Home >

news Help

Publication Information


Title
Japanese: 
English:Pre-Emptive Spectral Graph Protection Strategies on Multiplex Social Networks 
Author
Japanese: Wijayanto Arie Wahyu, 村田剛志.  
English: Arie Wahyu Wijayanto, Tsuyoshi MURATA.  
Language English 
Journal/Book name
Japanese: 
English:Applied Network Science 
Volume, Number, Page Vol. 3    No. 5    pp. 1-24
Published date Apr. 11, 2018 
Publisher
Japanese: 
English:Springer 
Conference name
Japanese: 
English: 
Conference site
Japanese: 
English: 
Official URL https://appliednetsci.springeropen.com/articles/10.1007/s41109-018-0061-8
 
DOI https://doi.org/10.1007/s41109-018-0061-8
Abstract Constructing effective and scalable protection strategies over epidemic propagation is a challenging issue. It has been attracting interests in both theoretical and empirical studies. However, most of the recent developments are limited to the simplified single-layered networks. Multiplex social networks are social networks with multiple layers where the same set of nodes appear in different layers. Consequently, a single attack can trigger simultaneous propagation in all corresponding layers. Therefore, suppressing propagation in multiplex topologies is more challenging given the fact that each layer also has a different structure. In this paper, we address the problem of suppressing the epidemic propagation in multiplex social networks by allocating protection resources throughout different layers. Given a multiplex graph, such as a social network, and k budget of protection resources, we aim to protect a set of nodes such that the percentage of survived nodes at the end of epidemics is maximized. We propose MultiplexShield, which employs the role of graph spectral properties, degree centrality and layer-wise stochastic propagation rate to pre-emptively select k nodes for protection. We also comprehensively evaluate our proposal in two different approaches: multiplex-based and layer-based node protection schemes. Furthermore, two kinds of common attacks are also evaluated: random and targeted attack. Experimental results show the effectiveness of our proposal on real-world datasets.

©2007 Tokyo Institute of Technology All rights reserved.