“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al. Hammad Iqbal CS 3150 24 April 2006.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks Power law graphs Small world graphs.
Advertisements

Complex Networks Advanced Computer Networks: Part1.
Scale Free Networks.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Emergence of Scaling in Random Networks Albert-Laszlo Barabsi & Reka Albert.
Analysis and Modeling of Social Networks Foudalis Ilias.
Week 5 - Models of Complex Networks I Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Information Networks Generative processes for Power Laws and Scale-Free networks Lecture 4.
Synopsis of “Emergence of Scaling in Random Networks”* *Albert-Laszlo Barabasi and Reka Albert, Science, Vol 286, 15 October 1999 Presentation for ENGS.
Information Networks Small World Networks Lecture 5.
Advanced Topics in Data Mining Special focus: Social Networks.
The influence of search engines on preferential attachment Dan Li CS3150 Spring 2006.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
1 A Random-Surfer Web-Graph Model (Joint work with Avrim Blum & Hubert Chan) Mugizi Rwebangira.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
CS728 Lecture 5 Generative Graph Models and the Web.
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Network Models Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Models Why should I use network models? In may 2011, Facebook.
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
CS 728 Lecture 4 It’s a Small World on the Web. Small World Networks It is a ‘small world’ after all –Billions of people on Earth, yet every pair separated.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
CS Lecture 6 Generative Graph Models Part II.
Global topological properties of biological networks.
Advanced Topics in Data Mining Special focus: Social Networks.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 7 May 14, 2006
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
Network analysis and applications Sushmita Roy BMI/CS 576 Dec 2 nd, 2014.
Error and Attack Tolerance of Complex Networks Albert, Jeong, Barabási (presented by Walfredo)
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
Computer Science 1 Web as a graph Anna Karpovsky.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
Network properties Slides are modified from Networks: Theory and Application by Lada Adamic.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Complex Network Theory – An Introduction Niloy Ganguly.
Class 9: Barabasi-Albert Model-Part I
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Complex Network Theory – An Introduction Niloy Ganguly.
LECTURE 2 1.Complex Network Models 2.Properties of Protein-Protein Interaction Networks.
Most of contents are provided by the website Network Models TJTSD66: Advanced Topics in Social Media (Social.
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Lecture II Introduction to complex networks Santo Fortunato.
Network (graph) Models
Lecture 23: Structure of Networks
Structures of Networks
Lecture 1: Complex Networks
Topics In Social Computing (67810)
Models of networks (synthetic networks or generative models): Random, Small-world, Scale-free, Configuration model and Random geometric model By: Ralucca.
Lecture 23: Structure of Networks
From the Synthetic networks slide deck (didn’t have a chance to go over them at that time) By: Ralucca Gera, NPS.
Lecture 23: Structure of Networks
Lecture 9: Network models CS 765: Complex Networks
Modelling and Searching Networks Lecture 5 – Random graphs
Modelling and Searching Networks Lecture 6 – PA models
Network Science: A Short Introduction i3 Workshop
Discrete Mathematics and its Applications Lecture 5 – Random graphs
Network Models Michael Goodrich Some slides adapted from:
Discrete Mathematics and its Applications Lecture 6 – PA models
Advanced Topics in Data Mining Special focus: Social Networks
Presentation transcript:

“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al. Hammad Iqbal CS April 2006

Talk Overview 1. Background 1. Large graphs 2. Modeling large graphs 2. Robustness and Vulnerability 1. Problem and Mechanism 2. Main Results 3. Adversarial Deletions During Graph Generation 1. Results 2. Graph Coupling 3. Construction of the proofs

Large Graphs  Modeling of large graphs has recently generated interest ~ 1990s  Driven by the computerization of data acquisition and greater computing power  Theoretical models are still being developed  Modeling difficulties include Heterogeneity of elements Non-local interactions

Large Graphs Examples  Hollywood graph: 225,000 actors as vertices; an edge connects two actors if they were cast in the same movie  World Wide Web: 800 million pages as vertices; links from one page to another are the edges  Citation pattern of scientific publications  Electrical Power-grid of US  Nervous system of the nematode worm Caenorhabditis elegans

Small World of Large Graphs  Large naturally occurring graphs tend to show: Sparsity:  Hollywood graph has 13 million edges (25 billion for a clique of 225,000 vertices) Clustering:  In WWW, two pages that are linked to the same page have a higher prob of including link to one another Small Diameter:  ~log n  D.J. Watts and S.H. Strogatz, Collective dynamics of 'small-world' networks, Nature (1998)

Talk Overview 1. Background 1. Large graphs 2. Modeling large graphs 2. Robustness and Vulnerability 1. Problem and Mechanism 2. Main Results 3. Adversarial Deletions During Graph Generation 1. Results 2. Graph Coupling 3. Construction of the proofs

Erdos-Renyi Random Graphs  Developed around 1960 by Hungarian mathematicians Paul Erdos and Alfred Renyi.  Traditional models of large scale graphs  G(n,p): a graph on [n] where each pair is joined independently with prob p  Weaknesses: Fixed number of vertices No clustering

Watts-Strogatz Model  Starting from a ring lattice with n vertices and k edges per vertex, rewire each vertex with prob p to a randomly chosen destination figurefigure  A good model for Hollywood graph  Web is also shown to fit small world model  Weakness: Constant n

Barabasi model  Incorporates growth and preferential attachment  Evolves to a steady ‘scale-free’ state: the distribution of node degrees don’t change over time  Prob of finding a vertex with k edges ~k -3

Degree Distribution  Scale Free P [X ≥ k] ~ ck -α Power Law distributed Heavy Tail  Erdos- Renyi Graphs P [X = k] = e -λ λ k / k! λ depends on the N Poisson distributed Decays rapidly for large k P[X≥k]  0 for large k

Power Law distributions  Also referred to as {heavy-tail, Pareto, Zipfian} distributions  Pervasive in many naturally occurring phenomena  Scale-free graph have power law distributions P [X ≥ k] ~ ck -α c>0 and α>0

Exponential (ER) vs Scale Free Albert, Jeong, Barabasi vertices and 430 edges Red = 5 highest connected vertices Green = Neighbors of red

Degree Sequence of WWW  In-degree for WWW pages is power-law distributed with x -2.1  Out-degree x  Av. path length between nodes ~16

Talk Overview 1. Background 1. Large graphs 2. Modeling large graphs 2. Robustness and Vulnerability 1. Problem and Mechanism 2. Main Results 3. Adversarial Deletions During Graph Generation 1. Results 2. Graph Coupling 3. Construction of the proofs

Robustness and Vulnerability  Many complex systems display inherent tolerance against random failures  Examples: genetic systems, communication systems (Internet)  Redundant wiring is common but not the only factor  This tolerance is only shown by scale- free graphs (Albert, Jeong, Barabasi 2000)

Inverse Bond Percolation  What happens when a fraction p of edges are removed from a graph?  Threshold prob p c (N): Connected if edge removal probability p<p c (N)  Infinite-dimensional percolation  Worse for node removal

General Mechanism  Barabasi (2000) - Networks with the same number of nodes and edges, differing only in degree distribution  Two types of node removals: Randomly selected nodes Highly connected nodes (Worst case)  Study parameters: Size of the largest remaining cluster (giant component) S Average path length l

Main Results (Deletion occurs after generation) □ Random node removal ○ Preferential node removal Why is this important?

Talk Overview 1. Background 1. Large graphs 2. Modeling large graphs 2. Robustness and Vulnerability 1. Problem and Mechanism 2. Main Results 3. Adversarial Deletions During Graph Generation 1. Results 2. Graph Coupling 3. Construction of the proofs

Main Result  Time steps {1,…,n}  New vertex with m edges using preferential att.  Total deleted vertices ≤ δn (Adversarially)  m >> δ  w.h.p a component of size ≥ n/30

Formal Statements  Theorem 1 For any sufficiently small constant δ there exists a sufficiently large constant m=m(δ) and a constant θ=θ(δ,m) such that whp G n has a “giant” connected component with size at least θn

Graph Coupling Random Graph G(n’,p) Red = Induced graph vertices Γ n

Informal Informal Proof Construction  A random graph can be tightly coupled with the scale free graph on the induced subset (Theorem 2)  Deleting few edges from a random graph with relatively many edges will leave a giant connected component (Lemma 1)  There will be a sufficient number of vertices for the construction of induced subset (Lemma 2) w.h.p

Formal Statements  Theorem 2 We can couple the construction of G n and random graph H n such that H n ~ G(Γ n,p) and whp e(H n \ G n ) ≤ Ae -Bm n  Difference in edge sets of G n and H n decreases exponentially with the number of edges

Induced Sub-graph Properties  Vertex classification at each time step t: Good if:  Created after t/2  Number of original edges that remain undeleted ≥ m/6 Bad otherwise  Γ t = set of good vertices at time t  Good vertex can become bad  Bad vertex remains bad

Proof of Theorem 2 Construction  H[n/2] ~ G(Γ n/2,p)  For k > n/2, both G[k] and H[k] are constructed inductively: Gk is generated by preferential attachment model. H[k] is constructed by connecting a new vertex with the vertices that are good in G[k] A difference will only happen in case of ‘failure’

Proof of Theorem 2 Type 0 failure  If not enough good vertices in Gk  Lemma 2: whp γ t ≥ t/10  Prob of occurrence is therefore o(1)  Generate G[n] and H[n] independently if this occurs

 If not enough good vertices are chosen by x k+1 in G[k]  r = number of good vertices selected  Let P[a given vertex is good] = ε 0  Failure if r ≤ (1-δ)ε 0 m  Upper bound: Proof of Theorem 2 Type 1 failure

 If the number of good vertices chosen by x k+1 in G[k] is less than the random vertices generated in H[k]  X~Bi(r, ε 0 ) and Y~Bi(γ k,p)  Failure if Y>X  Upper bound on type 2 failure prob: Ae - Bm Proof of Theorem 2 Type 2 failure

 Take a random subset of size Y of the good chosen vertices in G[k] and connect them with the new vertex in H[k]  Delete vertices in H[k] that are deleted by the adversary in G[k]  H n ~ G(Γ n,p)  Difference can only occur due to failure Proof of Theorem 2 Coupling and deletion

Proof of Theorem 2 Bound on failures  Prob of failure at each step Ae -Bm  Total number of misplaced edges added: E[M] ≤ Ae -Bm n

Lemma 1 Statement  Let G obtained by deleting fewer than n/100 edges from a realization of G n,c/n. if c≥10 then whp G has a component of size at least n/3

Proof of Lemma 1  G n,c/n contains a set S of size n/3 ≤ s ≤ n/2  P [at most n/100 edges joining s to n-s] is small  E [number of edges across this cut] = s(n-s)c/n  Pick some ε so that n/100 ≤(1-ε)s(n-s)c/n n-s s N/100

Proof of Lemma 1

Proof of Lemma 2 Statement and Notation  whp γ t ≥ t/10 for n/2 < t ≤ n  Let z t = number of deleted vertices ν’ t = number of vertices in G t  It is sufficient to show that

Proof of Lemma 2 Coupling  Couple two generative processes P : adversary deletes vertices at each time step P* : no vertices are deleted until t and then same vertices are deleted as P  Difference can only occur because of ‘failure’  Upper bound on z t (P*)

Theorem 1 Statement For any sufficiently small constant δ there exists a sufficiently large constant m=m(δ) and a constant θ=θ(δ,m) such that whp G n has a “giant” connected component with size at least θn

Proof of Theorem 1  Let G 1 =G n and G 2 = G(Γ n,p)  Let G = G 1 ∩ G 2  e(G 2 \ G) ≤ Ae -Bm n by theorem 2  whp |G|= γ n ≥ n/10 by lemma 2  Let m be large so that p>10/ γ n  Proof by lemma 1