Skip to main content
Log in

BPSL: a new rumor source location algorithm based on the time-stamp back propagation in social networks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Finding a rumor source is a major issue in the analysis of social networks. In this problem, the rumor source is usually estimated from a given diffusion snapshot. How to estimate the rumor source accurately is a challenging problem. Usually, the rumor source location problem is regarded as a node ranking problem. However, most of the existing algorithms ignore the structure of the infected subgraph or the randomness of the rumor spread. Therefore, they have defects in applicability and accuracy. To solve this problem, this paper takes into account the above two aspects at the same time, and propose a new algorithm to locate the rumor source, which is called Back Propagation Source Location(BPSL). The proposed algorithm contains an estimation method which is based on the time-stamp back propagation. This method makes the proposed algorithm’s accuracy outperform previous algorithms’ accuracy. Moreover, the susceptible-infected model is used to simulate the information spread of the networks. The steps of the proposed algorithm can be stated as follows. First, a new method based on the influence maximization is proposed to determine the observer set, which can greatly reduce the number of observer nodes. Second, a new estimation method based on the time-stamp back propagation is proposed to locate the source, which makes the proposed algorithm more accuracy and doesn’t change the structure of infected subgraph at the same time. Finally, the experimental results on two artificial networks and four real-world networks show the superiority of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Choi J, Moon S, Woo J, Son K, Shin J, Yi Y (2017) Rumor source detection under querying with untruthful answers. In: IEEE INFOCOM 2017-IEEE conference on computer communications. IEEE, pp 1–9

  2. Kesavareddigari H, Spencer S, Eryilmaz A, Srikant R (2019) Identification and asymptotic localization of rumor sources using the method of types. IEEE Trans Netw Sci Eng 7(3):1145

    Article  MathSciNet  Google Scholar 

  3. Shah D, Zaman T (2010) Detecting sources of computer viruses in networks: theory and experiment. In: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp 203–214

  4. Wasserman S, Faust K et al (1994) Social network analysis: Methods and applications (Cambridge university press, 1994)

  5. Xu S, Teng C, Zhou Y, Peng J, Zhang Y, Zhang ZK (2019) Identifying the diffusion source in complex networks with limited observers. Physica A: Statistical Mechanics and its Applications 527:1212670

    Google Scholar 

  6. Zhu K, Ying L (2014) Identifying the diffusion source in complex networks with limited observers. IEEE/ACM Trans Netw 24(1):408

    Article  Google Scholar 

  7. Xu W, Chen H (2015) Scalable rumor source detection under independent cascade model in online social networks. In: 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN). IEEE, pp 236–242

  8. Jiang J, Wen S, Yu S, Xiang Y, Zhou W (2016) Rumor source identification in social networks with time-varying topology. IEEE Trans Depend Sec Comput 15(1):166

    Article  Google Scholar 

  9. Choi J, Moon S, Shin J, Yi Y (2016) Estimating the rumor source with anti-rumor in social networks. In: 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE, pp 1–6

  10. Yu K, Jiang H, Li T, Han S, Wu X (2020) Data Fusion Oriented Graph Convolution network model for rumor detection. IEEE Trans Netw Serv Manag 17(4):2171

    Article  Google Scholar 

  11. Li L, Zhou J, Jiang Y, Huang B (2021) Propagation source identification of infectious diseases with graph convolutional networks. J Biomed Inform 116:103720

    Article  Google Scholar 

  12. Aghdam NH, Ashtiani M, Azgomi MA (2020) An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks. Inf Sci 513:465

    Article  MathSciNet  Google Scholar 

  13. Jiang C, Liu S, Lin Z, Zhao G, Duan R, Liang K (2016) Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networks. Knowl-Based Syst 111:237

    Article  Google Scholar 

  14. Nasution H, Jusuf H, Ramadhani E, Husein I (2020) Model of spread of infectious disease. System Rev Pharm 11(2)

  15. Xuan W, Ren R, Paré PE, Ye M, Ruf S, Liu J (2020) On a discrete-time network SIS model with opinion dynamics. IFAC-PapersOnLine 53(2):2582

    Article  Google Scholar 

  16. Church KE, Liu X (2019) Analysis of a sir model with pulse vaccination and temporary immunity: Stability, bifurcation and a cylindrical attractor. Nonlinear Anal Real World Appl 50:240

    Article  MathSciNet  Google Scholar 

  17. Wen S, Jiang J, Liu B, Xiang Y, Zhou W (2017) Using epidemic betweenness to measure the influence of users in complex networks. J Netw Comput Appl 78:288

    Article  Google Scholar 

  18. Ghersheen S, Kozlov V, Tkachev VG, Wennergren U (2019) Dynamical behaviour of SIR model with coinfection: the case of finite carrying capacity. Math Methods Appl Sci 42(17):5805

    Article  MathSciNet  Google Scholar 

  19. Mohapatra D, Panda A, Gouda D, Sahu SS (2020) A combined approach for k-seed selection using modified independent cascade model. In: Computational Intelligence in Pattern Recognition. Springer, pp 775–782

  20. Goldenberg J, Libai B, Muller E (2001) Talk of the network: A complex systems look at the underlying process of word-of-mouth. Market Lett 12(3):211

    Article  Google Scholar 

  21. Cui L, Hu H, Yu S, Yan Q, Ming Z, Wen Z, Lu N (2018) DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J Netw Comput Appl 103:119

    Article  Google Scholar 

  22. Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 199–208

  23. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 420–429

  24. Tang X, Wang J, Zhong J, Pan Y (2013). Essential proteins based on weighted degree centrality. IEEE/ACM Trans Comput Biol Bioinform 11(2):407

    Article  Google Scholar 

  25. Tang Y, Shi Y, Xiao X (2015) Influence maximization in near-linear time: A martingale approach. In: Proceedings of the 2015 ACM SIGMOD international conference on management of data, pp 1539–1554

  26. Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1029–1038

  27. Kalvit A, Borkar VS, Karamchandani N (2019) Stochastic approximation algorithms for rumor source inference on graphs. Performa Eval 132:1

    Article  Google Scholar 

  28. Zang W, Zhang P, Zhou C, Guo L (2014) Discovering multiple diffusion source nodes in social networks. Procedia Comput Sci 29:443

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China [Grant No.71772107], Shandong Nature Science Foundation of China [Grant No.ZR2020MF044].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moji Wei.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qiu, L., Sai, S. & Wei, M. BPSL: a new rumor source location algorithm based on the time-stamp back propagation in social networks. Appl Intell 52, 8603–8615 (2022). https://doi.org/10.1007/s10489-021-02919-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-02919-w

Keywords

Navigation