Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms

被引:8
|
作者
Tan, Chee Wei [1 ]
Yu, Pei-Duo [2 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
[2] Chung Yuan Christian Univ, Taoyuan, Taiwan
来源
FOUNDATIONS AND TRENDS IN NETWORKING | 2023年 / 13卷 / 2-3期
关键词
ESTIMATING INFECTION SOURCES; BAYESIAN-INFERENCE; SOCIAL NETWORKS; INFORMATION; SPREAD; CENTRALITY; IDENTIFICATION; PAGERANK; NEWS;
D O I
10.1561/1300000068
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid spread of infectious diseases and online rumors share similarities in terms of their speed, scale, and patterns of contagion. Although these two phenomena have historically been studied separately, the COVID-19 pandemic has highlighted the devastating consequences that simultaneous crises of epidemics and misinformation can have on the world. Soon after the outbreak of COVID-19, the World Health Organization launched a campaign against the COVID-19 Infodemic, which refers to the dissemination of pandemic-related false information online that causes widespread panic and hinders recovery efforts. Undoubtedly, nothing spreads faster than fear. Networks serve as a crucial platform for viral spreading, as the actions of highly influential users can quickly render others susceptible to the same. The potential for contagion in epidemics and rumors hinges on the initial source, underscoring the need for rapid and efficient digital contact tracing algorithms to identify superspreaders or Patient Zero. Similarly, detecting and removing rumor mongers is essential for preventing the proliferation of harmful information in online social networks. Identifying the source of large-scale contagions requires solving complex optimization problems on expansive graphs. Accurate source identification and understanding the dynamic spreading process requires a comprehensive understanding of surveillance in massive networks, including topological structures and spreading veracity. Ultimately, the efficacy of algorithms for digital contact tracing and rumor source detection relies on this understanding. This monograph provides an overview of the mathematical theories and computational algorithm design for contagion source detection in large networks. By leveraging network centrality as a tool for statistical inference, we can accurately identify the source of contagions, trace their spread, and predict future trajectories. This approach provides fundamental insights into surveillance capability and asymptotic behavior of contagion spreading in networks. Mathematical theory and computational algorithms are vital to understanding contagion dynamics, improving surveillance capabilities, and developing effective strategies to prevent the spread of infectious diseases and misinformation.
引用
收藏
页码:106 / 251
页数:146
相关论文
共 46 条
  • [31] RETRACTED: Application Analysis of Overlapping Community Detection Algorithms for Multidimensional Network Big Data and IoT (Retracted Article)
    Yang, Xin
    Cui, Liping
    Liu, Yan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] Comparative analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) algorithms in Differentiated Services Network
    Rajput, Shyam Singh
    Kumar, Vinod
    Paul, Santosh Kumar
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 237 - 240
  • [33] Automated detection of landslide events from multi-source remote sensing imagery: Performance evaluation and analysis of YOLO algorithms
    Chandra, Naveen
    Vaidya, Himadri
    JOURNAL OF EARTH SYSTEM SCIENCE, 2024, 133 (03)
  • [34] Adaptive and automated detection of service anomalies in transaction-oriented WAN's: Network analysis, algorithms, implementation, and deployment
    Ho, LL
    Cavuto, DJ
    Papavassiliou, S
    Zawadzki, AG
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (05) : 744 - 757
  • [35] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Xindai Lu
    Jiajia Han
    Qianbo Ren
    Hua Dai
    Jiyuan Li
    Jing Ou
    Multimedia Tools and Applications, 2020, 79 : 33349 - 33363
  • [36] A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
    H. Asad
    S. Adhikari
    Ilir Gashi
    International Journal of Information Security, 2024, 23 : 1331 - 1346
  • [37] Big-Data Analysis of Multi-Source Logs for Anomaly Detection on Network-based System
    Jia Zhanpei
    Shen Chao
    Yi Xiao
    Chen Yufei
    Yu Tianwen
    Guan Xiaohong
    2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 1136 - 1141
  • [38] Diagnostic performance of neural network algorithms in skull fracture detection on CT scans: a systematic review and meta-analysis
    Sharifi, Guive
    Hajibeygi, Ramtin
    Zamani, Seyed Ali Modares
    Easa, Ahmed Mohamedbaqer
    Bahrami, Ashkan
    Eshraghi, Reza
    Moafi, Maral
    Ebrahimi, Mohammad Javad
    Fathi, Mobina
    Mirjafari, Arshia
    Chan, Janine S.
    Santo, Irene Dixe de Oliveira
    Anar, Mahsa Asadi
    Rezaei, Omidvar
    Tu, Long H.
    EMERGENCY RADIOLOGY, 2025, 32 (01) : 97 - 111
  • [39] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Lu, Xindai
    Han, Jiajia
    Ren, Qianbo
    Dai, Hua
    Li, Jiyuan
    Ou, Jing
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (45-46) : 33349 - 33363
  • [40] A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems
    Asad, H.
    Adhikari, S.
    Gashi, Ilir
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1331 - 1346