Early detection of dynamic harmful cascades in large-scale networks

被引:3
|
作者
Zhou, Chuan [1 ,2 ]
Lu, Wei-Xue [3 ]
Zhang, Jingzun [4 ]
Li, Lei [5 ]
Hu, Yue [1 ,2 ]
Guo, Li [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] JD Com, Beijing 100176, Peoples R China
[4] Beijing Union Univ, Coll Intellectualized City, Beijing 100101, Peoples R China
[5] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei 230009, Anhui, Peoples R China
关键词
Early detection; Sensor placement; Diffusion networks; SENSOR PLACEMENT;
D O I
10.1016/j.jocs.2017.10.014
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Quickly detecting harmful cascades in networks can allow us to analyze the causes and prevent further spreading of destructive influence. Since it is often impossible to observe the state of all nodes in a network, a common method is to detect harmful cascades from sparsely placed sensors. However, the harmful cascades are usually dynamic (e.g., the cascade initiators and diffusion trajectories can change over the time), which can severely destroy the robustness of selected sensors. Meanwhile the large scale of current networks greatly increases the time complexity of sensor selection. Motivated by the observation, in this paper we investigate the scalable sensor selection problem for early detection of dynamic harmful cascades in networks. Specifically, we first put forward a dynamic susceptible-infected model to describe harmful cascades, and formally define a detection time minimization (DTM) problem which focuses on effective sensors placement for early detection of dynamic cascades. We prove that it is #P-hard to calculate the objective function exactly and propose two Monte-Carlo methods to estimate it efficiently. We prove the NP-hardness of DTM problem and design a corresponding greedy algorithm. Based on that, we propose an efficient upper bound based greedy (UBG) algorithm with the theoretical performance guarantee reserved. To further meet different types of large-scale networks, we propose two accelerations of UBG: Quickest-Path-UBG for sparse networks and Local-Reduction-UBG for dense networks to improve the time complexity. The experimental results on synthetic and real-world social networks demonstrate the practicality of our approaches. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:304 / 317
页数:14
相关论文
共 50 条
  • [21] Weak State Routing for Large-Scale Dynamic Networks
    Acer, Utku Guenay
    Kalyanaraman, Shivkumar
    Abouzeid, Alhussein A.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (05) : 1450 - 1463
  • [22] NONLINEAR CASCADES IN LARGE-SCALE ATMOSPHERIC FLOW
    STEINBERG, HL
    WIINNIEL.A
    YANG, CH
    JOURNAL OF GEOPHYSICAL RESEARCH, 1971, 76 (36): : 8629 - +
  • [23] Spurious Features Everywhere - Large-Scale Detection of Harmful Spurious Features in ImageNet
    Neuhaus, Yannic
    Augustin, Maximilian
    Boreiko, Valentyn
    Hein, Matthias
    2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2023), 2023, : 20178 - 20189
  • [24] Automated Detection of Load Changes in Large-Scale Networks
    Mata, Felipe
    Aracil, Javier
    Luis Garcia-Dorado, Jose
    TRAFFIC MONITORING AND ANALYSIS: FIRST INTERNATIONAL WORKSHOP, TMA 2009, 2009, 5537 : 34 - 41
  • [25] Anomaly detection in large-scale data stream networks
    Duc-Son Pham
    Venkatesh, Svetha
    Lazarescu, Mihai
    Budhaditya, Saha
    DATA MINING AND KNOWLEDGE DISCOVERY, 2014, 28 (01) : 145 - 189
  • [26] Community Detection in Large-Scale Bipartite Biological Networks
    Calderer, Genis
    Kuijjer, Marieke L.
    FRONTIERS IN GENETICS, 2021, 12
  • [27] Distributed Detection in Coexisting Large-Scale Sensor Networks
    Lee, Junghoon
    Tepedelenlioglu, Cihan
    IEEE SENSORS JOURNAL, 2014, 14 (04) : 1028 - 1034
  • [28] Anomaly detection in large-scale data stream networks
    Duc-Son Pham
    Svetha Venkatesh
    Mihai Lazarescu
    Saha Budhaditya
    Data Mining and Knowledge Discovery, 2014, 28 : 145 - 189
  • [29] Fast detection of worm infection for large-scale networks
    He, Hui
    Hu, Mingzeng
    Zhang, Weizhe
    Zhang, Hongli
    ADVANCES IN MACHINE LEARNING AND CYBERNETICS, 2006, 3930 : 672 - 681
  • [30] RECOD: reliable detection protocol for large-scale and dynamic continuous objects in wireless sensor networks
    Yongbin Yim
    Soochang Park
    Euisin Lee
    Ki-Dong Nam
    Cheonyong Kim
    Sang-Ha Kim
    Wireless Networks, 2019, 25 : 4193 - 4213