Show simple item record

dc.contributor.authorShah, Devavrat
dc.contributor.authorZaman, Tauhid R.
dc.date.accessioned2014-06-30T13:55:48Z
dc.date.available2014-06-30T13:55:48Z
dc.date.issued2011-08
dc.date.submitted2011-02
dc.identifier.issn0018-9448
dc.identifier.issn1557-9654
dc.identifier.urihttp://hdl.handle.net/1721.1/88122
dc.description.abstractWe provide a systematic study of the problem of finding the source of a rumor in a network. We model rumor spreading in a network with the popular susceptible-infected (SI) model and then construct an estimator for the rumor source. This estimator is based upon a novel topological quantity which we term rumor centrality. We establish that this is a maximum likelihood (ML) estimator for a class of graphs. We find the following surprising threshold phenomenon: on trees which grow faster than a line, the estimator always has nontrivial detection probability, whereas on trees that grow like a line, the detection probability will go to 0 as the network grows. Simulations performed on synthetic networks such as the popular small-world and scale-free networks, and on real networks such as an internet AS network and the U.S. electric power grid network, show that the estimator either finds the source exactly or within a few hops of the true source across different network topologies. We compare rumor centrality to another common network centrality notion known as distance centrality. We prove that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ. Indeed, simulations show that rumor centrality outperforms distance centrality in finding rumor sources in networks which are not tree-like.en_US
dc.description.sponsorshipUnited States. Air Force Office of Scientific Research. Complex Networks Programen_US
dc.description.sponsorshipNational Science Foundation (U.S.). Division of Human and Social Dynamicsen_US
dc.description.sponsorshipNational Science Foundation (U.S.). Emerging Models and Technologies for Computation Programen_US
dc.description.sponsorshipMIT-Shell Energy Fellowshipen_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/TIT.2011.2158885en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther univ. web domainen_US
dc.titleRumors in a Network: Who's the Culprit?en_US
dc.typeArticleen_US
dc.identifier.citationShah, Devavrat, and Tauhid Zaman. “Rumors in a Network: Who’s the Culprit?” IEEE Trans. Inform. Theory 57, no. 8 (n.d.): 5163–5181.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.departmentMassachusetts Institute of Technology. Laboratory for Information and Decision Systemsen_US
dc.contributor.departmentSloan School of Managementen_US
dc.contributor.mitauthorShah, Devavraten_US
dc.contributor.mitauthorZaman, Tauhid R.en_US
dc.relation.journalIEEE Transactions on Information Theoryen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsShah, Devavrat; Zaman, Tauhiden_US
dc.identifier.orcidhttps://orcid.org/0000-0003-0737-3259
dc.identifier.orcidhttps://orcid.org/0000-0003-4973-9343
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record