Computer Science ›› 2025, Vol. 52 ›› Issue (4): 280-290.doi: 10.11896/jsjkx.240300127

• Artificial Intelligence • Previous Articles     Next Articles

Method for Selecting Observers Based on Doubly Resolving Set in Independent Cascade Model

CHEN Zhangyuan, CHEN Ling, LIU Wei, LI Bin   

  1. College of Information Engineering,Yangzhou University,Yangzhou,Jiangsu 225000,China
  • Received:2024-03-18 Revised:2024-08-14 Online:2025-04-15 Published:2025-04-14
  • About author:CHEN Zhangyuan,born in 2000.His main research interests include data mining and complex network.
    CHEN Ling,born in 1951,professor,Ph.D supervisor,is a member of CCF(No.85182M).His main research interests include data mining complex network and artificial intelligence.
  • Supported by:
    National Natural Science Foundation of China(61379066,61702441,61379064,61472344,61402395,61602202),Natural Science Foundation of Jiangsu Province,China(BK20140492,BK20160428),Natural Science Foundation of Jiangsu Provincial Department of Education,China(12KJB520019,13KJB520026,09KJB20013)and “Six Talents Peaks” of Jiangsu Province(2011-DZXX-032).

Abstract: With the development of the Internet,rumor information may quickly spread on social networks.Finding the source of rumor can effectively help stop the spread of negative influences,so the source localization problem has great research value.At present,the most effective source localization method is based on observation nodes.But the existing selection of observation nodes has not considered the uniformity of node distribution in the network,and the number of observation nodes is pre-set without reasonably considering the topological characteristics of the graph.This paper studies the strategy of observer nodes placement from two perspectives:node budget threshold and node coverage threshold.Taking into account the activation status of observer nodes and the discriminative distance to the source set,a novel K-differentiation algorithm is proposed,which initially selects the initial observer nodes based on the concept of the doubly-resolving set.Subsequently,an anchor node is chosen to greedily select observer nodes based on a combination of coverage and budget differences to reach the specified thresholds for coverage and budget.The algorithm then addresses two problems related to budget and coverage proposed in this paper when choosing observer nodes for experimentation within the same source localization algorithm.Experiments are conducted in real world social datasets.The proposed algorithm for selecting observer nodes is compared with various alternatives within the same source localization algorithm.The results indicate that the accuracy of source localization and average error distance by our algorithm outperforms other algorithms and achieve excellent results in the large dataset with 5%~10% observer nodes.

Key words: Observer nodes, Social networks, Independent cascade model, Doubly resolving set, Source localization

CLC Number: 

  • TP399
[1]KHULLER S,RAGHAVACHARI B,ROSFIELD A.Land-marks in grapghs[J].Discrete Applied Mathematics,1996,70(3):217-229.
[2]DEVARAPALLI R K,BISWAS A.Rumor Detection and Tra-cing its source to Prevent Cyber-Crimes on social Media[C]//Intelligent Data Analytics for Terror Threat Prediction:Architectures,Methodologies,Techniques and Applications.2021:1-30.
[3]REN J,LIU M,LIU Y,et al.Optimal resource allocation with spatiotemporal transmission discovery for effective disease control[J].Infectious diseases of poverty,2022,11(1):34.
[4]LIU P,LI L,FANG S,et al.Identifying influential nodes in social networks:A voting approach[J].Chaos,Solitons & Fractals,2021,152:111309.
[5]SHAH D,ZAMAN T.Rumors in a Network:Who’s the Culprit?[J].IEEE Transactions on Information Theory,2011,57(8):5163-5181.
[6]PINTO P C,THIRAN P,VETTERLI M.Locating the source of diffusion in large scale networks[J].Physical Review Letters,2012,109(6):68702.
[7]LI X,WANG X,HAO C,et a1.Locating the Epidemic Source in complex Networks with sparse Observers [J].Applied Sciences,2019,9(18):3644.
[8]SPINELLI B,CELIS L E,THIRAN P.A General Frameworkfor Sensor Placement in Source Localization[J].IEEE Transactions on Network Science and Engineering,2019,6(2):86-102.
[9]CELIS L E,PAVETIC' F,SPINELLI B,et al.Budgeted sensor placement for source localization on trees[J].Electronic Notes in Discrete Mathematics,2015,50:65-70.
[10]LOKHOV A,MÉZARD M,OHTA H,et al.Inferring the origin of an epidemic with a dynamic message-passing algorithm[J].Physical Review E,2014,90(1):012801.
[11]WANG Z X,SUN C,RUI X,et al.Localization of multiple diffusion sources based on overlapping community detection[J].Knowledge-Based Systems,2021,226:106613.
[12]LIU Y,LI W,YANG C,et al.Multi-source detection based on neighborhood entropy in social networks[J].Scientific Reports,2022,12(1):1-12.
[13]ZHANG Z,YUE K,SUN Z,et al.Locating Sources in Onlinesocial Networks via Random walk[C]//2017 IEEE Interna-tional Congress on Big Data(Big Data Congress).IEEE,2017:337-343.
[14]BAO Z Q,CHEN W D.Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation[J].Computer Science,2021,48(4):243-248.
[15]YUAN D Y,GAO J,YE M X,et al.Malicious InformationSource Locating Algorithm Based on Topological Extension in Online Social NEtwork[J].Computer Science,2019,46(5):129-134.
[16]LI W,GUO C,LIU Y,et al.Rumor source localization in social networks based on infection potential energy[J].Information Science,2023,634,172-188.
[17]ZHANG X Z,ZHANG Y B,LV T Y,et al.Identification of efficient observers for locating spreading source in complex networks[J].Physic A,2015,442:100-109.
[18]PALUCH R,LU X,SUCHECKI K,et a1.Fast andaccurate detection of spread source in large complex networks[J].Scientific Reports,2018,8(1):2508.
[19]PALUCH R,GAJEWSKI L,HOLYST G,et al.Optimizing sensors placement in complex networks for localization of hidden signal source:A review[J].Future Generation Compute Systems,2020,112:1070-1092.
[20]SPINELLI B,CELIS L E,THIRAN P.Observer placement for source localization:The effect of budgets and transmission variance[C]//54th Annual Allerton Conference on Communication,Control,and Computing,Allerton 2016.IEEE,2016:743-751.
[21]ZEJNILOVIC S,GOMES J,SINOPOLI B.Sequential observer selection for source localization[C]//2015 IEEE Global Confe-rence on Signal and Information Processing(GlobalSIP).IEEE,2015:1220-1224.
[22]ZEJNILOVIC S,XAVIER J,GOMES J,et al.Selecting observers for source localization via error exponents[C]//2015 IEEE International Symposium on Information Theory(ISIT),IEEE,2015:2914-2918.
[23]ZEJNILOVIC,GOMES J,SINOPOLI B.Network observability and localization of the source of diffusion based on a subset of nodes[C]//51st Annual Allerton Conference on Communication,Control,and Computing(Allerton).IEEE,2013:847-852.
[24]GAJEWSKI L,PALUCH R,SUCHECKI K,et al.Comparison of observer based methods for source localization in complex networks[J].Scientific Reports,2022,12:5079-5079.
[25]CHEN X,HU X,WAN C.Approximation for the minimum cost doubly resolving set problem[J].Theoretical Computer Science,2016,609:526-543.
[26]WANG H J,ZHANG F F,SUN K J.An algorithm for locating propagation source in complex networks[J].Physics Letters A,2021,393:127184.
[27]ZHAO J,HAO K,CHEONG H.Early identification of diffusion source in complex networks with evidence theory[J].Information Science,2023,642:119061.
[28]BERRY J,HART,W,PHILLIPS C,et al.Sensor placement in municipal water networks with temporal integer programming models[J].Journal of Water Resources Planning and Manage-
ment,2006,132(4):218.
[1] LIU Wei, WU Fei, GUO Zhen, CHEN Ling. Two Stage Rumor Blocking Method Based on EHEM in Social Networks [J]. Computer Science, 2024, 51(7): 156-166.
[2] DENG Ziwei, CHEN Ling, LIU Wei. Continuous Influence Maximization Under Independent Cascade Propagation Model [J]. Computer Science, 2024, 51(6): 161-171.
[3] ZHU Yangfu, LI Meiling, TAN Jiachen, WU Bin. Study on Text-based Personality Detection-A Review [J]. Computer Science, 2024, 51(12): 209-222.
[4] CAO Jinxin, XU Weizhong, JIN Di, DING Weiping. Survey of Community Discovery in Complex Networks [J]. Computer Science, 2023, 50(11A): 230100130-11.
[5] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[6] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[7] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[8] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
[9] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[10] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[11] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
[12] WU Lei,YUE Feng,WANG Han-ru,WANG Gang. Academic Paper Recommendation Method Combined with Researcher Tag [J]. Computer Science, 2020, 47(2): 51-57.
[13] GU Qiu-yang, JU Chun-hua, WU Gong-xing. Social Network Information Recommendation Model Combining Deep Autoencoder and Network Representation Learning [J]. Computer Science, 2020, 47(11): 101-112.
[14] ZHANG Zheng, WANG Hong-zhi, DING Xiao-ou, LI Jian-zhong, GAO Hong. Identification of Same User in Social Networks [J]. Computer Science, 2019, 46(9): 93-98.
[15] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!