• DocumentCode
    245307
  • Title

    Keynote Speech VI

  • Author

    Wanlei Zhou ; Deakin, Alfred

  • Author_Institution
    Deakin Univ., Geelong, VIC, Australia
  • fYear
    2014
  • fDate
    19-21 Dec. 2014
  • Abstract
    It has long been a significant but difficult problem to identify propagation sources based on limited knowledge of network structures and the varying states of network nodes. In practice, real cases can be locating the sources of rumors in online social networks and finding origins of a rolling blackout in smart grids. This talk reviews the state-of-the art in source identification techniques, and discusses the pros and cons of current methods in this field. Furthermore, in order to gain a quantitative understanding of current methods, we provide a series of experiments and comparisons based on various environment settings. Especially, our observation reveals considerable differences in performance by employing different network topologies, various propagation schemes and diverse propagation probabilities. We therefore reach a number of points for future work and list some open issues of current methods. Solutions to these open issues are of great academic and practical significance. This talk will be based on the following papers: 1. Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, and Weijia Jia, "Modeling Propagation Dynamics of Social Network Worms", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633-1643, Aug. 2013. 2. Yini Wang, Sheng Wen, Yang Xiang, and Wanlei Zhou, "Modeling the Propagation of Worms in Networks: A Survey", IEEE Communications Surveys and Tutorials, Volume:16, Issue:2, pp 942-960, 2014. 3. Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, and Cliff C.Zou "Modeling and Analysis on the Propagation Dynamics of Modern Email Malware", IEEE Transactions on Dependable and Secure Computing, VOL. 11, NO. 4, pp. 361-374, JULY/AUGUST 2014. 4. Sheng Wen, Jiaojiao Jiang, Yang Xiang, Shui Yu, and Wanlei Zhou, "Are the Popular Users Always Important for the Information Dissemination in Online Social Networks?" IEEE Network, pp. 64-67, September/October 2014. 5. Sheng Wen, Mohammad Sayad Haghighi, Cha- Chen, Yang Xiang, Wanlei Zhou, and Weijia Jia, "A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks", Accepted by IEEE Transactions on Computers, accepted 5/12/2013. Available online: http://ieeexplore.ieee.org /stamp/stamp.jsp?tp=&arnumber=6714520 6. Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, and Ekram Hossain, "Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies", Accepted by IEEE Communications Surveys and Tutorials, accepted 17/9/2014.
  • Keywords
    grid computing; probability; social networking (online); network structures; network topologies; online social networks; propagation probabilities; propagation sources; smart grids; source identification techniques;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4799-7980-6
  • Type

    conf

  • DOI
    10.1109/CSE.2014.32
  • Filename
    7023543