Rumor Source Detection in Networks Based on the SEIR Model
Online social networks have become extremely important in daily life and can be used to influence lives in dramatic ways. Two issues are the veracity and provenance of posted information, including rumors. There is a need for methods for tracing rumors (or any piece of information) to their most lik...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8682104/ |
_version_ | 1819276205360152576 |
---|---|
author | Yousheng Zhou Chujun Wu Qingyi Zhu Yong Xiang Seng W. Loke |
author_facet | Yousheng Zhou Chujun Wu Qingyi Zhu Yong Xiang Seng W. Loke |
author_sort | Yousheng Zhou |
collection | DOAJ |
description | Online social networks have become extremely important in daily life and can be used to influence lives in dramatic ways. Two issues are the veracity and provenance of posted information, including rumors. There is a need for methods for tracing rumors (or any piece of information) to their most likely source in such networks. We consider the detection problem of single rumor source based on observed snapshots based on the susceptible-exposed-infected-recovered (SEIR) model. According to the SEIR model, all nodes in the network are formulated into four possible states: susceptible (S), exposed (E), infected (I), and recovered (R). Given an observed snapshot in the network, from which we can know the relevant graph topology and all infected nodes, but where nodes in susceptible, exposed, or recovered status cannot be distinguished, the purpose of our research is to identify the rumor source based on the observed snapshot and graph topology. We propose the concept of the optimal infection process and derive an estimator for the rumor source based on this optimal infection process. Subsequently, we prove that this estimator matches the rumor source with a high probability. The effectiveness of the proposed scheme is validated using experiments based on regular tree networks with different degrees. We further evaluate the performance of our scheme on two well-known synthetic complex networks and four real-world networks; the results suggest that our proposed scheme outperforms the traditional rumor centrality heuristics. The performance analysis on computational complexity demonstrates that our scheme has advantages in efficiency compared with other rumor centrality heuristics used in rumor detection methods. |
first_indexed | 2024-12-23T23:36:31Z |
format | Article |
id | doaj.art-871effd4b66a4988858d891b657db7e8 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-23T23:36:31Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-871effd4b66a4988858d891b657db7e82022-12-21T17:25:51ZengIEEEIEEE Access2169-35362019-01-017452404525810.1109/ACCESS.2019.29095528682104Rumor Source Detection in Networks Based on the SEIR ModelYousheng Zhou0https://orcid.org/0000-0003-4116-6608Chujun Wu1Qingyi Zhu2https://orcid.org/0000-0002-1168-1599Yong Xiang3Seng W. Loke4College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaCollege of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, ChinaSchool of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, ChinaSchool of Information Technology, Deakin University, Geelong, VIC, AustraliaSchool of Information Technology, Deakin University, Geelong, VIC, AustraliaOnline social networks have become extremely important in daily life and can be used to influence lives in dramatic ways. Two issues are the veracity and provenance of posted information, including rumors. There is a need for methods for tracing rumors (or any piece of information) to their most likely source in such networks. We consider the detection problem of single rumor source based on observed snapshots based on the susceptible-exposed-infected-recovered (SEIR) model. According to the SEIR model, all nodes in the network are formulated into four possible states: susceptible (S), exposed (E), infected (I), and recovered (R). Given an observed snapshot in the network, from which we can know the relevant graph topology and all infected nodes, but where nodes in susceptible, exposed, or recovered status cannot be distinguished, the purpose of our research is to identify the rumor source based on the observed snapshot and graph topology. We propose the concept of the optimal infection process and derive an estimator for the rumor source based on this optimal infection process. Subsequently, we prove that this estimator matches the rumor source with a high probability. The effectiveness of the proposed scheme is validated using experiments based on regular tree networks with different degrees. We further evaluate the performance of our scheme on two well-known synthetic complex networks and four real-world networks; the results suggest that our proposed scheme outperforms the traditional rumor centrality heuristics. The performance analysis on computational complexity demonstrates that our scheme has advantages in efficiency compared with other rumor centrality heuristics used in rumor detection methods.https://ieeexplore.ieee.org/document/8682104/Rumor source detectionoptimal infection processsusceptible-exposed-infected-recovered (SEIR) modelinformation security |
spellingShingle | Yousheng Zhou Chujun Wu Qingyi Zhu Yong Xiang Seng W. Loke Rumor Source Detection in Networks Based on the SEIR Model IEEE Access Rumor source detection optimal infection process susceptible-exposed-infected-recovered (SEIR) model information security |
title | Rumor Source Detection in Networks Based on the SEIR Model |
title_full | Rumor Source Detection in Networks Based on the SEIR Model |
title_fullStr | Rumor Source Detection in Networks Based on the SEIR Model |
title_full_unstemmed | Rumor Source Detection in Networks Based on the SEIR Model |
title_short | Rumor Source Detection in Networks Based on the SEIR Model |
title_sort | rumor source detection in networks based on the seir model |
topic | Rumor source detection optimal infection process susceptible-exposed-infected-recovered (SEIR) model information security |
url | https://ieeexplore.ieee.org/document/8682104/ |
work_keys_str_mv | AT youshengzhou rumorsourcedetectioninnetworksbasedontheseirmodel AT chujunwu rumorsourcedetectioninnetworksbasedontheseirmodel AT qingyizhu rumorsourcedetectioninnetworksbasedontheseirmodel AT yongxiang rumorsourcedetectioninnetworksbasedontheseirmodel AT sengwloke rumorsourcedetectioninnetworksbasedontheseirmodel |