2011
DOI: 10.1109/tit.2011.2158885
|View full text |Cite
|
Sign up to set email alerts
|

Rumors in a Network: Who's the Culprit?

Abstract: We provide a systematic study of the problem of finding the source of a rumor in a network. We model rumor spreading in a network with a variant of the popular SIR model and then construct an estimator for the rumor source. This estimator is based upon a novel topological quantity which we term rumor centrality. We establish that this is an ML estimator for a class of graphs. We find the following surprising threshold phenomenon: on trees which grow faster than a line, the estimator always has non-trivial dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

6
635
1
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 584 publications
(653 citation statements)
references
References 26 publications
6
635
1
1
Order By: Relevance
“…Kempe et al applied theoretical analysis on the seeds selection problem [9] based on two simple adoption models: Linear Threshold Model and Independent Cascade Model. Recently, Zaman et al developed a method to trace rumors back in the topological spreading path to identify sources in a social network [10], and suggest that methods can be used to locate influencers in a network. Some scholars express their doubts and concerns for the influencer-driven viral marketing approach, suggesting that "everyone is an influencer" [11], and companies "should not rely on it" [12].…”
Section: Related Workmentioning
confidence: 99%
“…Kempe et al applied theoretical analysis on the seeds selection problem [9] based on two simple adoption models: Linear Threshold Model and Independent Cascade Model. Recently, Zaman et al developed a method to trace rumors back in the topological spreading path to identify sources in a social network [10], and suggest that methods can be used to locate influencers in a network. Some scholars express their doubts and concerns for the influencer-driven viral marketing approach, suggesting that "everyone is an influencer" [11], and companies "should not rely on it" [12].…”
Section: Related Workmentioning
confidence: 99%
“…However, this is only feasible for small networks. Message-passing algorithms can approximate the marginals efficiently [12,[14][15][16], however these algorithms are model specific: for every M , one must invent new approximations, heuristic assumptions and analytic calculations.In contrast, the second class of methods works independent of the forward model [14,[17][18][19]. These presuppose that s should be approximately equidistant to all other nodes in C, and therefore, nodes with high "centrality" values should have a higher likelihood of being s. This assumption breaks down if the spread reaches "boundaries", or if the spread self-interacts (i.e.…”
mentioning
confidence: 99%
“…While the generation of morphological stencils requires knowing the dynamic law as well as the states of all nodes at some final time, our approach works for all models. In contrast, other inversion schemes are model-specific [12,16,19,20]. Even though our inversion scheme works for any model, it is not model invariant like the centrality based methods which uses only topological properties in the graph.…”
mentioning
confidence: 99%
See 2 more Smart Citations