Early identification of diffusion source in complex networks with evidence

被引:17
作者
Zhao, Jie [1 ]
Cheong, Kang Hao [1 ]
机构
[1] Singapore Univ Technol & Design, Sci Math & Technol Cluster, Singapore 487372, Singapore
关键词
Dempster-Shafer theory; Information fusion; Complex network; Source localization; BELIEF FUNCTIONS; MODEL;
D O I
10.1016/j.ins.2023.119061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inferring of source in the aftermath of a pandemic outbreak has received immense attention due to its substantial practical potential. In light of the inaccessibility to the status of every individual in the network, observer-based approaches have become an essential research direction for solving this problem. However, the way that utilizes the combined observers to infer the source node, as most existing methods follow, may compromise the algorithm's flexibility and generalizability. To address this issue, we ask the question: can observational information be viewed as pairs of expert-driven information so that it allows us to frame the source localization as an information-fusion problem? To this end, we propose an evidential source localization (ESL) model that utilizes evidence theory to represent the uncertainty caused by limited information and to determine the source node by the information-fusion technique. Moreover, ESL is characterized by its ability to detect sources of disease at an early stage of the pandemic. Rather than focusing on a specific structure, we consider an arbitrary graph as our subject, rendering our method general enough for more applications. Experimental results on real-world networks demonstrate the superiority of ESL in efficiency and effectiveness with the comparison to other state-of-the-art methods.
引用
收藏
页数:16
相关论文
共 49 条
  • [1] EPA: Exoneration and Prominence based Age for Infection Source Identification
    Ali, Syed Shafat
    Anwar, Tarique
    Rastogi, Ajay
    Rizvi, Syed Afzal Murtaza
    [J]. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 891 - 900
  • [2] The Hidden Geometry of Complex, Network-Driven Contagion Phenomena
    Brockmann, Dirk
    Helbing, Dirk
    [J]. SCIENCE, 2013, 342 (6164) : 1337 - 1342
  • [3] Information Sources Estimation in Time-Varying Networks
    Chai, Yun
    Wang, Youguo
    Zhu, Liang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2621 - 2636
  • [4] Determine the number of unknown targets in the open world from the perspective of bidirectional analysis using Gap statistic and Isolation forest
    Cui, Huizi
    Chang, Yuhang
    Zhang, Huaqing
    Mi, Xiangjun
    Kang, Bingyi
    [J]. INFORMATION SCIENCES, 2023, 623 : 832 - 856
  • [5] Dempster AP, 2008, STUD FUZZ SOFT COMP, V219, P57
  • [6] An Unsupervised Fuzzy Clustering Approach for Early Screening of COVID-19 From Radiological Images
    Ding, Weiping
    Chakraborty, Shouvik
    Mali, Kalyani
    Chatterjee, Sankhadeep
    Nayak, Janmenjoy
    Das, Asit Kumar
    Banerjee, Soumen
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (08) : 2902 - 2914
  • [7] Multimodal Infant Brain Segmentation by Fuzzy-Informed Deep Learning
    Ding, Weiping
    Abdel-Basset, Mohamed
    Hawash, Hossam
    Pedrycz, Witold
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (04) : 1088 - 1101
  • [8] Dong W, 2013, IEEE INT SYMP INFO, P2671, DOI 10.1109/ISIT.2013.6620711
  • [9] Fioriti Vincenzo, 2014, Applied Mathematical Sciences, V8, P01, DOI [DOI 10.12988/AMS.2014.49693, 10.12988/ams.2014.49693]
  • [10] Efficient, Private and Robust Federated Learning
    Hao, Meng
    Li, Hongwei
    Xu, Guowen
    Chen, Hanxiao
    Zhang, Tianwei
    [J]. 37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 45 - 60