Identifying infection sources in large tree networks

  title={Identifying infection sources in large tree networks},
  author={Wuqiong Luo and Wee-Peng Tay},
  journal={2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)},
Estimating which nodes in a network are the infection sources, including the individuals who started a rumor in a social network, the computers that introduce a virus into a computer network, or the index cases of a contagious disease, plays a critical role in identifying the influential nodes in a network, and in some applications, limiting the damage caused by the infection through timely quarantine of the sources. We consider the problem of estimating the infection sources, based only on… CONTINUE READING


Publications citing this paper.
Showing 1-10 of 11 extracted citations

Effector Detection in Social Networks

IEEE Transactions on Computational Social Systems • 2016
View 1 Excerpt

Observer placement for source localization: The effect of budgets and transmission variance

2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton) • 2016
View 3 Excerpts

Local detection of infections in heterogeneous networks

2015 IEEE Conference on Computer Communications (INFOCOM) • 2015
View 2 Excerpts

Online diffusion source detection in social networks

2015 International Joint Conference on Neural Networks (IJCNN) • 2015
View 1 Excerpt

Finding an infection source under the SIS model

2013 IEEE International Conference on Acoustics, Speech and Signal Processing • 2013
View 2 Excerpts

Rumor source detection under probabilistic sampling

2013 IEEE International Symposium on Information Theory • 2013
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 17 references

Rumors in a Network: Who's the Culprit?

IEEE Transactions on Information Theory • 2011
View 10 Excerpts
Highly Influenced

Identifying the Productive and Influential Bloggers in a Community

IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) • 2011
View 1 Excerpt

Identifying Key Users for Targeted Marketing by Mining Online Social Network

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops • 2010
View 1 Excerpt

Source Tracing and Pursuing of Network Virus

2008 IEEE 8th International Conference on Computer and Information Technology Workshops • 2008
View 1 Excerpt

Bayesian Detection in Bounded Height Tree Networks

IEEE Transactions on Signal Processing • 2007
View 1 Excerpt

Similar Papers

Loading similar papers…