skip to main content
10.1145/3543507.3583299acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Lightweight source localization for large-scale social networks

Published: 30 April 2023 Publication History

Abstract

The rapid diffusion of hazardous information in large-flow-based social media causes great economic losses and potential threats to society. It is crucial to infer the inner information source as early as possible to prevent further losses. However, existing localization methods wait until all deployed sensors obtain propagation information before starting source inference within a network, and hence the best opportunity to control propagation is missed. In this paper, we propose a new localization strategy based on finite deployed sensors, named Greedy-coverage-based Rapid Source Localization (GRSL), to rapidly, flexibly and accurately infer the source in the early propagation stage of large-scale networks. There are two phases in GRSL. In the first phase, the Greedy-based Strategy (GS) greedily deploys sensors to rapidly achieve wide area coverage at a low cost. In the second phase, when a propagation event within a network is observed by a part of the sensors, the Inference Strategy (IS) with an earlier response mechanism begins executing the source inference task in an earlier small infected area. Comprehensive experiments with the SOTA methods demonstrate the superior performance and robustness of GRSL in various application scenarios.

References

[1]
Ameya Agaskar and Yue M. Lu. 2013. A fast Monte Carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. 88581N.
[2]
Fabrizio Altarelli, Alfredo Braunstein, Luca Dall’Asta, Alejandro Lage-Castellanos, and Riccardo Zecchina. 2014. Bayesian inference of epidemics on networks via belief propagation. Physical Review Letters 112, 11 (2014), 118701.
[3]
Oberiri Destiny Apuke and Bahiyah Omar. 2021. Fake news and COVID-19: modelling the predictors of fake news sharing among social media users. Telematics and Informatics 56 (2021), 101475.
[4]
Jonathan Berry, William E Hart, Cynthia A Phillips, James G Uber, and Jean-Paul Watson. 2006. Sensor placement in municipal water networks with temporal integer programming models. Journal of Water Resources Planning and Management 132, 4 (2006), 218–224.
[5]
Tian Bian, Xi Xiao, Tingyang Xu, Peilin Zhao, Wenbing Huang, Yu Rong, and Junzhou Huang. 2020. Rumor detection on social media with bi-directional graph convolutional networks. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34. 549–556.
[6]
Phillip Bonacich. 2007. Some unique properties of eigenvector centrality. Social Networks 29, 4 (2007), 555–564.
[7]
Ulrik Brandes. 2001. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology 25, 2 (2001), 163–177.
[8]
Anneliese Depoux, Sam Martin, Emilie Karafillakis, Raman Preet, Annelies Wilder-Smith, and Heidi Larson. 2020. The pandemic of social media panic travels faster than the COVID-19 outbreak. Journal of Travel Medicine 27, 3 (2020), taaa031.
[9]
Ravi Kishore Devarapalli and Anupam Biswas. 2021. Locating the rumor source in social networks using timestamps. In 2021 5th International Conference on Computer, Communication and Signal Processing. 280–284.
[10]
Ming Dong, Bolong Zheng, Nguyen Quoc Viet Hung, Han Su, and Guohui Li. 2019. Multiple rumor source detection with graph convolutional networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. 569–578.
[11]
Dorit S Hochba. 1997. Approximation algorithms for NP-hard problems. ACM Sigact News 28, 2 (1997), 40–52.
[12]
Roland Imhoff and Pia Lamberty. 2020. A bioweapon or a hoax¿ The link between distinct conspiracy beliefs about the Coronavirus disease (COVID-19) outbreak and pandemic behavior. Social Psychological and Personality Science 11, 8 (2020), 1110–1118.
[13]
Md Saiful Islam, Tonmoy Sarkar, and Sazzad Hossain Khan. 2020. COVID-19–related infodemic and its impact on public health: A global social media analysis. The American Journal of Tropical Medicine and Hygiene 103, 4 (2020), 1621.
[14]
Feng Ji, Wee Peng Tay, and Lav R Varshney. 2017. An algorithmic framework for estimating rumor sources with different start times. IEEE Transactions on Signal Processing 65, 10 (2017), 2517–2530.
[15]
Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou. 2016. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys & Tutorials 19, 1 (2016), 465–481.
[16]
Christian Kreibich and Jon Crowcroft. 2004. Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer Communication Review 34, 1 (2004), 51–56.
[17]
Jure Leskovec and Daniel Huttenlocher. 2010. Signed networks in social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1361–1370.
[18]
Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. 2010. Predicting positive and negative links in online social networks. In Proceedings of the 19th International Conference on World Wide Web. 641–650.
[19]
Jure Leskovec and Julian J Mcauley. 2012. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems. 539–547.
[20]
Chen Ling, Junji Jiang, Junxiang Wang, and Zhao Liang. 2022. Source localization of graph diffusion via variational atoencoders for graph inverse problems. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1010–1020.
[21]
David E Losada, Fabio Crestani, and Javier Parapar. 2017. eRISK 2017: CLEF lab on early risk prediction on the internet: Experimental foundations. In International Conference of the Cross-Language Evaluation Forum for European Languages. 346–360.
[22]
Wuqiong Luo, Wee Peng Tay, and Mei Leng. 2016. Infection spreading and source identification: A hide and seek game. IEEE Transactions on Signal Processing 64, 16 (2016), 4228–4243.
[23]
Priyanka Meel and Dinesh Kumar Vishwakarma. 2020. Fake news, rumor, information pollution in social media and web: A contemporary survey of state-of-the-arts, challenges and opportunities. Expert Systems with Applications 153 (2020), 112986.
[24]
Fuzhong Nian, Chasheng Hu, Shuanglong Yao, Longjing Wang, and Xingyuan Wang. 2018. An immunization based on node activity. Chaos, Solitons & Fractals 107 (2018), 228–233.
[25]
Robert Paluch, Łukasz Gajewski, Krzysztof Suchecki, and Bolesław Szymański. 2021. Enhancing maximum likelihood estimation of infection source localization. In Simplicity of Complexity in Economic and Social Systems. 21–41.
[26]
Robert Paluch, Łukasz G Gajewski, Janusz A Hołyst, and Boleslaw K Szymanski. 2020. Optimizing sensors placement in complex networks for localization of hidden signal source: A review. Future Generation Computer Systems 112 (2020), 1070–1092.
[27]
Robert Paluch, Xiaoyan Lu, Krzysztof Suchecki, Bolesław K Szymański, and Janusz A Hołyst. 2018. Fast and accurate detection of spread source in large complex networks. Scientific Reports 8, 1 (2018), 1–10.
[28]
Pedro C Pinto, Patrick Thiran, and Martin Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical Review Letters 109, 6 (2012), 068702.
[29]
Benedek Rozemberczki, Carl Allen, and Rik Sarkar. 2021. Multi-scale attributed node embedding. Journal of Complex Networks 9, 2 (2021), 1–22.
[30]
Marina Sokolova, Nathalie Japkowicz, and Stan Szpakowicz. 2006. Beyond accuracy, F-score and ROC: A family of discriminant measures for performance evaluation. In Australasian Joint Conference on Artificial Intelligence. 1015–1021.
[31]
Brunella Spinelli, L Elisa Celis, and Patrick Thiran. 2017. A general framework for sensor placement in source localization. IEEE Transactions on Network Science and Engineering 6, 2 (2017), 86–102.
[32]
Wenchang Tang, Feng Ji, and Wee Peng Tay. 2018. Estimating infection sources in networks using partial timestamps. IEEE Transactions on Information Forensics and Security 13, 12 (2018), 3035–3049.
[33]
Hongjue Wang and Kaijia Sun. 2020. Locating source of heterogeneous propagation model by universal algorithm. Europhysics Letters 131, 4 (2020), 48001.
[34]
Hongjue Wang, Fangfeng Zhang, and Kaijia Sun. 2021. An algorithm for locating propagation source in complex networks. Physics Letters A 393 (2021), 127184.
[35]
Xingyuan Wang and Tianfang Zhao. 2017. Model for multi-messages spreading over complex networks considering the relationship between messages. Communications in Nonlinear Science and Numerical Simulation 48 (2017), 63–69.
[36]
Zhen Wang, Dongpeng Hou, Chao Gao, Jiajin Huang, and Qi Xuan. 2022. A rapid source localization method in the early stage of large-scale network propagation. In Proceedings of the ACM Web Conference 2022. 1372–1380.
[37]
Zhixiao Wang, Chengcheng Sun, Xiaobin Rui, S Yu Philip, and Lichao Sun. 2021. Localization of multiple diffusion sources based on overlapping community detection. Knowledge-Based Systems 226 (2021), 106613.
[38]
Zheng Wang, Chaokun Wang, Jisheng Pei, and Xiaojun Ye. 2017. Multiple source detection without knowing the underlying propagation model. In Proceedings of the AAAI Conference on Artificial Intelligence. 217–223.
[39]
Richard Williams. 2009. Using heterogeneous choice models to compare logit and probit coefficients across groups. Sociological Methods & Research 37, 4 (2009), 531–559.
[40]
Fan Yang, Shuhong Yang, Yong Peng, Yabing Yao, Zhiwen Wang, Houjun Li, Jingxian Liu, Ruisheng Zhang, and Chungui Li. 2020. Locating the propagation source in complex networks with a direction-induced search based Gaussian estimator. Knowledge-Based Systems 195 (2020), 105674.
[41]
Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network communities based on ground-truth. Knowledge and Information Systems 42, 1 (2015), 181–213.
[42]
Kai Zhu, Zhen Chen, and Lei Ying. 2017. Catch’em all: Locating multiple diffusion sources in networks with partial observations. In Proceedings of the AAAI Conference on Artificial Intelligence. 1676–1682.

Cited By

View all
  • (2025)Source identification on financial networks with label propagationPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2024.130328(130328)Online publication date: Jan-2025
  • (2024)Joint source localization in different platforms via implicit propagation characteristics of similar topicsProceedings of the Thirty-Third International Joint Conference on Artificial Intelligence10.24963/ijcai.2024/268(2424-2432)Online publication date: 3-Aug-2024
  • (2024)Propagation Structure-Aware Graph Transformer for Robust and Interpretable Fake News DetectionProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3672024(4652-4663)Online publication date: 25-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '23: Proceedings of the ACM Web Conference 2023
April 2023
4293 pages
ISBN:9781450394161
DOI:10.1145/3543507
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 April 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. network propagation
  2. social network dynamics
  3. source localization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

WWW '23
Sponsor:
WWW '23: The ACM Web Conference 2023
April 30 - May 4, 2023
TX, Austin, USA

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)133
  • Downloads (Last 6 weeks)6
Reflects downloads up to 30 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Source identification on financial networks with label propagationPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2024.130328(130328)Online publication date: Jan-2025
  • (2024)Joint source localization in different platforms via implicit propagation characteristics of similar topicsProceedings of the Thirty-Third International Joint Conference on Artificial Intelligence10.24963/ijcai.2024/268(2424-2432)Online publication date: 3-Aug-2024
  • (2024)Propagation Structure-Aware Graph Transformer for Robust and Interpretable Fake News DetectionProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3672024(4652-4663)Online publication date: 25-Aug-2024
  • (2024)Source Localization for Cross Network Information DiffusionProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671624(5419-5429)Online publication date: 25-Aug-2024
  • (2024)New Localization Frameworks: User-centric Approaches to Source Localization in Real-world Propagation ScenariosProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679796(839-848)Online publication date: 21-Oct-2024
  • (2024)Path-Wise Continuous-Time Transmission with Applications in Source Identification from Partial ObservationsInternational Journal of Modern Physics C10.1142/S0129183124502097Online publication date: 26-Jul-2024
  • (2024)Random Full-Order-Coverage Based Rapid Source Localization With Limited Observations for Large-Scale NetworksIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.340639411:5(4213-4226)Online publication date: Sep-2024
  • (2024)Network Shortest Path Interdiction Problem Based on Generalized Set CoverageIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.334145211:2(2191-2203)Online publication date: Mar-2024
  • (2024)Multi-Feature Rumor Suppression Mechanism Based on Community Division in Social NetworksIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.333664911:2(2047-2061)Online publication date: Mar-2024
  • (2024)DISLPSI: A framework for source localization in signed social networks with structural balancePhysics Letters A10.1016/j.physleta.2024.129772(129772)Online publication date: Aug-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media