Next Article in Journal
A Graph Representation Learning Algorithm for Low-Order Proximity Feature Extraction to Enhance Unsupervised IDS Preprocessing
Next Article in Special Issue
Cross-Layer and SDN Based Routing Scheme for P2P Communication in Vehicular Ad-Hoc Networks
Previous Article in Journal
Comparisons of Scotopic/Photopic Ratios Using 2- and 10-Degree Spectral Sensitivity Curves
Previous Article in Special Issue
On the Determination of Meshed Distribution Networks Operational Points after Reinforcement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Locating Multiple Sources of Contagion in Complex Networks under the SIR Model

1
College of Liberal Arts and Sciences, National University of Defense Technology, Changsha 410073, China
2
State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Submission received: 5 September 2019 / Revised: 8 October 2019 / Accepted: 18 October 2019 / Published: 22 October 2019
(This article belongs to the Special Issue Implementation of Vehicular Cloud Networks Using Wireless Sensor)

Abstract

:
Simultaneous outbreaks of contagion are a great threat against human life, resulting in great panic in society. It is urgent for us to find an efficient multiple sources localization method with the aim of studying its pathogenic mechanism and minimizing its harm. However, our ability to locate multiple sources is strictly limited by incomplete information about nodes and the inescapable randomness of the propagation process. In this paper, we present a valid approach, namely the Potential Concentration Label method, which helps locate multiple sources of contagion faster and more accurately in complex networks under the SIR(Susceptible-Infected-Recovered) model. Through label assignment in each node, our aim is to find the nodes with maximal value after several iterations. The experiments demonstrate that the accuracy of our multiple sources localization method is high enough. With the number of sources increasing, the accuracy of our method declines gradually. However, the accuracy remains at a slight fluctuation when average degree and network scale make a change. Moreover, our method still keeps a high multiple sources localization accuracy with noise of various intensities, which shows its strong anti-noise ability. I believe that our method provides a new perspective for accurate and fast multi-sources localization in complex networks.

1. Introduction

Contagion propagation [1,2,3] is an important topic in social network research [4], which brings huge damage to society [5,6,7], drawing much attention from researchers. When severe contagion outbreaks occur in important places simultaneously, decision-makers including government leaders almost have no ability to deal with the disaster very well. Here is a real case. In 2009, the H1N1 pandemic spread almost simultaneously in Beijing, Shanghai, Fujian and Guangdong provinces, which were the sources propagating the virus in China, and then across the country. After the application of medical treatment over several months, the number of infected people declined gradually and disappeared. If we acquired the infection state of the whole country at an early stage, we could know the cities which spread the virus initially and then take practical actions to prevent it from spreading further. Furthermore, for each originally infected city, we are able to adopt appropriate measures to eliminate it after the disease spread for a short while. Therefore, it makes sense for us to design a pre-warning system, whose core content means a fast and accurate multiple sources of contagion localization method in complex networks under the SIR [8,9] model.
Despite many studies having been done in this field, the problem of multiple sources localization is still a challenging work. On the one hand, the exact number of sources and initial time of sources remain unknown to us; on the other hand, it is inevitable that the randomness of the propagation process will decrease the accuracy of multiple sources localization methods. In the past ten years, the multiple sources localization problem has attracted many researchers’ attention. Shah et al. [10] first proposed a rumor centrality, as a maximum likelihood estimation of single source, in a tree network under the SI model. Then Lou et al. [2] popularized it to a multiple sources localization method. They proposed a Multiple Sources Estimation and Partitioning algorithm, the key to which lies in dividing the network to several disjoint infection regions by infection partitioning, where one region corresponds to one source. Zhu et al. [11] defined Jordan centrality, the farthest distance a node to all the infected nodes and the sources are the nodes with the smallest Jordan centrality. In addition, there is a similar concept, namely distance centrality, the sum distance of the node to the whole infected nodes and the sources have the smallest distance centrality analogously. Fioriti et al. [12] presented to calculate the dynamical age of each node based on the importance of node dynamical. They considered the eigenvalue drop rate of the adjacency matrix as the dynamical age when a node was eliminated from this network and the sources are the nodes with the highest dynamical age. Based on the SIR model and incomplete node information, Zang et al. [13] proposed an advanced unbiased betweenness algorithm. They used a reverse propagation algorithm to build an extended infection graph and marked off several infection subgraphs where we can identify the source with the highest unbiased betweenness. Moreover, based on source identification algorithm, Wang et al. [14] presented label propagation, where they set up an initial label, propagated label and chose the nodes with the tallest label as the sources. Hu et al. [15] combined a backward diffusion-based method with IP to locate both sources and the initial diffusion time with a limited number of observers.
In addition, some scholars study the source localization problems from different angles [16,17,18,19,20]. Nino Antulov-Fantulin et al. [21] proposed a new source localization method based Monte-Carlo simulation under the SIR model. Fu et al. [22] studied a backward diffusion-based source localization method. Based on the times at which the diffusion reached partial observers, the maximum time when the diffusion goes reversely from partial observers to each node is calculated. Then the node with the minimum value is picked up and recognized as the source. Huang et al. [23] used observers to diffuse reversely and found the node as the source with minimum variance yields, resolving the single source localization problem in the temporal network.
In this paper, we propose the Potential Concentration Label method ( PCL ) to locate multiple sources of contagion in complex networks under the SIR model. The main idea in this paper reflects that the sources prefer to exist in the infection region with more infected neighbor nodes where the nodes have the maximal value of potential concentration label just right. In the following sections, we first define the Potential Concentration Label and propose the PCL method. After that, we test the performance network parameters on sources localization accuracy in synthetic networks and real networks, compared to the other four benchmark methods. Finally, some experiments are carried out to measure the anti-noise ability of our method.

2. Model and Method

2.1. SIR Model for Contagion Propagation

In this work, we focus on an undirected graph G = { V , E } , where V is the set of nodes and E is the set of edges. Each node v V has its possible state—Susceptible (S), Infected (I), Recovered (R). The susceptible nodes represent the people who are infected easily but have not been infected yet, meanwhile the infected nodes denote the citizens who have already been infected and are capable of infecting other nodes. The recovered nodes are the individuals who remain immune or die. Suppose that there is a time-slotted system. At first, only several nodes are infected, which are the contagion sources in the network. Meanwhile, the other nodes are susceptible. At each time step, each infected node infects its susceptible neighbors with probability p independently, that is, a susceptible node is infected with probability 1 ( 1 p ) n when it has n infected neighbors. Meanwhile, the infected nodes turn to be recovered with probability q. Additionally, the recovered nodes will not be infected, which may die or be removed.

2.2. Problem Formulation

As a contagion propagates through a complex network under the SIR model, all the nodes will change infection state as time goes by. The susceptible nodes may be infected by infected neighbour nodes and the infected nodes recover to a recovered node with a certain probability. Due to the emergency response to contagion, we mainly consider an initial infection situation of the whole network and only collect two states, infected and uninfected (susceptible, recovered), of all nodes. Accordingly, the problem of the multiple sources localization problem can be described as—given the simple snapshot of the network at an early certain moment, how can we accurately locate multiple sources?
It is common that we know the state of almost all nodes, but we have no ability to distinguish the susceptible nodes from the recovered nodes. Therefore, all nodes can be divided into two states—infected and uninfected, which decreases the accuracy of multiple sources localization certainty.

2.3. Potential Concentration Label Definition

In the early period of severe contagion propagation, disease outbreaks through a crowd quickly. It comes to the situation that the nodes around sources are more likely to be the infected nodes, that is, the sources are surrounded by many infected nodes. Only by depending on the infection states can we locate the sources in a complex network accurately.
Inspired by Figure 1a, which shows the concentration of a pollutant, it is clear that the sources are more likely to be the node set { d , k } , whose concentration is the highest (10). In fact, to get the state of each node is not easy, for example, some sensors do not have the capacity to measure concentrations, and can only judge whether the concentration surpasses a threshold value or not, and even then we may lose the concentration information. Therefore, the information we can obtain is incomplete, just like in Figure 1b. We can see two concentration states easily, 0 or 1 (1 denotes concentration over 8, 0 denotes concentration under 8) in a network, where an error occurred with node c. It seems we have no ability to identify the sources according to these concentrations, which is similar to the infection situation of contagion.
Therefore, a new index needs to be proposed so as to distinguish between the sources and other nodes for incomplete pollutant diffusion and contagion propagation. We think the node with more infected neighbors, including the first order neighbor, the second order neighbor and so forth, is closer to the sources. Based on the above analysis, we propose a new concept, namely a potential concentration label, denoted by L . The potential concentration label is determined by its initial label and the labels of neighbor nodes. The experiments demonstrate that it is a good index for locating multiple sources of contagion in complex networks under the SIR model.

2.4. The PCL Method

In this section, we present the PCL method at length in this section. The purpose of PCL is to locate multiple contagion sources, which is realized by following four steps in Algorithm 1.

2.4.1. Step 1: Label Assignment in the Snapshot of Network

Due to the incomplete information, only two states can be seen in the network—infected and uninfected (susceptible and recovered). The infection state of nodes X is shown as follows—infected nodes carry the virus, denoted by 1; uninfected nodes carry no virus, denoted by 0. That is, if node i is infected, then L i 0 = 1 ; if node i is uninfected, then L i 0 = 0 , where L i 0 is the initial potential concentration label of node i.

2.4.2. Step 2: Adding One Hub Node to the Network

In real networks, it comes up all the time that the network we acquire is disconnected, but connected actually. To avoid this situation, we can add a hub node in the network, which has a link with every node, to make it connect for certain and to increase its connectivity. Besides, the possibility of this node being infected is high enough that we assign label 1 to it directly.

2.4.3. Step 3: Potential Concentration Label Calculation by Iteration

The potential concentration label of a node is connected with the potential concentration label of neighbor nodes and its initial potential concentration label, so the potential concentration label of node i at t iterations becomes:
L i t = α j Γ i T i , j L j t 1 + β L i 0
where α , β is the proportionality coefficient, Γ i represents the first order neighbors of node i.
Before starting iteration, we should build an adjacency matrix A and a degree matrix D. Matrix A is decided by edge E, where A i j = 1 represents node i and node j have an edge. Matrix D is a diagonal matrix, where the i-th element is the sum of i-th row of matrix A. The transmission probability matrix T from neighbors is decided by adjacency matrix A and degree matrix D, such that T = D 1 2 A D 1 2 .
The state of a node at moment t is mainly dependent on the states of its neighbor nodes at moment t 1 . Apparently, the potential concentration label of each node at moment t is proportional to the initial potential concentration label. Therefore, we choose α > 0 , β > 0 .
Thanks to the hub node, the diameter of the network decreases to two. That is to say, every node only has the first order neighbor and the second order neighbor. Therefore, a node acquires the label information from other nodes in the network, only requiring two iterations. It spends little time in getting the potential concentration label.
Algorithm 1 Potential Concentration Label
Input: The network topology G and infection state X .
Output: The multiple sources S .
1:
Set up the initial label L i 0 , i V ;
2:
Add a hub node to the network and L N + 1 0 = 1 ;
3:
Construct the transmission matrix T = D 1 2 A D 1 2
4:
for t=1: t 1 do
5:
     L i t = α j Γ i T i , j L j t 1 + β L i 0
6:
end for
7:
α > 0 , β > 0 , Γ i represents the first order neighbors of node i.
8:
We choose the nodes with maximal value as the sources S ;
9:
return S .

2.4.4. Step 4: The Multiple Sources Localization

The central idea of this paper is that the sources prefer to exist in an infection region with more infected nodes, meanwhile the potential concentration label of sources is superior to that of neighbor nodes. After several iterations, there are several maximal values of potential concentration labels existing in the network. Finally, we choose the nodes with the maximal value as multiple sources.

2.5. A Simple Example of Multiple Sources Localization

To better describe the PCL method, we just introduce a simple example of multiple sources localization. Given a snapshot of the network at some point, we can know the infection state of all the nodes. In addition, the sources are { f , h } . From Figure 2, it is easy to find that the node f and h always have the maximal value. According to PCL, we see nodes { f , h } as the estimated sources, which also are the true sources.

3. Simulation and Analysis

3.1. Data Descriptions and Measurements

To evaluate the performance of PCL method, we firstly introduce several synthetic networks, that is, ER, WS and BA, and real networks, that is, Karate , Lesmis , Adjnoun , Football , Jazz and USAir , as the experimental data. Synthetic networks are controllable, where network parameters can be adjusted, so that many tests can be done to verify the efficiency of the method. What is more, the data of Karate , Lesmis , Adjnoun and Football networks can be downloaded via the network data of Newman [24]. The other data sets come from the corresponding references. Basic characteristics are shown in Table 1.
As we know, F-measure is usually used to check the accuracy of estimated or identified sources in a complex network [25]. It can be defined as follows:
F m e a s u r e = 2 p r e c i s i o n r e c a l l p r e c i s i o n + r e c a l l
where precision is the ratio of the number of correctly identified sources over the number of all retrieved sources which is defined in Equation (3) and recall is the ratio of the number of correctly identified sources over the ground truth source, defined in Equation (4)
p r e c i s i o n = | { r e t r i e v e d s o u r c e s } { t r u e s o u r c e s } | | { r e t r i e v e d s o u r c e s } |
r e c a l l = | { r e t r i e v e d s o u r c e s } { t r u e s o u r c e s } | | { t r u e s o u r c e s } |
In this paper, suppose that we already know the number of sources so that retrieved sources equal true sources, that is, precision equals F-measure.
Therefore, we choose the precision as the evaluation index of sources localization accuracy in this paper. The situation we face is a serious contagion so that we suppose infection probability p = 0.8 , recovery probability q = 0.1 . What is more, the results are obtained by averaging over 100 independent realizations.

3.2. Optimal Iteration Frequency Choice

We choose the nodes with the maximal value of the potential concentration label as the sources and the potential concentration label is related to the number of iterations. Therefore, we next test the performance of our multiple sources localization method under six iteration frequencies in synthetic networks and real networks, which can help us find the appropriate iteration frequency.
Figure 3 shows that the source’s localization accuracy changes sharply when t 1 is different. It is an interesting phenomenon that the accuracy reaches its highest when t 1 = 2 . The hub node plays a decisive role in the change of accuracy. On the first iteration, the hub node is an unnecessary node which brings error to the potential concentration label of each node. However, on the next iterations, the hub node transmits all node labels to each node as a bridge, which increases the accuracy of sources localization. Moreover, there is a turning point when β = 0 . The accuracy is higher for β < 0 than it is for β > 0 . The main reason lies in the incomplete infection information where a recovered node has actually been infecte, especially the sources, but it is considered to be uninfected when calculating. To get a better multiple sources localization performance, we choose t 1 = 2 , β = 1 in the following experiments.

3.3. Comparison Methods

To compare with the performance of PCL , we pick up some sources localization methods as benchmarks.
Distance Centrality ( DC ) [10]—represents the sum of the distances from one node to all the infected nodes. The sources usually have the smallest Distance Centrality.
Jordan Centrality ( JC ) [11]—denotes the maximum of the distances from one node to all the infected nodes. The sources prefer to have the least Jordan Centrality.
Unbiased Betweenness Centrality ( UBC ) [13]—the betweenness of one node eliminates the effect of degree, namely unbiased betweenness. The nodes are the sources, which always have the biggest unbiased betweenness.
Modified Label Propagation based Source Identification ( LPSI ) [14]: This method lets infection status iteratively propagate in the network as labels, and finally uses local peaks of the label propagation result as source nodes.

3.4. Sources Localization in Synthetic Networks

To test the efficiency of the PCL method, we first carry out some experiments in synthetic networks, that is, the Radom ( ER ) network [26], the Watts-Strogtz small world(WS) network [27], and the scale-free (BA) network [28]. The ER network and WS network are homogeneous networks, and the BA network is a heterogeneous network. We focus our attention on the influence the network parameter has on sources localization accuracy. The main parameters are the scale of network N, average degree < k > and the number of sources s.
This paper mainly considers the sources localization problem, there is no denying that the number of sources is the most important network parameter. At first, we examine the effects the number of sources has on the performance of sources localization. Figure 4 shows that when the number of sources increases, the sources localization accuracy has a decrease tendency for all the methods, that is, PCL, LPSI, DC, JC and UBC. When the number of sources becomes large, multiple sources may be too closed to identify them easily. To find the number of sources accurately is the first problem we need to solve urgently. In a short, in the above three synthetic networks, PCL behaves better than the other four methods in sources localization accuracy. With the increasing of the number of sources, the sources localization accuracy of PCL only declines slightly, reflecting its strong robustness.
From Figure 6, we find that the average degree has little influence on the sources localization accuracy with almost all methods. The results of the four methods in the ER network distinguish that PCL > DC > JC > UBC > LPSI; meanwhile those in the WS and BA networks distinguish that PCL > JC > DC > UBC > LPSI. All in all, PCL can always solve the sources localization problems, no matter whether the network is sparse or not. In other words, the accuracy of PCL keeps very robust when the number of edges in the network increases or decreases.
For different scales of networks, Figure 7 indicates that the sources localization accuracy has a mild fluctuation with the increasing of network scale for all the methods except for DC . In the ER network, the DC method can get a higher accuracy when the scale of network increases. Of course, the accuracy of PCL keeps robust when network size changes. Thanks to its result, we can generalize this method to large networks based on the background of big data.

3.5. Sources Localization in Real Networks

In addition to the synthetic network, we test the performance of the above five methods in real networks ( Karate , Lesmis , Adjnoun , Football , Jazz and USAir ). These networks are social networks, where propagation usually occurs.
From Figure 5, we can find that PCL has the highest sources localization accuracy in all real networks. Meanwhile, the sources localization accuracy of PCL keeps robust with a different network structure. Moreover, it confirms that the average degree and the scale of the network have less effect on sources localization accuracy. All in all, PCL behaves best in sources localization accuracy of five different methods, that is, PCL, LPSI, DC, JC and UBC.

4. Anti-Noise

An efficient method needs to keep high accuracy under noise of various intensities. In this section, noise disposal strategies and infection state noise are taken into account so as to test the anti-noise of the sources localization method.
It is very common that the infection information of partial nodes may be lost. Now suppose that there is 20% nodes in a network unknown to us. There are three strategies to deal with it. ( i ) All-inf, a strategy where the nodes without infection information are considered to be infected; ( i i ) None-inf, a strategy where the nodes without infection information are regarded as uninfected; ( i i i ) Rand-inf, a strategy where the nodes without infection information are thought to be infected randomly. Next, we test the performance of sources localization accuracy with five methods in synthetic networks and real networks. The results are shown in Table 2 and Table 3.
Table 2 suggests that the sources localization accuracy of PCL reaches its highest among all the methods with each strategy in each network. The accuracy changes slightly, due to different strategies of dealing with noise, of the whole methods except for PCL . In most cases, when noise exists, PCL method achieves the highest sources localization accuracy, mostly choosing the None-inf strategy to deal with noise.
Except for the different strategies for dealing with unknown infection information, we further study the sources localization performance under noise of three various intensities ( n i ), which denotes the proportion of nodes we are unaware of. The noise intensities are shown such that n i = 0.05 , n i = 0.1 , n i = 0.2 . From Table 3, with increasing noise intensity, the sources localization accuracy of all methods decreases in all networks. Apparently, our method shows a huge advantage in sources localization in all methods. PCL achieves the highest sources localization accuracy not only in an ideal situation (without noise), but also in a real situation(with noise).

5. Conclusions and Discussion

In this paper, we study multiple sources of the contagion localization problem under the SIR model. Given the snapshot of a network, we propose a fast and more accurate multiple sources localization method, namely Potential Concentration Label. What matters in this method is to find the nodes with the maximal value of the potential concentration label as the sources. Firstly, we assign the initial concentration label to each node according to its infection state; next, it begins the label propagation process, where the label of one node is determined by its neighbors’ and its initial own, through two iterations; finally, we choose the nodes with the maximal value of the potential concentration label as the contagion sources. The experiments demonstrate that when the number of sources increases, the sources localization accuracy of our method decreases gradually. However, it keeps very robust as the average degree and network scale make a change. Compared to other benchmark methods, this method has a low time complexity and higher sources localization accuracy in synthetic networks and real networks. What is more, the anti-noise ability of our method is strong enough, which shows its effectiveness.
Although our method provide a new reference for the problem of multiple sources localization in complex networks, much work still needs to be done. The issue of sources localization we proposed is based on an undirected network, while this method may extend to the directed network. Moreover, the network topology we consider in this paper is static and known to us. In fact, the topology in the real world remains dynamic as time goes by. This makes us improve our model so as to solve the sources localization problem in a temporal network [29,30]. In addition, as we know, few theoretical and practical studies have focused attention on multiple sources localization in multi-layer networks [31].

Author Contributions

Conceptualization, D.Y.; methodology, X.L.; software, Y.L.; validation, Y.L.; formal analysis, Y.L.; investigation, X.Z.; resources, X.L.; data curation, X.L.; writing—original draft preparation, X.L.; writing—review and editing, X.Z.; visualization, Y.L.; supervision, X.L.; project administration, C.Z.; funding acquisition, C.Z. This paper was prepared the contributions of all authors. All authors have read and approved the final manuscript.

Funding

This work is supported by the National Key R&D Program of China (Grant No. 2017YCF1200301).

Acknowledgments

We thank Xiaojie Wang, Caixia Yu and Qiangjuan Huang for valuable discussions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Prakash, B.A.; Vreeken, J.; Faloutsos, C. Spotting Culprits in Epidemics: How Many and Which Ones? In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, Brussels, Belgium, 10–13 September 2012. [Google Scholar]
  2. Luo, W.; Tay, W.P.; Leng, M. Identifying Infection Sources and Regions in Large Networks. IEEE Trans. Signal Process. 2013, 61, 2850–2865. [Google Scholar] [CrossRef] [Green Version]
  3. Suire, A.; van Baalen, M. Rumour propagation and the eco-evolutionary dynamics of social information use. Proc. R. Soc.-Biol. Sci. 2018, 285, 175. [Google Scholar] [CrossRef] [PubMed]
  4. Jia, P.; Wang, C.; Zhang, G.; Ma, J. A rumor spreading model based on two propagation channels in social networks. Phys. A-Stat. Mech. Its Appl. 2019, 524, 342–353. [Google Scholar] [CrossRef]
  5. Neumann, G.; Noda, T.; Kawaoka, Y. Emergence and pandemic potential of swine-origin H1N1 influenza virus. Nature 2009, 459, 931–939. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Hvistendahl, M.; Normile, D.; Cohen, J. Despite large research effort, H7N9 continues to baffle. Science 2013, 340, 414–415. [Google Scholar] [CrossRef]
  7. Williams, B.G.; Granich, R.; Chauhan, L.S.; Dharmshaktu, N.S.; Dye, C. The impact of HIV/AIDS on the control of tuberculosis in India. Proc. Natl. Acad. Sci. USA 2005, 102, 9619–9624. [Google Scholar] [CrossRef] [Green Version]
  8. Altmann, M. Susceptible-infected-removed epidemic models with dynamic partnerships. J. Math. Biol. 1995, 33, 661–675. [Google Scholar] [CrossRef]
  9. De la Sen, M.; Ibeas, A.; Alonso-Quesada, S.; Nistal, R. On a SIR Model in a Patchy Environment Under Constant and Feedback Decentralized Controls with Asymmetric Parameterizations. Symmetry 2019, 11, 430. [Google Scholar] [CrossRef]
  10. Shah, D.; Zaman, T. Rumor centrality: A universal source detector. ACM SIGMETRICS Perform. Eval. Rev. 2012, 40, 199–210. [Google Scholar] [CrossRef]
  11. Zhu, K.; Ying, L. Information Source Detection in the SIR Model: A Sample Path Based Approach. IEEE/ACM Trans. Netw. 2012, 24, 408–421. [Google Scholar] [CrossRef]
  12. Fioriti, V. Chinnici, M. Predicting the sources of an outbreak with a spectral technique. arXiv 2012, arXiv:1211.2333. [Google Scholar]
  13. Zang, W.; Zhang, P.; Zhou, C.; Guo, L. Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach. J. Comput. Sci. 2015, 10, 278–287. [Google Scholar] [CrossRef]
  14. Wang, Z.; Wang, C.; Pei, J.; Ye, X. Multiple Source Detection without Knowing the Underlying Propagation Model. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), San Francisco, CA, USA, 4–9 February 2018. [Google Scholar]
  15. Hu, Z.L.; Shen, Z.; Tang, C.-B.; Xie, B.-B.; Lu, J.-F. Localization of diffusion sources in complex networks with sparse observations. Phys. Lett. A 2018, 382, 931–937. [Google Scholar] [CrossRef]
  16. Pinto, P.C.; Thiran, P.; Vetterli, M. Locating the Source of Diffusion in Large-Scale Networks. Phys. Rev. Lett. 2012, 109. [Google Scholar] [CrossRef] [PubMed]
  17. Brockmann, D.; Helbing, D. The hidden geometry of complex, network-driven contagion phenomena. Science 2013, 342, 1337–1342. [Google Scholar] [CrossRef] [PubMed]
  18. Nguyen, H.T.; Ghosh, P.; Mayo, M.L.; Dinh, T.N. Multiple Infection Sources Identification with Provable Guarantees. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, Indianapolis, IN, USA, 24–28 October 2016. [Google Scholar]
  19. Li, X.; Wang, X.; Zhao, C.; Zhang, X.; Yi, D. Locating the Source of Diffusion in Complex Networks via Gaussian-Based Localization and Deduction. Appl. Sci. 2019, 9, 3758. [Google Scholar] [CrossRef]
  20. Li, X.; Wang, X.; Zhao, C.; Zhang, X.; Yi, D. Locating the Epidemic Source in Complex Networks with Sparse Observers. Appl. Sci. 2019, 9, 3644. [Google Scholar] [CrossRef]
  21. Antulovfantulin, N.; Lancic, A.; Smuc, T.; Štefančić, H.; Šikić, M. Identification of Patient Zero in Static and Temporal Networks - Robustness and Limitations. Phys. Rev. A. 2014, 114, 248701. [Google Scholar]
  22. Fu, L.; Shen, Z.; Wang, W.-X.; Fan, Y.; Di, Z. Multi-source localization on complex networks with limited observers. Europhys. Lett. 2016, 113, 18006. [Google Scholar] [CrossRef]
  23. Huang, Q.; Zhao, C.; Zhang, X.; Yi, D. Locating the source of spreading in temporal networks. Physica A 2016, 468, 434–444. [Google Scholar] [CrossRef]
  24. Network Data. Available online: http://www-personal.umich.edu/~mejn/netdata/ (accessed on 19 April 2013).
  25. Wang, D.; Wen, S.; Xiang, Y. Catch Me If You Can: Detecting compromised users through partial observation on networks. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2417–2422. [Google Scholar]
  26. Erdos, P. On the evolution of random graphs. Trans. Am. Math. Soc. 2011, 286, 257–274. [Google Scholar]
  27. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’ networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef] [PubMed]
  28. Barabasi, A.L.; Albert, R.T. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  29. De la Sen, M.; Ibeas, A. On the stability properties of linear dynamic time-varying unforced systems involving switches between parameterizations from topologic considerations via graph theory. Discret. Appl. Math. 2007, 155, 7–25. [Google Scholar] [CrossRef] [Green Version]
  30. Holme, P. Modern temporal network theory: A colloquium. Eur. Phys. J. B 2015, 88, 234. [Google Scholar] [CrossRef]
  31. Kivelä, M.; Arenas, A.; Barthelemy, M.; Gleeson, J.P.; Moreno, Y.; Porter, M.A. Multilayer networks. J. Complex Netw. 2014, 2, 203–271. [Google Scholar] [CrossRef] [Green Version]
Figure 1. A snapshot of the pollutant diffusion process. The letter denotes the node in network and the digital represents the concentration label of each node. The propagation sources are S = { d , k } . ( a ) pollutant concentration of network diagram. ( b ) incomplete pollutant concentration of network diagram, which is similar to the contagion situation of the network.
Figure 1. A snapshot of the pollutant diffusion process. The letter denotes the node in network and the digital represents the concentration label of each node. The propagation sources are S = { d , k } . ( a ) pollutant concentration of network diagram. ( b ) incomplete pollutant concentration of network diagram, which is similar to the contagion situation of the network.
Applsci 09 04472 g001
Figure 2. An example of multiple sources localization. (ac) represent the potential concentration label of the network at different iteration frequencies.
Figure 2. An example of multiple sources localization. (ac) represent the potential concentration label of the network at different iteration frequencies.
Applsci 09 04472 g002
Figure 3. Sources localization accuracy with various frequencies of iteration in nine networks. (ai) The relationship between p r e c i s i o n and β in synthetic networks and real networks. Without loss of generality, we suppose α = 1 . t 1 denotes the number of iterations.
Figure 3. Sources localization accuracy with various frequencies of iteration in nine networks. (ai) The relationship between p r e c i s i o n and β in synthetic networks and real networks. Without loss of generality, we suppose α = 1 . t 1 denotes the number of iterations.
Applsci 09 04472 g003
Figure 4. Sources localization accuracy of different numbers of sources with five methods in synthetic networks. (ac) The relationship between p r e c i s i o n and α ( β = 1 ) for different number of sources in ER network. The number of sources is s = 2 , 3 , 5 respectively, which is similar to Figure 5. The scale of the network is N = 100 and the average degree is < k > = 4 . (df) The difference is that the experiments are carried out in the WS network. (gi) Similarly, tests are done in the BA network. Besides, all contrast experiments (including subsequent experiments) involve the above five methods, that is, PCL , LPSI , DC , JC and UBC , which is represented by five different colors.
Figure 4. Sources localization accuracy of different numbers of sources with five methods in synthetic networks. (ac) The relationship between p r e c i s i o n and α ( β = 1 ) for different number of sources in ER network. The number of sources is s = 2 , 3 , 5 respectively, which is similar to Figure 5. The scale of the network is N = 100 and the average degree is < k > = 4 . (df) The difference is that the experiments are carried out in the WS network. (gi) Similarly, tests are done in the BA network. Besides, all contrast experiments (including subsequent experiments) involve the above five methods, that is, PCL , LPSI , DC , JC and UBC , which is represented by five different colors.
Applsci 09 04472 g004
Figure 5. The relationship between sources localization precision and α ( β = 1 ) with five methods in real networks. (af) represent the multiple sources localization performance in Karate, Lesmis, Adjnoun, Football, Jazz and USAir network respectively. The number of sources is s = 3 in all networks.
Figure 5. The relationship between sources localization precision and α ( β = 1 ) with five methods in real networks. (af) represent the multiple sources localization performance in Karate, Lesmis, Adjnoun, Football, Jazz and USAir network respectively. The number of sources is s = 3 in all networks.
Applsci 09 04472 g005aApplsci 09 04472 g005b
Figure 6. Sources localization accuracy of different average degree with five methods in synthetic networks. (ac) Results in ER network. The average degree is < k > = 4 , 6 , 8 respectively, the scale of network is N = 100 . The number of sources is s = 3 , the same as Figure 7. (df) Results in WS network. (gi) Results in BA network.
Figure 6. Sources localization accuracy of different average degree with five methods in synthetic networks. (ac) Results in ER network. The average degree is < k > = 4 , 6 , 8 respectively, the scale of network is N = 100 . The number of sources is s = 3 , the same as Figure 7. (df) Results in WS network. (gi) Results in BA network.
Applsci 09 04472 g006
Figure 7. Sources localization accuracy of different network scale with five methods in synthetic networks. (ac) Results in ER network. The scale of the network is N = 100 , 200 , 300 respectively, the average degree is < k > = 4 . (df) Results in WS network. (gi) Results in BA network.
Figure 7. Sources localization accuracy of different network scale with five methods in synthetic networks. (ac) Results in ER network. The scale of the network is N = 100 , 200 , 300 respectively, the average degree is < k > = 4 . (df) Results in WS network. (gi) Results in BA network.
Applsci 09 04472 g007
Table 1. The parameter of real network. The quantities N, | E | , < k > represent the number of nodes, the number of edges and the average degree, respectively.
Table 1. The parameter of real network. The quantities N, | E | , < k > represent the number of nodes, the number of edges and the average degree, respectively.
NetworkN | E | < k > Description
Karate34784.59The friendships between 34 members of a karate club at a US university in the 1970s
Lesmis772586.70The characters relationships in the novel Les Miserables
Adjnoun1124257.59The common adjectives and nouns in the novel David Copperfield by Charles Dickens
Football11561310.66The games among 115 American college football teams
Jazz [14]198274227.70The jazz bands attending performance from 1912 to 1940
USAir [15]332212612.81The flights in the USA
Table 2. The average precision ( PCL vs. LPSI vs. DC vs. JC vs. UBC ), α = 0.1 : 0.1 : 1 , β = 1 , for different strategies of dealing with unknown infection information in synthetic networks and real networks with 20% uncertainty. The number of sources is s = 3 in all networks, < k > = 4 , N = 100 in ER , WS and BA network, the connect probability is 0.1 in WS network. Besides, a bold number denotes the highest accuracy of sources localization in each network.
Table 2. The average precision ( PCL vs. LPSI vs. DC vs. JC vs. UBC ), α = 0.1 : 0.1 : 1 , β = 1 , for different strategies of dealing with unknown infection information in synthetic networks and real networks with 20% uncertainty. The number of sources is s = 3 in all networks, < k > = 4 , N = 100 in ER , WS and BA network, the connect probability is 0.1 in WS network. Besides, a bold number denotes the highest accuracy of sources localization in each network.
NetworkStrategyPCLLPSIDCJCUBC
All-inf53.1711.7724.3130.8412.31
ERNone-inf58.6012.2225.2730.9712.31
Rand-inf55.5112.1625.6031.0113.36
All-inf47.5910.2418.7631.1212.94
WSNone-inf54.2810.2118.1631.1212.55
Rand-inf50.1110.2117.9230.8713.09
All-inf51.1610.8719.4230.8912.10
BANone-inf57.3110.8118.8830.9311.98
Rand-inf54.2510.8718.7930.9112.07
All-inf46.2711.8327.6733.0916.48
KarateNone-inf50.0511.7727.8533.1817.47
Rand-inf48.2211.9528.3933.2216.30
All-inf36.3110.2419.1831.1014.02
LesmisNone-inf36.5810.6919.5431.3813.60
Rand-inf36.1010.5118.9731.4114.44
All-inf53.0810.6922.0630.8112.97
AdjnounNone-inf53.5610.4822.5730.9612.19
Rand-inf52.2410.3021.5230.6912.13
All-inf51.1310.1531.0930.7212.25
FootballNone-inf59.9210.2730.7930.7911.95
Rand-inf52.6310.2131.4230.8312.37
All-inf38.5310.2419.4230.3411.35
JazzNone-inf41.6210.1218.1330.5611.50
Rand-inf38.5910.1219.0330.5511.35
All-inf37.9010.1213.9330.3811.08
USAirNone-inf36.0410.2113.4530.3010.90
Rand-inf38.4710.0613.6630.2711.05
Table 3. The performance of sources localization accuracy with PCL vs. LPSI vs. DC vs. JC vs. UBC in synthetic networks and real networks under noise of various intensities. The p r e c i s i o n is the mean value when α = 0.1:0.1:1. The number of sources is s = 3 in all networks, < k > = 4 , N = 100 in the ER , WS and BA networks, the connect probability is 0.1 in the WS network. Moreover, the strategy of dealing with unknown infection information chooses Rand-inf.
Table 3. The performance of sources localization accuracy with PCL vs. LPSI vs. DC vs. JC vs. UBC in synthetic networks and real networks under noise of various intensities. The p r e c i s i o n is the mean value when α = 0.1:0.1:1. The number of sources is s = 3 in all networks, < k > = 4 , N = 100 in the ER , WS and BA networks, the connect probability is 0.1 in the WS network. Moreover, the strategy of dealing with unknown infection information chooses Rand-inf.
NetworkNoisePCLLPSIDCJCUBC
0.0556.8311.6830.0731.0712.43
ER0.1054.7312.3426.0531.0912.70
0.2051.6111.5019.3030.9212.58
0.0552.8110.2420.4731.2413.09
WS0.1050.6510.3318.5231.0113.12
0.2045.1910.3615.2230.9613.12
0.0556.1710.6021.1630.7812.31
BA0.1054.1310.5418.6430.8312.91
0.2049.7810.4515.9730.8412.28
0.0549.4511.5028.1233.3416.69
Karate0.1048.0111.3828.1533.3917.44
0.2043.8711.7425.6632.8215.73
0.0536.9110.3320.5031.4313.87
Lesmis0.1036.6110.5119.6931.4113.99
0.2033.8510.6917.2331.1713.90
0.0554.4610.4826.4430.9412.34
Adjnoun0.1052.1210.4521.4630.8312.01
0.2047.8910.4517.7430.8112.13
0.0555.7510.2434.2430.7312.34
Football0.1052.6010.2431.1230.8612.46
0.2049.6910.2727.4030.9512.22
0.0540.2710.1521.6130.6311.17
Jazz0.1040.8410.1818.4330.3611.08
0.2036.4310.1216.2130.4411.38
0.0540.0910.0614.8330.2311.05
USAir0.1039.5210.1814.2630.2210.66
0.2036.3710.2413.2730.3010.75

Share and Cite

MDPI and ACS Style

Li, X.; Liu, Y.; Zhao, C.; Zhang, X.; Yi, D. Locating Multiple Sources of Contagion in Complex Networks under the SIR Model. Appl. Sci. 2019, 9, 4472. https://0-doi-org.brum.beds.ac.uk/10.3390/app9204472

AMA Style

Li X, Liu Y, Zhao C, Zhang X, Yi D. Locating Multiple Sources of Contagion in Complex Networks under the SIR Model. Applied Sciences. 2019; 9(20):4472. https://0-doi-org.brum.beds.ac.uk/10.3390/app9204472

Chicago/Turabian Style

Li, Xiang, Yangyang Liu, Chengli Zhao, Xue Zhang, and Dongyun Yi. 2019. "Locating Multiple Sources of Contagion in Complex Networks under the SIR Model" Applied Sciences 9, no. 20: 4472. https://0-doi-org.brum.beds.ac.uk/10.3390/app9204472

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop