Abstract
The recent outbreak of the coronavirus disease 2019 (COVID-19) has rapidly become a pandemic, which calls for prompt action in identifying suspected cases at an early stage through risk prediction. To suppress its further spread, we exploit the social relationships between mobile devices in the Social Internet of Things (SIoT) to help control its propagation by allocating the limited protective resources to the influential so-called high-degree individuals to stem the tide of precipitated spreading. By exploiting the so-called differential contact intensity and the infectious rate in susceptible-exposed-infected-removed (SEIR) epidemic model, the resultant optimization problem can be transformed into the minimum weight vertex cover (MWVC) problem of graph theory. To solve this problem in a high-dynamic random network topology, we propose an adaptive scheme by relying on the graph embedding technique during the state representation and reinforcement learning in the training phase. By relying on a pair of real-life datasets, the results demonstrate that our scheme can beneficially reduce the epidemiological reproduction rate of the infection. This technique has the potential of assisting in the early identification of COVID-19 cases.
Keywords: Social Internet of Thing (SIoT), COVID-19, reinforcement learning, graph theory
I. Introduction
The coronavirus disease 2019 (COVID-19) has spread over 215 countries with the numbers of infected cases and deaths still increasing. As of the 19th April 2020, a cumulative total of 2,228,455 (154,309) cases (fatalities) were reported in the world. During this outbreak, every aspect of our daily lives has been deeply impacted. One of the gravest challenges is its high human-to-human transmission rate via droplet inhalation or contact with contaminated surfaces. Recent studies have demonstrated that asymptomatic patients are particularly contagious [1], [2], because people tend to avoid contact with others showing obvious symptoms, but asymptomatic people cannot be readily identified. Therefore, early identification of suspected cases and the judicious allocation of limited medical resources is vital [3].
Recently, both ‘big data’ analysis and human social networking solutions were proposed for detecting suspected cases during an epidemic. For example, in [4], the authors proposed a spatio-temporal model termed as HiRES, which relies on a risk map for detecting suspected individuals based on the trajectory of big data and mean-field theory. In [5], the authors proposed a sentinel node detection strategy for disease surveillance by relying on social networks. However, the latency in the associated trajectory and inaccuracy of social data may render these models somewhat inefficient. Hence, a deep-routed research-question arises, namely how to take advantage of both the real-time social data and of accurate trajectory data for identifying suspected virus careers. In [6], the authors proposed the Social Internet of Things (SIoT) concept, which paves a new way for building the social relationships among devices without human intervention. Despite the delay in human data feedback, portable equipment such as smart phones and wearable devices may be employed for sensing, computation and communications, while relying on positioning information to perform real-time symptom recognition, contact tracking and data exchange. For example, the so-called co-located object relationship (C-LOR) of the SIoT characterizes the geographic location similarity of two devices, while the social object relationship (SOR) quantifies the contact intensity, when the device-owners are in each others’ proximity, which are useful for identifying the individuals at risk of infection.
By collecting the data from SIoT, the complex networks of virus transmission may be viewed as a weighted undirectional graph (WUG), where each vertex represents a mobile user, each edge indicates the contact between two users and the vertex weight is related to the probability of becoming infected. Based on this graph, we will identify those vertices which may have high impact on other vertices, corresponding to the influential individuals in a resource-constrained environment, since the medical resources such as surgical masks and nucleic acid detection reagents are scarce. Hence, the optimization objective is to select high-risk vertices within a limited budget of resources to minimize the propagation rate of the epidemic. This epidemic propagation rate minimization problem of identifying the suspected COVID-19 cases in SIoT may be viewed to be analogous to the rumor influence minimization problem of identifying the highly influential nodes in mobile social networks. The latter can be further transformed into the classic minimum-weight vertex cover (MWVC) problem of graph theory [7]. Most prior studies resorted to heuristic algorithms or to local search for solving MWVC problems at an acceptable complexity [8]. However, considering the dynamically evolving network topology over time, recomputing the solution from scratch is time-consuming. As an efficient decision-making technique in dynamic environments, reinforcement learning has been widely used in the field of wireless communications, aerospace, power system, etc [9], [10]. In [11], the authors proposed an adaptive strategy based on graph embedding and reinforcement learning for solving the associated combinatorial optimization problem, which inspired us to design an adaptive identification scheme for highly suspected COVID-19 cases in response to these topology changes.
The main contributions of this paper are summarized as follows:
-
•
By using the dynamic WUG model, we propose a new network topology of SIoT-aided inter-device social relationship establishment process, which takes into account the fact that the network structure evolves dynamically throughout the epidemic propagation.
-
•
We conceive the high-risk vertex selection problem relying on the MWVC framework and propose a risk-aware adaptive identification algorithm based on joint graph embedding and reinforcement learning for solving the MWVC problem in a dynamic topology.
-
•
We conduct simulations based on a pair of realistic datasets to demonstrate that our proposed scheme is efficient in suppressing the propagation speed in both large-scale and small-scale scenarios. Besides, we evaluate our proposed scheme on the Erdos-Renyi social graph relying on adjustable contact probability to verify the scalability.
The rest of this paper is outlined as follows. First our system model is presented and then our optimization problem is formulated in Section II. The adaptive scheme for identifying the suspected cased with high risk is illustrated in Section III. Simulation results are shown in Section IV, followed by concluding remarks in Section V.
II. System Model and Problem Formulation
In the absence of global restrictions COVID-19 spreads without limits since many asymptomatic carriers are contagious. To characterize the spread of COVID-19, we consider the modified susceptible-exposed-infected-removed (SEIR) epidemic model, where asymptomatic individuals are based on [12]. When a susceptible individual comes in contact with either a symptomatic or asymptomatic individual, the probability of being exposed is or , respectively. Furthermore, the probability of those exposed individuals being symptomatic or asymptomatic is or , respectively. Finally, the probability of being removed from the set through recovery or death is .
Naturally, the rate of propagation is also influenced by contact intensity, as determined by the contact frequency and duration. As shown in Fig. 1, each device can rely on the global positioning system (GPS), wireless network signaling, human social networks, radio frequency identification (RFID), bluetooth, and Wifi to track their owner’s contacts, perform co-location detection, and establish relationship with other devices through owner control and relationship management modules [6]. Then, the collected data will be gathered and aggregated by mobile vehicles or unmanned aerial vehicles, and finally delivered to the edge data center for real-time data analysis and decision-making. Herein, we mainly focus on the decision-making process since the data collection and analysis problems are beyond the scope of this paper and can be addressed by several existing works [3], [4]. Given a time span which is discretized into time slots, the average contact intensity between two users and can be denoted as [13]
where represents the total number of contacts before the time slot , while is the corresponding contact duration. Note that even short exposures such as two seconds of contact are perilous and multiple short contacts do increase the overall risk of exposure. Furthermore, the weight of each contact is quantified by Eq. (1), where a short exposure time corresponds to a low weight.
Given an individual set , the network topology at time slot can be abstracted as a WUG , where denotes the vertex set, denotes the edge set, and denotes the vertex weight, and can be
where and represent the symptomatic and asymptomatic neighbors of , respectively. Note that the parameter quantifies the degree of risk. It is worth mentioning that the corresponding edge can only be inserted into if the social distance between the pair of vertices and in their contact is lower than a certain threshold. Note that the social distance threshold was initially three inches as declared by the World Health Organization (WHO), because the authors of [14] found that people who kept at least three inches of social distance between them were able to reduce the infection rate by approximately 82%. As a further result [1], the authors have demonstrated that two meters of social distance reduced infection rate by approximately 96%, since this social distance can prevent the transmission of droplets [14]. Hence here we use the latter metric as the threshold of social distance.
In a resource-constrained environment, we assume that the arrival process of medical resources obeys the Poisson distribution with arrival rate . Hence, we have to allocate these resources to those individuals at high-risk of being exposed in order to cut off the transmission paths, i.e. to remove the corresponding edges from . Let , , , and denote the number of infected individuals, all the individuals, all available resource blocks and the detected individuals, respectively. Here, we assume that a resource block can only be assigned to a single individual for detection. Therefore, the optimization problem is that of minimizing the infection rate (propagation speed), which can be formulated as
where indicates that the number of detected individuals should be no higher than that of the available resources. In graph theory, a vertex cover of is a subset of the vertex set so that for every edge, at least one of its endpoints belongs to . The MWVC is a vertex cover having the lowest possible number of vertices and sum weights. For the convenience of problem transformation, we turn the edge weights into negative values.
Proposition 1 (Detection Threshold):
The MWVC of is the minimum number of vertices required for cuttikng off all the transmission paths (remove all edge) from .
Proof:
Considering the definition of MWVC, all edges can be omitted by removing the edges connected to and meanwhile the has the minimum size, which concludes the proposition 1.
Therefore, the problem (3) can be naturally transformed into a MWVC problem. It is worth mentioning that we consider the MWVC rather than MVC, because the former outperforms the latter when the size of minimum vertex cover exceeds the resources available. Next, we will investigate how to select higher-risk vertices from a MWVC.
III. Adaptive Identification Scheme
In this section, we propose an adaptive identification scheme, which incrementally identifies the high-risk vertices instead of identifying all of them at once. More specifically, the adaptive identification process is divided into several rounds. In each round, our scheme can dynamically block the epidemic propagation based on a snapshot of the current network topology. Upon considering the case of at time slot , selecting any vertices from the set of for detection will lead to different results. Given a limited budget, we should grant different priorities according to the associated hazard levels, which can be quantified by the vertex weight.
Since we have to dynamically find MWVC in the face of evolving network topologies obeying different graph structures, we first utilize the graph embedding process, in which each vertex can be represented by a -dimensional vector paving the way for the learning phase. This is because reinforcement learning is more efficient when processing low-dimensional vectors than graphs. Similar to [11], we capitalize on the deep learning architecture termed as Structure2Vec [15] for graph embedding, which computes a -dimensional feature embedding for each vertex . Initially, we set and the update strategy can be formulated as [11]
where the neighbor set is equivalent to , ’relu’ represents the rectified linear unit, i.e., , is a binary variable, which indicates, whether the state is being selected or not, are model parameters, and represents the edge weight in graph embedding, which is determined by the structural similarity (structural distance) , i.e., . Note that can be calculated by dynamic time warping (DTW) [15].
When the computation process of graph embedding is completed and the representation of the selected vertex set is obtained, we then define the evaluation function , where is the associated neural network parameter. When obtained at the final slot, the pooled embedding of the entire graph can be represented as . In this way, can be approximated by
where denotes the concatenation operator and .
Next, we will invoke reinforcement learning for determining the function . In the neural network, the -step fitted Q-Learning [11] is invoked to train . We define the states, actions and rewards in the reinforcement learning framework as follows:
-
•
States: the selected vertices for detection at slot , i.e., .
-
•
Transition: the state variable .
-
•
Actions: push a new vertex into .
-
•Rewards: the reward function is defined as the change in the cost function after taking action and transitioning to a new state , which can be expressed as
Note that we set a penalty of −1 for the increment in vertex number and for the increment in weight to ensure that we can find a MWVC.
The training phase based on -step fitted Q-learning is illustrated in Algorithm 1. Note that the termination criterion is whether the MWVC is achieved, i.e. whether all edges are covered, while the sum weights are minimum.
Algorithm 1 Q-Learning Based Training for MWVC
-
1:
Input: Adjacency matrix of
-
2:
Output: Parameter
-
3:
Experience replay memory is initialized to
-
4:
for episode do
-
5:
Initialize the state to empty set
-
6:
for do
-
7:
-
8:
-
9:
Push into , i.e.,
-
10:
if then
-
11:
Push tuple to
-
12:
Randomly sample batch from
-
13:
Update by stochastic gradient descent to minimize the squared loss for
-
14:
end if
-
15:
end for
-
16:
end for
Note that the -step Q-learning can handle the issue of delayed rewards during an episode by waiting steps before updating the parameters. This fits our scenario quite naturally, where the final objective value is only revealed after the addition of a series of vertices. In this way, the reward received so far can be used for estimating that in the future more accurately. Hence, the parameter in the squared loss function can be expressed as
Furthermore, the fitted Q-iteration will rely on experience replay for updating the Q-function using a batch of samples instead of updating it sample-by-sample. In this process, the cumulative rewards can be represented by . Based on the above discussion, our risk-aware adaptive identification (RAI) algorithm can be summarized in Algorithm 2.
Algorithm 2 Risk-Aware Adaptive Identification (RAI)
-
1:
Input: Adjacency matrix of current snapshot of , i.e., , available resource
-
2:
Output: A set of vertices at risk of being infected
-
3:
Initialize the state to empty set
-
4:
Each vertex in is embeded into a -dimensional vector using Eq. (4) and (5)
-
5:
Search for the MWVC using the Algorithm 1
-
6:
if then
-
7:
Select vertices from as based on the ascending order of their weights
-
8:
else
-
9:
-
10:
end if
As shown in Fig. 1, when the furst stage of contact tracking is accomplished, graph embedding is performed to obtain the “node score” (green bars), which quantifies the degree of risk from the perspective of graph structure. In the final stage, reinforcement learning is invoked for solving the MWVC by considering both the node score and weight. The specific nodes associated with a high degree of risk are marked in red.
IV. Simulation Results
In this section, we first evaluate our proposed scheme on the Erdos-Renyi social graph [16] relying on adjustable contact probability (edge insertion probability) and then on a pair of real-world datasets [12], [17]. The data in [12] collected from a primary school was used for evaluating our proposed scheme on a small-scale dynamic network and that in [17] collected from a museum was used for characterizing our proposed scheme on a large-scale dynamic network. In the dataset [17], 410 vertices are connected by 17,298 edges and the time span of 1 hour is discretized into 8 time slots. By contrast, in [12], 242 vertices are connected by 125,773 edges and the time span of 1 hour is discretized into 18 time slots.
In the learning phase, we set the batch size to 64, embedding dimension size to 64, the number of iterations to 5, to 5, to 0.05, training size to 10000, and the learning rate to 0.0001 based on [11]. For the SEIR model, we set the to 0.8, to 0.4, to 0.7, and to 0.3 based on the current data analysis about COVID-19 [4]. The initial number of randomly infected individuals is , where represents the number of all vertices in the initial stage. The arrival rate of resources ranges from 0 to 0.05 per second. Note that the vertices corresponding to the removed individuals will be removed from the current snapshot.
To comprehensively characterize our proposed scheme, we further compare RAI to four benchmarks: 1) degree centrality (to measure the risk of being infected by neighbors) selects vertices with highest degree in the current snapshot [18], 2) betweenness centrality (to measure the risk of being infected on a large scale) can be calculated by
where denotes the number of shortest paths connecting and , and denotes those shortest paths passing through [18], 3) closeness centrality (measure the risk of being infected on a small scale) can be calculated by
where denotes the length of shortest paths connecting and [18], and 4) Q-learning based greedy algorithm for MVC (abbreviated as “GreedyMVC”) [11], which approximates the set of MVC nodes of the input graph by greedily selecting the uncovered edge having the maximum sum of degrees of its endpoints. Then we protect nodes from this unordered MVC set.
To verify the scalability and efficiency of our proposed scheme, we have conducted simulations relying on the classic Erdos-Renyi social graph, which is representative of most of the popular graph structures associated with varying contact probability. Fig. 2 shows the infection rate vs. contact probability, when the arrival rate of resources is set to 0.04 per second and the number of vertices is set to 100. The contact duration obeys the normal distribution associated with the expectation of 30s and standard deviation of 5s. The number of contacts obeys a Poisson distribution and the arrival rate is randomly chosen from per time slot. The time span of 1 hour is discretized into 10 time slots. We can observe that our proposed RAI always outperforms other methods upon increasing the contact probability. Compared to the scenario of “without detection”, our proposed scheme achieves approximately 43% infection rate reduction, when the contact probability is set to 0.8, which demonstrates the efficiency of early detection of highly suspected cases. Furthermore, since the degree and closeness centralities always select those specific vertices which are close to each other in the crowded parts of the graph, they exhibit a higher propagation rate than that of betweenness centrality (selecting the vertices which are in most of the multi-hop neighbor sets of other vertices) when the graph becomes dense, i.e., the number of edges becomes high.
In Fig. 3 and Fig. 4, we study the impact of early detection based on two different real-world datasets. As clearly seen from these two figures, the proposed RAI scheme always outperforms the other methods upon increasing the arrival rate of resources for both datasets. In the small-scale scenario, the dominant form of infection is direct person-to-person transmission (one-hop transmission), while in the large-scale scenario, the cross infection (multi-hop transmission) becomes dominant. When the resources are very scarce, say for an arrival rate below 0.02 per second, the degree centrality method outperforms the “GreedyMVC”, because the degree centrality represents the degree of risk better within a limited budget. Upon increasing the arrival rate, the “GreedyMVC” performs better, because it can cut off more transmission paths within a certain budget. Note that the performance achieved by closeness centrality is better than that of betweenness centrality based on the dataset [12], but based worse on [17]. This is because the closeness centrality is efficient in small-scale scenarios (the selected vertices rapidly infect their one-hop neighbors) while the betweenness centrality is efficient in large-scale scenarios (the selected vertices can infect more multi-hop neighbors).
Finally, we discuss some characteristics inferred from the simulation and experimental results. Although the COVID-19 datasets are not available, Fig. 2 readily justifies that the proposed method outperforms the graph-theoretic methods for diverse graph structures. This is because the control efficiency is only related to the graph structures determined by the densities of the vertices and edges, plus the vertex weight. On one hand, the graph embedding is eminently suitable for extracting the centrality features of different graph structures. On the other hand, by solving the MWVC, the vertex weight is also considered. Since the traditional graph-theoretic based methods only consider the centrality feature, our proposed method would outperform the graph-theoretic based methods, regardless of the specific nature of the dataset.
Secondly, we justify the employment of reinforcement learning. Generally, traditional techniques of solving the graph optimization problem cam be classified into three main categories: exact algorithms, approximate algorithms and heuristic algorithms [11]. The exact algorithms perform well for small-scale scenarios, but their complexity tends to become prohibitive for large-scale scenarios. The approximate algorithms tend to have realistic complexity, but fail to provide sufficiently strong optimality guarantees. Finally, the heuristic algorithms tend to be efficient, but lack of theoretical guarantees. However, all three types of algorithms may only adapt to partial graph structures and thus their performance may be degraded in dynamically time-varying environments. Fortunately, this problem can be solved by reinforcement learning. It was demosntrated by extensive simulations in [11] that reinforcement learning based algorithms are capable of performing well in continuously envolving graph structures. Although different real datasets correspond to different scenarios, the graph structures inferred can typically be handled by relying on the Erdos-Renyi social graph. Futhermore, the reward function and other parameters are also influenced by the specific graph structures. As for the reward function, we carefully take into account the specific number of vertices and the vertex weight, which allows us to satisfy both the “minimum-weight” and “minimum set cover” conditions. Hence, the reward function used in the paper is suitable for the MWVC problem in the context of different graph structures. For other learning related parameters, the authors of [11] have indeed justified that this setting is suitable for most graph structures and thus we do not discuss this issue in detail. In conclusion, our proposed scheme exhibits excellent scalability and it is expected to perform well for diverse datasets, including COVID-19 datasets.
V. Conclusion
In this paper, we have studied how to exploit the social relationships between mobile devices in SIoT to help control the infection rate by the early identification of suspected COVID-19 cases. Then, we transformed the optimization problem into a MWVC problem and proposed a RAI algorithm for solving this problem for a dynamic network topology. By relying on a pair of realistic datasets, we demonstrate that our scheme substantially reduces the epidemic infection rate compared to the benchmarks in both large-scale and small-scale scenarios. In conclusion, the proposed technique is eminently suitable for disease control and prevention by relying on the early identification of COVID-19 cases. At the time of writing no COVID-19 dataset is available concerning the accurate contact history of a crowd and their subsequent health conditions, but no doubt, real-life datasets will soon be available. This contribution may however assist both governments and other decision-making authorities in their decision making. In our future research we will use more data sources to verify and revise this early identification scheme at an increased accuracy.
Biographies
Bowen Wang received the Ph.D. degree in information and communication engineering from the China University of Mining and Technology, Xuzhou, China, in 2020. He is currently with the Xuzhou Engineering Research Center of Intelligent Industry Safety and Emergency Collaboration, as a Research Fellow, and with China University of Mining and Technology, as an Associate Professor. He was also a Visiting Ph.D. Student with the School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast. He was awarded the Best Paper Award in INISCOM 2019. His research interests include matching theory, graph theory, UAV communications, and Social Internet of Things (SIoT).
Yanjing Sun (Member, IEEE) received the Ph.D. degree in information and communication engineering from the China University of Mining and Technology, Xuzhou, China, in 2008. He is currently with the Xuzhou Engineering Research Center of Intelligent Industry Safety and Emergency Collaboration, as a Research Fellow, and with the China University of Mining and Technology, as a Professor. His current research interests include IBFD communications, embedded real-time system, wireless sensor networks and cyber-physical systems.
Trung Q. Duong (Senior Member, IEEE) received the Ph.D. degree in telecommunications systems from the Blekinge Institute of Technology (BTH), Sweden, in 2012. He is currently with Queen’s University Belfast, U.K., where he was a Lecturer (Assistant Professor), from 2013 to 2017, and a Reader (Associate Professor), in 2018. His current research interests include the Internet of Things (IoT), wireless communications, molecular communications, and signal processing. He is the author or a coauthor of over 330 technical articles published in scientific journals (200 articles) and presented at international conferences (136 papers). He was awarded the Best Paper Award at the IEEE Vehicular Technology Conference (VTC-Spring), in 2013, IEEE International Conference on Communications (ICC) 2014, IEEE Global Communications Conference (GLOBECOM) 2016, and IEEE Digital Signal Processing Conference (DSP) 2017. He is a recipient of the prestigious Royal Academy of Engineering Research Fellowship, from 2016 to 2021, and has won the prestigious Newton Prize, in 2017. He currently serves as an Editor for the IEEE Transactions on Wireless Communications and the IEEE Transactions on Communications and a Lead Senior Editor for the IEEE Communications Letters.
Long D. Nguyen (Member, IEEE) was born in Dong Nai, Vietnam. He received the B.S. degree in electrical and electronics engineering and the M.S. degree in telecommunication engineering from the Ho Chi Minh City University of Technology (HCMUT), Vietnam, in 2013 and 2015, respectively, and the Ph.D. degree in electronics and electrical engineering from Queen’s Univerisity Belfast (QUB), U.K., in 2018. He was a Research Fellow with Queen’s University Belfast, for a part of Newton Project, from 2018 to 2019. He is currently with Dong Nai University, Vietnam, as an Assistant Professor, and Duy Tan University as an Adjunct Assistant Professor. His research interests include convex optimization techniques for resource management in wireless communications, energy efficiency approaches (heterogeneous networks, relay networks, cell-free networks, and massive MIMO), and real-time embedded optimization for wireless networks and the Internet of Things (IoT).
Lajos Hanzo (Fellow, IEEE) received the master’s and Ph.D. degrees from the Technical University (TU) of Budapest, in 1976 and 1983, respectively, and the D.Sc. degree from the University of Southampton, in 2004, and the Honorary Doctorates from the TU of Budapest, in 2009, and the University of Edinburgh, in 2015. He is a Foreign Member of the Hungarian Academy of Sciences and a former Editor-in-Chief of the IEEE Press. He has served several terms as Governor of both IEEE ComSoc and of VTS. He has published 1900+ contributions at IEEE Xplore, 19 Wiley-IEEE Press books and has helped the fast-track career of 123 Ph.D. students. Over 40 of them are Professors at various stages of their careers in academia and many of them are leading scientists in the wireless industry. He is also a Fellow of the Royal Academy of Engineering (FREng), of the IET and of EURASIP. (http://www-mobile.ecs.soton.ac.uk, https://en.wikipedia.org/wiki/Lajos_Hanzo)
Funding Statement
This work was supported in part by the Royal Academy of Engineering (RAEng) through the RAEng Research Fellowships Schemer under Grant RF14151422, in part by the Researcher Links through the Newton Fund Partnership under Grant 527612186, and in part by the U.K. Department for Business, Energy and Industrial Strategy and delivered by the British Council. L. Hanzo would like to acknowledge the financial support of the Engineering and Physical Sciences Research Council projects EP/N004558/1, EP/P034284/1, EP/P034284/1, EP/P003990/1 (COALESCE), of the Royal Society’s Global Challenges Research Fund Grant as well as of the European Research Council’s Advanced Fellow Grant QuantCom.
References
- [1].Giordano G., Blanchini F., Bruno R., Colaneri P., Di Filippo A., Di Matteo A., and Colaneri M., “Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy,” Nature Med., vol. 26, no. , pp. 1–6, Apr. 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [2].Rothe C., Schunk M., Sothmann P., Bretzel G., Froeschl G., Wallrauch C., Zimmer T., Thiel V., Janke C., Guggemos W., Seilmaier M., Drosten C., Vollmar P., Zwirglmaier K., Zange S., Wölfel R., and Hoelscher M., “Transmission of 2019-nCoV infection from an asymptomatic contact in Germany,” New England J. Med., vol. 382, no. 10, pp. 970–971, Mar. 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [3].Shi F., Wang J., Shi J., Wu Z., Wang Q., Tang Z., He K., Shi Y., and Shen D., “Review of artificial intelligence techniques in imaging data acquisition, segmentation and diagnosis for COVID-19,” IEEE Rev. Biomed. Eng., early access, Apr. 16, 2020, doi: 10.1109/RBME.2020.2987975. [DOI] [PubMed]
- [4].Zhou C., Yuan W., Wang J., Xu H., Jiang Y., Wang X., Wen Q. H., and Zhang P., “Detecting suspected epidemic cases using trajectory big data,” 2020, arXiv:2004.00908. [Online]. Available: http://arxiv.org/abs/2004.00908
- [5].Herrera J. L., Srinivasan R., Brownstein J. S., Galvani A. P., and Meyers L. A., “Disease surveillance on complex social networks,” PLOS Comput. Biol., vol. 12, no. 7, Jul. 2016, Art. no. e1004928. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [6].Atzori L., Iera A., Morabito G., and Nitti M., “The social Internet of Things (SIoT)—When social networks meet the Internet of Things: Concept, architecture and network characterization,” Comput. Netw., vol. 56, no. 16, pp. 3594–3608, Nov. 2012. [Google Scholar]
- [7].He Z., Cai Z., Yu J., Wang X., Sun Y., and Li Y., “Cost-efficient strategies for restraining rumor spreading in mobile social networks,” IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2789–2800, Mar. 2017. [Google Scholar]
- [8].Cai S., Hou W., Lin J., and Li Y., “Improving local search for minimum weight vertex cover by dynamic strategies,” in Proc. Twenty-Seventh Int. Joint Conf. Artif. Intell., Stockholm, Sweden, Jul. 2018, pp. 1412–1418. [Google Scholar]
- [9].Mu C. and Zhang Y., “Learning-based robust tracking control of quadrotor with time-varying and coupling uncertainties,” IEEE Trans. Neural Netw. Learn. Syst., vol. 31, no. 1, pp. 259–273, Jan. 2020. [DOI] [PubMed] [Google Scholar]
- [10].Mu C., Zhang Y., Jia H., and He H., “Energy-storage-based intelligent frequency control of microgrid with stochastic model uncertainties,” IEEE Trans. Smart Grid, vol. 11, no. 2, pp. 1748–1758, Mar. 2020. [Google Scholar]
- [11].Dai H., Khalil E. B., Zhang Y., Dilkina B., and Song L., “Learning combinatorial optimization algorithms over graphs,” in Proc. Adv. Neural Inf. Proc. Syst., Dec. 2017, pp. 6348–6358. [Google Scholar]
- [12].Gemmetto V., Barrat A., and Cattuto C., “Mitigation of infectious disease at school: Targeted class closure vs school closure,” BMC Infectious Diseases, vol. 14, no. 1, p. 695, Dec. 2014. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [13].Wang B., Sun Y., Duong T. Q., Nguyen L. D., and Zhao N., “Security enhanced content sharing in social IoT: A directed hypergraph-based learning scheme,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 4412–4425, Apr. 2020. [Google Scholar]
- [14].Chu D. K., Akl E. A., Duda S., Solo K., S, Yaacoub, and Schünemann H. J., “Physical distancing, face masks, and eye protection to prevent person-to-person transmission of SARS-CoV-2 and COVID-19: A systematic review and meta-analysis,” Lancet, Jun. 2020, doi: 10.1016/S0140-6736(20)31142-9. [DOI] [PMC free article] [PubMed]
- [15].Ribeiro L. F. R., Saverese P. H. P., and Figueiredo D. R., “Struc2vec: Learning node representations from structural identity,” in Proc. 23rd ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, New York, NY, USA, Aug. 2017, pp. 385–394. [Google Scholar]
- [16].Newman M. E. J., Watts D. J., and Strogatz S. H., “Random graph models of social networks,” Proc. Nat. Acad. Sci. USA, vol. 99, no. 1, pp. 2566–2572, Feb. 2002. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [17].Isella L., Stehlé J., Barrat A., Cattuto C., Pinton J.-F., and Van den Broeck W., “What’s in a crowd? Analysis of face-to-face behavioral networks,” J. Theor. Biol., vol. 271, no. 1, pp. 166–180, Feb. 2011. [DOI] [PubMed] [Google Scholar]
- [18].Aadithya K. V., Ravindran B., Michalak T. P., and Jennings N. R., “Efficient computation of the Shapley value for centrality in networks,” in Internet and Network Economics, Saberi A., Ed. Berlin, Germany: Springer, 2010, pp. 1–13. [Google Scholar]