<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>for Cost-Efficient and Risk Aware Infection Suppression</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladimir Marbukh</string-name>
          <email>marbukh@nist.gov</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Institute of Standards &amp; Technology, Information Technology Laboratory</institution>
          ,
          <addr-line>100 Bureau Dr., Gaithersburg, Maryland</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In public health, contact tracing is the process of identifying people who may have been exposed to an infected person. Contact tracing performance criteria, which include infection suppression, protection of high-risk individuals, and cost-eficiency, are not necessarily aligned with each other. Pareto optimization of the corresponding inherent trade-ofs, especially at the early stages of infection, is typically unrealistic due to insuficient information on infection propagation, risk factors, prevention and treatment options, etc. We suggest that contact tracing performance can be significantly improved with the support of a specialized Recommender System (RS). Based on the combination of up-to-date contact tracing and medical data, RS can identify and test through Exposure Notification System (ENS) not only high-risk individuals but also potential superspreaders to suppress infection propagation. Due to incomplete information, the dynamic nature of the problem, and a large state and action spaces, the RS should be supported by Deep Reinforcement Learning (DRL) for solving the corresponding Partially Observable Markov Decision Process (POMDP).</p>
      </abstract>
      <kwd-group>
        <kwd>contact tracing</kwd>
        <kwd>exposure notifications</kwd>
        <kwd>recommender system</kwd>
        <kwd>deep reinforcement learning</kwd>
        <kwd>partially observable</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Motivation</title>
      <p>
        In public health, contact tracing is the process of identifying people who may have been exposed to an
infected person, subsequent testing them for infection, and isolating or treating the infected [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Contact
tracing performance criteria include infection suppression, protection of high-risk individuals, and
cost-eficiency. These criteria are not necessarily aligned with each other, e.g., given testing capacity,
infection suppression requires high priority testing for the potential super spreaders, while protection of
high-risk individuals requires testing them with higher priority. Given the testing priorities, the existing
Google/Apple Exposure Notification (GAEN) technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] can support an Exposure Notification
System (ENS) by allowing public health authorities to quickly notify people for subsequent testing.
GAEN is a framework and protocol specification developed by Apple Inc. and Google to facilitate digital
contact tracing during the COVID-19 pandemic to augment more traditional contact tracing techniques
using Android or iOS smartphones.
      </p>
      <p>Extensive research on COVID-19 has revealed that while risk-aware, multi-criteria optimization of
contact tracing has significant potential, realization of this potential requires deep knowledge of the
infection propagation mechanisms, medical prognoses and treatment options for infected individuals
with diferent risk profiles [</p>
      <p>
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Even though COVID-19 originated almost five years ago, such knowledge
is still lacking [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], which suggests that a contact tracing system should have the ability to collect
and make sense of all up-to-date available information on infection. This can be achieved with the
⋆Oficial contribution of the National Institute of Standards and Technology; not subject to copyright in the United States.
Certain equipment, instruments, software, or materials are identified in this paper in order to specify the experimental
procedure adequately. Such identification is not intended to imply recommendation or endorsement of any product or
service by NIST, nor is it intended to imply that the materials or equipment identified are necessarily the best available for
the purpose.
      </p>
      <p>CEUR</p>
      <p>ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>2. RS Supported Contact Tracing</title>
      <p>went through Health Care System</p>
      <p>The Exposure Monitoring System (EMS) monitors “accumulated exposure to infection” for each
participating individual  , ℰ [0,] (defined in the next section) in near real time  , and feeds this
informa
tion into the RS. RS also gets available information on demographic and risk factors of participating
(1) as well as health status of both participating and not participating individuals who
(2) . Note that participating individuals are likely to consent to
revealing their health information since they would benefit from accounting for their risk factors, e.g.,
advanced age, preexisting conditions, etc. For not participating individuals, some relevant information,
which does not require revealing individual identity, can be obtained without violating their privacy.</p>
      <p>RS is also fed the estimate of the infection reproduction number () , i.e., the average number of new
infections produced by one infected individual during his/her lifetime: ( )̃ ≈ ()
. Estimate ( )̃
may
combine information from EMS, the Health Care System, and possibly from other tracing mechanisms
not shown in Figure 1, e.g., from manual tracing. Infection suppression requires keeping the infection
reproduction number less than one: () &lt; 1 . Due to numerous uncertainties in the ()
estimation:
( )̃ ≈ ()</p>
      <p>, the infection suppression condition is ( )̃ ≤ 1 −  , where “safety margin”  &lt; 1 depends on
the confidence level of the corresponding estimate. The reward of the RS supported Contact Tracing
ℰ̂ :
is quantified be the negative loss</p>
      <p>−() , where () =   () +   () . Here economic loss due to lost
productivity and cost of testing/treatment is   () , and “social cost” quantifying sufering and, most
importantly, deaths due to the infection   () . The cost estimates are provided to RS by the Health Care
System and Agencies collecting and processing economic data.</p>
      <p>System evolution is described by POMDP () = (  ()) , where component   () describes the health
status of participating individual  , i.e., “non-infected,” “infected,” “deceased.” “Non-infected” and
“infected” states may not be observable which makes process ()
partially observable. The decision
to test a participating individual reveals his/her infected or not-infected status at a certain cost due
to limited testing capacity. RL employs DRL to make testing decisions on the basis of ℰ [0,]
Constraints on the infection reproduction number can be incorporated through penalty function ℎ(( )̃)
,  (2).</p>
      <p>(1)
, 

which is flat for ( )̃ ≤ 1 −</p>
      <p>and sharply increases for ( )̃ &gt; 1 −  .</p>
      <p>Our conjecture is that (near) optimal notification strategy is threshold-based: individual  should be
notified at the first moment</p>
      <p>
        =   &gt; 0 when this individual’s accumulated exposure reaches threshold
where threshold ℰ̂ = Δ(ℰ , ) depends on the history of former testing decisions/results combined
with medical and demographic data of these individuals. The function Δ(ℰ , ) can be evaluated by
employing a Deep Supervised Learning (DSL) algorithm. Note that in practice, notification strategy may
operate on the basis of a small number of risk groups [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which may be defined and then redefined by
an on-line clustering algorithm. Assumptions of homogeneity and large number of individuals within
each group, simplifies optimization of group-specific thresholds in (
1).
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Accumulated Exposure</title>
      <p>For each participating individual  , the contact tracing system identifies “accumulated exposure” to
another participating individual  during time interval [0, ] as follows:
where the corresponding instantaneous exposure rate ()
is an increasing function of  &gt; 0 , the
distance between individuals  and  at moment  is   ( ) , and  ̃ &gt; 0 ,  ≥ 1 are some parameters.
Individual  accumulated exposure to infection during time interval [0, ] is defined as the aggregated
exposure to all known spreaders during this time interval:
(1)
(2)
(3)</p>
      <p>
        Finally note that available information on accumulated exposure to specific individuals can be used to
identify “infection superspreaders” who otherwise could be unidentified, e.g., due to being asymptomatic
or for any other reason. This can be done with known algorithms [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] on undirected exposure graph 
where nodes  and  are connected if ℰ [0,] ≥ ℰ ̆[0,] , and ℰ ̆[0,] &gt; 0 is a properly defined threshold.
      </p>
      <p>≥0
  = inf{ ∶ ℰ  [0,] ≥ ℰ̂ },

0

0
ℰ [0,] = ∫  [(/̃</p>
      <p>( ))  ]  ,
ℰ [0,] = ∑ ∫   ( )


[(/̃ 
 ( ))  ]  ,
where () = 0
if  ≤ 0 and () = 1</p>
      <p>24
individual is assumed exposed if ℰ [0, ] = ∫0 (2/()) 
 &gt; 15
min.
where   ( ) = 1 if individual  is infected at moment  and   ( ) = 0 otherwise.</p>
      <p>
        Consider some examples. As currently defined by the CDC [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a high-risk COVID-19 exposure is a
() ≡
24
min(, 1) , and thus an individual is assumed exposed if ℰ [0, ] = ∫0 (() − 2
contact with a person who tests/tested positive for SARS-CoV-2 which takes place at a distance of less
than two meters for a total of 15 minutes or more over a 24-hour period. In this case,  =̃ 2
m,  → ∞ ,
m) &gt; 15
min,
otherwise. In another example [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ],  =̃ 2 m, () ≡  , and thus an
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>CDC</given-names>
            ,
            <surname>Contact</surname>
          </string-name>
          <string-name>
            <surname>tracing</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://www.cdc.gov/museum/pdf/ cdcm-pha
          <article-title>-stem-lesson-contact-tracing-lesson</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Nebeker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kareem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kunowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Malekinejad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Aronof-Spencer</surname>
          </string-name>
          ,
          <article-title>Digital exposure notification tools: A global landscape analysis</article-title>
          ,
          <source>PLOS Digital Health</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1371/journal.pdig.
          <volume>0000287</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Acemoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chernozhukov</surname>
          </string-name>
          , I. Werning,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Whinston</surname>
          </string-name>
          ,
          <article-title>Optimal Targeted Lockdowns in a Multigroup SIR Model, American Economic Review: Insights 3 (</article-title>
          <year>2021</year>
          )
          <fpage>487</fpage>
          -
          <lpage>502</lpage>
          . doi:
          <volume>10</volume>
          .1257/ aeri.20200590.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C. F.</given-names>
            <surname>Manski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Molinari</surname>
          </string-name>
          ,
          <article-title>Estimating the COVID-19 infection rate: Anatomy of an inference problem</article-title>
          ,
          <source>Journal of Econometrics</source>
          <volume>220</volume>
          (
          <year>2021</year>
          )
          <fpage>181</fpage>
          -
          <lpage>192</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jeconom.
          <year>2020</year>
          .
          <volume>04</volume>
          .041.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Rauch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Schenk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Rauch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Harders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Oberacher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Insam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Markt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kreuzinger</surname>
          </string-name>
          ,
          <article-title>Estimating actual SARS-CoV-2 infections from secondary data</article-title>
          ,
          <source>Scientific Reports</source>
          <volume>14</volume>
          (
          <year>2024</year>
          )
          <article-title>6732</article-title>
          . doi:
          <volume>10</volume>
          .1038/s41598-024-57238-0.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>McAuley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Deep reinforcement learning in recommender systems: A survey and new perspectives, Knowledge-Based Systems 264 (</article-title>
          <year>2023</year>
          )
          <article-title>110335</article-title>
          . doi:
          <volume>10</volume>
          . 1016/j.knosys.
          <year>2023</year>
          .
          <volume>110335</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Foo</surname>
          </string-name>
          ,
          <article-title>Recent advances in deep reinforcement learning applications for solving partially observable markov decision processes (POMDP) problems: Part 1-fundamentals and applications in games, robotics and natural language processing</article-title>
          ,
          <source>Machine Learning and Knowledge Extraction</source>
          <volume>3</volume>
          (
          <year>2021</year>
          )
          <fpage>554</fpage>
          -
          <lpage>581</lpage>
          . doi:
          <volume>10</volume>
          .3390/make3030029.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Foo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zang</surname>
          </string-name>
          ,
          <article-title>Recent advances in deep reinforcement learning applications for solving partially observable markov decision processes (POMDP) problems part 2-applications in transportation, industries, communications and networking and more topics</article-title>
          ,
          <source>Machine Learning and Knowledge Extraction</source>
          <volume>3</volume>
          (
          <year>2021</year>
          )
          <fpage>863</fpage>
          -
          <lpage>878</lpage>
          . doi:
          <volume>10</volume>
          .3390/make3040043.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sayrafian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Cloteaux</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Marbukh</surname>
          </string-name>
          ,
          <article-title>Impact of using soft exposure thresholds in automatic contact tracing</article-title>
          , in: 2022 IEEE International Conference on E-health
          <string-name>
            <surname>Networking</surname>
          </string-name>
          ,
          <source>Application &amp; Services (HealthCom)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/HealthCom54947.
          <year>2022</year>
          .
          <volume>9982790</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z. Zhang,</surname>
          </string-name>
          <article-title>Identifying and quantifying potential super-spreaders in social networks</article-title>
          ,
          <source>Scientific Reports</source>
          <volume>9</volume>
          (
          <year>2019</year>
          )
          <article-title>14811</article-title>
          . doi:
          <volume>10</volume>
          .1038/s41598-019-51153-5.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>