#### Filter Results:

- Full text PDF available (6)

#### Publication Year

2010

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Wuqiong Luo, Wee-Peng Tay, Mei Leng
- IEEE Transactions on Signal Processing
- 2013

Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine… (More)

- Wuqiong Luo, Wee-Peng Tay
- 2012 9th Annual IEEE Communications Society…
- 2012

Estimating which nodes in a network are the infection sources, including the individuals who started a rumor in a social network, the computers that introduce a virus into a computer network, or the index cases of a contagious disease, plays a critical role in identifying the influential nodes in a network, and in some applications, limiting the damage… (More)

- Wuqiong Luo, Wee-Peng Tay, Mei Leng
- IEEE Journal of Selected Topics in Signal…
- 2014

A rumor spreading in a social network or a disease propagating in a community can be modeled as an infection spreading in a network. Finding the infection source is a challenging problem, which is made more difficult in many applications where we have access only to a limited set of observations. We consider the problem of estimating an infection source for… (More)

- Wuqiong Luo, Wee-Peng Tay
- 2013 IEEE International Conference on Acoustics…
- 2013

We consider the problem of identifying an infection source based only on an observed set of infected nodes in a network, assuming that the infection process follows a Susceptible-Infected-Susceptible (SIS) model. We derive an estimator based on estimating the most likely infection source associated with the most likely infection path. Simulation results on… (More)

- Wuqiong Luo, Wee-Peng Tay, Mei Leng
- ArXiv
- 2014

Finding the infection sources in a network when we only know the network topology and infected nodes, but not the rates of infection, is a challenging combinatorial problem, and it is even more difficult in practice where the underlying infection spreading model is usually unknown a priori. In this paper, we are interested in finding a source estimator that… (More)

- Wuqiong Luo, Wee-Peng Tay
- 2013 IEEE Global Conference on Signal and…
- 2013

We consider the problem of estimating infection sources based on incomplete observations of the set of infected nodes at some point in time, assuming that the infection spreading process follows an Susceptible-Infected (SI) model. We derive an estimator that finds the source nodes associated with the most likely infection path that yields the incomplete… (More)

- Wuqiong Luo, Wee-Peng Tay, Mei Leng
- ArXiv
- 2015

- Wuqiong Luo, Wee-Peng Tay
- ACSCC
- 2012

- Chee Kheong Siew, Shuai Peng, Wuqiong Luo, Peng Tang, Yanting Mo
- INC
- 2010

With rapid growth of Internet traffic, much effort has been focused on possible QoS provisioning mechanisms for different types of services. Many mechanisms, such as MultiServ and Virtual Time Reference System, have been proposed to provide QoS guarantees but scalability remains a challenging problem. In this paper, a novel Distributed-FDPS algorithm is… (More)

- Wuqiong Luo, Wee-Peng Tay, Mei Leng
- IEEE Transactions on Signal Processing
- 2016

The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. On the other hand, the network administrator aims to identify the source node based on knowledge of which nodes have been infected. We model the infection… (More)