The Impact of Changes in Network Structure on Diffusion of Warnings

Slides:



Advertisements
Similar presentations
Sampling Research Questions
Advertisements

Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Network biology Wang Jie Shanghai Institutes of Biological Sciences.
Emergence of Scaling in Random Networks Albert-Laszlo Barabsi & Reka Albert.
Modeling Maze Navigation Consider the case of a stationary robot and a mobile robot moving towards a goal in a maze. We can model the utility of sharing.
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) WIDS MIT, May 31, 2011.
Analysis and Modeling of Social Networks Foudalis Ilias.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
IEEE ICDCS, Toronto, Canada, June 2007 (LA-UR ) 1 Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks Hasan Guclu.
The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires,
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
The influence of search engines on preferential attachment Dan Li CS3150 Spring 2006.
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
IEEE P2P, Aachen, Germany, September Ad-hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks Hasan Guclu
This material is based upon work supported by the U.S. Department of Homeland Security, Science and Technology Directorate, Office of University Programs,
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Efficient Identification of Overlapping Communities Jeffrey Baumes Mark Goldberg Malik Magdon-Ismail Rensselaer Polytechnic Institute, Troy, NY.
“The Geography of the Internet Infrastructure: A simulation approach based on the Barabasi-Albert model” Sandra Vinciguerra and Keon Frenken URU – Utrecht.
Optimal Link Bombs are Uncoordinated Sibel Adali Tina Liu Malik Magdon-Ismail Rensselaer Polytechnic Institute.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Micro-Simulation of Diffusion of Warnings Cindy Hui Mark Goldberg Malik Magdon-Ismail William A. Wallace Rensselaer Polytechnic Institute This material.
Measuring Behavioral Trust in Social Networks
Social Networking: Large scale Networks
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
An Improved Acquaintance Immunization Strategy for Complex Network.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
The simultaneous evolution of author and paper networks
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Network (graph) Models
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
A Viewpoint-based Approach for Interaction Graph Analysis
QoS & Queuing Theory CS352.
Presented by Tae-Seok Kim
Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Topics In Social Computing (67810)
A Study of Group-Tree Matching in Large Scale Group Communications
Learning to Generate Networks
On Growth of Limited Scale-free Overlay Network Topologies
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
Models of networks (synthetic networks or generative models): Random, Small-world, Scale-free, Configuration model and Random geometric model By: Ralucca.
MA4404 Winter 2018 Introduction to Machine Learning
Finding Communities by Clustering a Graph into Overlapping Subgraphs
Generative Model To Construct Blog and Post Networks In Blogosphere
The Importance of Communities for Learning to Influence
Extract Agent-based Model from Communication Network
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
A Locality Model of the Evolution of Blog Networks
Elliptic Partial Differential Equations – Direct Method
The likelihood of linking to a popular website is higher
Peer-to-Peer and Social Networks Fall 2017
Title of Poster Site Visit 2017 Introduction Results
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Department of Computer Science University of York
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Peer-to-Peer and Social Networks
A History Sensitive Cascade Model in Diffusion Networks
CHAPTER 10 Comparing Two Populations or Groups
Log-periodic oscillations due to discrete effects in complex networks
Malik Magdon-Ismail, Konstantin Mertsalov, Mark Goldberg
Network Models Michael Goodrich Some slides adapted from:
Advanced Topics in Data Mining Special focus: Social Networks
Presentation transcript:

The Impact of Changes in Network Structure on Diffusion of Warnings Cindy Hui Malik Magdon-Ismail William A. Wallace Mark Goldberg Rensselaer Polytechnic Institute

Diffusion on Dynamic Networks Diffusion of warning messages through a population Network dynamics as the result of the information flow 2

Diffusion Model How does information flow through the network? How do nodes process information? How do nodes act on the information?

How does information flow? Messages are propagated when nodes interact.

How does information flow? Information Loss Axiom When a message is passed from one node to another, the information value of the message is non-increasing. The information value of the message is a function of the social relationship between the sender and the receiver. trust A B

How do nodes process information? Source Union Axiom The recipient node combines information from incoming messages. Information Fusion Axiom The combined information value is at most the sum of the individual bits of information and at least the maximum.

How do nodes act on the information? Threshold Utility Axiom If the node’s information fused value exceeds one of the thresholds, the node will enter a new state. 1 Believer time Action Upper bound Undecided Lower bound Disbelieved Uninformed

Experiments Diffusion of evacuation warnings: Parameters: A warning message is broadcasted to a population. Population is a network of household nodes. The proportion of evacuated nodes is recorded. Parameters: Social network structure Seed set selection Diffusion scenarios

Experimental Networks Population Size Density Random 100,000 0.00004000 Grid 0.00003987 Scale-free 0.00003900 Blog 138,007 0.00004926 Barabasi-Albert (BA) model for generating random scale-free networks using preferential attachment Degree distribution follows a power law P(k) ~ k-3 LiveJournal blog comment network M. Goldberg, S. Kelley, M. Magdon-Ismail, K. Mertsalov, and W. A. Wallace, Communication dynamics of blog networks, in Proc. SIGKDD Workshop on Social Network Mining and Analysis, August 2008. The edges in the networks are undirected edges where messages may flow in either direction.

Seed Set Selection One single information source High information value Broadcast message at time step 1 Initially connected to 20% of the population Two seeding strategies Random seed set Highest degree set of nodes

Social Relation: Trust We can use trust to differentiate the society into social groups. We divide the population into two groups of nodes by randomly assigning each node to one of two groups, A or B.

Diffusion Scenario 1: No Groups Equal trust between all nodes Group A Group B

Diffusion Scenario 2: Groups (1) High trust between nodes in the same group Group A Group B Group A Group B High Low

Diffusion Scenario 3: Groups (2) High trust in nodes in group A Group A Group B Group A Group B High Low

Simulation Results

Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Simulation Results Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Network No Groups Grid 0.63 Random 0.60 Scale-free 0.56 Blog 0.58 Proportion of Evacuated Nodes in Each Trust Scenario (Infect High Degree) Network No Groups Grid 0.67 Random 0.76 Scale-free 0.95 Blog 0.82

Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Simulation Results Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Network No Groups Groups (1) Groups (2) 0.1 0.3 Grid 0.63 0.76 0.89 0.77 Random 0.60 Scale-free 0.56 0.79 Blog 0.58 0.78 0.84 0.83 Proportion of Evacuated Nodes in Each Trust Scenario (Infect High Degree) Network No Groups Groups (1) Groups (2) 0.1 0.3 Grid 0.67 0.80 0.91 Random 0.76 0.86 0.90 Scale-free 0.95 0.98 Blog 0.82 0.87 0.88 0.89

Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Simulation Results Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Network No Groups Groups (1) Groups (2) 0.1 0.3 Grid 0.63 0.76 0.89 0.77 Random 0.60 Scale-free 0.56 0.79 Blog 0.58 0.78 0.84 0.83 Proportion of Evacuated Nodes in Each Trust Scenario (Infect High Degree) Network No Groups Groups (1) Groups (2) 0.1 0.3 Grid 0.67 0.80 0.91 Random 0.76 0.86 0.90 Scale-free 0.95 0.98 Blog 0.82 0.87 0.88 0.89

Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Simulation Results Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Network No Groups Groups (1) Groups (2) No Groups (diff) 0.1 0.3 Grid 0.63 0.76 0.89 0.77 0.54 0.82 Random 0.60 0.52 0.85 Scale-free 0.56 0.79 0.49 Blog 0.58 0.78 0.84 0.83 0.51 0.81 Proportion of Evacuated Nodes in Each Trust Scenario (Infect High Degree) Network No Groups Groups (1) Groups (2) No Groups (diff) 0.1 0.3 Grid 0.67 0.80 0.91 0.58 0.84 Random 0.76 0.86 0.90 Scale-free 0.95 0.98 0.85 0.92 Blog 0.82 0.87 0.88 0.89 0.74

Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Simulation Results Proportion of Evacuated Nodes in Each Trust Scenario (Infect Randomly) Network No Groups Groups (1) Groups (2) No Groups (diff) 0.1 0.3 Grid 0.63 0.76 0.89 0.77 0.54 0.82 Random 0.60 0.52 0.85 Scale-free 0.56 0.79 0.49 Blog 0.58 0.78 0.84 0.83 0.51 0.81 Proportion of Evacuated Nodes in Each Trust Scenario (Infect High Degree) Network No Groups Groups (1) Groups (2) No Groups (diff) 0.1 0.3 Grid 0.67 0.80 0.91 0.58 0.84 Random 0.76 0.86 0.90 Scale-free 0.95 0.98 0.85 0.92 Blog 0.82 0.87 0.88 0.89 0.74

Conclusion Presented a model for information propagation Nodes process and act on the information Group structure by assigning trust between nodes Social groups are important for diffusion Diffusion was more efficient when based on social group than in an unstructured way Increasing trust differentials led to larger proportions of evacuated nodes Trust differential alone does not accomplish the same as organized trust differentials (social groups) Diffusion process and effectiveness depends on Network structure Seeding mechanism

Thank you Questions? Acknowledgements: This material is based upon work partially supported by the U.S. National Science Foundation (NSF) under Grant No. IIS-0621303, IIS-0522672,IIS-0324947, CNS-0323324, NSF IIS-0634875 and by the U.S. Office of Naval Research (ONR) Contract N00014-06-1-0466 and by the U.S. Department of Homeland Security (DHS) through the Center for Dynamic Data Analysis for Homeland Security administered through ONR grant number N00014-07-1-0150 to Rutgers University.The content of this paper does not necessarily reflect the position or policy of the U.S. Government, no official endorsement should be inferred or implied.

Node States State Description Behavior Uninformed Individual has not received the message No action Disbelieved Individual received the message, but does not understand or has not personalized the message Undecided Individual received the message and is uncertain of what to do Query neighbors in network Believer Individual received the message and believes the value of the message Propagate the message Evacuated Individual has left the network

Node Parameters Node thresholds: Lower bound 0.1, Upper bound 0.3 Once a node enters believer state, they will evacuate from the network after 5 time steps Nodes have high trust in the source (0.90) Probability of successful communication on a link (0.75) Information fusion Source appears in multiple messages, take the maximum Information fused value at the node, take the sum

Information Fusion Axiom (a) When a source S is found in multiple messages with information values V1,V2,…, the information value from source S is fused into a single value V*, where Node 1 {S1,V11;S2,V21} Node 2 {S2,V22} Node 3 {S1,V13; S2,V23}

Information Fusion Axiom (b) Suppose that the sources (S1, S2,…) have information values (V1, V2,…). The fused information value at the node is Node 3 {S1,V13; S2,V23}