skip to main content
10.1145/3150928.3150936acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvaluetoolsConference Proceedingsconference-collections
research-article

MCMC Approaches to Rumor Source Inference using Pairwise Information

Published:05 December 2017Publication History

ABSTRACT

In this work, we examine the problem of rumor source inference on a network whose topology is known, given infected nodes and pairwise information in the form of pairwise partial orders on the set of nodes of the underlying graph based on the order in which they were infected. We analyze the Maximum Likelihood Estimator (MLE) of the rumor source, assumed unique, and compare it with other estimators popular in literature, e.g., rumor center, distance center and Jordan center. We propose an approximation to the MLE and a class of estimators based on this approximation that is agnostic to the underlying rumor model. We also propose MCMC algorithms to implement them. Further, we assess the robustness of the proposed estimators to different graph topologies via extensive simulations on the Erdős-Rényi and Barabási-Albert models.

References

  1. David Aldous and Jim Fill. 2002. Reversible Markov chains and random walks on graphs. (2002).Google ScholarGoogle Scholar
  2. Albert-László Barabási and Réka Albert. 1999. Emergence of scaling in random networks. science 286, 5439 (1999), 509--512.Google ScholarGoogle Scholar
  3. P. Erdős and A. Rényi. 1959. On random graphs. I. Publ. Math. Debrecen 6 (1959), 290--297.Google ScholarGoogle Scholar
  4. GH Golub and CF Van Loan. 1996. Matrix computations 3rd edition The John Hopkins University Press. Baltimore, MD (1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W Keith Hastings. 1970. Monte Carlo sampling methods using Markov chains and their applications. Biometrika 57, 1 (1970), 97--109.Google ScholarGoogle ScholarCross RefCross Ref
  6. Nikhil Karamchandani and Massimo Franceschetti. 2013. Rumor source detection under probabilistic sampling. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ankit Kumar, Vivek Borkar, and Nikhil Karamchandani. 2017. Temporally Agnostic Rumor Source Detection. IEEE Transactions on Signal and Information Processing over Networks (2017).Google ScholarGoogle Scholar
  8. Devavrat Shah and Tauhid Zaman. 2011. Rumors in a network: who's the culprit? IEEE Transactions on Information Theory (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Devavrat Shah and Tauhid Zaman. 2012. Finding rumor sources on random graphs. (2012).Google ScholarGoogle Scholar
  10. Devavrat Shah and Tauhid Zaman. 2012. Rumor centrality: a universal source detector. In ACM SIGMETRICS Performance Evaluation Review, Vol. 40. ACM, 199--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Daniel A Spielman and Nikhil Srivastava. 2011. Graph sparsification by effective resistances. SIAM J. Comput. 40, 6 (2011), 1913--1926. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kai Zhu and Lei Ying. 2015. Source localization in networks: Trees and beyond. arXiv preprint arXiv:1510.01814 (2015).Google ScholarGoogle Scholar
  13. Kai Zhu and Lei Ying. 2016. Information source detection in the SIR model: A sample-path-based approach. IEEE/ACM Transactions on Networking (TON) 24, 1 (2016), 408--421. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. MCMC Approaches to Rumor Source Inference using Pairwise Information

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          VALUETOOLS 2017: Proceedings of the 11th EAI International Conference on Performance Evaluation Methodologies and Tools
          December 2017
          268 pages
          ISBN:9781450363464
          DOI:10.1145/3150928

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 December 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate90of196submissions,46%
        • Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)1

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader