2016
DOI: 10.1145/2964791.2901471
|View full text |Cite
|
Sign up to set email alerts
|

Rumor Source Obfuscation on Irregular Trees

Abstract: Anonymous messaging applications have recently gained popularity as a means for sharing opinions without fear of judgment or repercussion. Messages in these applications propagate anonymously (without authorship metadata) over a network that is typically defined by social connections or physical proximity. However, recent advances in rumor source detection show that the source of such an anonymous message can be inferred by statistical inference attacks. Adaptive diffusion was recently proposed as a solution t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…The motivation for studying randomly growing networks is twofold: on the one hand, in numerous applications networks grow over time and one wants to infer information about the entities of the network in general, and about the source of the network in particular. Examples include rumor spreading in social networks (see for example [33,34,35,60]), finding the source of a computer virus in a telecommunication network (see for example [59]) and the evolution of biological networks [54], to name a few. On the other hand, the rigorous study of randomly growing networks has also its own mathematical interest.…”
Section: Related Workmentioning
confidence: 99%
“…The motivation for studying randomly growing networks is twofold: on the one hand, in numerous applications networks grow over time and one wants to infer information about the entities of the network in general, and about the source of the network in particular. Examples include rumor spreading in social networks (see for example [33,34,35,60]), finding the source of a computer virus in a telecommunication network (see for example [59]) and the evolution of biological networks [54], to name a few. On the other hand, the rigorous study of randomly growing networks has also its own mathematical interest.…”
Section: Related Workmentioning
confidence: 99%
“…This problem is of importance in deciding whether or not a computer network is under attack, for instance, or whether a product gets sold through word-of-mouth or thanks to the advertisement campaign (or both [29]). More specifically, the problem of source detection [32][33][34][35][36] or obfuscation [11][12][13] has been extensively studied. On the other side of the spectrum, both experimental and theoretical work has tackled the problem of modeling [7,17,37], predicting the growth [6,39], and controlling the spread of epidemics [9,10,14,18].…”
Section: :2 Jessica Hoffmann and Constantine Caramanismentioning
confidence: 99%
“…The focus in those works has been to understand the limit of information required in order to detect the epidemic. More generally, inverse problems have also been of interest, especially source detection [27,24,25,28,23] or obfuscation [12,11].…”
Section: Related Work and Backgroundmentioning
confidence: 99%