IEEE Transactions on Network Science and Engineering

Constructions and Comparisons of Pooling Matrices for Pooled Testing of COVID-19
Lin YJ, Yu CH, Liu TH, Chang CS and Chen WT
In comparison with individual testing, group testing is more efficient in reducing the number of tests and potentially leading to tremendous cost reduction. There are two key elements in a group testing technique: (i) the pooling matrix that directs samples to be pooled into groups, and (ii) the decoding algorithm that uses the group test results to reconstruct the status of each sample. In this paper, we propose a new family of pooling matrices from packing the pencil of lines (PPoL) in a finite projective plane. We compare their performance with various pooling matrices proposed in the literature, including 2D-pooling, P-BEST, and Tapestry, using the two-stage definite defectives (DD) decoding algorithm. By conducting extensive simulations for a range of prevalence rates up to 5%, our numerical results show that there is no pooling matrix with the lowest relative cost in the whole range of the prevalence rates. To optimize the performance, one should choose the right pooling matrix, depending on the prevalence rate. The family of PPoL matrices can dynamically adjust their construction parameters according to the prevalence rates and could be a better alternative than using a fixed pooling matrix.
COVID-19 Networking Demand: An Auction-Based Mechanism for Automated Selection of Edge Computing Services
Yassine A and Hossain MS
Network and cloud service providers are facing an unprecedented challenge to meet the demand of end-users during the COVID-19 pandemic. Currently, billions of people around the world are ordered to stay at home and use remote connection technologies to prevent the spread of the disease. The COVID-19 crisis brought a new reality to network service providers that will eventually accelerate the deployment of edge computing resources to attract the massive influx of users' traffic. The user can elect to procure its resource needs from any edge computing provider based on a variety of attributes such as price and quality. The main challenge for the user is how to choose between the price and multiple quality of service deals when such offerings are changing continually. This problem falls under multi-attribute decision-making. This paper investigates and proposes a novel auction mechanism by which network service brokers would be able to automate the selection of edge computing offers to support their end-users. We also propose a multi-attribute decision-making model that allows the broker to maximize its utility when several bids from edge-network providers are present. The evaluation and experimentation show the practicality and robustness of the proposed model.
Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 Pandemic: A Blockchain Perspective
Lv W, Wu S, Jiang C, Cui Y, Qiu X and Zhang Y
Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing. The attention from both public and policy keeps raising on related practical problems, including To answer these questions, in this paper, we propose a decentralized and permissionless blockchain protocol, named . Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key escrow mechanism. As a result, connections between personal identity and the ownership of on-chain location information are decoupled. Meanwhile, the owner of the on-chain location data can still claim its ownership without revealing the private key to anyone else. 2) An artificial potential field-based incentive allocation mechanism is proposed to incentivize IoT witnesses to pursue the maximum monitoring coverage deployment. We implemented and evaluated the proposed blockchain protocol in the real-world using the Bluetooth 5.0. The storage, CPU utilization, power consumption, time delay, and security of each procedure and performance of activities are analyzed. The experiment and security analysis is shown to provide a real-world performance evaluation.
Epidemic Risk Assessment by a Novel Communication Station Based Method
Gu Z, Wang L, Chen X, Tang Y, Wang X, Du X, Guizani M and Tian Z
The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually under control in some countries and it is essential to ensure safe work resumption in the future. Although some approaches are proposed to measure people's healthy conditions, such as filling health information forms or evaluating people's travel records, they cannot provide a fine-grained assessment of the epidemic risk. In this paper, we propose a novel epidemic risk assessment method based on the granular data collected by the communication stations. We first compute the epidemic risk of these stations in different intervals by combining the number of infected persons and the way they pass through the station. Then, we calculate the personnel risk in different intervals according to the station trajectory of the queried person. This method could assess people's epidemic risk accurately and efficiently. We also conduct extensive simulations and the results verify the effectiveness of the proposed method.
Adjuvant Therapy System of COVID-19 Patient: Integrating Warning, Therapy, Post-Therapy Psychological Intervention
Li M, Hao Y, Ma Y, Chen J, Hu L, Chen M, Hwang K and Liu Z
The 2019 novel coronavirus(COVID-19) spreads rapidly, and the large-scale infection leads to the lack of medical resources. For the purpose of providing more reasonable medical service to COVID-19 patients, we designed an novel adjuvant therapy system integrating warning, therapy, and post-therapy psychological intervention. The system combines data analysis, communication networks and artificial intelligence(AI) to design a guidance framework for the treatment of COVID-19 patients. Specifically, in this system, we first can use blood characteristic data to help make a definite diagnosis and classify the patients. Then, the classification results, together with the blood characteristics and underlying diseases disease characteristics of the patient, can be used to assist the doctor in treat treating the patient according to AI algorithms. Moreover, after the patient is discharged from the hospital, the system can monitor the psychological and physiological state at the data collection layer. And in the data feedback layer, this system can analyze the data and report the abnormalities of the patient to the doctor through communication network. Experiments show the effectiveness of our proposed system.
Positively Correlated Samples Save Pooled Testing Costs
Lin YJ, Yu CH, Liu TH, Chang CS and Chen WT
The group testing approach, which achieves significant cost reduction over the individual testing approach, has received a lot of interest lately for massive testing of COVID-19. Many studies simply assume samples mixed in a group are independent. However, this assumption may not be reasonable for a contagious disease like COVID-19. Specifically, people within a family tend to infect each other and thus are likely to be positively correlated. By exploiting positive correlation, we make the following two main contributions. One is to provide a rigorous proof that further cost reduction can be achieved by using the Dorfman two-stage method when samples within a group are positively correlated. The other is to propose a hierarchical agglomerative algorithm for pooled testing with a social graph, where an edge in the social graph connects frequent social contacts between two persons. Such an algorithm leads to notable cost reduction (roughly 20-35%) compared to random pooling when the Dorfman two-stage algorithm is applied.
Age-Stratified COVID-19 Spread Analysis and Vaccination: A Multitype Random Network Approach
Chen X, Zhu G, Zhang L, Fang Y, Guo L and Chen X
The risk of severe illness and mortality from COVID-19 significantly increases with age. As a result, age-stratified modeling for COVID-19 dynamics is the key to study how to reduce hospitalizations and mortality from COVID-19. By taking advantage of network theory, we develop an age-stratified epidemic model for COVID-19 in complex contact networks. Specifically, we present an extension of standard SEIR (susceptible-exposed-infectious-removed) compartmental model, called age-stratified SEAHIR (susceptible-exposed-asymptomatic-hospitalized-infectious-removed) model, to capture the spread of COVID-19 over multitype random networks with general degree distributions. We derive several key epidemiological metrics and then propose an age-stratified vaccination strategy to decrease the mortality and hospitalizations. Through extensive study, we discover that the outcome of vaccination prioritization depends on the reproduction number [Formula: see text]. Specifically, the elderly should be prioritized only when [Formula: see text] is relatively high. If ongoing intervention policies, such as universal masking, could suppress [Formula: see text] at a relatively low level, prioritizing the high-transmission age group (i.e., adults aged 20-39) is most effective to reduce both mortality and hospitalizations. These conclusions provide useful recommendations for age-based vaccination prioritization for COVID-19.
A Time-Dependent SIR Model for COVID-19 With Undetectable Infected Persons
Chen YC, Lu PE, Chang CS and Liu TH
In this paper, we conduct mathematical and numerical analyses for COVID-19. To predict the trend of COVID-19, we propose a time-dependent SIR model that tracks the transmission and recovering rate at time [Formula: see text]. Using the data provided by China authority, we show our one-day prediction errors are almost less than [Formula: see text]. The turning point and the total number of confirmed cases in China are predicted under our model. To analyze the impact of the undetectable infections on the spread of disease, we extend our model by considering two types of infected persons: detectable and undetectable infected persons. Whether there is an outbreak is characterized by the spectral radius of a [Formula: see text] matrix. If [Formula: see text], then the spectral radius of that matrix is greater than 1, and there is an outbreak. We plot the phase transition diagram of an outbreak and show that there are several countries on the verge of COVID-19 outbreaks on Mar. 2, 2020. To illustrate the effectiveness of social distancing, we analyze the independent cascade model for disease propagation in a configuration random network. We show two approaches of social distancing that can lead to a reduction of the effective reproduction number [Formula: see text].
Contact Adaption During Epidemics: A Multilayer Network Formulation Approach
Sahneh FD, Vajdi A, Melander J and Scoglio CM
People change their physical contacts as a preventive response to infectious disease propagations. Yet, only a few mathematical models consider the coupled dynamics of the disease propagation and the contact adaptation process. This paper presents a model where each agent has a default contact neighborhood set, and switches to a different contact set once she becomes alert about infection among her default contacts. Since each agent can adopt either of two possible neighborhood sets, the overall contact network switches among [Formula: see text] possible configurations. Notably, a two-layer network representation can fully model the underlying adaptive, state-dependent contact network. Contact adaptation influences the size of the disease prevalence and the epidemic threshold-a characteristic measure of a contact network robustness against epidemics-in a nonlinear fashion. Particularly, the epidemic threshold for the presented adaptive contact network belongs to the solution of a nonlinear Perron-Frobenius (NPF) problem, which does not depend on the contact adaptation rate monotonically. Furthermore, the network adaptation model predicts a counter-intuitive scenario where adaptively changing contacts may adversely lead to lower network robustness against epidemic spreading if the contact adaptation is not fast enough. An original result for a class of NPF problems facilitate the analytical developments in this paper.
Clustering network layers with the strata multilayer stochastic block model
Stanley N, Shai S, Taylor D and Mucha PJ
Multilayer networks are a useful data structure for simultaneously capturing multiple types of relationships between a set of nodes. In such networks, each relational definition gives rise to a layer. While each layer provides its own set of information, community structure across layers can be collectively utilized to discover and quantify underlying relational patterns between nodes. To concisely extract information from a multilayer network, we propose to identify and combine sets of layers with meaningful similarities in community structure. In this paper, we describe the "strata multilayer stochastic block model" (sMLSBM), a probabilistic model for multilayer community structure. The central extension of the model is that there exist groups of layers, called "strata", which are defined such that all layers in a given stratum have community structure described by a common stochastic block model (SBM). That is, layers in a stratum exhibit similar node-to-community assignments and SBM probability parameters. Fitting the sMLSBM to a multilayer network provides a joint clustering that yields node-to-community and layer-to-stratum assignments, which cooperatively aid one another during inference. We describe an algorithm for separating layers into their appropriate strata and an inference technique for estimating the SBM parameters for each stratum. We demonstrate our method using synthetic networks and a multilayer network inferred from data collected in the Human Microbiome Project.
Pattern Formation over Multigraphs
Gyorgy A and Arcak M
Two of the most common pattern formation mechanisms are Turing-patterning in reaction-diffusion systems and lateral inhibition of neighboring cells. In this paper, we introduce a broad dynamical model of interconnected modules to study the emergence of patterns, with the above mentioned two mechanisms as special cases. Our results do not restrict the number of modules or their complexity, allow multiple layers of communication channels with possibly different interconnection structure, and do not assume symmetric connections between two connected modules. Leveraging only the static input/output properties of the subsystems and the spectral properties of the interconnection matrices, we characterize the stability of the homogeneous fixed points as well as sufficient conditions for the emergence of spatially non-homogeneous patterns. To obtain these results, we rely on properties of the graphs together with tools from monotone systems theory. As application examples, we consider patterning in neural networks, in reaction-diffusion systems, and contagion processes over random graphs.
Efficient Privacy-preserving Machine Learning in Hierarchical Distributed System
Jia Q, Guo L, Fang Y and Wang G
With the dramatic growth of data in both amount and scale, distributed machine learning has become an important tool for the massive data to finish the tasks as prediction, classification, etc. However, due to the practical physical constraints and the potention privacy leakage of data, it is infeasible to aggregate raw data from all data owners for the learning purpose. To tackle this problem, the distributed privacy-preserving learning approaches are introduced to learn over all distributed data without exposing the real information. However, existing approaches have limits on the complicated distributed system. On the one hand, traditional privacy-preserving learning approaches rely on heavy cryptographic primitives on training data, in which the learning speed is dramatically slowed down due to the computation overheads. On the other hand, the complicated system architecture becomes a barrier in the practical distributed system. In this paper, we propose an efficient privacy-preserving machine learning scheme for hierarchical distributed systems. We modify and improve the collaborative learning algorithm. The proposed scheme not only reduces the overhead for the learning process but also provides the comprehensive protection for each layer of the hierarchical distributed system. In addition, based on the analysis of the collaborative convergency in different learning groups, we also propose an asynchronous strategy to further improve the learning efficiency of hierarchical distributed system. At the last, extensive experiments on real-world data are implemented to evaluate the privacy, efficacy, and efficiency of our proposed schemes.
Reprogramming multistable monotone systems with application to cell fate control
Shah R and Del Vecchio D
Multistability is a key property of dynamical systems modeling cellular regulatory networks implicated in cell fate decisions, where, different stable steady states usually represent distinct cell phenotypes. Monotone network motifs are highly represented in these regulatory networks. In this paper, we leverage the properties of monotone dynamical systems to provide theoretical results that guide the selection of inputs that trigger a transition, i.e., reprogram the network, to a desired stable steady state. We first show that monotone dynamical systems with bounded trajectories admit a minimum and a maximum stable steady state. Then, we provide input choices that are guaranteed to reprogram the system to these extreme steady states. For intermediate states, we provide an input space that is guaranteed to contain an input that reprograms the system to the desired state. We then provide implementation guidelines for finite-time procedures that search this space for such an input, along with rules to prune parts of the space during search. We demonstrate these results on simulations of two recurrent regulatory network motifs: self-activation within mutual antagonism and self-activation within mutual cooperation. Our results depend uniquely on the structure of the network and are independent of specific parameter values.
Nonlinear control of networked dynamical systems
Morrison M and Kutz JN
We develop a principled mathematical framework for controlling nonlinear, networked dynamical systems. Our method integrates dimensionality reduction, bifurcation theory, and emerging model discovery tools to find low-dimensional subspaces where feed-forward control can be used to manipulate a system to a desired outcome. The method leverages the fact that many high-dimensional networked systems have many fixed points, allowing for the computation of control signals that will move the system between any pair of fixed points. The (SINDy) algorithm is used to fit a nonlinear dynamical system to the evolution on the dominant, low-rank subspace. This then allows us to use bifurcation theory to find collections of constant control signals that will produce the desired objective path for a prescribed outcome. Specifically, we can destabilize a given fixed point while making the target fixed point an attractor. The discovered control signals can be easily projected back to the original high-dimensional state and control space. We illustrate our nonlinear control procedure on established bistable, low-dimensional biological systems, showing how control signals are found that generate switches between the fixed points. We then demonstrate our control procedure for high-dimensional systems on random high-dimensional networks and Hopfield memory networks.
Intelligent Task Caching in Edge Cloud via Bandit Learning
Miao Y, Hao Y, Chen M, Gharavi H and Hwang K
Task caching, based on edge cloud, aims to meet the latency requirements of computation-intensive and data-intensive tasks (such as augmented reality). However, current task caching strategies are generally based on the unrealistic assumption of knowing the pattern of user task requests and ignoring the fact that a task request pattern is more user specific (e.g., the mobility and personalized task demand). Moreover, it disregards the impact of task size and computing amount on the caching strategy. To investigate these issues, in this paper, we first formalize the task caching problem as a non-linear integer programming problem to minimize task latency. We then design a novel intelligent task caching algorithm based on a multiarmed bandit algorithm, called M-adaptive upper confidence bound (M-AUCB). The proposed caching strategy cannot only learn the task patterns of mobile device requests online, but can also dynamically adjust the caching strategy to incorporate the size and computing amount of each task. Moreover, we prove that the M-AUCB algorithm achieves a sublinear regret bound. The results show that, compared with other task caching schemes, the M-AUCB algorithm reduces the average task latency by at least 14.8%.
Graph Matching between Bipartite and Unipartite Networks: to Collapse, or not to Collapse, that is the Question
Arroyo J, Priebe CE and Lyzinski V
Graph matching consists of aligning the vertices of two unlabeled graphs in order to maximize the shared structure across networks; when the graphs are unipartite, this is commonly formulated as minimizing their edge disagreements. In this paper we address the common setting in which one of the graphs to match is a bipartite network and one is unipartite. Commonly, the bipartite networks are collapsed or projected into a unipartite graph, and graph matching proceeds as in the classical setting. This potentially leads to noisy edge estimates and loss of information. We formulate the graph matching problem between a bipartite and a unipartite graph using an undirected graphical model, and introduce methods to find the alignment with this model without collapsing. We theoretically demonstrate that our methodology is consistent, and provide non-asymptotic conditions that ensure exact recovery of the matching solution. In simulations and real data examples, we show how our methods can result in a more accurate matching than the naive approach of transforming the bipartite networks into unipartite, and we demonstrate the performance gains achieved by our method in simulated and real data networks, including a co-authorship-citation network pair, and brain structural and functional data.