Effective Social Network Quarantine with Minimal Isolation Costs

Slides:



Advertisements
Similar presentations
Generalization and Specialization of Kernelization Daniel Lokshtanov.
Advertisements

Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
Chap 8: Estimation of parameters & Fitting of Probability Distributions Section 6.1: INTRODUCTION Unknown parameter(s) values must be estimated before.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
Evaluating Hypotheses
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
2.3. Measures of Dispersion (Variation):
Maximum likelihood (ML)
Package Transportation Scheduling Albert Lee Robert Z. Lee.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Efficient Gathering of Correlated Data in Sensor Networks
Deadline-sensitive Opportunistic Utility-based Routing in Cyclic Mobile Social Networks Mingjun Xiao a, Jie Wu b, He Huang c, Liusheng Huang a, and Wei.
Random Sampling, Point Estimation and Maximum Likelihood.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
A Clustering Algorithm based on Graph Connectivity Balakrishna Thiagarajan Computer Science and Engineering State University of New York at Buffalo.
Snowballing Effects in Preferential Attachment: The Impact of The Initial Links Huanyang Zheng and Jie Wu Computer and Information Sciences Temple University.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
1 11 Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Rensselaer Polytechnic Institute.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Introduction Many organizations use decision rules to alleviate incentive problems as opposed to incentive contracts The principal typically retains some.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
CHAPTER 2: Basic Summary Statistics
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
EE327 Final Representation Qianyang Peng F
Satisfaction Games in Graphical Multi-resource Allocation
TEMPLE UNIVERSITY Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications Guoju Gaoa, Mingjun Xiao∗a, Jie Wub, Kai Hana, Liusheng Huanga.
Random Walk for Similarity Testing in Complex Networks
Wenyu Zhang From Social Network Group
Finding Dense and Connected Subgraphs in Dual Networks
Greedy & Heuristic algorithms in Influence Maximization
Presented by Tae-Seok Kim
Hypotheses and test procedures
Other confidence intervals
12. Principles of Parameter Estimation
CSC 421: Algorithm Design & Analysis
CSC 421: Algorithm Design & Analysis
Inference in Bayesian Networks
On-Chip Power Network Optimization with Decoupling Capacitors and Controlled-ESRs Wanping Zhang1,2, Ling Zhang2, Amirali Shayan2, Wenjian Yu3, Xiang Hu2,
SEIV Epidemic Model & Resource Allocation
The minimum cost flow problem
Sampling Distributions
CSC 421: Algorithm Design & Analysis
Nithin Michael, Yao Wang, G. Edward Suh and Ao Tang Cornell University
Server Allocation for Multiplayer Cloud Gaming
Exact Inference Continued
The Importance of Communities for Learning to Influence
Functional Coherence in Domain Interaction Networks
Coverage and Distinguishability in Traffic Flow Monitoring
Department of Computer Science University of York
Coverage Approximation Algorithms
Introduction Wireless Ad-Hoc Network
Cost-effective Outbreak Detection in Networks
3.3 Network-Centric Community Detection
Automatic Segmentation of Data Sequences
CSC 421: Algorithm Design & Analysis
CHAPTER 2: Basic Summary Statistics
2.3. Measures of Dispersion (Variation):
Viral Marketing over Social Networks
12. Principles of Parameter Estimation
CSC 421: Algorithm Design & Analysis
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
Presentation transcript:

Effective Social Network Quarantine with Minimal Isolation Costs Huanyang Zheng and Jie Wu Presenter: Dongyang Zhan Dept. of Computer and Info. Sciences Temple University, USA Good afternoon, ladies and gentlemen. I’m going to present the paper “Effective Social Network Quarantine with Minimal Isolation Costs”. The authors, Huanyang Zheng and Jie Wu, are absent due to some private reasons. This is Dongyang Zhan, and I will be the presenter.

Introduction Notion of diseases Susceptible-Infected-Susceptible Human communities (e.g., Ebola) Online social networks (e.g., rumours) Distributed systems (e.g., computer virus) Susceptible-Infected-Susceptible Two states: susceptible and infected Susceptible people can be infected Infected people return to susceptible by recovery Nowadays, the notion of diseases has been extended from real human diseases to general epidemic information propagations, such as the rumors in distributed systems. Controlling the spread of a disease in a population is usually done through quarantine where people that have, or are suspected to have, a disease are restricted from having interactions with others. However, the human interactions are inevitably degraded by the quarantine. This motivates us to explore an effective quarantine strategy that can maximally preserve the human interactions. We use the classic Susceptible-Infected-Susceptible (SIS) model to simulate the epidemic spreading, where each person has a state of being either susceptible or infected. People transfer their states through a cycle in which their susceptibility (S) causes them to become infected (I), and they return to being susceptible (S) by recovery. Clearly, the epidemic breaks out when the average infection rate becomes larger than the average recovery rate.

Problem Formulation Social Network G = (V, E) Objective and Constraint V is a set of nodes (people) E is a set of directed edges Cv is the isolation cost of the node v Q is the set of isolated nodes (people) Objective and Constraint Minimize the total isolation cost of Epidemic outbreaks are eliminated Our social network model is based on a directed graph G = (V, E), where V is a set of nodes, and E is a set of directed edges (social relationships)., respeLet To control epidemic outbreaks, some nodes are isolated by the quarantine strategy. A node v is isolated, if all the incoming and outgoing edges of v are removed. An isolated node can no longer interact with its neighbors, but it remains in the network. The isolation cost of v is C_v. The set of nodes isolated by the quarantine strategy is denoted by Q. The objective is to explore a quarantine strategy that eliminates epidemic outbreaks with minimal isolation cost.

Epidemic Model Parameters is a constant infection rate is a constant recover rate is the fraction of nodes with in-degree d is the fraction of infected nodes with in-degree d at time t, and is the fraction of susceptible nodes with in-degree d at time t The probability that a uniform-randomly selected edge comes from an infected node at the time t is Our epidemic spreading model is based on the classic SIS model. Nodes have states of either being susceptible or infected. We consider that the infection rate of a given node depends on its infected incoming neighbors. For the node v, each of its infected incoming neighbors independently brings a constant infection rate (the infection probability per time unit) of \lambda to v. Meanwhile, the recovery rate is set to be a constant of r, as used in existing models. To capture the structural heterogeneity of the social network, let f_d(t) denote the fraction of infected nodes with in-degree d at time t. Then, \Theta(f(t)) is the probability that a uniform-randomly selected edge comes from an infected node at the time t.

Epidemic Model Consider a node with in-degree d It has d incoming neighbors infected incoming neighbors (expected) Each infected neighbor has a infection rate of The total infection rate is The epidemic state transfer equation is The 1st part is infection, and the 2nd part is recovery The fraction of susceptible nodes with in-degree d at time t is [1-f_d(t)]. Each of these nodes has an incoming degree of d, meaning that it is expected to have d \times\Theta(f(t)) infected incoming neighbors. Since each infected incoming neighbor brings an infection rate of , the total infection rate is (the first equation in PPT). As a result, we have (the second equation in PPT).

Epidemic Model To control epidemic outbreaks The new infection must be 0: Further derivation shows Since we want to control epidemic outbreaks, the new infection must be 0. Further results are shown in the following.

Epidemic Model The result to control epidemic outbreak: denotes the mean value of variable Larger average degree and larger degree variance bring more network vulnerability to epidemics Here is the result to control epidemic outbreaks (first equation). Let <> denote the mean value of the corresponding variable. Then, the result can be simplified as the second equation. The key insight is that both a larger average degree and a larger degree variance bring a more vulnerable network with respect to epidemic outbreaks.

Feasibility and Minimality Let denote the degradation of (isolation Q can control epidemic outbreaks) Objective is to minimize Constraint is to control epidemic outbreaks: We focus on feasible isolations: (just read the slides here: the reformulation of the problem, and the definition of feasible isolations)

Feasibility and Minimality Key concept of minimality: Key observation: Key intuition: A minimal feasible quarantine strategy would not lead to unnecessary isolations. Unnecessary isolations are saved once the epidemic outbreak is controlled. (just read the slides, the definition of minimality, key observation, and key intuition)

Algorithmic Design Our problem is NP-hard A reduction from partial set cover Unbounded greedy can iteratively choose the lowest marginal cost-to-benefit node (just read the slide, NP-hard, and greedy algorithm)

Algorithmic Design Bounded greedy through homogeneous scaling The key observation of our approach is that a minimal feasible quarantine strategy would not lead to excessive isolations. Following this intuition, a homogeneous greedy solution is proposed. It is a recursive algorithm that splits the node cost through a homogeneous function. At each recursion level, it isolates the node v that can minimize the “cost-to-benefit” ratio, as implemented in lines 3 to 5. Then, in lines 6 to 9, it splits the node cost through a homogeneous function for a recursive call. Finally, in lines 10 to 12, some nodes in Q are removed to satisfy the minimality property.

Algorithmic Design Approximation ratio is 2 At most double the optimal isolation cost Insight is that a minimal feasible isolation strategy is close to the optimal isolation strategy Time complexity is O(V2) (Just read the slide)

Experiments Epidemics in online social networks Epinions is a general consumer review site Wikipedia is a free encyclopedia (just read the slide on the dataset and statistics)

Experiments Results on Epinions Isolation cost depends on node degree It can be seen that the isolation cost decreases monotonously with respect to the recovery rate. This is because a high recovery rate can resist epidemic spreadings. If the recovery rate is high enough, then epidemic outbreaks can be eliminated without isolations. HomoGreedy always has the lowest isolation costs among the comparison algorithms. Another interesting observation is that, when the cost of a node isolation is a constant, the total isolation cost is the smallest. This is because the quarantine strategy tends to isolate large degree nodes, while their costs are relatively cheap after normalization. On the other hand, when the cost of a node isolation scales with its degree (in a logarithmic manner or a square root manner), the overall isolation costs become very large. This is because the isolations of large degree nodes take relatively large costs after normalization.

Experiments Results on Wikipedia Isolation cost depends on node degree We also find that, the total isolation costs in Epinions are smaller than those in Wikipedia. One reason is that Epinions has a much larger degree variance than Wikipedia, as shown in Table I (355,754 to 103,689). Another reason is that Epinions has more users than Wikipedia (18,098 to 7,115), bringing larger isolation costs.

Conclusion Epidemic outbreak depends on both the average node degree and the degree variance A minimal feasible quarantine can avoid unnecessary isolations, and lead to a bounded algorithm Thank You (read the slide and then finish)