“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.
description
Transcript of “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.
![Page 1: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/1.jpg)
“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.
Hammad IqbalCS 315024 April 2006
![Page 2: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/2.jpg)
Talk Overview1. Background
1. Large graphs2. Modeling large graphs
2. Robustness and Vulnerability1. Problem and Mechanism2. Main Results
3. Adversarial Deletions During Graph Generation
1. Results2. Graph Coupling3. Construction of the proofs
![Page 3: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/3.jpg)
Large Graphs
Modeling of large graphs has recently generated interest ~ 1990s
Driven by the computerization of data acquisition and greater computing power
Theoretical models are still being developed
Modeling difficulties include Heterogeneity of elements Non-local interactions
![Page 4: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/4.jpg)
Large Graphs Examples
Hollywood graph: 225,000 actors as vertices; an edge connects two actors if they were cast in the same movie
World Wide Web: 800 million pages as vertices; links from one page to another are the edges
Citation pattern of scientific publications Electrical Power-grid of US Nervous system of the nematode worm
Caenorhabditis elegans
![Page 5: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/5.jpg)
Small World of Large Graphs Large naturally occurring graphs tend to show:
Sparsity: Hollywood graph has 13 million edges (25 billion for a clique
of 225,000 vertices) Clustering:
In WWW, two pages that are linked to the same page have a higher prob of including link to one another
Small Diameter: ~log n
D.J. Watts and S.H. Strogatz, Collective dynamics of 'small-world' networks, Nature (1998)
![Page 6: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/6.jpg)
Talk Overview1. Background
1. Large graphs2. Modeling large graphs
2. Robustness and Vulnerability1. Problem and Mechanism2. Main Results
3. Adversarial Deletions During Graph Generation
1. Results2. Graph Coupling3. Construction of the proofs
![Page 7: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/7.jpg)
Erdos-Renyi Random Graphs
Developed around 1960 by Hungarian mathematicians Paul Erdos and Alfred Renyi.
Traditional models of large scale graphs G(n,p): a graph on [n] where each pair is
joined independently with prob p Weaknesses:
Fixed number of vertices No clustering
![Page 8: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/8.jpg)
Barabasi model
Incorporates growth and preferential attachment
Evolves to a steady ‘scale-free’ state: the distribution of node degrees don’t change over time
Prob of finding a vertex with k edges ~k-3
![Page 9: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/9.jpg)
Degree Distribution
Scale Free P [X ≥ k] ~ ck-α
Power Law distributed Heavy Tail
Erdos- Renyi Graphs P [X = k] = e-λ λk / k! λ depends on the N Poisson distributed Decays rapidly for large k P[X≥k] 0 for large k
![Page 10: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/10.jpg)
Exponential (ER) vs Scale Free
Albert, Jeong, Barabasi 2000
130 vertices and 430 edgesRed = 5 highest connected verticesGreen = Neighbors of red
![Page 11: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/11.jpg)
Degree Sequence of WWW
In-degree for WWW pages is power-law distributed with x-2.1
Out-degree x-2.45
Av. path length between nodes ~16
![Page 12: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/12.jpg)
Talk Overview1. Background
1. Large graphs2. Modeling large graphs
2. Robustness and Vulnerability1. Problem and Mechanism2. Main Results
3. Adversarial Deletions During Graph Generation1. Results2. Graph Coupling3. Construction of the proofs
![Page 13: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/13.jpg)
Robustness and Vulnerability Many complex systems display inherent
tolerance against random failures Examples: genetic systems,
communication systems (Internet) Redundant wiring is common but not the
only factor This tolerance is only shown by scale-free
graphs (Albert, Jeong, Barabasi 2000)
![Page 14: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/14.jpg)
Inverse Bond Percolation What happens when a
fraction p of edges are removed from a graph?
Threshold prob pc(N): Connected if edge
removal probability p<pc(N)
Infinite-dimensional percolation
Worse for node removal
![Page 15: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/15.jpg)
General Mechanism Barabasi (2000) - Networks with the same
number of nodes and edges, differing only in degree distribution
Two types of node removals: Randomly selected nodes Highly connected nodes (Worst case)
Study parameters: Size of the largest remaining cluster (giant
component) S Average path length l
![Page 16: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/16.jpg)
Main Results(Deletion occurs after generation)
□ Random node removal ○ Preferential node removal
Why is this important?Why is this important?
![Page 17: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/17.jpg)
Talk Overview1. Background
1. Large graphs2. Modeling large graphs
2. Robustness and Vulnerability1. Problem and Mechanism2. Main Results
3. Adversarial Deletions During Graph Generation
1. Results2. Graph Coupling3. Construction of the proofs
![Page 18: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/18.jpg)
Main Result
Time steps {1,…,n} New vertex with m edges using preferential att. Total deleted vertices ≤ δn (Adversarially) m >> δ w.h.p a component of size ≥ n/30
![Page 19: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/19.jpg)
Formal Statements
Theorem 1 For any sufficiently small constant δ there
exists a sufficiently large constant m=m(δ) and a constant θ=θ(δ,m) such that whp Gn
has a “giant” connected component with size at least θn
![Page 20: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/20.jpg)
Graph Coupling
Random Graph G(n’,p)
Red = Induced graph vertices Γn
![Page 21: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/21.jpg)
InformalInformal Proof Construction
A random graph can be tightly coupled with the scale free graph on the induced subset (Theorem 2)
Deleting few edges from a random graph with relatively many edges will leave a giant connected component (Lemma 1)
There will be a sufficient number of vertices for the construction of induced subset (Lemma 2)
w.h.p
![Page 22: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/22.jpg)
Formal Statements
Theorem 2 We can couple the construction of Gn and
random graph Hn such that Hn ~ G(Γn,p) and whp e(Hn \ Gn) ≤ Ae-Bmn
Difference in edge sets of Gn and Hn
decreases exponentially with the number of edges
![Page 23: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/23.jpg)
Induced Sub-graph Properties
Vertex classification at each time step t: Good if:
Created after t/2 Number of original edges that remain
undeleted ≥ m/6 Bad otherwise
Γt = set of good vertices at time t Good vertex can become bad Bad vertex remains bad
![Page 24: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/24.jpg)
Proof of Theorem 2Construction
H[n/2] ~ G(Γn/2,p) For k > n/2, both G[k] and H[k] are
constructed inductively: Gk is generated by preferential attachment
model. H[k] is constructed by connecting a new
vertex with the vertices that are good in G[k] A difference will only happen in case of
‘failure’
![Page 25: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/25.jpg)
Proof of Theorem 2Type 0 failure
If not enough good vertices in Gk Lemma 2: whp γt ≥ t/10 Prob of occurrence is therefore o(1) Generate G[n] and H[n] independently if
this occurs
![Page 26: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/26.jpg)
If not enough good vertices are chosen by xk+1 in G[k]
r = number of good vertices selected Let P[a given vertex is good] = ε0 Failure if r ≤ (1-δ)ε0m Upper bound:
Proof of Theorem 2Type 1 failure
![Page 27: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/27.jpg)
If the number of good vertices chosen by xk+1 in G[k] is less than the random vertices generated in H[k]
X~Bi(r, ε0) and Y~Bi(γk,p) Failure if Y>X Upper bound on type 2 failure prob: Ae-
Bm
Proof of Theorem 2Type 2 failure
![Page 28: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/28.jpg)
Take a random subset of size Y of the good chosen vertices in G[k] and connect them with the new vertex in H[k]
Delete vertices in H[k] that are deleted by the adversary in G[k]
Hn ~ G(Γn,p) Difference can only occur due to failure
Proof of Theorem 2Coupling and deletion
![Page 29: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/29.jpg)
Proof of Theorem 2Bound on failures
Prob of failure at each step Ae-Bm
Total number of misplaced edges added:
E[M] ≤ Ae-Bmn
![Page 30: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/30.jpg)
Lemma 1Statement
Let G obtained by deleting fewer than n/100 edges from a realization of Gn,c/n. if c≥10 then whp G has a component of size at least n/3
![Page 31: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/31.jpg)
Proof of Lemma 1
Gn,c/n contains a set S of size n/3 ≤ s ≤ n/2 P [at most n/100 edges joining s to n-s] is
small E [number of edges across this cut] = s(n-
s)c/n Pick some ε so that n/100 ≤(1-ε)s(n-s)c/n
n-ss
N/100
![Page 32: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/32.jpg)
Proof of Lemma 1
![Page 33: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/33.jpg)
Proof of Lemma 2Statement and Notation
whp γt ≥ t/10 for n/2 < t ≤ n Let
zt = number of deleted vertices ν’t = number of vertices in Gt
It is sufficient to show that
![Page 34: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/34.jpg)
Proof of Lemma 2Coupling
Couple two generative processes P : adversary deletes vertices at each time step P* : no vertices are deleted until t and then same vertices are
deleted as P
Difference can only occur because of ‘failure’
Upper bound on zt(P*)
![Page 35: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/35.jpg)
Theorem 1Statement
For any sufficiently small constant δ there exists a sufficiently large constant m=m(δ) and a constant θ=θ(δ,m) such that whp Gn
has a “giant” connected component with size at least θn
![Page 36: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/36.jpg)
Proof of Theorem 1
Let G1=Gn and G2= G(Γn,p) Let G = G1 ∩ G2
e(G2 \ G) ≤ Ae-Bmn by theorem 2 whp |G|= γn ≥ n/10 by lemma 2 Let m be large so that p>10/ γn Proof by lemma 1
![Page 37: “Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al.](https://reader036.fdocuments.in/reader036/viewer/2022081604/5681683d550346895dde09e1/html5/thumbnails/37.jpg)