| Literature DB >> 32288925 |
Chuan Zhou1,2, Wei-Xue Lu3, Jingzun Zhang4, Lei Li5, Yue Hu1,2, Li Guo1,2.
Abstract
Quickly detecting harmful cascades in networks can allow us to analyze the causes and prevent further spreading of destructive influence. Since it is often impossible to observe the state of all nodes in a network, a common method is to detect harmful cascades from sparsely placed sensors. However, the harmful cascades are usually dynamic (e.g., the cascade initiators and diffusion trajectories can change over the time), which can severely destroy the robustness of selected sensors. Meanwhile the large scale of current networks greatly increases the time complexity of sensor selection. Motivated by the observation, in this paper we investigate the scalable sensor selection problem for early detection of dynamic harmful cascades in networks. Specifically, we first put forward a dynamic susceptible-infected model to describe harmful cascades, and formally define a detection time minimization (DTM) problem which focuses on effective sensors placement for early detection of dynamic cascades. We prove that it is #P-hard to calculate the objective function exactly and propose two Monte-Carlo methods to estimate it efficiently. We prove the NP-hardness of DTM problem and design a corresponding greedy algorithm. Based on that, we propose an efficient upper bound based greedy (UBG) algorithm with the theoretical performance guarantee reserved. To further meet different types of large-scale networks, we propose two accelerations of UBG: Quickest-Path-UBG for sparse networks and Local-Reduction-UBG for dense networks to improve the time complexity. The experimental results on synthetic and real-world social networks demonstrate the practicality of our approaches.Entities:
Keywords: Diffusion networks; Early detection; Sensor placement
Year: 2017 PMID: 32288925 PMCID: PMC7102699 DOI: 10.1016/j.jocs.2017.10.014
Source DB: PubMed Journal: J Comput Sci
Major variables in the paper.
| Variables | Descriptions |
|---|---|
| social network | |
| number of nodes in the network | |
| set of infected nodes at step | |
| set of infected nodes before step | |
| number of sensors to be selected | |
| set of parents of node | |
| the detection time as in Eq. | |
| time horizon we consider | |
| the expected value of detection time as in Eq. | |
| ∏ = { | probability distribution about the uncertainty of nodes being the infected source |
| the remaining time for taking actions | |
| probability measure with initial infected node | |
| expectation operator with initial infected node | |
| row vector with probabilities as in Eq. | |
Fig. 1An illustration of the upper bound calculation.
Fig. 2An illustration of graph conversion.
Fig. 3An example to show the calculation results of expected detection times under the one-hop assumption. Here the seed set S = {a, b} is selected as sensor set for monitoring and T is assigned to be larger than 10. The red boldfaced character on the left of each node is the numerical value of calculated by Eq. (29) for each .
Statistics of the four real-world networks.
| Dataset | Digger | Epinions | Small-world | |
|---|---|---|---|---|
| #Node | 8194 | 32,986 | 51,783 | 200,000 |
| #Edge | 56,440 | 763,713 | 476,491 | 3,000,000 |
| Average degree | 6.9 | 23.2 | 9.2 | 15.0 |
| Maximal degree | 850 | 674 | 190 | 29 |
Comparison of two Monte-Carlo methods on estimating D(S).
| Comparison item | Digger | Epinions | Small-world | |
|---|---|---|---|---|
| Propagation simulation | 10.056 | 12.236 | 13.216 | 13.738 |
| Snapshot simulation | 10.053 | 12.240 | 13.212 | 13.737 |
Fig. 4The cumulative time cost in estimating detection time D(S) of ten different sensor sets.
Evaluations of the upper bounds.
| Comparison item | Digger | Epinions | Small-world | |
|---|---|---|---|---|
| Real value | 10.056 | 12.236 | 13.216 | 13.738 |
| Upper Bound (I) | 11.437 | 12.820 | 13.768 | 14.431 |
| Upper Bound (II) | 11.739 | 13.026 | 14.271 | 14.609 |
The number of estimation calls at the first ten iterations.
| Datasets | Algorithms | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Sum(1:10) | Sum(1:50) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Digger | CELF | 14 | 22 | 32 | 55 | 38 | 19 | 38 | 17 | 28 | |||
| UBG | 52 | 23 | 9 | 41 | 38 | 22 | 38 | 82 | 52 | ||||
| Quickest-Path-UBG | 56 | 24 | 21 | 42 | 54 | 32 | 29 | 79 | 56 | ||||
| Local-Reduction-UBG | 49 | 34 | 32 | 59 | 34 | 34 | 39 | 68 | 44 | ||||
| CELF | 323 | 121 | 28 | 18 | 78 | 67 | 38 | 98 | 82 | ||||
| UBG | 31 | 23 | 179 | 112 | 152 | 36 | 251 | 134 | 97 | ||||
| Quickest-Path-UBG | 29 | 28 | 147 | 149 | 141 | 31 | 302 | 135 | 102 | ||||
| Local-Reduction-UBG | 43 | 30 | 134 | 183 | 147 | 45 | 312 | 138 | 138 | ||||
| Epinions | CELF | 216 | 371 | 102 | 98 | 46 | 29 | 15 | 12 | 115 | |||
| UBG | 193 | 87 | 227 | 169 | 161 | 82 | 134 | 120 | 136 | ||||
| Quickest-Path-UBG | 203 | 91 | 201 | 159 | 174 | 83 | 142 | 118 | 159 | ||||
| Local-Reduction-UBG | 213 | 109 | 235 | 178 | 182 | 92 | 156 | 135 | 182 | ||||
| Small-world | CELF | 1092 | 346 | 167 | 389 | 254 | 138 | 76 | 275 | 146 | |||
| UBG | 723 | 452 | 431 | 217 | 319 | 231 | 373 | 78 | 267 | ||||
| Quickest-Path-UBG | 872 | 421 | 543 | 231 | 341 | 245 | 401 | 102 | 231 | ||||
| Local-Reduction-UBG | 687 | 328 | 341 | 238 | 347 | 277 | 353 | 87 | 356 | ||||
Fig. 5Detection time w.r.t. the number of sensors k on the four data sets.
Fig. 6The selection time of the algorithms.
Fig. 7Selection time of different greedy algorithms network infection probability with seed size k = 50.
| 1: | initialize |
| 2: | |
| 3: | select |
| 4: | |
| 5: | |
| 6: | output |
| 01: | Input: the infection probability matrix |
| 02: | Output: the sensor set |
| 03: | initial |
| | |
| 04: | |
| 05: | set |
| 06: | |
| 07: | { |
| 08: |
|
| 09: |
|
| 10: |
|
| 11: |
|
| 12: |
|
| 13: |
|
| 14: |
|
| 15: | break |
| 16: |
|
| 17: | |
| 18: | output |
| 01 - 02, 04 - 08, 10 - 18: the same with that of Algorithm 2 |
| 03: initial |
| and |
| 09: |
| 01 – 08, 10 – 12, 14 – 18: the same with that of Algorithm 2 |
| 09: |
| 13: This row is removed. |