2019
DOI: 10.1016/j.physa.2019.121262
|View full text |Cite
|
Sign up to set email alerts
|

Localization of diffusion sources in complex networks: A maximum-largest method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…Third, time-line correlation should be introduced into topic-level sub-event development trends [41]. Lastly, the approach of network reconstruction [42,43,44] can be integrated into content reconstruction.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Third, time-line correlation should be introduced into topic-level sub-event development trends [41]. Lastly, the approach of network reconstruction [42,43,44] can be integrated into content reconstruction.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…They employed a k-center method to identify multiple sources and the corresponding infection areas in general networks. [14] Other methods have also been proposed for source localization, including maximum likelihood estimation, [11,[15][16][17] statistical physics, [18][19][20][21] reverse propagation, [22][23][24][25][26][27][28][29][30][31][32][33][34] machine learning, [35,36] etc. [37][38][39] However, existing source localization research overlooks the signed nature of node connections, which is frequently encountered in signed networks, such as social networks that incorporate friend and enemy relationships.…”
Section: Introductionmentioning
confidence: 99%
“…[24] Building upon this work, Hu et al observed that the initial propagation time of the true source occurs at its maximum frequency in the referred initial propagation time matrix, leading to the proposal of a maximum-maximum source localization method. [30] Integer programming methods can improve accuracy, but observer selection remains random. [28] Nevertheless, the random observation method is still adopted, requiring a relatively large number of observers.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this limitation, researchers proposed to identify the sources based on limited observation (a) E-mail: yuanshanxiaowu@qq.com (b) E-mail: wangchao@xidian.edu.cn (corresponding author) [12,[20][21][22][23]. Specifically, several nodes on a network are selected as the observation nodes in the diffusion process, which can memorize the diffusion information, like the infected time.…”
mentioning
confidence: 99%
“…Fu et al [21] presented a novel backward diffusion-based method entitled the maximumminimum method (MMM) to locate sources with partial observations. But the accuracy of the MMM is susceptible to extreme values, which means the performance of the MMM may be undesirable when given a small fraction of observers [22]. Hu et al proposed the maximum largest method (MLM) which extends the MMM by changing the identifying strategy [22].…”
mentioning
confidence: 99%