Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2016 Jun 10;6:27538. doi: 10.1038/srep27538

Inference of causality in epidemics on temporal contact networks

Alfredo Braunstein 1,2,3,a,*, Alessandro Ingrosso 1,*
PMCID: PMC4901330  PMID: 27283451

Abstract

Investigating into the past history of an epidemic outbreak is a paramount problem in epidemiology. Based on observations about the state of individuals, on the knowledge of the network of contacts and on a mathematical model for the epidemic process, the problem consists in describing some features of the posterior distribution of unobserved past events, such as the source, potential transmissions, and undetected positive cases. Several methods have been proposed for the study of these inference problems on discrete-time, synchronous epidemic models on networks, including naive Bayes, centrality measures, accelerated Monte-Carlo approaches and Belief Propagation. However, most traced real networks consist of short-time contacts on continuous time. A possibility that has been adopted is to discretize time line into identical intervals, a method that becomes more and more precise as the length of the intervals vanishes. Unfortunately, the computational time of the inference methods increase with the number of intervals, turning a sufficiently precise inference procedure often impractical. We show here an extension of the Belief Propagation method that is able to deal with a model of continuous-time events, without resorting to time discretization. We also investigate the effect of time discretization on the quality of the inference.


Identifying past features of an epidemic outbreak remains a challenging problem even for simple stochastic epidemic models, such as the susceptible-infected (SI) model and the susceptible-infected-recovered (SIR) model. In recent years, this problem has received considerable attention, especially on discrete time models1,2,3,4,5. For these models, we recently proposed an approximate Bayesian method based on Belief Propagation (BP)6,7, that gave the first exact tractable solution to a family of discrete time inference problems on acyclic graphs and an excellent approximation on general graphs, including real ones. The problem addressed ranged from the inference of the epidemic source (the patient zero or index case), inference of the infection times and the epidemic parameters, all from the knowledge of the network plus a (partial, noisy) snapshot of the infection state of the system at a given instant.

In the last years, several precise spatio-temporal information about contacts between individuals in a community have been collected, representing close proximity8,9, social or sexual interactions10,11 and more. Each dataset consists of a time-stamped list of pairs of individuals. Seeking to explore characteristics of potential outbreaks, many authors studied the disease propagation over those communities employing compartment infection models such as SI and SIR. Technically, a simple way to achieve this is by computing a weighted discrete time network. This can be done by sub-dividing the time line into subintervals of length Δ (time-steps), aggregating all contacts falling in a given interval [tΔ,(t + 1)Δ] into a time-step dependent weight Inline graphic equal to Inline graphic, where λ is the probability of transmission in a single quasi-instantaneous contact and kt the number of contacts the interval8,6. Once this discrete time network has been constructed, the spread of infectious diseases on the community can be described through a discrete time SIR model, in which the transition probabilities between states defining each of these models depend on the time-step t. However, these coarsening methods naturally lead a loss of timing information and precision, becoming exact only in the limit of small Δ and a large number of intervals. Unfortunately, the computational time of both simulations and various inference algorithms typically increase with the number of time steps, making a sufficiently precise analysis unpractical, if not impossible in most cases. In the following, we will describe a very simple semi-continuous time stochastic model of infection dynamics that does not require coarsening or binning and is naturally equivalent to the Δ → 0 limit. For simplicity, we will concentrate on the SIR model, but all methods here can be naturally generalized to other variants such as SEIR8. We will then develop a semi-continuous time inference framework which is able to deal with contact network datasets without any discretization approximation, may it be implicit or explicit. The method will be shown to perform very well on two datasets of real contact networks, being able to reconstruct the epidemic source, the infection times and the infection causality tree with a great degree of accuracy in a wide range of parameters. In the concluding section, its performance will be compared to a discretized version of the model, showing that the inference performance under discretization approximations, although converging to the non-discretized one, does so in a range of discretization precision that renders it extremely unpractical.

Methods

A static model to describe dynamics

Let us consider an evolving contact network G composed of N nodes. Each node i is equipped with a time dependent state variable xi(t) ∈ {S, I, R} so that at time t it can be in one of three possible states: susceptible (S), infected (I), and recovered/removed (R). We will define our dynamical model as follows: let time Inline graphic be continuous, and contagion events be instantaneous with probability λ. Each pair of individuals (i, j) will be in contact in a discrete set of instants Tij(0) < Tij(1) < … < Tij(nij) (given by the real network traced dataset), where we assume for simplicity Tij(r) = ∞ for r > nij. As time advances, contagion to node j will happen at a time tj with probability λ if i is infected, j is susceptible and there exists a contact between the two nodes with some index ri such that Tij(ri) = tj. Let us define ti = min{t: xi(t) = I} the time at which node i gets infected (infection time) and gi = min{g: xi(ti + g) = R} the time passed before his recovery. Note that, as infections can only occur during contacts, each ti will be necessarily equal to the time of a contact. Let us define Inline graphic the index of the first possible such contacts. Recovery of individuals will happen at a time ti + gi, where gi follows a given recovery probability distribution with density G(gi). This parametrization is reversible, i.e. given ti and gi, it is easy to compute the state of xi(t) at any time t:

graphic file with name srep27538-m5.jpg

Since a node i has a finite probability to transmit the disease to a neighbor j in each of its contacts, one can compute the probability that the contagion will occur during the contact at time Inline graphic, assuming that node j is still susceptible, simply as Inline graphic. Note that after time ti + gi, contagion will not take place because node i will be recovered. Given {gk} and {rki}, infection time ti of a non-source node i must satisfy deterministically the condition ti = Fi({tk}, {gk}, {rki}) where

graphic file with name srep27538-m8.jpg

where ∂i denotes the set of neighbors of node i (i.e. nodes that share at least a contact with i) and it is conventionally assumed that the min is equal to +∞ if the set is empty. Eq. (2) must hold because each neighbor k will be in the infected state in the time interval Inline graphic, and will transmit at time Inline graphic; the transmission that arrives first will be the one that succeeds. Suppose now an epidemic spreading is initiated by a spreader node i0, which was infected at some time −ε < 0 before the first contact, which we conventionally fix at time t = 0. Our aim is to infer the initial spreader from just a single (possibly incomplete) observation of the state x(T) of the network at a later time T. The posterior distribution over the initial state of the networks can be easily written by means of Bayes theorem. In order to identify the initial spreader we should, in principle, maximize over the following posterior marginal probability:

graphic file with name srep27538-m11.jpg

we will give a very small prior probability γ to each initial seed, ensuring that configurations with more than one seed are overwhelmingly improbable (note that having at least one seed is necessary to explain any evidence of infection). The prior distribution S(ti) for the node i then reads:

graphic file with name srep27538-m12.jpg

where Inline graphic denotes the Kroenecker delta.

It is easy to see that (3) does not depend on ε. Indeed, for any ε′ > ε, Inline graphicInline graphic implying that the two posteriors only differ by a constant factor, that has no relevance in (3).

The posterior distribution of infection times can now be written as Inline graphic where

graphic file with name srep27538-m17.jpg

The patient zero problem can be recast as the one of computing single site marginals Inline graphic from the posterior distribution in equation (3). The problem of computing marginals over large dimensional probability distributions is in general intractable (NP-hard). In analogy with a previously introduced approximation method6,7, we will tackle this problem by means of Belief Propagation, a method which is exact on acyclic graphs, and that was shown to perform very well on random and real contact networks in the discrete time scenario.

For each node in the network, the BP algorithm provides an estimate of the posterior probability that the node got infected at a certain time, and thus also the probability that the node was the origin of the epidemics.

Graphical model formulation

In order to apply BP, we will first formulate an alternative expression with no continuous variables, as the numerical representation of their distributions is problematic. Note that variables ti are already discrete, as they live in the finite subset of the real line formed by all incoming contact times Inline graphic. Let us consider the ordered sequence of values Ti(0) < … < Ti(ni) in this subset, and define Ti(ni + 1) = ∞. To cope with continuous variables gi, we will define from gi a discrete variable Inline graphic, by exploiting the fact that Inline graphic (here Inline graphic is the indicator function of the condition in its argument), and that X and F are constant for gi inside an interval Inline graphic. We can recast (3) as

graphic file with name srep27538-m24.jpg

where Inline graphic. In order to simplify the structure of the probability distribution factorization, we will introduce the variables Inline graphic where

graphic file with name srep27538-m27.jpg

The introduction of sji variables allows to simplify the structure of equation (6):

graphic file with name srep27538-m28.jpg

where

graphic file with name srep27538-m29.jpg

Belief Propagation equations

To briefly describe the essence of the BP method, let us consider a probability distribution over the variables Inline graphic that has the following factorized form:

graphic file with name srep27538-m31.jpg

where Inline graphic is the subset of variables that Fa depends on. BP equations are a set of self-consistent relations linking the so-called cavity messages (or beliefs), a set of single-site probability distributions which are associated to each directed link in the graphical model defined by the joint distribution in equation (10). The general form of BP equations is the following:

graphic file with name srep27538-m33.jpg
graphic file with name srep27538-m34.jpg
graphic file with name srep27538-m35.jpg

where Fa is a factor, zi is a variable, ∂a is the subset of indices of variables in factor Fa and ∂i is the subset of factors that depend on zi. The terms Zia, Zai and Zi are local partition function, serving as normalizations. To solve equations (11) and (12) an iterative procedure is typically used, where the cavity messages are initialized with homogeneous distributions and they are asynchronously updated until convergence to a fixed point12,13. While the computation of equation (12) is straightforward, the summation in (11) often involves a number of steps growing exponentially with the size of ∂a. In a number of interesting contexts, though, it is possible to devise efficient methods for computing this sum, and so reducing the computational complexity of the BP updates.

The inference problem of equation (8) is interpreted as a partial marginalization of a factorized distribution as in equation (10). In this settings, there are only two types of BP message, namely Inline graphic and Inline graphic, and the corresponding updates are derived straightforwardly from equation (11). The node-to-factor BP messages, namely namely Inline graphic Inline graphic, can be computed very easily by virtue of equation (12).

Calling Inline graphic, the BP equations for ψi are

graphic file with name srep27538-m41.jpg
graphic file with name srep27538-m42.jpg
graphic file with name srep27538-m43.jpg

where (15) follows because

graphic file with name srep27538-m44.jpg
graphic file with name srep27538-m45.jpg
graphic file with name srep27538-m46.jpg

Similarly,

graphic file with name srep27538-m47.jpg

Note that values Inline graphic can be pre-computed in a matrix Inline graphic as each ti must be equal Inline graphic for some Inline graphic in {0, …, ni + 1}. The calculation of 16, 20 can be performed more efficiently by observing that all terms

graphic file with name srep27538-m52.jpg
graphic file with name srep27538-m53.jpg

can be computed in time Inline graphic. Then equations (14)–(20), , , , , , can be computed as

graphic file with name srep27538-m55.jpg
graphic file with name srep27538-m56.jpg

on a loop over the possible values of Inline graphic.

The pseudocode in Algorithm 1 illustrates the implementation of our BP algorithm in detail. Please note that at each iteration we store factor-to-variable messages and marginals for each variable, the variable-to-factor messages being easily extracted at each iteration in view of the simple relation:

graphic file with name srep27538-m58.jpg
graphic file with name srep27538-m87.jpg

The time complexity of the computation of all messages Inline graphic exiting node i is Inline graphic. Assuming a bounded number of contacts per individual ni, this scaling results in an update with a number of operations per BP iteration which is linear in the number of edges (i.e. the number of pairs of individuals that are in contact) in the full system. On a BP fixed point, equation (13) is used to compute the marginal probability mi(ti = −ε), which brings an estimation of the posterior probability Inline graphic for the node to be the active before the first contact. Note that, in the present case, the marginal mi(ti) is equal to the message Inline graphic. In the event that BP doesn’t converge, reliable information can be extracted equivalently from the average value over iterations of the marginals mi(ti), that we call Inline graphic.

Results

Patient zero detection in two large real contact time networks

We tested our methods on two large evolving networks: a database of time-stamped sexual interactions and a network of face-to-face contacts in a high school.

For each dataset, we simulated a large number of epidemic propagations, each one initiated from a unique random source (the patient zero, or seed). The nodes in the network are then ranked in decreasing order of their estimated posterior probability of being the origin of the observed epidemics: the position of the true origin in the ranking provided by the algorithm is a good measure of the efficacy of the method. In what follows, i0 stands for the index of the true origin of the epidemics, its rank being indicated by r0 = rank(i0). For simplicity, we will always consider homogeneous epidemic parameters λij = λ and G(gi) an exponential distribution with rate constant μ.

The first dataset comes from a database of sexual encounters between clients and escorts on a Brazilian website, covering the beginning of the community, September 2002 through October 2008, and composed of a total of E = 50185 contacts between between 6642 escorts and 10106 sex-buyers. This kind of data are particularly relevant in the study of spreading of Sexually Transmitted Infections (STI), and have been previously used to model the diffusion of HIV by means of simple SI-SIR compartmental models11. We build a bipartite evolving network, focusing on the last two available years of operation of the website (E = 29628 contacts, slightly over half of the dataset) in order to skip the initial period where reporting of encounters are very sparse and incomplete. For each value of λ, we simulate M = 1000 single source epidemic propagations, with a recovery rate equal to μ = 0.5/year. Concerning algorithmic efficiency, the efficient implementation of the BP updates presented in the previous section allows us to perform inference in large-scale contact network with a remarkably small computational cost. As an example, a parallel C++ implementation with 5 concurrent processes took roughly 11 minutes to converge to a solution with rank(i0) = 1 (perfect identification of the source) on a single instance with an epidemic size of NIR = 1810 individuals, obtained with λ = 0.4 and μ = 0.5/year.

In Fig. 1 we show the average absolute rank r0 of the true first infected individual i0 as a function of the epidemic size NIR = |I| + |R| (i.e. the number of infected and recovered sites), whose values are discretized in intervals of width equal to 0.1. The low values of the rank show the effectiveness of the method.

Figure 1. Left: Average absolute rank r0 of the true patient zero as a function of the epidemic size NIR = |I| + |R| for μ = 0.5/year and increasing values of the infection probability λ in the network of sexual contacts.

Figure 1

Each curve represents a sample of M = 1000 random instances. Lines are guide to the eye. Right: probability distribution of rank i0 over the same epidemics for each value of λ.

The second dataset consists of a collection of Close Proximity Interactions (CPIs) obtained by means of wireless sensor network technology (TelosB motes)8. Data were collected in a US high school and provide an almost complete account of face-to-face interactions during a whole day at school. All in all 798 individuals were monitored, corresponding to the 94% of the total school community, and 2148991 unique Close Proximity Records (CPR) were acquired. A single CPR corresponds to a close proximity detection event between two motes (max. 3 meters). The authors of the study perform an aggregation of the raw data in interactions, defined as continuous sequences of CPRs between the same two nodes. Our choice was to go back to the raw data and investigate the spreading process at the level of single CPRs, using the intensity signal as a proxy for the closeness of a face-to-face contact (a detailed account is present in Salathe et al - Supplementary Information8). We constructed a set of evolving networks by setting a threshold θint for the signal intensity of the motes, thus resulting in denser networks for smaller θint, where more weaker (and distant) contacts are taken into account. A second interesting possibility could be to allow for a probability of contagion that depends on the proximity (i.e. the strength of the signal). We did not persue this route as the dependence of probability cf contagion on the distance is hard to determine (to our knowledge, no study provides this information for known diseases), and moreover we don’t have information on the correspondence between signal strength and distance. Besides, a threshold-like dependence on the distance could be adequate for contagion of many infectious diseases, such as non-airborne ones. In any case, the analysis technique presented here can be adapted directly to the case of contact-dependent probability would the needed modelling information mentioned above be available in the future.

Three representative examples are show in Fig. 2, which displays the average rank of the true first infected individual i0 for different values of λ and threshold θint. Two values of λ = 0.3, 0.4 are explored for θint = 250. Then we attempted with the much denser graph resulting of considering θint = 245. Here the infection probability λ has been chosen to maintain the same average number of infections as the case θint = 250, λ = 0.3.

Figure 2. Left: Average abolute r0 = rank(i0) as a function of the total epidemic size NIR = |I| + |R| in the network of face-to-face contacts in a high school for different values of the threshold θint.

Figure 2

Each curve is an average over M = 1000 (θint = 250) or M = 300 (θint = 245) random instances. Lines are guide to the eye. Right: probability distribution of ranki0 over same epidemics for the three set of parameters.

Reconstruction of causality

Consider the problem of inferring for each non-susceptible individual i at time T, the individual k from which he contracted the infection. The probability pktoi of such transmission event corresponds to

graphic file with name srep27538-m75.jpg

Once pki has been computed for every (ordered) pair (ki), a prediction will be formed by the subset of pairs with probability larger than a given threshold. A receiver operating charasteristic (ROC) curve can be computed by considering the performance for all possible thresholds. The ROC curve for an instance of an outbreak on the sexual contacts dataset is shown in Fig. 3, along with the inferred pairs in one single point of the curve. It is evident that a large fraction of the entire history of the propagation can be reconstructed with a high degree of reliability, despite the apparently limited amount of information available in a single observation of the nodes’ states.

Figure 3. Reconstruction of the causal history of transmissions on a simulated epidemic outbreak on a sexual contact network infecting 719 individuals (black dots) from a snapshot of the infection state at time 2y (corresponding to the outer dashed semicircle).

Figure 3

The figure represents the tree of transmissions in the outbreak originated in the central node (time flows in the outwards radial direction). Radial segments correspond to 718 true transmission events. The 4130 oriented pairs of infected individuals that were in contact were ordered by their decreasing estimated posterior probability of transmission. A ROC curve (area equal to 0.898) of the ordered list is shown in the top right panel, with the black point corresponding to the main figure. In the main figure, red full radial segments correspond to 202 correctly inferred transmissions (true positives, TP), black ones to non-inferred transmissions (false negatives, FN) and red dashed lines to the 16 wrongly predicted transmissions (false positives, FP).

For a comparison between the true infection times Inline graphic of each node and the ones that can be inferred by our method, we show in the left panel of Fig. 4 a scatter plot of Inline graphic versus Inline graphic for a single epidemic cascade in the network of sexual contacts, with epidemic parameters λ = 0.4 and μ = 0.5/year (in the resulting epidemics the number of infected individuals is |I| = 991, total epidemic size being NIR = 1070). The infection times Inline graphic have been simply obtained by averaging over the marginal posterior distribution Inline graphic of single-node infection times. In addition, we show in the right panel of Fig. 4 the Average Time Error (ATE) between ttrue and Inline graphic, which we define as Inline graphic, for a set of 200 different samples of simulated epidemic outbreaks in the same network and with the same epidemic parameters as in the previous example. The reconstruction of the dynamical history is remarkably good over a wide range of epidemic sizes.

Figure 4. Left panel: inferred vs true infection time for a single epidemic cascade in the network of sexual contacts.

Figure 4

Epidemic parameters are λ = 0.4 and μ = 0.5/year. The vertical bars represent the standard deviation of the inferred infection time computed from the BP marginals. The zero patient, highlighted in orange, is correctly identified as the first infected individual. Right panel: Average Time Error (ATE) sorted as a function of the epidemic size NIR in 140 samples (we simulated 200 epidemic cascades and then focused on samples with NIR > 20, where enough information is present at the time of observation). Epidemic parameters are the same as in the left plot, each point represents the ATE value for a single epidemic cascade. The orange dot corresponds to the cascade on the left panel.

Partial and noisy observations

It is not difficult to extend the present model to account for observations affected by some kind of uncertainty. One simply introduces the Observational Transition Matrix (OTM) oi(yi|xi), containing the transition probabilities from the true state xi to the observed state: in order to perform inference, one has to some over all the possible true unobserved states with a weight given by the corresponding entry in the OTM, a task which is easily accomplished in the BP inference scheme. The identity matrix oi(yi|xi) = δ[yi; xi] corresponds to the a case in which no noise enters the observations. Please note that, in this generalized scheme, we can simply take into account partial observability with a totally flat OTM Inline graphic for unobserved nodes.

Firstly, we consider the case of partial observations, i.e. the case in which only a subset of nodes are accessible for observation at time T: this is the standard realistic scenario in practical applications, when a complete monitoring of a full network is infeasible in the general case. We simulate a number of epidemic spreading in the contact network and model the partial observability by a fixed probability pob of observing a node at time T. In what follows, we will use the sexual encounters dataset, mostly because of its epidemiological relevance.

Results for decreasing values of pob in the network of sexual contacts are shown in the left panel of Fig. 5 (the complete observation case pob = 1 is shown in the dashed line for reference). The BP method happens to be highly resilient even with a high amount of hidden information at time of observation T.

Figure 5. Inference performance with partial or noisy observations in the network of sexual contacts.

Figure 5

In each curve we show the average normalized rank over M = 100 random instances of the true patient zero i0 as a function of the total epidemic size NIR = |I| + |R| for λ = 0.2, μ = 0.5/year. Left panel: r0 = rank(i0) normalized over |G| vs NIR for different values of probability of observation pobs; dashed curve is the case with full observations. Right panel: normalized r0 = rank(i0) vs NIR for different noise intensity ν; dashed curve is the case with no noise. Lines are guide to the eye.

Turning to the problem of uncertain observations, we use a very simple symmetric model for observational noise. Let us consider the following OTM:

graphic file with name srep27538-m84.jpg

This matrix describes a kind of symmetric noise, where a node that is in the state x has a probability 1 − ν of being correctly observed in its state, and a probability ν of being observed incorrectly in one of the other two states. Suppose, for example, node i is S (susceptible) at observation time T: for a given noise probability ν, there is an equal probability Inline graphic for the node i to be observed in the R (recovered) or I (infected) state - the same holds for the others two cases, equivalently. In Fig. 5, right panel, we show that our BP algorithm is highly robust even to a significant amount of noise, up to 30%.

Discretization and binning

In order to ascertain the eventual loss of inference precision due to time-discretization, we performed the following experiment on the sexual intercourse dataset10. We generated M = 100 random epidemics with the semi-continuous time model with instantaneous probability of transmission λ.

Separately, for each value of T = 10, 15, 20, 25 we produced a discrete time temporal network from by sub-dividing the time interval [t0, t1] into T equal subintervals (time-steps) of length Δ = (t1 − t0)/T, aggregating all contacts falling in a given interval [tΔ; (t + 1)Δ] into a time-step dependent weight Inline graphic, where kt is the number of contacts in the interval8,6.

We then performed the inference analysis on the M previously generated epidemics both in the discretized network with the the discrete-time BP algorithm6 and using the semi-continuous time inference BP algorithm presented here. We investigated the difference in performance for different combinations of the epidemic parameters, noting that the semi-continuous time method strikingly outperforms the discretization procedure in all cases. As an example, we show in Fig. 6 a comparison of the continuous time method versus the discretized version for λ = 0.4 and μ = 0.5/year with an increasing number of time bins.

Figure 6. Left: Comparison between the continuous time method and the discretized version in the network of sexual contacts for infection probability λ = 0.4 and μ = 0.5/year.

Figure 6

Each curve is the average absolute rank r0 over M = 100 samples as a function of the epidemic size NIR. Full curve: continuous time version. Dashed curves: contacts have been aggregated in effective contacts so that final time of observation T is systematically increased from T = 10 to T = 25. Lines are guide to the eye. Right: probability distribution of rank i0 over the same epidemics for the four values of T. The distribution for the continuous case has been omitted since probability is extremely concentrated around r0 = 1 and appears off-scale.

Discussion

In this work, we developed an inference framework to analyze the dynamics of infection in temporal contact networks with continuous or very fine-grained time resolution. We showed by means of simulations on real contact networks how the approach is able to reconstruct with great degree of accuracy both the source of the epidemics, the infection times and the underlying epidemic causal history from the mere observation of the state of the system (noisy or incomplete) at a single instant in a wide range of parameters.

Moreover, we were able to quantify the loss of information due to time-discretization, demonstrating a remarkable improvement with continuous time inference when compared with time discretized data even for a relatively large number of time sub-intervals.

It would be interesting to apply this technique on other relatively closed communities where the interactions can be monitored but the infections themselves are hidden, such as in hospital wards14 and for applications to computer virus forensics4. The ability to reconstruct the epidemic history and causality of transmissions could prove to be helpful to devise better containment strategies. In those cases, generalizations of the method to epidemic models related to SIR such as SEIR and other distributions of recovery time different from exponential could be necessary.

Additional Information

How to cite this article: Braunstein, A. and Ingrosso, A. Inference of causality in epidemics on temporal contact networks. Sci. Rep. 6, 27538; doi: 10.1038/srep27538 (2016).

Acknowledgments

AB acknowledges support by Fondazione CRT under the initiative “La Ricerca dei Talenti”.

Footnotes

Author Contributions A.B. and A.I. conceived the experiments, conducted the experiments and analyzed the results. All authors reviewed the manuscript.

References

  1. Antulov-Fantulin N., Lancic A., Stefancic H., Sikic M. & Smuc T. Statistical Inference Framework for Source Detection of Contagion Processes on Arbitrary Network Structures. In 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 78–83 (2014).
  2. Lokhov A. Y., Mézard M., Ohta H. & Zdeborová L. Inferring the origin of an epidemic with a dynamic message-passing algorithm. Phys. Rev. E 90, 012801 (2014). [DOI] [PubMed] [Google Scholar]
  3. Pinto P. C., Thiran P. & Vetterli M. Locating the source of diffusion in large-scale networks. Physical Review Letters 109, 068702 (2012). [DOI] [PubMed] [Google Scholar]
  4. Shah D. & Zaman T. Detecting sources of computer viruses in networks: theory and experiment. ACM SIGMETRICS Performance Evaluation Review 38, 203–214 (2010). [Google Scholar]
  5. Shah D. & Zaman T. Rumors in a network: Who’s the culprit? Information Theory, IEEE Transactions on 57, 5163–5181 (2011). [Google Scholar]
  6. Altarelli F., Braunstein A., Dall’Asta L., Lage-Castellanos A. & Zecchina R. Bayesian inference of epidemics on networks via belief propagation. Physical Review Letters 112, 118701 (2014). [DOI] [PubMed] [Google Scholar]
  7. Altarelli F., Braunstein A., Dall’Asta L., Ingrosso A. & Zecchina R. The patient-zero problem with noisy observations. Journal of Statistical Mechanics: Theory and Experiment 2014, P10016 (2014). [Google Scholar]
  8. Salathé M. et al. A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences 107, 22020–22025 (2010). [DOI] [PMC free article] [PubMed] [Google Scholar]
  9. Isella L. et al. What’s in a crowd? analysis of face-to-face behavioral networks. Journal of Theoretical Biology 271, 166–180 (2011). [DOI] [PubMed] [Google Scholar]
  10. Rocha L. E. C., Liljeros F. & Holme P. Information dynamics shape the sexual networks of internet-mediated prostitution. Proceedings of the National Academy of Sciences 107, 5706–5711 (2010). [DOI] [PMC free article] [PubMed] [Google Scholar]
  11. Rocha L. E. C., Liljeros F. & Holme P. Simulated epidemics in an empirical spatiotemporal network of 50,185 sexual contacts. PLoS Comput Biol 7, e1001109 (2011). [DOI] [PMC free article] [PubMed] [Google Scholar]
  12. Yedidia J. S., Freeman W. T. & Weiss Y. Bethe free energy, kikuchi approximations, and belief propagation algorithms. Advances in neural information processing systems 13 (2001). [Google Scholar]
  13. Mézard M. & Montanari A. Information, Physics, and Computation (Oxford University Press, 2009). [Google Scholar]
  14. Vanhems P. et al. Estimating Potential Infection Transmission Routes in Hospital Wards Using Wearable Proximity Sensors. PLoS ONE 8, e73970 (2013). [DOI] [PMC free article] [PubMed] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES