• Corpus ID: 239009971

Quickest Inference of Network Cascades with Noisy Information

@article{Sridhar2021QuickestIO,
  title={Quickest Inference of Network Cascades with Noisy Information},
  author={Anirudh Sridhar and H. Vincent Poor},
  journal={ArXiv},
  year={2021},
  volume={abs/2110.08115}
}
We study the problem of estimating the source of a network cascade given a time series of noisy information about the spread. Initially, there is a single vertex affected by the cascade (the source) and the cascade spreads in discrete time steps across the network. The cascade evolution is hidden, but one can observe a time series of noisy signals from each vertex. The time series of a vertex is assumed to be a sequence of i.i.d. samples from a pre-change distribution Q0 before the cascade… 

Figures from this paper

References

SHOWING 1-10 OF 53 REFERENCES
Quickest Detection of Significant Events in Structured Networks
TLDR
A sequential algorithm that can detect a “significant” event, i.e., when the event has affected no fewer than $\eta$ nodes, as quickly as possible, while controlling the false alarm rate is constructed.
Quickest Detection of Dynamic Events in Networks
TLDR
The goal is to design a sequential algorithm that can detect a “significant” event, i.e., when the event has affected no fewer than $\eta $ nodes, as quickly as possible, while controlling the false alarm rate.
Information cascades in complex networks
TLDR
Simulation results on sample networks reveal just how relevant the centrality of initiator nodes is on the latter development of an information cascade, and the spreading influence of a node is defined as the fraction of nodes that is activated as a result of the initial activation of that node.
Rumors in a Network: Who's the Culprit?
TLDR
Simulations show that rumor centrality outperforms distance centrality in finding rumor sources in networks which are not tree-like, and it is proved that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ.
Finding Rumor Sources on Random Trees
TLDR
The authors proposed the graph score function rumor centrality as an estimator for detecting the source of a rumor and establish it to be the maximum likelihood estimator with respect to the popular Susceptible Infected model with exponential spreading times for regular trees.
Detecting sources of computer viruses in networks: theory and experiment
TLDR
Simulations show that rumor centrality outperforms distance centrality in finding virus sources in networks which are not tree-like, and it is proved that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ.
Rumor source detection with multiple observations: fundamental limits and algorithms
TLDR
Surprisingly, even with merely two observations, the detection probability at least doubles that of a single observation, and further approaches one, i.e., reliable detection, with increasing degree, indicates that a richer diversity enhances detectability.
Confidence Sets for the Source of a Diffusion in Regular Trees
  • Justin Khim, Po-Ling Loh
  • Mathematics, Computer Science
    IEEE Transactions on Network Science and Engineering
  • 2017
TLDR
A probabilistic analysis of Pólya urns corresponding to the number of uninfected neighbors in specific subtrees of the infection tree is provided to provide an example illustrating the shortcomings of source estimation techniques in settings where the underlying graph is asymmetric.
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions
TLDR
It is shown that a weak form of source obfuscation is still possible in the case of two independent snapshots, but already with three observations there is a simple algorithm that finds the rumor source with constant probability, regardless of the adaptive diffusion protocol.
Quickest Detection of Growing Dynamic Anomalies in Networks
TLDR
This detection problem is posed as a stochastic optimization problem by using a delay metric that is based on the worst possible path of the anomaly that is proposed that is asymptotically optimal as the mean time to false alarm goes to infinity.
...
1
2
3
4
5
...