Source detection of rumor in social network–a review

S Shelke, V Attar - Online Social Networks and Media, 2019‏ - Elsevier
The ubiquity of handheld devices provides straightforward access to the Internet and Social
networking. The quick and easy updates from social networks help users in many situations …

Schemes of propagation models and source estimators for rumor source detection in online social networks: A short survey of a decade of research

R **, W Wu - Discrete Mathematics, Algorithms and Applications, 2021‏ - World Scientific
Recent years have seen various rumor diffusion models being assumed in detection of
rumor source research of the online social network. Diffusion model is arguably considered …

Epidemic source detection in contact tracing networks: Epidemic centrality in graphs and message-passing algorithms

PD Yu, CW Tan, HL Fu - IEEE Journal of Selected Topics in …, 2022‏ - ieeexplore.ieee.org
We study the epidemic source detection problem in contact tracing networks modeled as a
graph-constrained maximum likelihood estimation problem using the susceptible-infected …

Contagion source detection in epidemic and infodemic outbreaks: Mathematical analysis and network algorithms

CW Tan, PD Yu - Foundations and Trends® in Networking, 2023‏ - nowpublishers.com
The rapid spread of infectious diseases and online rumors share similarities in terms of their
speed, scale, and patterns of contagion. Although these two phenomena have historically …

Confidence sets for the source of a diffusion in regular trees

J Khim, PL Loh - IEEE Transactions on Network Science and …, 2016‏ - ieeexplore.ieee.org
We study the problem of identifying the source of a diffusion spreading over a regular tree.
When the degree of each node is at least three, we show that it is possible to construct …

HMSL: Source localization based on higher-order Markov propagation

C Gong, J Li, L Qian, S Li, Z Yang, K Yang - Chaos, Solitons & Fractals, 2024‏ - Elsevier
The widespread use of the Internet and social media has brought us great convenience, but
it has also exposed us to a lot of false information and malicious attacks. It is vital to …

Rumor source detection under querying with untruthful answers

J Choi, S Moon, J Woo, K Son… - IEEE INFOCOM 2017 …, 2017‏ - ieeexplore.ieee.org
Social networks are the major routes for most individuals to exchange their opinions about
new products, social trends and political issues via their interactions. It is often of significant …

Averting cascading failures in networked infrastructures: Poset-constrained graph algorithms

PD Yu, CW Tan, HL Fu - IEEE Journal of Selected Topics in …, 2018‏ - ieeexplore.ieee.org
Cascading failures in critical networked infrastructures that result even from a single source
of failure often lead to rapidly widespread outages as witnessed in the 2013 Northeast …

Contagion source detection by maximum likelihood estimation and starlike graph approximation

PD Yu, L Zheng, CW Tan - 2024 58th Annual Conference on …, 2024‏ - ieeexplore.ieee.org
Detecting the origin of an epidemic-like spread in extensive networks has crucial
implications, including pinpointing rumor sources in online social networks. When provided …

Optimal detection of influential spreaders in online social networks

CW Tan, PD Yu, CK Lai, W Zhang… - … Annual Conference on …, 2016‏ - ieeexplore.ieee.org
The wide availability of digital data in online social networks such as the Facebook offers an
interesting question on finding the influential users based on the user interaction over time …