591
Views
0
CrossRef citations to date
0
Altmetric
Theory and Methods

Permutation Tests for Infection Graphs

ORCID Icon &
Pages 770-782 | Received 19 Oct 2017, Accepted 22 Nov 2019, Published online: 22 Jan 2020

References

  • Albert, R., Jeong, H., and Barabási, A.-L. (2000), “Error and Attack Tolerance of Complex Networks,” Nature, 406, 378–382. DOI: https://doi.org/10.1038/35019019.
  • Anderson, R. M., and May, R. M. (1992), Infectious Diseases of Humans: Dynamics and Control, Dynamics and Control, New York: Oxford University Press.
  • Angluin, D., Aspnes, J., and Reyzin, L. (2015), “Network Construction With Subgraph Connectivity Constraints,” Journal of Combinatorial Optimization, 29, 418–432. DOI: https://doi.org/10.1007/s10878-013-9603-2.
  • Banerjee, D. (2018), “Contiguity and Non-Reconstruction Results for Planted Partition Models: The Dense Case,” Electronic Journal of Probability, 23. DOI: https://doi.org/10.1214/17-EJP128.
  • Banerjee, D., and Ma, Z. (2017), “Optimal Hypothesis Testing for Stochastic Block Models With Growing Degrees,” arXiv no. 1705.05305.
  • Borgs, C., Brautbar, M., Chayes, J., Khanna, S., and Lucier, B. (2012), “The Power of Local Information in Social Networks,” in Proceedings of the 8th International Workshop on Internet and Network Economics, pp. 406–419.
  • Brautbar, M., and Kearns, M. (2010), “Local Algorithms for Finding Interesting Individuals in Large Networks,” in Innovations in Theoretical Computer Science.
  • Bubeck, S., Devroye, L., and Lugosi, G. (2017), “Finding Adam in Random Growing Trees,” Random Structures & Algorithms, 50, 158–172. DOI: https://doi.org/10.1002/rsa.20649.
  • Bubeck, S., Ding, J., Eldan, R., and Rácz, M. (2016), “Testing for High-Dimensional Geometry in Random Graphs,” Random Structures & Algorithms, 49, 503–532. DOI: https://doi.org/10.1002/rsa.20633.
  • Chen, W., Wang, C., and Wang, Y. (2010), “Scalable Influence Maximization for Prevalent Viral Marketing in Large-Scale Social Networks,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 1029–1038. DOI: https://doi.org/10.1145/1835804.1835934.
  • Christakis, N. A., and Fowler, J. H. (2007), “The Spread of Obesity in a Large Social Network Over 32 Years,” The New England Journal of Medicine, 357, 370–379. DOI: https://doi.org/10.1056/NEJMsa066082.
  • Cohen, R., Havlin, S., and Ben-Avraham, D. (2003), “Efficient Immunization Strategies for Computer Networks and Populations,” Physical Review Letters, 91, 247901. DOI: https://doi.org/10.1103/PhysRevLett.91.247901.
  • Domingos, P., and Richardson, M. (2001), “Mining the Network Value of Customers,” in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 57–66. DOI: https://doi.org/10.1145/502512.502525.
  • Dudas, G., Carvalho, L. M., Bedford, T., Tatem, A. J., Baele, G., Faria, N. R., Park, D. J., Ladner, J. T., Arias, A., Asogun, D., Bielejec, F., Caddy, S. L., Cotten, M., D’Ambrozio, J., Dellicour, S., Di Caro, A., Diclaro, J. W., Duraffour, S., Elmore, M. J., Fakoli, L. S., Faye, O., Gilbert, M. L., Gevao, S. M., Gire, S., Gladden-Young, A., Gnirke, A., Goba, A., Grant, D. S., Haagmans, B. L., Hiscox, J. A., Jah, U., Kugelman, J. R., Liu, D., Lu, J., Malboeuf, C. M., Mate, S., Matthews, D. A., Matranga, C. B., Meredith, L. W., Qu, J., Quick, J., Pas, S. D., Phan, M. V. T., Pollakis, G., Reusken, C. B., Sanchez-Lockhart, M., Schaffner, S. F., Schieffelin, J. S., Sealfon, R. S., Simon-Loriere, E., Smits, S. L., Stoecker, K., Thorne, L., Tobin, E. A., Vandi, M. A., Watson, S. J., West, K., Whitmer, S., Wiley, M. R., Winnicki, S. M., Wohl, S., Wölfel, R., Yozwiak, N. L., Andersen, K. G., Blyden, S. O., Bolay, F., Carroll, M. W., Dahn, B., Diallo, B., Formenty, P., Fraser, C., Gao, G. F., Garry, R. F., Goodfellow, I., Günther, S., Happi, C. T., Holmes, E. C., Kargbo, B., Keïta, S., Kellam, P., Koopmans, M. P. G., Kuhn, J. H., Loman, N. J., Magassouba, N., Naidoo, D., Nichol, S. T., Nyenswah, T., Palacios, G., Pybus, O. G., Sabeti, P. C., Sall, A., Ströher, U., Wurie, I., Suchard, M. A., Lemey, P., and Rambaut A (2017), “Virus Genomes Reveal the Factors That Spread and Sustained the West African Ebola Epidemic,” Nature, 544, 309–315. DOI: https://doi.org/10.1038/nature22040.
  • Fisher, R. A. (1935), The Design of Experiments, Edinburgh: Oliver and Boyd.
  • Godsil, C., and Royle, G. F. (2001), Algebraic Graph Theory (Vol. 207), New York: Springer Science & Business Media.
  • Gomez-Rodriguez, M., Song, L., Daneshmand, H., and Schölkopf, B. (2016), “Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-Thresholding Algorithm,” Journal of Machine Learning Research, 17, 1–29.
  • Good, P. (2013), Permutation Tests: A Practical Guide to Resampling Methods for Testing Hypotheses, Springer Series in Statistics, New York: Springer.
  • Huang, Y., Janardhanan, M. V., and Reyzin, L. (2017), “Network Construction With Ordered Constraints,” arXiv no. 1702.07292.
  • Jackson, M. O. (2008), Social and Economic Networks, Princeton, NJ: Princeton University Press.
  • Kempe, D., Kleinberg, J., and Tardos, E. (2003), “Maximizing the Spread of Influence Through a Social Network,” in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ‘03, New York, NY, USA, ACM, pp. 137–146. DOI: https://doi.org/10.1145/956750.956769.
  • Kesten, H. (1993), “On the Speed of Convergence in First-Passage Percolation,” The Annals of Applied Probability, 3, 296–338. DOI: https://doi.org/10.1214/aoap/1177005426.
  • Lehmann, E. L., and Romano, J. P. (2005), Testing Statistical Hypotheses, New York: Springer Science & Business Media.
  • Milling, C., Caramanis, C., Mannor, S., and Shakkottai, S. (2015), “Distinguishing Infections on Different Graph Topologies,” IEEE Transactions on Information Theory, 61, 3100–3120. DOI: https://doi.org/10.1109/TIT.2015.2424875.
  • Morris, M. (1993), “Epidemiology and Social Networks: Modeling Structured Diffusion,” Sociological Methods and Research, 22, 99–126. DOI: https://doi.org/10.1177/0049124193022001005.
  • Myers, S. A., Zhu, C., and Leskovec, J. (2012), “Information Diffusion and External Influence in Networks,” in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 33–41. DOI: https://doi.org/10.1145/2339530.2339540.
  • Netrapalli, P., and Sanghavi, S. (2012), “Learning the Graph of Epidemic Cascades,” in ACM SIGMETRICS Performance Evaluation Review (Vol. 40), ACM, pp. 211–222. DOI: https://doi.org/10.1145/2318857.2254783.
  • Newman, M. E. J. (2002), “Spread of Epidemic Disease on Networks,” Physical Review E, 66, 016128. DOI: https://doi.org/10.1103/PhysRevE.66.016128.
  • Pastor-Satorras, R., and Vespignani, A. (2002), “Immunization of Complex Networks,” Physical Review E, 65, 036104. DOI: https://doi.org/10.1103/PhysRevE.65.036104.
  • Potterat, J., Phillips-Plummer, L., Muth, S., Rothenberg, R., Woodhouse, D., Maldonado-Long, T., Zimmerman, H., and Muth, J. (2002), “Risk Network Structure in the Early Epidemic Phase of HIV Transmission in Colorado Springs,” Sexually Transmitted Infections, 78, i159–i163. DOI: https://doi.org/10.1136/sti.78.suppl_1.i159.
  • Shah, D., and Zaman, T. (2011), “Rumors in a Network: Who’s the Culprit?,” IEEE Transactions on Information Theory, 57, 5163–5181. DOI: https://doi.org/10.1109/TIT.2011.2158885.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.