Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms
From MaRDI portal
Publication:6180230
Abstract: This monograph provides an overview of the mathematical theories and computational algorithm design for contagion source detection in large networks. By leveraging network centrality as a tool for statistical inference, we can accurately identify the source of contagions, trace their spread, and predict future trajectories. This approach provides fundamental insights into surveillance capability and asymptotic behavior of contagion spreading in networks. Mathematical theory and computational algorithms are vital to understanding contagion dynamics, improving surveillance capabilities, and developing effective strategies to prevent the spread of infectious diseases and misinformation.
Recommendations
- Controlling the spread of infectious diseases by using random walk method to remove many important links
- Social network analysis and its application in the prevention and control of propagation for public opinion and epidemics
- Diffusion source localization in large networks
- Inferring contagion patterns in social contact networks with limited infection data
- A network centrality game based on a compact representation of defender's belief for epidemic control
Cites work
- scientific article; zbMATH DE number 3523369 (Why is no real title available?)
- scientific article; zbMATH DE number 3548141 (Why is no real title available?)
- scientific article; zbMATH DE number 2061729 (Why is no real title available?)
- scientific article; zbMATH DE number 854567 (Why is no real title available?)
- A faster algorithm for betweenness centrality*
- A graph-theoretical basis of stochastic-cascading network influence: characterizations of influence-based centrality
- A novel approach for detecting multiple rumor sources in networks with partial observations
- A survey of statistical network models
- A tutorial introduction to Bayesian inference for stochastic epidemic models using Markov chain Monte Carlo methods
- An $O(n\log ^2 n)$ Algorithm for the kth Longest Path in a Tree with Applications to Location Problems
- An Algorithmic Framework for Estimating Rumor Sources With Different Start Times
- Analytic combinatorics
- Automata, Languages and Programming
- Bayesian Discovery of Threat Networks
- Bayesian inference for epidemics with two levels of mixing
- Constant time enumeration of bounded-size subtrees in trees and its application
- Counting linear extensions
- Diffusion source localization in large networks
- Distributing antidote using PageRank vectors
- Exponential Random Graphs as Models of Overlay Networks
- Finding Adam in random growing trees
- Hiding the Rumor Source
- Identifying Infection Sources and Regions in Large Networks
- Infection Spreading and Source Identification: A Hide and Seek Game
- Introduction to algorithms.
- Message Passing Optimization of Harmonic Influence Centrality
- Network security and contagion
- On Spreading a Rumor
- On the Properties of Gromov Matrices and Their Applications in Network Inference
- On the centroid of increasing trees
- On the identification of superspreaders for infectious disease
- Opinion fluctuations and disagreement in social networks
- Optimal Resource Allocation for Network Protection Against Spreading Processes
- PageRank beyond the web
- Persistence of centrality in random growing trees
- Physical zero-knowledge proof for ripple effect
- Probabilistic graphical models.
- Random disease on the square grid
- Rank Centrality: Ranking from Pairwise Comparisons
- Rumor source detection for rumor spreading on random increasing trees
- Rumors in a Network: Who's the Culprit?
- Scalable Algorithms for Data and Network Analysis
- Scalable influence maximization for independent cascade model in large-scale social networks
- Statistical Models
Cited in
(2)
This page was built for publication: Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6180230)