2015
DOI: 10.1214/ecp.v20-3743
|View full text |Cite
|
Sign up to set email alerts
|

Rumor source detection for rumor spreading on random increasing trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…They consequently defined a notion of rumor centrality, which was shown to be equivalent to maximum likelihood estimation in the case of regular trees. Follow-up papers [9,11,22] include generalizations to recursive trees and scenarios where only incomplete information is provided about the subgraph of infected nodes.…”
Section: Introductionmentioning
confidence: 99%
“…They consequently defined a notion of rumor centrality, which was shown to be equivalent to maximum likelihood estimation in the case of regular trees. Follow-up papers [9,11,22] include generalizations to recursive trees and scenarios where only incomplete information is provided about the subgraph of infected nodes.…”
Section: Introductionmentioning
confidence: 99%
“…These types of dynamics on networks are popular models e.g. for the spread of biological epidemics in structured populations (Moore and Newman, 2000;Pastor-Satorras and Vespignani, 2001;Ganesh et al, 2015), malware in computer networks (Shah and Zaman, 2010), and rumours in social networks (Fuchs and Yu, 2015;Shah and Zaman, 2016), and are also sometimes referred to as contact processes. In addition, we impose a rate γ > 0 at which a new infection enters the network, infecting one uniformly sampled node.…”
Section: The Susceptible-infected-susceptible Networkmentioning
confidence: 99%
“…We are interested in inferring the initial location of the observed large infection, which may no longer be infected itself. Point estimators for similar inference problems have been studied in (Shah and Zaman, 2010;Fuchs and Yu, 2015;Shah and Zaman, 2016).…”
Section: The Susceptible-infected-susceptible Networkmentioning
confidence: 99%
“…A network centrality called the rumor centrality was introduced in [7] to solve optimally special instances of the problem when the graph topology of the online social networks is assumed to be degree-regular tree with countably infinite number of vertices and assuming a SI (susceptible-infectious) spreading model. This problem was subsequently extended to various problem settings, e.g., extension in [8] to random increasing trees, extension in [9] to probabilistic sampling of the rumor graph, extension in [10] to star graph, extension in [11], [12] to the scenario of multiple sources, extension in [13] to multiple observations. The authors in [14] proposed a Markov chain Monte Carlo based algorithms, and the authors in [15] proposed message-passing algorithms based on probabilistic analysis of graph boundaries.…”
Section: Introductionmentioning
confidence: 99%