English
 
Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT
  Efficient Edge Immunization Strategies for Diffusion Containment in Social Networks

Liu, Y., Wang, X., Su, Z., Xiao, Y., Wang, Z. (2025 online): Efficient Edge Immunization Strategies for Diffusion Containment in Social Networks. - IEEE Transactions on Dependable and Secure Computing.
https://doi.org/10.1109/TDSC.2025.3629028

Item is

Files

show Files

Locators

show

Creators

show
hide
 Creators:
Liu, Yang1, Author
Wang, Xi1, Author
Su, Zhen2, Author           
Xiao, Yujing1, Author
Wang, Zhen1, Author
Affiliations:
1External Organizations, ou_persistent22              
2Potsdam Institute for Climate Impact Research, ou_persistent13              

Content

show
hide
Free keywords: -
 Abstract: We study algorithmic strategies to effectively contain diffusion via edge immunization. We consider the scenarios where the epidemic characteristics are known and unknown, and accordingly present approaches relying upon the epidemic dynamics and the network topology. In particular, for the former, we propose the greedy and inverse greedy immune schemes to greedily minimize the immune edge set, whose performance is guaranteed by the exhaustive search. We also present strategies to scale up the associated methods such that they can more efficiently obtain better solutions. For the latter, we find that the epidemic incidence of the immunized network is determined by both local and global connection patterns, characterized by the critical threshold in network epidemiology and the largest connected component in network percolation, respectively. Thus, we propose network topology-based strategies that obtain the immune edge set by simultaneously minimizing both the factors. We conduct extensive experiments on synthetic and empirical social networks to evaluate the proposed methods. Results show that our methods outperform the state-of-the-art by a large margin. Besides, the developed topology-based strategies can always obtain comparable results to the greedy strategies, which are computationally much cheaper than existing approaches and thus favorable to tackle large-scale networks.

Details

show
hide
Language(s): eng - English
 Dates: 2025-11-05
 Publication Status: Published online
 Pages: -
 Publishing info: -
 Table of Contents: -
 Rev. Type: Peer
 Identifiers: DOI: 10.1109/TDSC.2025.3629028
MDB-ID: No data to archive
PIKDOMAIN: RD4 - Complexity Science
Organisational keyword: RD4 - Complexity Science
 Degree: -

Event

show

Legal Case

show

Project information

show

Source 1

show
hide
Title: IEEE Transactions on Dependable and Secure Computing
Source Genre: Journal
 Creator(s):
Affiliations:
Publ. Info: -
Pages: - Volume / Issue: - Sequence Number: - Start / End Page: - Identifier: CoNE: https://publications.pik-potsdam.de/cone/journals/resource/1941-0018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)