1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas.

Slides:



Advertisements
Similar presentations
Great Theoretical Ideas in Computer Science for Some.
Advertisements

Maximizing the Spread of Influence through a Social Network
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Ding-Zhu Du │ University of Texas at Dallas │ Lecture 7 Rumor Blocking 0.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2001 Lecture 4 Tuesday, 2/19/02 Graph Algorithms: Part 2 Network.
Influence Maximization
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2004 Lecture 5 Wednesday, 10/6/04 Graph Algorithms: Part 2.
TECH Computer Science Graph Optimization Problems and Greedy Algorithms Greedy Algorithms  // Make the best choice now! Optimization Problems  Minimizing.
Community Structure and Rumor Blocking Ding-Zhu Du University of Texas at Dallas.
Approximation Algorithms in Computational Social Networks Weili Wu Ding-Zhu Du University of Texas at Dallas.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Chapter 2 Greedy Strategy I. Independent System Ding-Zhu Du.
Chapter 24: Single-Source Shortest Paths Given: A single source vertex in a weighted, directed graph. Want to compute a shortest path for each possible.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Network Layer4-1 Distance Vector: link cost changes Link cost changes: r node detects local link cost change r updates distance table (line 15) r if cost.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Introduction to Algorithms L ECTURE 17 (Chap. 24) Shortest paths I 24.2 Single-source shortest paths 24.3 Dijkstra’s algorithm Edsger Wybe Dijkstra
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Chapter 4 Partition (1) Shifting Ding-Zhu Du. Disk Covering Given a set of n points in the Euclidean plane, find the minimum number of unit disks to cover.
1 Algorithmic aspects of radio access network design in 4G cellular networks David Amzallag Computer Science Department, Technion Joint work with Seffi.
Lecture 5-1 Positive Influence Dominating Set Ding-Zhu Du Univ of Texas at Dallas.
Lecture 2-1 Submodular Maximization Weili Wu Ding-Zhu Du University of Texas at Dallas.
Lecture 5-2 Target-Influence and Power Law Graphs Ding-Zhu Du Univ of Texas at Dallas.
Approximation Algorithms Greedy Strategies. I hear, I forget. I learn, I remember. I do, I understand! 2 Max and Min  min f is equivalent to max –f.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Computational Social Networks --computational data networks Weili Wu Ding-Zhu Du University of Texas at Dallas.
1/54 Rumor Source Detection: A Group Testing Approach Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
Trees.
Graphs – Breadth First Search
Inferring Networks of Diffusion and Influence
Seed Selection.
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
By Laksman Veeravagu and Luis Barrera
Greedy & Heuristic algorithms in Influence Maximization
Rumor Source Detection: A Group Testing Approach
Influence Maximization
Great Theoretical Ideas in Computer Science
Introduction to Social Computing
│ University of Texas at Dallas │
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Discrete Mathematics for Computer Science
Effective Social Network Quarantine with Minimal Isolation Costs
Maximal Independent Set
Lesson 5-4 The Triangle Inequality
Lecture 23 Greedy Strategy
Detect rumor sources 2019/1/3
Linear Algebra Chapter 4 Vector Spaces.
Approximation Algorithms
Algorithms (2IL15) – Lecture 7
at University of Texas at Dallas
Influence Maximization
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Submodular Maximization with Cardinality Constraints
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Matrix Algebra THE INVERSE OF A MATRIX © 2012 Pearson Education, Inc.
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Noncooperative Rumor Blocking
Vertex Covers and Matchings
Minimum Spanning Trees
Presentation transcript:

1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas

2/54 OUTLINE I.Background: Rumor Source Detection Problem II.Unique Source III.Group Testing Approach

3/54 7/8/ When misinformation or rumor spreads in social networks, what will happen?

4/54 A misinformation said that the president of Syria is dead, and it hit the twitter greatly and was circulated fast among the population, leading to a sharp, quick increase in the price of oil. leads-sharp-increase-price-oil html 7/8/2016 4

5/54 In August, 2012, thousands of people in Ghazni province left their houses in the middle of the night in panic after the rumor of earthquake. e-rumour-sends-thousands-ghazni-streets 7/8/2016 5

6/54 7/8/2016 6

7/54 Motivation  Rumors spread through the network  We only see who received rumor but not where they got rumor from  Can we locate the hidden rumor sources?

8/54 Motivation  Rumors spread through the network  We only see who received rumor but not where they got rumor from  Can we locate the hidden rumor sources?

9/54 Problem Description Given –Social network structure –Infection time of monitors Goal –Select a subset of vertices with minimum cardinality such that the rumor source can be uniquely located. Question –Which set of vertices should we select? Applications –Epidemiology: Virus –Social Media: Rumor

10/54 Related Work Shah and Zaman, 2010, 2011, 2012: –“Rumor Centrality”-single source, Susceptible- Infected (SI) model Luo and Tay, 2012: –Multiple sources, Susceptible-Infected-Recovered (SIR) model Zhu and Ying, 2013: –Single source estimation for SIR model Seo et al., 2012; Karamchandani and Franceschetti, 2013; Luo and Tay, 2013; Zhu and Ying, 2014: –Partial observations

11/54 OUTLINE I.Background: Rumor Source Detection Problem II.Unique Source III.Group Testing Approach

12/54 Methodology for Rumor Source Detection Definition (Set Resolving Set (SRS)). Node set K ⊆ V is an SRS if any different nodes a,b ∈ V are distinguishable by K. Two nodes a,b ⊆ V are distinguishable by K if there exist two nodes x, y ∈ K such that – : the time that node x received the rumor from A,

13/54 Influence Propagation Model Rumor propagates from the sources to any vertex through shortest paths in the network. As soon as a vertex receives the information, it sends the information to all its neighbors simultaneously, which takes one time unit. Thus, the time that a rumor initiated at node u is received by node v is r u (v) = s(u) + d(u, v).

14/54 An Example of Set Resolving Set (SRS) A EF D B C { A,B,C } is a SRS. ABC r(A)-r(B)r(A)-r(C)r(B)-r(C) A011 0 B C12012 D E F21210

15/54 Section

16/54 A general result on greedy algorithm With non-integer potential function Consider a monotone increasing, submodular function Consider the following problem: whereis a nonnegative cost function

17/54 Greedy Algorithm G

18/54 Theorem Suppose in Greedy Algorithm G, selected x always satisfies Then its p.r. where

19/54 Corollary (New)

20/54 Proof

21/54 Equivalence Relation

22/54 Potential Function

23/54 Monotone & Submodular

24/54 Inequality

25/54 Inequality

26/54

27/54

28/54 Greedy Algorithm G(s)

29/54 Section

30/54 Theorem Suppose in Greedy Algorithm G, selected x always satisfies Then its p.r. where

31/54 Required Condition

32/54 Required Condition

33/54 THANK YOU VERY MUCH!