Deutsch
 
Datenschutzhinweis Impressum
  DetailsucheBrowse

Datensatz

DATENSATZ AKTIONENEXPORT
  Efficient Edge Immunization Strategies for Diffusion Containment in Social Networks

Liu, Y., Wang, X., Su, Z., Xiao, Y., Wang, Z. (2026): Efficient Edge Immunization Strategies for Diffusion Containment in Social Networks. - IEEE Transactions on Dependable and Secure Computing, 23, 2, 2693-2709.
https://doi.org/10.1109/TDSC.2025.3629028

Item is

Externe Referenzen

einblenden:

Urheber

einblenden:
ausblenden:
 Urheber:
Liu, Yang1, Autor
Wang, Xi1, Autor
Su, Zhen2, Autor           
Xiao, Yujing1, Autor
Wang, Zhen1, Autor
Affiliations:
1External Organizations, ou_persistent22              
2Potsdam Institute for Climate Impact Research, ou_persistent13              

Inhalt

einblenden:
ausblenden:
Schlagwörter: -
 Zusammenfassung: We study algorithmic strategies to effectively contain diffusion via edge immunization. We consider the scenarios where the epidemic characteristics are known and unknown, and accordingly present approaches relying upon the epidemic dynamics and the network topology. In particular, for the former, we propose the greedy and inverse greedy immune schemes to greedily minimize the immune edge set, whose performance is guaranteed by the exhaustive search. We also present strategies to scale up the associated methods such that they can more efficiently obtain better solutions. For the latter, we find that the epidemic incidence of the immunized network is determined by both local and global connection patterns, characterized by the critical threshold in network epidemiology and the largest connected component in network percolation, respectively. Thus, we propose network topology-based strategies that obtain the immune edge set by simultaneously minimizing both the factors. We conduct extensive experiments on synthetic and empirical social networks to evaluate the proposed methods. Results show that our methods outperform the state-of-the-art by a large margin. Besides, the developed topology-based strategies can always obtain comparable results to the greedy strategies, which are computationally much cheaper than existing approaches and thus favorable to tackle large-scale networks.

Details

einblenden:
ausblenden:
Sprache(n): eng - English
 Datum: 2025-11-052026-03-01
 Publikationsstatus: Final veröffentlicht
 Seiten: -
 Ort, Verlag, Ausgabe: -
 Inhaltsverzeichnis: -
 Art der Begutachtung: Expertenbegutachtung
 Identifikatoren: DOI: 10.1109/TDSC.2025.3629028
MDB-ID: No data to archive
PIKDOMAIN: RD4 - Complexity Science
Organisational keyword: RD4 - Complexity Science
 Art des Abschluß: -

Veranstaltung

einblenden:

Entscheidung

einblenden:

Projektinformation

einblenden:

Quelle 1

einblenden:
ausblenden:
Titel: IEEE Transactions on Dependable and Secure Computing
Genre der Quelle: Zeitschrift
 Urheber:
Affiliations:
Ort, Verlag, Ausgabe: -
Seiten: - Band / Heft: 23 (2) Artikelnummer: - Start- / Endseite: 2693 - 2709 Identifikator: CoNE: https://publications.pik-potsdam.de/cone/journals/resource/1941-0018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)