Blocking Self-Avoiding Walks Stops Cyber-Epidemics: A Scalable GPU-Based Approach

IEEE Transactions on Knowledge and Data Engineering - Tập 32 Số 7 - Trang 1263-1275 - 2020
Hung T. Nguyen1, Alberto Cano1, Tam Vu2, Thang N. Dinh1
1Department of Computer Science, Virginia Commonwealth University, Richmond, USA
2Department of Computer Science, University of Colorado at Boulder, Boulder, USA

Tóm tắt

Cyber-epidemics, the widespread of fake news or propaganda through social media, can cause devastating economic and political consequences. A common countermeasure against cyber-epidemics is to disable a small subset of suspected social connections or accounts to effectively contain the epidemics. An example is the recent shutdown of 125,000 ISIS-related Twitter accounts. Despite many proposed methods to identify such a subset, none are scalable enough to provide high-quality solutions in nowadays’ billion-size networks. To this end, we investigate the Spread Interdiction problems that seek the most effective links (or nodes) for removal under the well-known Linear Threshold model. We propose novel CPU-GPU methods that scale to networks with billions of edges, yet possess rigorous theoretical guarantee on the solution quality. At the core of our methods is an $O(1)$O(1)-space out-of-core algorithm to generate a new type of random walks, called Hitting Self-avoiding Walks ($\mathsf{HSAW}$HSAWs). Such a low memory requirement enables handling of big networks and, more importantly, hiding latency via scheduling of millions of threads on GPUs. Comprehensive experiments on real-world networks show that our algorithms provide much higher quality solutions and are several orders of magnitude faster than the state-of-the art. Comparing to the (single-core) CPU counterpart, our GPU implementations achieve significant speedup factors up to 177x on a single GPU and 338x on a GPU pair.

Từ khóa

#Spread interdiction #self-avoiding walks #GPUs

Tài liệu tham khảo

10.1109/TPDS.2013.41

10.1002/widm.1232

10.1016/j.comnet.2013.04.002

10.1137/1.9781611972825.40

2017

10.1145/1772690.1772751

10.1109/FOCS.2015.49

du, 2013, Scalable influence estimation in continuous-time diffusion networks, Proc 26th Int Conf Neural Inf Process Syst, 3147

10.1145/1514888.1514892

10.1186/s13673-014-0014-x

10.1145/956750.956769

10.1145/2370036.2145832

10.1145/1718487.1718518

cha, 2010, Measuring user influence in twitter: The million follower fallacy, Proc 4th Int AAAI Conf Weblogs Social Media, 10

10.1145/2723372.2723734

10.1109/TKDE.2016.2605088

10.1016/S0020-0190(99)00031-9

10.1109/INFOCOM.2016.7524377

10.1109/ICDM.2010.118

10.1145/3143314.3078526

10.1109/TKDE.2017.2745562

10.14778/3099622.3099623

2017

2017, Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks

gentzkow, 2017, Social media and fake news in the 2016 election

10.1007/978-3-319-21786-4_8

10.1145/2588555.2593670

10.1145/2396761.2396795

10.1109/ICDM.2013.47

10.1007/978-3-540-89197-0_94

2017

10.1145/2623330.2623704

2017

10.1109/TKDE.2016.2566618

knuth, 1998, The Art of Computer Programming Vol II Seminumerical Algorithms

vigna, 2017, xorshift*/xorshift+ generators and the PRNG shootout

10.4086/toc.2015.v011a004

10.1145/2833179.2833188

10.1145/2882903.2882959

10.1145/2674005.2674994

10.1090/cbms/107

10.1145/2882903.2915207