Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Towards anomalous diffusion sources detection in a large network
Zhang P., He J., Long G., Huang G., Zhang C. ACM Transactions on Internet Technology16 (1):1-24,2016.Type:Article
Date Reviewed: Apr 21 2016

The identification of diffusion sources in a network is an interesting and important problem. A solution to this problem may be used, for example, for solving security problems such as finding the source of false or malicious information being spread through a network.

When designing a solution for a problem such as this one that has real-world applications, it is important to keep in mind that solutions should be realistic. This is one area where much of the previous work on identification of diffusion sources falls short. For example, much of the previous work assumes that snapshots of the entire network are available. In this paper, the authors propose five technical challenges that reflect common real-world conditions. They then propose a learning model that accurately detects diffusion sources under these conditions.

Both a theoretical analysis of the model and experimental validation are provided. Four of the datasets used for the experiments are synthetic, but one is based on a crawl of a real social network, further emphasizing the real-world applicability of these results. The results show that the proposed model outperforms benchmark models (meaning the predicted diffusion sources are closer to the actual diffusion sources) on a variety of datasets and conditions.

Reviewer:  Andrew Kalafut Review #: CR144342 (1607-0507)
Bookmark and Share
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Network Protocols": Date
An implementation of an automated protocol synthesizer (APS) and its application to the X.21 protocol
Ramamoorthy C. (ed), Dong S., Usuda Y. IEEE Transactions on Software Engineering SE-11(9): 886-908, 1985. Type: Article
Apr 1 1986
From state machines to temporal logic: specification methods for protocol standards
Schwartz R., Melliar-Smith P.  The analysis of concurrent systems (, Cambridge,651985. Type: Proceedings
Aug 1 1986
Reaching approximate agreement in the presence of faults
Dolev D., Lynch N., Pinter S., Stark E., Weihl W. Journal of the ACM 33(3): 499-516, 1986. Type: Article
Aug 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy