Significance
In this article, we bridge the disconnect between how spreading processes propagate and evolve in real life and the current mathematical and simulation models that ignore evolutionary adaptations. We propose a mathematical theory that reveals the effects of evolutionary adaptations on spreading processes in complex networks and highlights the shortcomings of classical epidemic models that do not capture evolution. Our work provides substantive developments to the classical theory of network epidemics and paves the way for exploring depths and revealing insights on the emergence phenomenon.
Keywords: evolution, spreading processes, information propagation, epidemics
Abstract
A common theme among previously proposed models for network epidemics is the assumption that the propagating object (e.g., a pathogen [in the context of infectious disease propagation] or a piece of information [in the context of information propagation]) is transferred across network nodes without going through any modification or evolutionary adaptations. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions, and information is often modified by individuals before being forwarded. In this article, we investigate the effects of evolutionary adaptations on spreading processes in complex networks with the aim of 1) revealing the role of evolutionary adaptations on the threshold, probability, and final size of epidemics and 2) exploring the interplay between the structural properties of the network and the evolutionary adaptations of the spreading process.
A common theme among previously proposed models for network epidemics is the assumption that the propagating object (e.g., a virus or a piece of information) is transferred across the nodes without going through any modification or evolution (1–11). However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions (12–16), and information is often modified by individuals before being forwarded (17, 18). In fact, 60% of the (approximately) 400 emerging infectious diseases that have been identified since 1940 are zoonotic (19, 20). A zoonotic disease is initially poorly adapted, poorly replicated, and inefficiently transmitted (21); hence, its ability to go from animal-to-human transmissions to human-to-human transmissions depends on the pathogen evolving to a strain that is well adapted to the human host.
Similar patterns of evolution are observed in the way that information propagates among individuals. Needless to say, one observes on a daily basis how information mutates unintentionally or perhaps, intentionally by an adversary on social media platforms (17). At a high level, an individual may mutate the information by exaggeration, hoping for her variant to go viral. Mutations may also occur unintentionally. In particular, Dawkins (22) argued that ideas and information spread and evolve between individuals with patterns similar to genes in a sense that they self-replicate, mutate, and respond to selective pressure as they interact with their host.
In this article, we aim to bridge the disconnect between how spreading processes propagate and evolve in real life and the current mathematical and simulation models that do not capture evolution. In particular, we investigate the effects of evolutionary adaptations on spreading processes with the aim of 1) revealing the role of evolutionary adaptations on the threshold, probability, and final size of epidemics and 2) understanding the interplay between the structural properties of the network and the evolutionary adaptations of the spreading process. Throughout, we use the term strain to denote a pathogen strain in the context of infectious disease propagation or a particular variation of the information in the context of information propagation.
In modeling the evolution of spreading processes, we adopt the multiple-strain model that was introduced by Alexander and Day in ref. 13. We develop a mathematical theory that fully characterizes the process and accurately predicts the epidemic threshold, expected epidemic size, and the expected fraction of individuals infected by each strain (all at steady state). In addition to the mathematical theory, we perform extensive simulations on random graphs with arbitrary degree distributions [generated by the configuration model (23–25)] as well as on real-world networks [obtained from the SNAP (Stanford Network Analysis Platform) dataset (26, 27)] to verify our theory and reveal the significant shortcomings of the classical mathematical models that do not capture evolution. In particular, we show that the classical, single-type bond percolation models (28–30) may accurately predict the threshold and final size of epidemics, but their predictions on the probability of emergence are significantly inaccurate on both random and real-world networks. This inaccuracy highlights a fundamental disconnect between the classical single-type, bond percolation models and real-life spreading processes that entail evolutionary adaptations.
Results
A Model for Evolutionary Adaptations.
In ref. 13, Alexander and Day proposed the multiple-strain model that accounts for evolution. Their model is captured by two matrices, namely the transmissibility matrix and the mutation matrix , both with dimensions for a finite integer denoting the number of possible strains. The transmissibility matrix is a diagonal matrix, with representing the transmissibility of strain , while the mutation matrix is a matrix with denoting the probability that strain mutates to strain with .
The multiple-strain model proposed by Alexander and Day (13) works as follows. Consider an SIR (susceptible-infectious-recovered) spreading process that starts with an individual (i.e., the seed) receiving infection with strain 1 from an external reservoir. Since strain 1 has transmissibility , the seed infects each of her contacts independently with probability , and then, recovers. After a susceptible individual receives the infection from the seed, the pathogen may evolve within that new host prior to any subsequent infections. In particular, the pathogen may remain as strain 1 with probability or mutate to strain (that has transmissibility ) with probability for . If the pathogen remains as strain 1 (mutates to strain ), then the host infects each of her susceptible neighbors in the subsequent stages independently with probability (), recovers, and so on. Observe that, as the process continues to grow, multiple strains may coexist in the population as governed by the transmissibility matrix and the mutation matrix . At an intermediate stage, if any susceptible individual receives strain , the pathogen may remain as strain with probability or mutate to strain with probability for prior to subsequent infections. The process terminates when no additional infections are possible.
The multiple-strain model considers the case when the epidemiological and evolutionary processes occur on a similar timescale. In particular, each new infection event entails an opportunity for mutation. This model is reasonable for pathogens with long infectious periods (e.g., HIV) or pathogens with short infectious periods but high mutation rates, large population sizes, and short generation times (e.g., RNA viruses) (31). We focus on the particular case where the fitness landscape consists of only two strains, yet extending the results to any arbitrary number of strains is straightforward (Materials and Methods).
Network Model.
Let denote the underlying contact network defined on the node set . We define the structure of through its degree distribution . In particular, gives the probability that an arbitrary node in has degree . We generate the network according to the configuration model (23, 24) (i.e., the degrees of nodes in are all drawn independently from the distribution ). In particular, we sample a degree sequence (with even total degree) from the corresponding degree distribution; then, we use the configuration model to construct a random graph with that degree sequence. Furthermore, we assume that the degree distribution is well behaved in the sense that all moments of arbitrary order are finite. Note that, when the second moment of the degree distribution is finite, the expected clustering coefficient of the graphs generated by the configuration model approaches zero in the limit of large ; hence, they are locally tree like. Of particular importance in the context of the configuration model is the degree distribution of a randomly chosen neighbor of a randomly chosen vertex denoted by and given by for , where denotes the mean degree (i.e., ).
Simulation Model.
We focus on the case where the fitness landscape consists only of two strains. The process starts by selecting a node uniformly at random and infecting it with strain 1. When cycles start to appear, a susceptible node could be exposed to multiple infections at once. We assume that coinfection is not possible; hence, a node may only be infected by one strain. In particular, if a node is exposed to infections of strain 1 and infections of strain 2 simultaneously, the node becomes infected with strain 1 (strain 2) with probability () for any nonnegative constants and . A node that receives infection at round mutates first (by the end of round ) before it attempts to infect her neighbors (with the corresponding transmissibility) at round . The node is considered recovered at round (i.e., a node is infective for only one round). We explore the case where coinfection with multiple pathogen strains is possible in SI Appendix, section 6.
In what follows, we use , , and to denote the total expected epidemic size, the expected fraction of nodes infected with strain 1, and the expected fraction of nodes infected with strain 2, respectively; all are at the steady state (i.e., when the process terminates). In all experiments, we set , , , and . The conclusions presented in this article hold for any other parameter selection. With respect to synthetic networks, we consider contact networks with Poisson degree distribution and power law degree distribution with exponential cutoff as given in ref. 28.
Epidemic Size.
We start by focusing on the total epidemic size and the expected fraction of nodes that were infected with strain 1 and strain 2. The network size is set to . In Fig. 1, we plot the empirical (averaged over 500 independent experiments) and theoretical values of , , and . We also plot a vertical line at the critical mean degree that corresponds to a phase transition as predicted by our theory. Our experimental results are in very good agreement with our theoretical results (Materials and Methods) on both contact networks.
Fig. 1.
The expected epidemic size () and expected fraction of individuals infected by each strain ( and ) on synthetic networks generated by the configuration model with (A) Poisson degree distribution and (B) power law degree distribution with exponential cut off. Simulation results are in very good agreement with our theoretical results given in Materials and Methods.
Reduction to Single-Type Bond Percolation.
An important question to ask is whether the classical single-type bond percolation models could predict the threshold, probability, and final size of epidemics that entail evolutionary adaptations. In pursing an answer to this question, we start by establishing a matching condition between single-strain models and multiple-strain models for epidemics.
In ref. 28, Newman considered a single-type bond percolation model with parameter (i.e., a process where each edge is occupied with the same probability independently), and it was shown that a phase transition occurs when . Comparing this with [4] suggests the proposal of a matching that results in the same condition for phase transition. More precisely, if we are to set
| [1] |
where denotes the spectral radius (i.e., the largest eigenvalue; in absolute value) of , then both models would predict the same phase transition condition. In what follows, we explore the extent to which classical, single-type bond percolation models (under the matching condition [1]) may predict the threshold, probability, and final size of epidemics that entail evolutionary adaptations.
In Fig. 2, we plot the empirical (averaged over independent experiments) and theoretical (as given in ref. 13) probability of emergence on contact networks with Poisson degree distribution (). We also plot the probability of emergence as predicted by the single-type bond percolation framework under the matching condition [1]. Observe that the classical single-type bond percolation model accurately captures the threshold and final size of epidemic but provides significantly inaccurate predictions on the probability of emergence. In SI Appendix, section 5, we explain the reasoning behind this observation.
Fig. 2.
The probability of emergence on contact networks with Poisson degree distribution. The single-type bond percolation framework provides significantly inaccurate predictions on the probability of emergence, yet it captures the expected epidemic size and phase transition point.
Effect of Mutation.
In what follows, we provide a theoretical approximation to the probability of emergence in a way that clearly distinguishes the role of mutation and shows how it strongly influences the probability of emergence. Consider the case when the fitness landscape consists of two strains with and . Assume that , and let denote the probability that, at some point along the chain of infections (starting from the type 1 seed), a type 2 node would emerge. This parameter selection models the case of one-step irreversible mutation where strain 1 could mutate to strain 2 that has higher transmissibility, but strain 2 never mutates back to strain 1.
For a fixed mean degree of the underlying network, we may approximate the probability of emergence by
| [2] |
where denotes the probability of emergence on a single-type bond-percolated network with edge occupation probability and mean degree and denotes the probability that, at some point along the chain of infections (starting from the type 1 seed), a node would be infected by strain 1 but then mutate to strain 2. In other words, captures the probability that, at some point during the propagation, a type 2 node would emerge. The proof of [2] is omitted for brevity and is given in SI Appendix, section 3.
In Fig. 3, we set and plot against the mean degree for a network with Poisson degree distribution. We observe that different values for impact the shape of (hence, the probability of emergence by virtue of [2]) in a remarkable way. First, for all values of , the behavior of seems to be strikingly different than the universality class of percolation models (e.g., the shape of the probability of emergence in Fig. 2). Second, the effect of mutation probabilities on seems to be significant as the mean degree increases from small values, reaches its peak right before the critical mean degree corresponding to , and then, decays as the mean degree increases further.
Fig. 3.
The impact of on (hence, the probability of emergence by virtue of [2]) is pronounced before the critical mean degree corresponding to a single-strain, bond-percolated network with . (Inset) The difference between the value of when and the value of when as a function of the mean degree of the underlying contact network.
The reasoning behind the aforementioned observation is intuitive. Let denote the phase transition point (i.e., critical mean degree) for a single-strain, bond-percolated network with . As the mean degree increases toward , the length of the tree of infections starting from the seed* also increases; however, no cycles appear, and the epidemic propagates on a finite, tree-like percolated network (since ). Increasing the length of the tree increases the probability that at least one intermediate node would mutate to strain 2, but the fact that the tree is finite makes the particular value of very crucial to . However, as increases beyond , cycles start to appear, and a giant component of nodes infected with strain 1 emerges. In this case, the chain of infections is no longer finite, and any positive value of results in a mutation almost surely in the limit of large network size.
Evolutionary Adaptations in Real-World Networks.
In this section, we consider two real-world contact networks that arise naturally in the context of infectious disease propagation and information propagation. In the context of infectious disease propagation, we consider the contact network observed at a US high school during a typical school day (27). In the context of information propagation, we consider the contact network among the friends of 1,000 users (including those 1,000 users) sampled from Twitter (26, 32) (Materials and Methods has more details). Four additional real-world networks are considered in SI Appendix, section 4. Our objective is to reveal the limitations of the single-type bond percolation framework in predicting the probability of emergence on real-world networks.
In Fig. 4, we plot the empirical (averaged over independent experiments) and theoretical (as given in ref. 13) probability of emergence on both networks. We compare the results with the predictions given by the single-type bond percolation framework. Similar to our observations on random networks, the single-type bond percolation framework provides significantly inaccurate predictions on the probability of emergence should the underlying process entail evolution. The limitation is universal as it applies to both random and real-world networks.
Fig. 4.
We consider two real-world contact networks, namely (A) the contact network among the friends of 1,000 users (including those 1,000 users) sampled from Twitter (26, 32) and (B) the contact network observed at a US high school during a typical school day (27). For each , we remove a random subset of edges such that the resulting graph has mean degree . The single-type bond percolation framework provides inaccurate predictions on the probability of emergence in line with our observations in Fig. 2.
The universality of the behavior suggests that the single-type bond percolation framework does not properly capture a fundamental property of spreading processes that entail evolution. Clearly, this property is stemming from the underlying correlations between the infection events of the multiple-strain model. In particular, infection events are conditionally independent given the type of the infective node. Namely, conditioned on node being type , node infects each of her neighbors independently with probability . However, infection events are marginally dependent unless for all with probability one, a condition that essentially reduces the dynamics to that of single-strain processes without evolution. Indeed, the single-type bond percolation framework fails to capture these correlations since they are averaged out according to [1]; hence, its predictions are significantly inaccurate. A similar observation was made by Kenah and Robins (33) in the context of the spread of diseases governed by the SIR model on contact networks. In particular, Kenah and Robins (33) showed that, when the distribution of the infectious periods of the SIR model is nondegenerate, there is no bond percolation probability that will make the bond percolation model isomorphic to the SIR model† due to the underlying correlations of infection events in the SIR model. More details are given in SI Appendix, section 5.
Discussion
In this article, we investigated the effects of evolutionary adaptations on spreading processes in complex networks. We developed a mathematical theory that unraveled the relationship between the characteristics of the spreading process, evolutionary adaptations, and the structure of the underlying contact network. In particular, our theory accurately predicts the epidemic threshold and the expected epidemic size as functions of the characteristics of the spreading object (i.e., ), the evolutionary pathways of the object (i.e., ), and the structure of the underlying network (i.e., the degree distribution).
Our mathematical theory was complemented by an extensive simulation study on both synthetic and real-world contact networks. The simulation results proved the validity of our theory and revealed the significant shortcomings of the classical mathematical models that do not capture evolution. A matching condition between single- and multiple-strain models was proposed and evaluated in the context of probability of emergence, epidemic size, and epidemic threshold. Under the proposed matching condition, our results revealed that the classical bond percolation models may accurately predict the threshold and final size of epidemics that entail evolution, but their predictions on the probability of emergence are significantly inaccurate on both random and real-world networks.
We proceeded by deriving a lower bound on the probability of emergence to gain further insights on the effects of mutation. The bound was derived for the special case of one-step irreversible mutation where strain 1 could mutate to strain 2 that has higher transmissibility (remains as strain 1) with probability (), while strain 2 does not mutate back to strain 1. Our results revealed that the plays a key role in determining the shape and behavior of the probability of emergence. Our results also shed light on the interplay between and the structure of the underlying network. In particular, the particular value of directly influences the probability of emergence in the small mean degree regime, yet as the mean degree increases and cycles start to form, such dependency starts to loosen as mutation events become inevitable even for very small values of .
In future work, we plan to extend our theory to accommodate for real-world networks with a given adjacency matrix along the same line with refs. 34 and 35. Furthermore, we plan to explore the effect of targeted infection and mutation events, where an adversary might choose to allocate her broadcasting resources to particular links or intentionally inject a mutant at a particular point during the spread of the underlying item.
Materials and Methods
Expected Epidemic Size.
The analysis of the probability of emergence was established by Alexander and Day in ref. 13; hence, we focus here on deriving the expected epidemic size and the expected fraction of individuals infected by strain denoted for . We focus on the case where , yet it is straightforward to extend our theory to the case where there are general strains as long as the underlying process is indecomposable (13, 36, 37). We apply a tree-based approach that is based on the work by Gleeson and coworkers (38, 39). Their approach draws on the tools developed for analyzing the zero-temperature random-field Ising model on Bethe lattices (40). Observe that, as we build our network using the configuration model, the network structure is locally tree like with the fraction of cycles approaching zero in the limit of large network size (23–25).
Since is locally tree like, we can replace it by a tree and arrange the vertices in a hierarchical structure such that, at the top level, there is a single node (the root) that has degree with probability . Each of the neighbors of the root has degree with probability , where denotes the mean degree of the network. Furthermore, we label the levels of the tree from level at the bottom to level at the top (i.e., the root). Nodes update their status starting from the bottom of the tree and proceeding toward the top. This gives rise to a delicate case, where a node at some level may be exposed to simultaneous infections by both strain 1 and strain 2 from her neighbors at level . We assume that coinfection is not possible; hence, a node that receives infections of strain 1 and infections of strain 2 becomes infected by strain 1 (strain 2) with probability (). We explore the case where coinfection with multiple pathogen strains is possible in SI Appendix, section 6.
Throughout, we say that a node is either inactive if it has not received any infection (i.e., still susceptible) or active and type if it has been infected and then mutated to strain for . Let be the probability that a node at level , say node , is active and type . Furthermore, let (i.e., is the total probability that a node at level is active). We start by an arbitrary initial distribution for satisfying . Then, we update the distribution properly until we reach the root. Note that, if the degree of node is , then node is using one edge to connect to her parent at level and edges to connect to her neighbors at level . In this case, we can further condition on the number of active neighbors of type 1 and type 2 and the respective number of infections received from them.
Note that we have a multinomial distribution for the number of active neighbors of both types. In particular, a neighbor at level may be active and type 1 with probability , active and type 2 with probability , or inactive with probability . In addition, conditioned on having and active neighbors of type 1 and type 2, respectively, the number of type 1 (type 2) infections received, denoted (), follows a binomial distribution with parameters and ( and ). Hence, with
we have
| [3] |
The validity of [3] could be explained as follows. Consider a particular realization of the random variables . Observe that, if , then node becomes infected by strain 1 and eventually mutates to type with probability . Similarly, if , then node becomes infected by strain 2 and eventually mutates to type with probability . Finally, if , then node becomes infected by strain 1 (strain 2) with probability () and eventually mutates to type with probability ().
Observe that, under the assumption that nodes do not become inactive after they turn active, the quantities appearing in [3] are nondecreasing in , and thus, they converge to a limit for . Finally, the final fraction of nodes that are active and type is equal (in expected value) to the probability that the root of the tree (at level ) is active and type . Note that, if the tree root has degree , then all of these edges will be utilized to connect with her neighbors at the lower level. Hence,
where for denotes the probability that the tree root is active and type and for is the steady-state solution of the recursive equations [3]. Note that is the total probability that the tree root is active.
Observe that gives a trivial fixed point of the recursive equations [3]. Indeed, this trivial solution leads to . Although the trivial fixed point is a valid numerical solution for the recursive equations [3], we can show that this trivial solution is unstable. Hence, another solution with and may exist. To test whether or not the trivial fixed point is stable, we check the spectral radius of the Jacobian matrix corresponding to the linearization of [3] at . If the spectral radius of the at is larger than 1, then the trivial fixed point is unstable, indicating that there exists another solution with and and implying the existence of a giant component.
The Jacobian matrix (at ) is given by
It follows that a phase transition occurs when
| [4] |
Real-World Networks.
In the context of infectious disease propagation, we consider the contact network observed at a US high school during a typical school day (27). The dataset covers interactions between students, teachers, and staff. Each interaction between two individuals is characterized by their identification numbers as well as the duration of the interaction. Two individuals could have multiple interactions throughout the day, and we sum the durations of these interactions to calculate the total contact time between these two individuals over the whole day. We proceed by sampling a static graph out of this dataset by assigning an edge between nodes and with probability , where denotes the total contact time between nodes and throughout the day and denotes the maximum total contact time observed in the dataset. In the context of information propagation, we consider the contact network among the friends of 1,000 users (including those 1,000 users) sampled from Twitter (26, 32). Four additional real-world networks are investigated in SI Appendix, section 4.
The Twitter network consists of nodes and edges, with mean degree 33 and global clustering coefficient of 0.170. When we randomly remove edges to set the mean degree to 1 (10), the clustering coefficient becomes 0.005 (0.051). A synthetic contact network with Poisson degree distribution, , and mean degree 33 has a clustering coefficient of 0.0004. The high school network consists of 73 nodes and 543 edges with mean degree 14.87 and global clustering coefficient of 0.446. When we randomly remove edges to set the mean degree to 1 (10), the clustering coefficient becomes 0.090 (0.296). A synthetic contact network with Poisson degree distribution, , and mean degree 14.87 has a clustering coefficient of 0.183. Hence, the sampled graphs still exhibit significant clustering as compared with random networks with the same mean degree and number of nodes.
Data Availability.
Data will be available on request from O.Y.
Supplementary Material
Acknowledgments
Research was supported in part by Army Research Office Grant W911NF-17-1-0587, NSF Grant CCF-1813637, and Office of Naval Research Grants N0001418SB001 and N000141512797. R.E. was funded in part by the Dowd Fellowship from the College of Engineering at Carnegie Mellon University.
Footnotes
The authors declare no competing interest.
The length of the tree of infections can be interpreted as the size of the component (of a bond-percolated network with ) that contains the seed.
A claim that was made earlier by Newman (28).
This article contains supporting information online at https://www.pnas.org/lookup/suppl/doi:10.1073/pnas.1918529117/-/DCSupplemental.
References
- 1.Zhuang Y., Yağan O., Information propagation in clustered multilayer networks. IEEE Trans. Netw. Sci. Eng. 3, 211–224 (2016). [Google Scholar]
- 2.Dodds P. S., Watts D. J., Universal behavior in a generalized model of contagion. Phys. Rev. Lett. 92, 218701 (2004). [DOI] [PubMed] [Google Scholar]
- 3.Anderson R. M., May R. M., Anderson B., Infectious Diseases of Humans: Dynamics and Control (Wiley Online Library, 1992), vol. 28. [Google Scholar]
- 4.Sahneh F. D., Scoglio C., Van Mieghem P.. Generalized epidemic mean-field model for spreading processes over multilayer complex networks. IEEE ACM Trans. Netw. 21, 1609–1620 (2013). [Google Scholar]
- 5.Yağan O., Qian D., Zhang J., Cochran D., Conjoining speeds up information diffusion in overlaying social-physical networks. IEEE J. Sel. Areas. Commun. 31, 1038–1048 (2013). [Google Scholar]
- 6.Yağan O., Gligor V., Analysis of complex contagions in random multiplex networks. Phys. Rev. E 86, 036103 (2012). [DOI] [PubMed] [Google Scholar]
- 7.Zhuang Y., Arenas A., Yağan O., Clustering determines the dynamics of complex contagions in multiplex networks. Phys. Rev. E 95, 012312 (2017). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 8.Newman M. E., Forrest S., Balthrop J., Email networks and the spread of computer viruses. Phys. Rev. E 66, 035101 (2002). [DOI] [PubMed] [Google Scholar]
- 9.Balthrop J., Forrest S., Newman M. E., Williamson M. M., Technological networks and the spread of computer viruses. Science 304, 527–529 (2004). [DOI] [PubMed] [Google Scholar]
- 10.Qian D., Yağan O., Yang L., Zhang J., “Diffusion of real-time information in social-physical networks” in IEEE GLOBECOM (IEEE, Anaheim, CA, 2012), pp. 2072–2077. [Google Scholar]
- 11.Yağan O., Qian D., Zhang J., Cochran D., “Information diffusion in overlaying social-physical networks” in 2012 46th Annual Conference on Information Sciences and Systems (CISS) (IEEE, Princeton, NJ, 2012), pp. 1–6. [Google Scholar]
- 12.Leventhal G. E., Hill A. L., Nowak M. A., Bonhoeffer S., Evolution and emergence of infectious diseases in theoretical and real-world networks. Nat. Commun. 6, 6101 (2015). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Alexander H., Day T., Risk factors for the evolutionary emergence of pathogens. J. R. Soc. Interface 7, 1455–1474 (2010). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 14.Morens D. M., Folkers G. K., Fauci A. S., The challenge of emerging and re-emerging infectious diseases. Nature 430, 242–249 (2004). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 15.Antia R., Regoes R. R., Koella J. C., Bergstrom C. T., The role of evolution in the emergence of infectious diseases. Nature 426, 658–661 (2003). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 16.Pfennig K. S., Evolution of pathogen virulence: The role of variation in host phenotype. Proc. Biol. Sci. 268, 755–760 (2001). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 17.Adamic L. A., Lento T. M., Adar E., Ng P. C., “Information evolution in social networks” in ACM WSDM (Association for Computing Machinery, New York, NY: 2016), pp. 473–482. [Google Scholar]
- 18.Zhang Y., Zhou S., Zhang Z., Guan J., Zhou S., Rumor evolution in social networks. Phys. Rev. E 87, 032133 (2013). [Google Scholar]
- 19.Morse S. S., et al. , Prediction and prevention of the next pandemic zoonosis. Lancet 380, 1956–1965 (2012). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Jones K. E., et al. , Global trends in emerging infectious diseases. Nature 451, 990–339 (2008). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 21.Parrish C. R., et al. , Cross-species virus transmission and the emergence of new epidemic diseases. Microbiol. Mol. Biol. Rev. 72, 457–470 (2008). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 22.Dawkins R., The Selfish Gene (Oxford University Press, 2016). [Google Scholar]
- 23.Molloy M., Reed B., A critical point for random graphs with a given degree sequence. Random Struct. Algorithm 6, 161–180 (1995). [Google Scholar]
- 24.Bollobás B., Random Graphs (Cambridge University Press, 2001), vol. 73. [Google Scholar]
- 25.Newman M. E., Strogatz S. H., Watts D. J., Random graphs with arbitrary degree distributions and their applications. Phys. Rev. E 64, 026118 (2001). [DOI] [PubMed] [Google Scholar]
- 26.Leskovec J., Krevl A., SNAP Datasets: Stanford large network dataset collection, 2014. http://snap.stanford.edu/data. Accessed 1 January 2018.
- 27.Salathé M., et al. , A high-resolution human contact network for infectious disease transmission. Proc. Natl. Acad. Sci. U.S.A. 107, 22020–22025 (2010). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 28.Newman M. E., Spread of epidemic disease on networks. Phys. Rev. E 66, 016128 (2002). [DOI] [PubMed] [Google Scholar]
- 29.Moore C., Newman M. E., Exact solution of site and bond percolation on small-world networks. Phys. Rev. E 62, 7059–7064 (2000). [DOI] [PubMed] [Google Scholar]
- 30.Meyers L., Contact network epidemiology: Bond percolation applied to infectious disease prediction and control. Bull. Am. Math. Soc. 44, 63–86 (2007). [Google Scholar]
- 31.Grenfell B. T., et al. , Unifying the epidemiological and evolutionary dynamics of pathogens. Science 303, 327–332 (2004). [DOI] [PubMed] [Google Scholar]
- 32.Leskovec J., Mcauley J. J., “Learning to discover social circles in ego networks” in Advances in Neural Information Processing Systems (Curran Associates, Inc, Lake Tahoe, NV, 2012), pp. 539–547. [Google Scholar]
- 33.Kenah E., Robins J. M., Second look at the spread of epidemics on networks. Phys. Rev. E 76, 036113 (2007). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 34.Radicchi F., Percolation in real interdependent networks. Nat. Phys. 11, 597–602 (2015). [Google Scholar]
- 35.Karrer B., Newman M. E., Zdeborová L., Percolation on sparse networks. Phys. Rev. Lett. 113, 208702 (2014). [DOI] [PubMed] [Google Scholar]
- 36.Mode C. J., Multitype Branching Processes: Theory and Applications (American Elsevier Pub. Co., 1971), vol. 34. [Google Scholar]
- 37.Haccou P., Jagers P., Vatutin V. A., Branching Processes: Variation, Growth, and Extinction of Populations (Cambridge University Press, 2005). [Google Scholar]
- 38.Gleeson J. P., Cahalane D. J., Seed size strongly affects cascades on random networks. Phys. Rev. E 75, 056103 (2007). [DOI] [PubMed] [Google Scholar]
- 39.Gleeson J. P., Cascades on correlated and modular random networks. Phys. Rev. E 77, 046117 (2008). [DOI] [PubMed] [Google Scholar]
- 40.Sethna J. P., et al. , Hysteresis and hierarchies: Dynamics of disorder-driven first-order phase transformations. Phys. Rev. Lett. 70, 3347–3350 (1993). [DOI] [PubMed] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Supplementary Materials
Data Availability Statement
Data will be available on request from O.Y.




