Identifying infection sources and regions in large networks
Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/104814 http://hdl.handle.net/10220/47851 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-104814 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1048142020-03-07T14:00:36Z Identifying infection sources and regions in large networks Luo, Wuqiong Tay, Wee Peng Leng, Mei School of Electrical and Electronic Engineering Infection Graphs Inference Algorithm DRNTU::Engineering::Electrical and electronic engineering Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources and the infection regions (subsets of nodes infected by each source) in a network, based only on knowledge of which nodes are infected and their connections, and when the number of sources is unknown a priori. We derive estimators for the infection sources and their infection regions based on approximations of the infection sequences count. We prove that if there are at most two infection sources in a geometric tree, our estimator identifies the true source or sources with probability going to one as the number of infected nodes increases. When there are more than two infection sources, and when the maximum possible number of infection sources is known, we propose an algorithm with quadratic complexity to estimate the actual number and identities of the infection sources. Simulations on various kinds of networks, including tree networks, small-world networks and real world power grid networks, and tests on two real data sets are provided to verify the performance of our estimators. MOE (Min. of Education, S’pore) Accepted version 2019-03-19T04:13:24Z 2019-12-06T21:40:26Z 2019-03-19T04:13:24Z 2019-12-06T21:40:26Z 2013 Journal Article Luo, W., Tay, W. P., & Leng, M. (2013). Identifying infection sources and regions in large networks. IEEE Transactions on Signal Processing, 61(11), 2850-2865. doi:10.1109/TSP.2013.2256902 1053-587X https://hdl.handle.net/10356/104814 http://hdl.handle.net/10220/47851 10.1109/TSP.2013.2256902 en IEEE Transactions on Signal Processing © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TSP.2013.2256902. 16 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Infection Graphs Inference Algorithm DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
Infection Graphs Inference Algorithm DRNTU::Engineering::Electrical and electronic engineering Luo, Wuqiong Tay, Wee Peng Leng, Mei Identifying infection sources and regions in large networks |
description |
Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources and the infection regions (subsets of nodes infected by each source) in a network, based only on knowledge of which nodes are infected and their connections, and when the number of sources is unknown a priori. We derive estimators for the infection sources and their infection regions based on approximations of the infection sequences count. We prove that if there are at most two infection sources in a geometric tree, our estimator identifies the true source or sources with probability going to one as the number of infected nodes increases. When there are more than two infection sources, and when the maximum possible number of infection sources is known, we propose an algorithm with quadratic complexity to estimate the actual number and identities of the infection sources. Simulations on various kinds of networks, including tree networks, small-world networks and real world power grid networks, and tests on two real data sets are provided to verify the performance of our estimators. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Luo, Wuqiong Tay, Wee Peng Leng, Mei |
format |
Article |
author |
Luo, Wuqiong Tay, Wee Peng Leng, Mei |
author_sort |
Luo, Wuqiong |
title |
Identifying infection sources and regions in large networks |
title_short |
Identifying infection sources and regions in large networks |
title_full |
Identifying infection sources and regions in large networks |
title_fullStr |
Identifying infection sources and regions in large networks |
title_full_unstemmed |
Identifying infection sources and regions in large networks |
title_sort |
identifying infection sources and regions in large networks |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/104814 http://hdl.handle.net/10220/47851 |
_version_ |
1681043381363408896 |