Fig. 1. Rumor Spreading on Social Networks
Fig. 2. Identity/Direction Query
Fig. 3. Batch Query and Interactive Query with Untruthful Answers[3]
Fig. 4. Proposed Budget Assignment Method
Fig. 5. Interactive Query from the Rumor Center
Fig. 6. Facebook Network[2]
Fig. 7. Detection Probability for Batch Query on Regular Tree(degree=3)
Fig. 8. Detection Probability for Interactive Query on Regular Tree (degree=3)
Fig. 9. Detection Probability for Batch Query on ER Random Graph
Fig. 10. Detection Probability for Interactive Query on ER Random Graph
Fig. 11. Detection Probability for Batch Query on Facebook Graph
Fig. 12. Detection Probability for Interactive Query on Facebook Graph
Table 1. Taxonomy of Rumor Source Detection Problems
Table 2. Detection Probabilities for Batch Query using Various (p,q)(K=500)(H: Homogeneous, P: Proposed)
Table 3. Detection Probabilities for Interactive Query using Various (p,q)(K=500)(H: Homogeneous, P: Proposed)
References
- D. Shah and T. Zaman. Detecting Sources of Computer Viruses in Networks: Theory and Experiment. In Proceedings of ACM SIGMETRICS, 2010.
- J. Choi, S. Moon, J. Woo, K. Son, J. Shin, and Y. Yi. Rumor, "Source Detection under Querying with Untruthful Answers. In Proceedings of IEEE INFOCOM, 2017.
- J. Choi and Y. Yi, "Necessary and Sufficient Budgets in Information Source Finding with Querying: Adaptivity Gap," in Proceedings of IEEE ISIT, 2018.
- W. Dong, W. Zhang, and C. W. Tan, "Rooting Out the Rumor Culprit from Suspects." in Proceedings of IEEE International Symposium on Information Theory (ISIT), 2013.
- Z. Wang, W. Dong, W. Zhang, and C. W. Tan, "Rumor Source Detection with Multiple Observations: Fundamental Limits and Algorithms," in Proceedings, ACM SIGMETRICS, 2014.
- J. Choi, S. Moon, J. Shin, and Y. Yi, "Estimating the Rumor Source with Anti-Rumor in Social Networks," in Proceedings of IEEE ICNP Workshop on Machine Learning, 2016.
- G. Fanti, P. Kairouz, S. Oh, and P. Viswanath, "Spy vs. Spy: Rumor Source bfuscation," in Proceedings of ACM SIGMETRICS, 2015.
- G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Rumor ource Obfuscation on Irregular Trees," in Proceedings of ACM SIGMETRICS, 2016.
- G. Fanti, P. Kairouz, S. Oh, K. Ramchandran, and P. Viswanath, "Metadata-conscious Anonymous Messaging," in Proceedings of ICML, 2016.
- W. Luo, W. P. Tay and M. Leng, Infection Sprading and Source Identification: A Hide and Seek Game. IEEE Transaction on Signal Processing, Vol. 64, No. 16, AUGUST 15, 2016.
- J. Jaing, S. Wen, S. Yu, Y. Xiang, and W. Zhou, "K-Center: An Approach on the Multi-Source Identification of Information Diffusion," IEEE Transactions on Information Forensics and Security, Vol.10, pp.2616-2626, 2015. https://doi.org/10.1109/TIFS.2015.2469256
- F. Ji and W. P. Tay, "An Algorithmic Framework for Estimating Rumor Sources With Different Start Times," IEEE Transactions on Signal Processing, Vol.65, pp. 2517-2530, 2017. https://doi.org/10.1109/TSP.2017.2659643
- Z. Wang, C. Wang, J. Pei, and X. Ye, "Multiple Source Detection without Knowing the Underlying Propagation Model," in Proceedings of AAAI, 2017.
- W. Luo, W. P. Tay, and M. Leng, "How to Identify an Infection Source With Limited Observations," IEEE Journal of Selected Topics in Signal Processing, Voi.8, No.4, pp. 586-597, 2014. https://doi.org/10.1109/JSTSP.2014.2315533
- K. Zhu and L. Ying, "Information Source Detection in Networks: Possibility and Impossibility Results," IEEE INFOCOM, 2017.
- B. Chang, F. Zhu, E. Chen, and Q. Liu, "Information source detection via Maximum A Postreia Estimation,?" in Proceedings of IEEE ICDM, 2015.
- J. Leskovec and J. McAuley, "Learning to Discover Social Circles in Ego Networks," in Proceedings of NIPS, 2012.