) model has been largely ignored. To that end, in this paper, we formulate the source detection task as a Maximum Likelihood Estimation (MLE) problem, and then proposed a Markov Chain Monte Carlo (MCMC) algorithm, whose convergence is demonstrated. Along this line, to further improve efficiency of proposed algorithm, the sampling method is simplified only on the observed graph rather than the entire one. Extensive experiments on public data sets show that our MCMC algorithm significantly outperforms several state-of-the-art baselines, which validates the potential of our algorithm in source detection task.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Altarelli, F., Braunstein, A., DallAsta, L., Ingrosso, A., Zecchina, R.: The patient-zero problem with noisy observations. J. Stat. Mech. 2014, P10016 (2014)
Altarelli, F., Braunstein, A., DallAsta, L., Lage-Castellanos, A., Zecchina, R.: Bayesian inference of epidemics on networks via belief propagation. Phys. Rev. Lett. 112, 118701 (2014)
Chang, B., Zhu, F., Chen, E., Liu, Q.: Information source detection via maximum a posteriori estimation. In: ICDM 2015, pp. 21–30. IEEE Press, Atlantic City (2015)
Dong, W., Zhang, W., Tan, C.W.: Rooting out the rumor culprit from suspects. In: ISIT 2013, pp. 2671–2675. IEEE Press, Turkey (2013)
Fanti, G., Kairouz, P., Oh, S., Viswanath, P.: Spy vs. spy: rumor source obfuscation. In: SIGMETRICS 2015, pp. 271–284. ACM Press, Portland (2015)
Fioriti, V., Chinnici, M.: Predicting the sources of an outbreak with a spectral technique. arXiv preprint arXiv:1211.2333 (2012)
Jain, A., Borkar, V., Garg, D.: Fast rumor source identification via random walks. Soc. Netw. Anal. Min. 6, 62 (2016)
Kelner, J.A., Madry, A.: Faster generation of random spanning trees. In: 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 13–21. IEEE Press, Washington (2009)
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: SIGKDD 2013, pp. 137–146. ACM Press, Chicago (2003)
Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics. II. The problem of endemicity. Proc. Roy. Soc. London A Math. Phys. Eng. Sci. 138, 55–83 (1932)
Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding effectors in social networks. In: SIGKDD 2010, pp. 1059–1068. ACM Press, Washington (2010)
Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: WWW 2010, pp. 641–650. Raleigh (2010)
Nguyen, H.T., Ghosh, P., Mayo, M.L., Dinh, T.N.: Multiple infection sources identification with provable guarantees. In: CIKM 2016, pp. 1663–1672. ACM Press. Indianapolis (2016)
Schoot, R., Kaplan, D., Denissen, J., Asendorpf, J.B., Neyer, F.J., Aken, M.A.: A gentle introduction to Bayesian analysis: applications to developmental research. Child Dev. 85, 842–860 (2014)
Shah, D., Zaman, T.: Detecting sources of computer viruses in networks: theory and experiment. In: SIGMETRICS 2010, vol. 38, pp. 203–214 (2010)
Shah, D., Zaman, T.: Rumor centrality: a universal source detector. In: SIGMETRICS 2012, pp. 199–210. ACM Press, London (2012)
Shah, D., Zaman, T.: Rumors in a network: who’s the culprit? TIT 2011(57), 5163–5181 (2011)
Tong, G., Wu, W., Guo, L., Li, D., Liu, C., Liu, B., Du, D.-Z.: An Efficient Randomized Algorithm for Rumor Blocking in Online Social Networks. arXiv preprint arXiv:1701.02368 (2017)
Wang, Z., Dong, W., Zhang, W., Tan, C.W.: Rumor source detection with multiple observations: fundamental limits and algorithms. In: SIGMETRICS 2014, pp. 1–13. ACM Press, Austin (2014)
Zhai, X., Wu, W., Xu, W.: Cascade source inference in networks: a Markov chain Monte Carlo approach. Comput. Soc. Netw. 2, 17 (2015)
Yang, Y., Chen, E., Liu, Q., Xiang, B., Xu, T., Shad, S.A.: On approximation of real-world influence spread. In: ECML-PKDD 2012, pp. 548–564. UK (2012)
Xu, T., Zhong, H., Zhu, H., Xiong, H., Chen, E., Liu, G.: Exploring the impact of dynamic mutual influence on social event participation. In: SDM 2015, pp. 262–270. Canada (2015)
Jordan, C.: Sur les assemblages de lignes. J. Reine Angew. Math. 70, 81 (1869)
Acknowledgments
This research was partially supported by grants from the National Natural Science Foundation of China (Grant No. U1605251) and the National Science Foundation for Distinguished Young Scholars of China (Grant No. 61325010). Also, this research was supported by the Anhui Provincial Natural Science Foundation (Grant No. 1708085QF140), and the Fundamental Research Funds for the Central Universities (Grant No. WK2150110006).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, L., Jin, T., Xu, T., Chang, B., Wang, Z., Chen, E. (2017). A Markov Chain Monte Carlo Approach for Source Detection in Networks. In: Cheng, X., Ma, W., Liu, H., Shen, H., Feng, S., Xie, X. (eds) Social Media Processing. SMP 2017. Communications in Computer and Information Science, vol 774. Springer, Singapore. https://doi.org/10.1007/978-981-10-6805-8_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-6805-8_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6804-1
Online ISBN: 978-981-10-6805-8
eBook Packages: Computer ScienceComputer Science (R0)