dc.contributor.authorLuo, Wuqiong
dc.contributor.authorTay, Wee Peng
dc.contributor.authorLeng, Mei
dc.date.accessioned2017-07-28T01:47:29Z
dc.date.available2017-07-28T01:47:29Z
dc.date.issued2016
dc.identifier.citationLuo, W., Tay, W. P., & Leng, M. (2016). Infection Spreading and Source Identification: A Hide and Seek Game. IEEE Transactions on Signal Processing, 64(16), 4228-4243.en_US
dc.identifier.issn1053-587Xen_US
dc.identifier.urihttp://hdl.handle.net/10220/43480
dc.description.abstractThe goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. On the other hand, the network administrator aims to identify the source node based on knowledge of which nodes have been infected. We model the infection spreading and source identification problem as a strategic game, where the infection source and the network administrator are the two players. As the Jordan center estimator is a minimax source estimator that has been shown to be robust in recent works, we assume that the network administrator utilizes a source estimation strategy that can probe any nodes within a given radius of the Jordan center. Given any estimation strategy, we design a best-response infection strategy for the source. Given any infection strategy, we design a best-response estimation strategy for the network administrator. We derive conditions under which a Nash equilibrium of the strategic game exists. Simulations in both synthetic and real-world networks demonstrate that our proposed infection strategy infects more nodes while maintaining the same safety margin between the true source node and the Jordan center source estimator.en_US
dc.description.sponsorshipMOE (Min. of Education, S’pore)en_US
dc.format.extent32 p.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesIEEE Transactions on Signal Processingen_US
dc.rights© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TSP.2016.2558168].en_US
dc.subjectInfection sourceen_US
dc.subjectRumor sourceen_US
dc.titleInfection Spreading and Source Identification: A Hide and Seek Gameen_US
dc.typeJournal Article
dc.contributor.researchTemasek Laboratoriesen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.identifier.doihttp://dx.doi.org/10.1109/TSP.2016.2558168
dc.description.versionAccepted versionen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record