2015
DOI: 10.1145/2825236.2825262
|View full text |Cite
|
Sign up to set email alerts
|

On the Impossibility of Localizing Multiple Rumor Sources in a Line Graph

Abstract: Here we examine the problem of rumor source identification in line graphs. We assume the SI model for rumor propagation with exponential waiting times. We consider the case where a rumor originates from two sources simultaneously, and evaluate the likelihood function for the given observations given those sources. As the size of the infected region grows arbitrarily large, we show that unlike the single source case, where the likelihood function concentrates near the midpoint of the infected region, the suppor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…The study of epidemics on graphs is an active field of research. An important body of work assumes the underlying graph is known, and focuses on modeling epidemics [19,75,32,16,78,47], detecting whether there is an epidemic [8,9,54,53,51,44,40], finding communities [60,76], localizing the source of the spread [65,66,64,69,72,70,20] or instead obfuscating it [26,28,27], or controlling their spread [43,21,22,34,29,71,77,58]. The inverse problem, recovering the network from epidemic data, has also been extensively studied [56,1,18,59,41,35,33].…”
Section: Relevant Workmentioning
confidence: 99%
“…The study of epidemics on graphs is an active field of research. An important body of work assumes the underlying graph is known, and focuses on modeling epidemics [19,75,32,16,78,47], detecting whether there is an epidemic [8,9,54,53,51,44,40], finding communities [60,76], localizing the source of the spread [65,66,64,69,72,70,20] or instead obfuscating it [26,28,27], or controlling their spread [43,21,22,34,29,71,77,58]. The inverse problem, recovering the network from epidemic data, has also been extensively studied [56,1,18,59,41,35,33].…”
Section: Relevant Workmentioning
confidence: 99%
“…Further avenues to explore related to our work include game-theoretic formulations [9], optimal sensor/spy placement [15], confidence sets for the source [7], and multiple rumor sources [14].…”
Section: Discussionmentioning
confidence: 99%
“…It has been recently shown that it is difficult to locate multiple sources [35]. It might be possible to spread the messages faster than adaptive diffusion and still achieve perfect obfuscation by creating multiple pseudo-sources.…”
Section: Discussionmentioning
confidence: 99%