Inferring Full Diffusion History from Partial Timestamps

被引:2
|
作者
Chen, Zhen [1 ]
Tong, Hanghang [2 ]
Ying, Lei [1 ]
机构
[1] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85201 USA
[2] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85201 USA
关键词
History; Diffusion processes; Monitoring; Heuristic algorithms; Computational modeling; Privacy; Reconstruction algorithms; Graph mining; diffusion; NETWORK;
D O I
10.1109/TKDE.2019.2905210
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Understanding diffusion processes in networks has emerged as an important research topic because of its wide range of applications. Analysis of diffusion traces can help us answer important questions such as the source(s) of diffusion and the role of each node during the diffusion process. However, in large-scale networks, due to the cost and privacy concerns, it is almost impossible to monitor the entire network and collect the complete diffusion trace. In this paper, we tackle the problem of reconstructing the diffusion history from a partial observation. We formulate the diffusion history reconstruction problem as a maximum a posteriori (MAP) problem and prove the problem is NP-hard. Then, we propose a step-by-step reconstruction algorithm, which can always produce a diffusion history that is consistent with the partial observation. Our experimental results based on synthetic and real networks show that the algorithm significantly outperforms some existing methods.
引用
收藏
页码:1378 / 1392
页数:15
相关论文
共 50 条
  • [1] Estimating Infection Sources in Networks Using Partial Timestamps
    Tang, Wenchang
    Ji, Feng
    Tay, Wee Peng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 3035 - 3049
  • [2] Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
    Noorafiza, M.
    Maeda, H.
    Uda, R.
    Kinoshita, T.
    Shiratori, M.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 83 - 89
  • [3] Insights from a general, full-likelihood Bayesian approach to inferring shared evolutionary events from genomic data: Inferring shared demographic events is challenging
    Oaks, Jamie R.
    L'Bahy, Nadia
    Cobb, Kerry A.
    EVOLUTION, 2020, 74 (10) : 2184 - 2206
  • [4] Partial and Full Detection of Source Terms
    Zhang, Liang
    Wang, Qing-Guo
    Yang, Shuang-Hua
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (02) : 977 - 981
  • [5] Inferring diffusion in single live cells at the single-molecule level
    Robson, Alex
    Burrage, Kevin
    Leake, Mark C.
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2013, 368 (1611)
  • [6] Diffusion archeology for diffusion progression history reconstruction
    Emre Sefer
    Carl Kingsford
    Knowledge and Information Systems, 2016, 49 : 403 - 427
  • [7] Diffusion archeology for diffusion progression history reconstruction
    Sefer, Emre
    Kingsford, Carl
    KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 49 (02) : 403 - 427
  • [8] Inferring Accountability from Trust Perceptions
    Decroix, Koen
    Butin, Denis
    Jansen, Joachim
    Naessens, Vincent
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 69 - 88
  • [9] Inferring network structure from cascades
    Ghonge, Sushrut
    Vural, Dervis Can
    PHYSICAL REVIEW E, 2017, 96 (01)
  • [10] Exploring Collaborative Diffusion Model Inferring for AIGC-Enabled Edge Services
    Feng, Weijia
    Zhang, Ruojia
    Zhu, Yichen
    Wang, Chenyang
    Sun, Chuan
    Zhu, Xiaoqiang
    Li, Xiang
    Taleb, Tarik
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 11 (02) : 946 - 960