Abstract
As the COVID-19 pandemic has demonstrated, identifying the origin of a pandemic remains a challenging task. The search for patient zero may benefit from the widely-used and well-established toolkit of contact tracing methods, although this possibility has not been explored to date. We fill this gap by investigating the prospect of performing the source detection task as part of the contact tracing process, i.e., the possibility of tuning the parameters of the process in order to pinpoint the origin of the infection. To this end, we perform simulations on temporal networks using a recent diffusion model that recreates the dynamics of the COVID-19 pandemic. We find that increasing the budget for contact tracing beyond a certain threshold can significantly improve the identification of infected individuals but has diminishing returns in terms of source detection. Moreover, disease variants of higher infectivity make it easier to find the source but harder to identify infected individuals. Finally, we unravel a seemingly-intrinsic trade-off between the use of contact tracing to either identify infected nodes or detect the source of infection. This trade-off suggests that focusing on the identification of patient zero may come at the expense of identifying infected individuals.
Similar content being viewed by others
Introduction
Determining the origin of the COVID-19 pandemic, and the majority of globally emergent pathogens, is a challenging task, despite large technical advances in genetic epidemiology. The methods based on this approach attempt to determine the exact source of the virus via sequencing the virus genome and tracing different viral lineages1. While such techniques can help chart the general evolution of the virus, they require collecting biological samples in numerous locations and subjecting them to laborious analyses.
Alternative and complementary ways of seeking the source of a viral infection come from social network analysis2,3,4,5. These methods, called source detection algorithms, are designed to identify the origin of an infection with much greater granularity than the sequencing-based alternative. However, to work properly, these methods require extensive amounts of information, including the structure of the social connections and the infection state of the individuals at various points in time, which are often unavailable. In addition to the inadequacy of existing methods, there is another major obstacle facing the source-detection endeavour: the availability of limited resources that may be better spent on disease containment instead.
One strategy that got widely adopted worldwide to help curb the pandemic is contact tracing6 the practice of identifying people who came in close contact with a positive case. For years, contact tracing was used for disease control, in particular when it comes to sexually transmitted diseases and newly appearing pathogens7, e.g., it was successfully used to curb the spread of smallpox and SARS8. The effectiveness of contact tracing was further accelerated by the use of digital technologies9, and in this form, it was employed to curb the spread of COVID-196,10,11. Since it might be impossible to recover the actual network of contacts in which the spreading of the disease took place, one can use the communication network as a proxy for the purpose of contact tracing12.
While existing research on contact tracing was focused on using it to detect either current or future infections, we investigate the potential use of contact tracing to detect the source of infection, adding a new dimension to the utility of the contact tracing toolkit. To this end, we perform a wide variety of simulations on different kinds of temporal network structures, while using a spreading model of the COVID-19 disease13 to recreate the dynamics of the epidemic. It is worth noting that many existing source detection methods would benefit from the information gathered using a contact tracing process, e.g., in order to recreate the structure of the social network under consideration. What we are concerned with in this work is performing the source detection task, as part of the contact tracing process, and not as a prerequisite or an introduction to another source detection method. We attempt to answer the question of whether it is possible to pinpoint patient zero by tuning the parameters of the contact tracing process. If this method proves to be effective, it might help us determine the origins of future diseases without hindering the efforts to keep those diseases at bay. Our analysis indicates that, depending on the parameterization of the contact tracing process, it is possible to identify the source of the infection, i.e., the network node that represents patient zero. The majority of our findings focus on an inherent compromise between identifying the source of infection and identifying the nodes that are currently infected when these two tasks share the same budget. In other words, getting closer to patient zero may divert the resources from obtaining information that can be used to improve our chances of containing the disease.
Our contributions regarding the effectiveness of the contact tracing process in terms of the task of identifying infected nodes, and in terms of the task of finding the source, can be summarized as follows. First, we study how the effectiveness of contact tracing is influenced by the tracing window, i.e., the period for which infected individuals are asked to identify their close contacts. In other words, when people are asked to identify who they came in contact with, should this investigation focus on contacts made before these people got infected, after they got infected, or some time in between? Results indicate that shifting the tracing window has a negligible impact on the effectiveness of contact tracing in either task. Second, we study the impact of using depth-based or breadth-based search when tracing contacts. That is, when selecting the individuals whose close contacts will be traced, should the investigation prioritize those who were recently infected, or those whose infection is further into the past? We quantify the degree to which the former increases the chance of finding the infected nodes, the degree to which the latter increases the chance of identifying the source, and the trade-off between the two. Third, we study the relationship between the contact-tracing budget, i.e., the number of people whose contacts are traced, and the effectiveness of the investigation, measured by either the number of identified infections or the network distance to the source. We show that increasing the budget can significantly improve the former measure, but does not significantly improve the latter beyond a certain point due to the diminishing returns. Fourth, we investigate how the effectiveness of contact tracing is affected by the delay between the introduction of the disease to the network and the start of the tracing process. We find that increasing the delay drops the number of identified infections sharply, but has a relatively small effect on source detection. Fifth, we analyze how changing the characteristics of the disease itself can alter the outcome of contact tracing. As it turns out, a greater transmission rate makes it harder to identify currently infected individuals, while a longer presymptomatic period improves the effectiveness of finding the source. Moreover, a greater \(R_0\) makes it easier to identify patient zero, but makes it more difficult to contain the disease since the infected individuals are harder to identify. Finally, we compare three strategies of selecting who to test for the virus: testing people at random, prioritizing close contacts of positive cases, or a mixture of the two. Our results indicate that prioritizing close contacts offers superior efficiency, especially if the process of contact tracing is performed during, and not after, the spread of the disease.
Results
Experimental procedure
For a given temporal network, G we randomly select one of the nodes as the source node \(v^\dagger\) and start spreading the infection from it.
In our experiments, we generate the network structure using either the Barabási–Albert 14, Erdős–Rényi 15, or Watts–Strogatz16 model. We add a temporal structure of contacts to the network using the generative model by Holme17. In more detail, for any two nodes with an edge between them, they come into contact every one to seven days according to a truncated power-law distribution with exponent 2.2. To model the infection we use a model by Rusu et al.13, which at the moment of writing is the leading model of the COVID-19 disease. Even though it is slightly more complex than simple SIR or SEIR models, we selected it for a more accurate simulation of the disease. See " Materials and Methods" section for the technical details about the network generation and the diffusion model. We let the diffusion spread for T rounds, each round corresponding to a single day. Unless stated otherwise, we set \(T=28\) days in our simulations, making a single simulation run correspond to four weeks. We selected this value to represent the time necessary to discover the disease and assemble a source detection task force. Since we are only interested in detecting the source of a diffusion that spread successfully, we proceed only if at least \(10\%\) of the network got infected. We then perform the contact tracing process.
At the beginning of the contact tracing, the set of detected nodes D consists of 10 of the \(5\%\) most recently infected nodes (chosen uniformly at random). These nodes represent a small set of infections—those that are initially noticed by the authorities—which form the seed of the contact tracing process. It is worth noting that, in some cases, they might have already recovered. We have a limited budget b, which indicates the number of people for whom we can perform the contact tracing. The selection of nodes for which we perform contact tracing is based on the values of the tracing breadth parameter \(\beta _{tr}\in \{1, \ldots , b\}\). Intuitively, increasing the value of \(\beta _{tr}\) makes us focus on the most recently infected nodes, while decreasing the value of \(\beta _{tr}\) makes us reach further into the past.
We select \(\beta _{tr}\) members of D that got infected at the earliest time. For every such node \(v^*\) we trace their contacts within \(\delta\) days. The choice of the days is determined by the tracing window offset parameter \(\omega _{tr}\in \{0, \ldots , \delta -1\}\). The contacts of the node \(v^*\) are traced on the day \(\min (\tau (v^*)+\omega _{tr}, T)\) and six preceding days, where \(\tau (v^*)\) is the day when \(v^*\) got infected. Hence, the last day when the contacts are traced is the day \(\tau (v^*)+\omega _{tr}\), unless it would fall after the day T (which we assume to be the last day before we start the contact tracing process), in which case taking the minimum causes the day T to be the last day. Intuitively, increasing the value of \(\omega _{tr}\) shifts the tracing window towards the future, while decreasing the value of \(\omega _{tr}\) shifts the tracing window towards the past. For example, for \(\omega _{tr}=6\) we will trace the contact of an infected node on days \(\{\tau (v^*), \ldots , \tau (v^*)+6\}\) (i.e., during the week following the infection), while for \(\omega _{tr}=0\) we perform tracing on days \(\{\tau (v^*)-6, \ldots , \tau (v^*)\}\) (i.e., during the week preceding the infection). The probability that \(v^*\) remembers the contact that took place at time t is equal to \(P(t)=e^{-0.001(T-t)}\)18. Intuitively, the probability that a member of the network remembers a given contact drops with the time that passed since that contact following an exponential function. For example, a member of the network perfectly remembers their contacts taking place on the same day (in such a case \(t=T\), hence \(P(t)=1\)). However, the probability diminishes as they are asked about the contacts taking place further into the past (as the value of \(T-t\) increases, the value of P(t) decreases). We test for infection 10 (chosen uniformly at random) of the nodes with which \(v^*\) remembered having a contact within the described window (note that the contacts that are not remembered by \(v^*\) will not be perceived by the tracing process). Notice that this way the total number of performed tests is at most 10b, i.e., the parameter b reflects the amount of available resources both in terms of tracing contacts and performing the tests. We assume that the test is able to correctly identify an infection whether it is symptomatic, presymptomatic, or asymptomatic.
After tracing contacts for all \(\beta _{tr}\) nodes we add the newly identified nodes that were infected at some point in time to D. We repeat the process until we run out of budget. The pseudocode of the experimental procedure is presented in Section S1 of the Supplementary Materials. Unless stated otherwise, in our simulations we consider the parameter values \(\delta =7\) and \(\omega _{tr}=3\).
Figure 1 presents examples of tracing process for different values of \(\beta _{tr}\) and \(\omega _{tr}\). The infection process starts from the node A, which is the source (see how the infection time of node A is 0 in Fig. 1a). As a result of the diffusion, all nodes in the network other than the node I and the node J get infected (see how I and J are the only white nodes in Fig. 1a). At the beginning of the tracing process, the set of detected nodes consists only of the nodes G and H (see how they are the only nodes with a green rim in Fig. 1a). If \(\beta _{tr}=2\) then the entire tracing budget \(b=2\) is used to trace contacts of the set of initially detected nodes (see how in the column for \(\beta _{tr}=2\) only the contacts of G and H are traced in Fig. 1b). On the other hand, if \(\beta _{tr}=1\) then first only the contacts of G are traced (as it was infected earlier than H). As a result, we obtain information about new infected nodes (i.e., node F for \(\omega _{tr}=1\), or nodes F and E for \(\omega _{tr}=0\)). We then trace the contacts of the earliest detected infected nodes (i.e., node F for \(\omega _{tr}=1\), or node E for \(\omega _{tr}=0\)). As for the \(\omega _{tr}\) parameter, notice how for \(\omega _{tr}=1\) the contacts are traced at the day of the infection and the subsequent day, while for \(\omega _{tr}=0\) they are traced on the day of the infection and the preceding day (see the green numbers over green rectangles in Fig. 1b). Finally, notice that changing the values of \(\beta _{tr}\) and \(\omega _{tr}\) can significantly change the outcome of the tracing process, e.g., the actual source of the infection, node A, is detected only for \(\beta _{tr}=1\) and \(\omega _{tr}=0\) (see how the line corresponding to A is green only for this combination of the parameters in Fig. 1b).
Simulation results
We first evaluate how the parameters \(\beta _{tr}\) and \(\omega _{tr}\) affect the performance of the tracing process. First, let us see what are the effects of adjusting the breadth parameter \(\beta _{tr}\).
The first row of Fig. 2 presents examples of the tracing process for varying values of \(\beta _{tr}\) in a small network with 200 nodes, while the second row presents average results for large networks with 10,000 nodes. As can be seen from the figure, focusing on the breadth of the process results in detecting a greater number of currently infected nodes but a smaller chance of identifying the source of infection, while focusing on the depth of the process makes it easier to identify the source, but decreases the number of currently infected nodes we discover.
Let us now more broadly investigate the effects of changing tracing parameters. Figure 3 presents the results of the simulations with varying values of \(\beta _{tr}\) and \(\omega _{tr}\). As can be seen from the plots, greater values of the tracing breadth parameter \(\beta _{tr}\) result in more effective detection of the currently infected nodes (see colors closer to red in the first row of the figure). On the other hand, smaller values of \(\beta _{tr}\) result in closer identifying the source of the infection (see colors closer to blue in the second row of the figure). These findings confirm our observations based on simpler experiments, the results of which were presented in Fig. 2. The value of the \(\omega _{tr}\) parameter seems to have little effect on the outcome of the tracing process, i.e., it seems that whether we investigate contacts of the infected person before or after the infection does not make much difference in terms of detection effectiveness. It might be caused by the fact that contacts between a pair of nodes occur regularly in most cases. Hence, even if we do not notice the contact over which the infection spread, we might observe a different contact between the same two nodes. In Fig. 3 we focus on the outcomes of the contact tracing process. To get more insight into the course of the infection itself, see Fig. S2 in the Supplementary Materials, which presents the infection curves from our experiments. In the main article, we focus our attention on experiments with large, randomly generated networks. Nevertheless, to verify our results, we also run simulations on real-life temporal networks. The results of these experiments can be found in Section S2 of the Supplementary Materials. Broadly speaking, the trends observed for real-life networks are the same as those described above for large, randomly generated networks.
Our analysis indicates the existence of a trade-off between identifying the source of the infection process and detecting the nodes that got infected. Figure 4a further investigates this compromise. As it can be seen, for a network with 10,000 nodes getting one step closer to identifying the source (in terms of network distance) costs between 4 and 12 identified infections, depending on the structure of the network, with the cost being the greatest in Watts–Strogatz networks, and the smallest in the Barabási–Albert networks. It is worth noting that the total number of detected nodes varies between 15 in Barabási–Albert networks to 40 in Watts–Strogatz networks. Hence the cost of getting one step closer to the source can constitute about one-quarter of all detected infections.
Figure 4b,c present the results concerning the effects of increasing tracing budget and infection spreading time. In Fig. 4b we vary the budget b available to the party performing the contact tracing process. Our results suggest that increasing the budget gives a significant advantage in detecting more infected nodes. However, when it comes to identifying the source, the process quickly reaches the state of diminishing returns, where increasing the budget does not provide much better performance. On the other hand, in Fig. 4c we vary the time T that the infection process is allowed to run before the contact tracing efforts begin. As can be seen, the percentage of detected infected nodes drops significantly when the infection is allowed to run for a long time. Moreover, identifying the source is getting slightly more difficult as the infection time goes on, although the increase is sublinear with changing T.
When it comes to the effectiveness of identifying the source, it might be interesting to compare the considered contact tracing approach to existing dedicated source detection algorithms. In particular, we consider a class of source detection algorithms based on centrality measures, namely Betweenness2, Closeness2, Degree2, Eigenvector2, and Rumor3 algorithms. As these algorithms work based on the structure of the network, and the set of known infected nodes, we supply them with the information gathered by the contact tracing process. In particular, the network consists of the connections that got successfully traced (i.e., the contacts remembered by the nodes for which we performed the tracing), while the set of known infected nodes is the set of detected infections, D. Figure S3 in the Supplementary Materials presents the results of our simulations. As can be seen, the direct use of information gathered during the contact tracing process is consistently more effective in identifying the source than feeding them into existing source detection algorithms. The reason might be the fact that these algorithms were designed to process a different type of information—they expect the entire structure of the network and the complete set of infected nodes, while in reality, the available information is necessarily incomplete.
Figure 5 presents the results of simulations with changing characteristics of the infection process. More precisely, we consider the infection model described in the "Materials and Methods" section with varying presymptomatic period \(\mu _p\) and transmission rate \(\alpha\) (all other model parameters remain the same). As can be seen, the increasing transmission rate makes it significantly more challenging to identify currently infected nodes. Similarly, decreasing the presymptomatic period deteriorates the effectiveness of identifying the source. A value that allows encapsulating the severity of the infection is the basic reproduction number \(R_0\), indicating the average number of people infected by a single spreader. As evident from both the percentage of identified infections and the distance to the real source drop with the basic reproduction number, indicating that more severe disease strains are more difficult to contain by identifying the infected members of the population but give more hope of discovering the patient zero. Let us now briefly comment on the general trends in how characteristics of the infection (either the presymptomatic period and the transmission rate, or the basic reproduction number) affect the tracing process. For a more virulent, faster-spreading infection it is easier to identify the source, likely due to the fact that the average distance between the source and a given node is much shorter. Intuitively, if any contact with an infected individual resulted in becoming infected, the infection would spread from the source to all nodes along the shortest temporal paths. Similarly, if a larger percentage of the nodes becomes infected, a limited budget available to the party running the contact tracing process is not enough to thoroughly identify all infections. We also perform an analysis of how the outcome of the contact tracing process is affected by the infectious period of the disease. The results of our simulations are presented in Fig. S4 in the Supplementary Materials. When it comes to detecting infections, the situation becomes the most dire for infectious periods between 3 and 4 days (depending on the network model under consideration), as the percentage of detected infections is then minimal. Interestingly, increasing the infectious period makes it easier to identify the source, as it is seemingly more straightforward to backtrack a quickly progressing infection.
Figure 6 presents the results of our experiments with a slightly modified experimental setting. Instead of performing the entire tracing process at a single moment after T rounds, we allow the diffusion to continue for another T rounds. During each of these rounds, we assume a budget of \(b=100\). We spend a percentage p of this budget on testing randomly selected nodes, and the remaining \(1-p\) percentage of the budget on testing traced contacts as before. We do not test a node if it has been tested in the last 7 rounds. As a baseline, we consider a case in which the same budget is spent in its entirety at the end of the 2T rounds period. As can be seen from the figure, we detect a greater number of currently infected nodes when we devote a smaller part of the budget to random testing. It suggests that focusing on contact tracing rather than random testing can not only bring us closer to finding the source of infection, but also help us identify people that are infected at the moment. Moreover, performing contact tracing throughout the process is much more effective than doing it entirely at the end of the considered period.
Discussion
In this work, we explored using contact tracing to identify the source of a diffusion process, focusing on a diffusion model of the COVID-19 disease as the subject of our investigation. We found that the effectiveness of contact tracing is only marginally affected by shifting the tracing window, i.e., changing the exact days for which we trace contacts. In contrast, the choice between depth-based and breadth-based search has a significant impact on the effectiveness of contact tracing. The former is beneficial when identifying the source of diffusion, and the latter allows for finding more currently-infected nodes. We also showed that investing more resources into contact tracing can dramatically improve the number of discovered infections but has diminishing returns in terms of source detection. Moreover, we found that letting the diffusion spread for a longer time before starting contact tracing slightly reduces the chances of finding the source but has a highly detrimental effect on identifying infected nodes. We also investigated how the contact tracing results are affected by changing characteristics of the spreading infection process, modeling different potential strains of the disease. While it is easier to pinpoint the source of disease with a greater basic reproduction number, the total number of identified infected individuals is smaller for such strains. Finally, we analyzed the outcomes of mixing contact tracing and random testing during the diffusion process, with our results indicating that the former offers superior performance. Altogether, our analysis reveals that the effectiveness of contact tracing in identifying infections and finding the source follow very different trends, and, in many cases, we can observe a direct trade-off between these two objectives.
Our work is related to a growing body of literature on source detection in social networks. Typical source detection algorithms allow inferring which node was the source of the diffusion process based on the structure of the social network and the information about which nodes are infected2,3,4,5. Typically these algorithms allow to trace back the origins of diffusion starting from a single node, although there also exist techniques that can detect multiple sources19. Other source detection techniques are specifically designed to find the source of diffusion in tree networks20,21,22, or analyze the readings of sensors placed throughout the network before the diffusion takes place23,24,25. However, all of these source detection solutions require information that may not be readily available when tracing the origins of infectious diseases, most notably the structure of the underlying network. The technique based on contact tracing considered in this work overcomes this difficulty by reconstructing the connections between nodes during the tracing process without the need for any preexisting knowledge about the network structure.
The main policy implication of our work comes from the observed trade-off between the effectiveness of contact tracing in terms of finding the source and identifying the infected nodes. Our simulations indicate that, while it is possible to conduct both tasks simultaneously, a performance increase in one of them comes at the cost of a performance decrease in the other. Hence, if the primary goal of the contact tracing process is to curb the spreading of a disease, the emphasis should be on the breadth of the search rather than depth. Such an approach would allow us to maximize the effectiveness of containing the infection while, at the same time, letting us slowly work towards the secondary goal of identifying patient zero. Our results suggest that another key factor is the promptness with which the contact tracing process is started. This finding indicates the need to implement procedures to initiate the process as soon as the first signs of a major infection event are detected. Altogether, a promptly initiated and properly guided contact tracing process can be a crucial tool for combating the next global pandemic.
Materials and methods
Temporal networks
Let \(\langle T \rangle\) denote a time interval of T discrete time steps, i.e., \(\langle T \rangle = \{0, \ldots , T-1\}\). We will sometimes refer to a particular \(t \in \langle T \rangle\) as the moment t. We denote by \(G = (V,K,T) \in \mathbb {G}\) a temporal network, where V is the set of n nodes, \(K\subseteq V \times V \times \langle T \rangle\) is the set of contacts, and T is the duration of the time interval during which the contacts in \(K\) take place. We denote a contact between nodes v and w at moment t by (v, w, t). In this work we only consider undirected temporal networks, i.e., we do not discern between contacts (v, w, t) and (w, v, t). Moreover, we assume that networks do not contain self-contacts, i.e., \(\forall _{v \in V} \forall _{t \in \langle T \rangle }(v,v,t) \notin K\). We denote all contacts of a given node v at time t by \(K_G(v,t)\). To make the notation more readable, we will often omit the temporal network itself from the notation whenever it is clear from the context, e.g., by writing \(K(v,t)\) instead of \(K_G(v,t)\).
We consider the following network generation models:
-
Barabási–Albert model14—model generating preferential-attachment networks.
-
Erdős–Rényi model15—model generating uniform random networks.
-
Watts–Strogatz model16—model generating small-world networks. In our simulations we set the rewiring probability to 0.25.
After generating the structure of the network connections we add contact times to them using the generative model for contact sequences by Holme17, with \(k_{min} = 1\), \(k_{max} = 7\), \(\gamma = 2.2\), and \(\mu = 0.9\).
Spreading model
We use a spreading model of the COVID-19 disease by Rusu et al.13 In this model, every node in the network is in one of the following states: susceptible S, exposed but not infectious E; infectious presymptomatic \(I_p\), infectious asymptomatic \(I_a\), infectious symptomatic \(I_s\), hospitalized H, recovered R, or dead D. The probabilities of transitions between states in a given round are presented in Table 1, while the descriptions of the model parameters and the values used in our simulations are summarized in Table 2.
Data availability
The datasets generated and/or analysed during the current study are available in an online repository, https://figshare.com/articles/dataset/Contact_tracing_data/21790001.
Code availability
The code allowing to recreate the results of the current study is available online as a Java Eclipse project, https://github.com/mjwaniek/ContactTracing.
Change history
27 January 2023
A Correction to this paper has been published: https://doi.org/10.1038/s41598-023-28809-4
References
Lu, J. et al. Genomic epidemiology of SARS-Cov-2 in Guangdong province, China. Cell 181(5), 997–1003 (2020).
Comin, C. H. & da Fontoura Costa, L. Identifying the starting point of a spreading process in complex networks. Phys. Rev. E 84(5), 056105 (2011).
Shah, D. & Zaman, T. Rumors in a network: Who’s the culprit? IEEE Trans. Inf. Theory 57(8), 5163–5181 (2011).
Jain, A., Borkar, V. & Garg, D. Fast rumor source identification via random walks. Soc. Netw. Anal. Min. 6(1), 62 (2016).
Antulov-Fantulin, N., Lančić, A., Šmuc, T., Štefančić, H. & Šikić, M. Identification of patient zero in static and temporal networks: Robustness and limitations. Phys. Rev. Lett. 114(24), 248701 (2015).
Kleinman, R. A. & Merkel, C. Digital contact tracing for Covid-19. CMAJ 192(24), E653–E656 (2020).
Eames, K. T. & Keeling, M. J. Contact tracing and disease control. Proc. R. Soc. Lond. B 270(1533), 2565–2571 (2003).
Klinkenberg, D., Fraser, C. & Heesterbeek, H. The effectiveness of contact tracing in emerging epidemics. PLoS ONE 1(1), e12 (2006).
Anglemyer, A. et al Digital contact tracing technologies in epidemics: A rapid review. Cochr. Database Syst. Rev.8(8), (2020).
Braithwaite, I., Callender, T., Bullock, M. & Aldridge, R. W. Automated and partly automated contact tracing: A systematic review to inform the control of Covid-19. Lancet Digital Health 2(11), e607–e621 (2020).
Park, Y. J. et al. Contact tracing during coronavirus disease outbreak, South Korea, 2020. Emerg. Infect. Dis. 26(10), 2465 (2020).
Farrahi, K., Emonet, R. & Cebrian, M. Epidemic contact tracing via communication traces. PLoS ONE 9(5), e95133 (2014).
Rusu, A., Farrahi, K. & Emonet, R. Modelling digital and manual contact tracing for Covid-19 are low uptakes and missed contacts deal-breakers? medRxiv, (2021).
Barabási, A.-L. & Albert, R. Emergence of scaling in random networks. Science 286(5439), 509–512 (1999).
Erdős, P. & Rényi, A. On random graphs i. Publ. Math. Debrecen 6, 290–297 (1959).
Watts, D. J. & Strogatz, S. H. Collective dynamics of small-world networks. Nature 393(6684), 440–442 (1998).
Holme, P. Epidemiologically optimal static networks from temporal network data. PLoS Comput. Biol. 9(7), e1003142 (2013).
Woźniak, P. A., Gorzelańczyk, E. J. & Murakowski, J. A. Two components of long-term memory. Acta Neurobiol. Exp. 55(4), 301–305 (1995).
Shelke, S. & Attar, V. Source detection of rumor in social network: A review. Online Soc. Netw. Media 9, 30–42 (2019).
Wang, Z., Dong, W., Zhang, W. & Tan, C. W. Rumor source detection with multiple observations: Fundamental limits and algorithms. ACM SIGMETRICS Perform. Eval. Rev. 42(1), 1–13 (2014).
Wang, Z., Dong, W., Zhang, W. & Tan, C. W. Rooting our rumor sources in online social networks: The value of diversity from multiple observations. IEEE J. Sel. Top. Signal Process. 9(4), 663–677 (2015).
Cai, K., Xie, H. & Lui, J. C. Information spreading forensics via sequential dependent snapshots. IEEE/ACM Trans. Network. 26(1), 478–491 (2018).
Pinto, P. C., Thiran, P. & Vetterli, M. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett. 109(6), 068702 (2012).
Xu, W., & Chen, H.: Scalable rumor source detection under independent cascade model in online social networks. In 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp 236–242. IEEE, (2015).
Paluch, R., Lu, X., Suchecki, K., Szymański, B. K. & Hołyst, J. A. Fast and accurate detection of spread source in large complex networks. Sci. Rep. 8(1), 1–10 (2018).
Acknowledgments
M.C. was supported by the Ministry of Universities of the Government of Spain, under the program “Convocatoria de Ayudas para la recualificación del sistema universitario español para 2021-2023, de la Universidad Carlos III de Madrid, de 1 de Julio de 2021”. P.H. was supported by JSPS KAKENHI Grant Number JP 21H04595.
Author information
Authors and Affiliations
Contributions
M.C. and T.R. conceived the study. M.W. ran the simulations and generated the figures. All authors wrote and reviewed the manuscript.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this Article was revised: The original version of this Article contained an error in Affiliation 1, which was incorrectly given as ‘New York University Abu Dhabi, Abu Dhabi, UAE’. The correct affiliation is: Computer Science, Science Division, New York University Abu Dhabi, Abu Dhabi, UAE.
Supplementary Information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Waniek, M., Holme, P., Farrahi, K. et al. Trading contact tracing efficiency for finding patient zero. Sci Rep 12, 22582 (2022). https://doi.org/10.1038/s41598-022-26892-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-022-26892-7
- Springer Nature Limited
This article is cited by
-
Source identification via contact tracing in the presence of asymptomatic patients
Applied Network Science (2023)