Skip to main content
Erschienen in: Knowledge and Information Systems 3/2015

01.12.2015 | Regular Paper

Triangle minimization in large networks

verfasst von: Rong-Hua Li, Jeffrey Xu Yu

Erschienen in: Knowledge and Information Systems | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The number of triangles is a fundamental metric for analyzing the structure and function of a network. In this paper, for the first time, we investigate the triangle minimization problem in a network under edge (node) attack, where the attacker aims to minimize the number of triangles in the network by removing \(k\) edges (nodes). We show that the triangle minimization problem under edge (node) attack is a submodular function maximization problem, which can be solved efficiently. Specifically, we propose a degree-based edge (node) removal algorithm and a near-optimal greedy edge (node) removal algorithm for approximately solving the triangle minimization problem under edge (node) attack. In addition, we introduce two pruning strategies and an approximate marginal gain evaluation technique to further speed up the greedy edge (node) removal algorithm. We conduct extensive experiments over 12 real-world datasets to evaluate the proposed algorithms, and the results demonstrate the effectiveness, efficiency and scalability of our algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Albert R et al (2000) Error and attack tolerance of complex networks. Nature 406:378–382 Albert R et al (2000) Error and attack tolerance of complex networks. Nature 406:378–382
2.
Zurück zum Zitat Alon N et al (1997) Finding and counting given length cycles. Algorithmica 17(3):209–223 Alon N et al (1997) Finding and counting given length cycles. Algorithmica 17(3):209–223
3.
Zurück zum Zitat Avron H (2010) Counting triangles in large graphs using randomized matrix trace estimation. In: Proceedings of KDD-LDMTA’10 Avron H (2010) Counting triangles in large graphs using randomized matrix trace estimation. In: Proceedings of KDD-LDMTA’10
4.
Zurück zum Zitat Bar-Yossef Z et al (2002) Reductions in streaming algorithms, with an application to counting triangles in graphs. In: SODA Bar-Yossef Z et al (2002) Reductions in streaming algorithms, with an application to counting triangles in graphs. In: SODA
5.
Zurück zum Zitat Barabasi A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512 Barabasi A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512
6.
Zurück zum Zitat Becchetti L et al (2008) Efficient semi-streaming algorithms for local triangle counting in massive graphs. In: KDD Becchetti L et al (2008) Efficient semi-streaming algorithms for local triangle counting in massive graphs. In: KDD
7.
Zurück zum Zitat Brin S, Page L (1997) PageRank: bringing order to the web. Tech. rep, Stanford Digital Library Project Brin S, Page L (1997) PageRank: bringing order to the web. Tech. rep, Stanford Digital Library Project
8.
Zurück zum Zitat Buriol LS et al (2006) Counting triangles in data streams. In: PODS Buriol LS et al (2006) Counting triangles in data streams. In: PODS
9.
Zurück zum Zitat Callaway DS et al (2000) Network robustness and fragility: percolation on random graphs. Phys Rev Lett 85(25):5468–5471 Callaway DS et al (2000) Network robustness and fragility: percolation on random graphs. Phys Rev Lett 85(25):5468–5471
10.
Zurück zum Zitat Chu S, Cheng J (2011) Triangle listing in massive networks and its applications. In: KDD Chu S, Cheng J (2011) Triangle listing in massive networks and its applications. In: KDD
11.
Zurück zum Zitat Cohen R et al (2000) Resilience of the internet to random breakdowns. Phys Rev Lett 85(21):5626–5628 Cohen R et al (2000) Resilience of the internet to random breakdowns. Phys Rev Lett 85(21):5626–5628
12.
Zurück zum Zitat Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:95–120CrossRef Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:95–120CrossRef
13.
Zurück zum Zitat Durand M, Flajolet P (2003) Loglog counting of large cardinalities (extended abstract). In: ESA, pp 605–617 Durand M, Flajolet P (2003) Loglog counting of large cardinalities (extended abstract). In: ESA, pp 605–617
14.
Zurück zum Zitat Feige U (1998) A threshold of in n for approximating set cover. J ACM 45(4):634–652 Feige U (1998) A threshold of in n for approximating set cover. J ACM 45(4):634–652
15.
Zurück zum Zitat Flajolet P et al (2003) Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. In: ESA, pp 605–617 Flajolet P et al (2003) Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. In: ESA, pp 605–617
16.
19.
Zurück zum Zitat Hochbaum DS (1996) Approximation algorithms for NP-hard problems. PWS Publishing Company, Boston, MA Hochbaum DS (1996) Approximation algorithms for NP-hard problems. PWS Publishing Company, Boston, MA
20.
Zurück zum Zitat Itai A, Rodeh M (1978) Finding a minimum circuit in a graph. SIAM J Comput 7(4):413–423 Itai A, Rodeh M (1978) Finding a minimum circuit in a graph. SIAM J Comput 7(4):413–423
21.
Zurück zum Zitat Jowhari H, Ghodsi M (2005) New streaming algorithms for counting triangles in graphs. In: COCOON Jowhari H, Ghodsi M (2005) New streaming algorithms for counting triangles in graphs. In: COCOON
22.
Zurück zum Zitat Kempe D et al (2003) Maximizing the spread of influence through a social network. In: KDD Kempe D et al (2003) Maximizing the spread of influence through a social network. In: KDD
23.
Zurück zum Zitat Krause A, Guestrin C (2007) Near-optimal observation selection using submodular functions. In: AAAI Krause A, Guestrin C (2007) Near-optimal observation selection using submodular functions. In: AAAI
24.
Zurück zum Zitat Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: AAAI Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: AAAI
25.
Zurück zum Zitat Krause A et al (2008) Near-optimal sensor placements in Gaussian processes: theory, efficient algorithms and empirical studies. J Mach Learn Res 9:235–284 Krause A et al (2008) Near-optimal sensor placements in Gaussian processes: theory, efficient algorithms and empirical studies. J Mach Learn Res 9:235–284
26.
Zurück zum Zitat Latapy M (2008) Main-memory triangle computations for very large (sparse (power-law)) graphs. Theor Comput Sci 407:1–3MathSciNetCrossRef Latapy M (2008) Main-memory triangle computations for very large (sparse (power-law)) graphs. Theor Comput Sci 407:1–3MathSciNetCrossRef
27.
Zurück zum Zitat Leskovec J (2010) Standford network analysis project Leskovec J (2010) Standford network analysis project
28.
Zurück zum Zitat Leskovec J et al (2007) Cost-effective outbreak detection in networks. In: KDD Leskovec J et al (2007) Cost-effective outbreak detection in networks. In: KDD
29.
Zurück zum Zitat Li R-H, Yu JX (2011) Scalable diversified ranking on large graphs. In: ICDM Li R-H, Yu JX (2011) Scalable diversified ranking on large graphs. In: ICDM
30.
Zurück zum Zitat Li R-H, Yu JX (2013) Scalable diversified ranking on large graphs. IEEE Trans Knowl Data Eng 25(9):2133–2146CrossRef Li R-H, Yu JX (2013) Scalable diversified ranking on large graphs. IEEE Trans Knowl Data Eng 25(9):2133–2146CrossRef
31.
Zurück zum Zitat Li R-H et al (2014a) Random-walk domination in large graphs. In: ICDE Li R-H et al (2014a) Random-walk domination in large graphs. In: ICDE
32.
Zurück zum Zitat Li R-H et al (2012) Measuring robustness of complex networks under MVC attack. In: CIKM Li R-H et al (2012) Measuring robustness of complex networks under MVC attack. In: CIKM
33.
Zurück zum Zitat Li R-H et al (2014b) Measuring the impact of MVC attack in large complex networks. Inf Sci 278:685–702CrossRef Li R-H et al (2014b) Measuring the impact of MVC attack in large complex networks. Inf Sci 278:685–702CrossRef
34.
Zurück zum Zitat Lin H, Bilmes J (2010) Multi-document summarization via budgeted maximization of submodular functions. In: HLT-NAACL Lin H, Bilmes J (2010) Multi-document summarization via budgeted maximization of submodular functions. In: HLT-NAACL
35.
Zurück zum Zitat Lin H, Bilmes J (2011) A class of submodular functions for document summarization. In: ACL Lin H, Bilmes J (2011) A class of submodular functions for document summarization. In: ACL
36.
Zurück zum Zitat McPherson M et al (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27:415–444 McPherson M et al (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27:415–444
37.
Zurück zum Zitat Minoux M (1978) Accelerated greedy algorithms for maximizing submodular set functions. Lecture Notes in Control and Information Sciences. Springer, Berlin Minoux M (1978) Accelerated greedy algorithms for maximizing submodular set functions. Lecture Notes in Control and Information Sciences. Springer, Berlin
38.
Zurück zum Zitat Nemhauser GL et al (1978) An analysis of approximations for maximizing submodular set functions-I. Math Program 14:265–294 Nemhauser GL et al (1978) An analysis of approximations for maximizing submodular set functions-I. Math Program 14:265–294
39.
Zurück zum Zitat Palmer CR et al (2002) ANF: a fast and scalable tool for data mining in massive graphs. In: KDD, pp 81–90 Palmer CR et al (2002) ANF: a fast and scalable tool for data mining in massive graphs. In: KDD, pp 81–90
40.
Zurück zum Zitat Schank T (2007) Algorithmic aspects of triangle-based network analysis. PhD Thesis, University Karlsruhe (TH) Schank T (2007) Algorithmic aspects of triangle-based network analysis. PhD Thesis, University Karlsruhe (TH)
41.
Zurück zum Zitat Schank T, Wagner D (2005) Finding, counting and listing all triangles in large graphs, an experimental study. In: WEA Schank T, Wagner D (2005) Finding, counting and listing all triangles in large graphs, an experimental study. In: WEA
42.
Zurück zum Zitat Schneider CM et al (2011) Mitigation of malicious attacks on networks. PNAS 108(10):3838–3841 Schneider CM et al (2011) Mitigation of malicious attacks on networks. PNAS 108(10):3838–3841
43.
Zurück zum Zitat Seshadhri C et al (2012) Fast triangle counting through wedge sampling. CoRR abs/1202.5230 Seshadhri C et al (2012) Fast triangle counting through wedge sampling. CoRR abs/1202.5230
44.
Zurück zum Zitat Suri S, Vassilvitskii S (2011) Counting triangles and the curse of the last reducer. In: WWW Suri S, Vassilvitskii S (2011) Counting triangles and the curse of the last reducer. In: WWW
45.
Zurück zum Zitat Tong H et al (2012) Gelling, and melting, large graphs by edge manipulation. In: CIKM Tong H et al (2012) Gelling, and melting, large graphs by edge manipulation. In: CIKM
46.
Zurück zum Zitat Tong H et al (2010) On the vulnerability of large graphs. In: ICDM Tong H et al (2010) On the vulnerability of large graphs. In: ICDM
47.
Zurück zum Zitat Tsourakakis CE et al (2009) DOULION: counting triangles in massive graphs with a coin. In: KDD Tsourakakis CE et al (2009) DOULION: counting triangles in massive graphs with a coin. In: KDD
48.
Zurück zum Zitat Vazirani VV (2001) Approximation algorithms. Springer, Berlin Vazirani VV (2001) Approximation algorithms. Springer, Berlin
49.
Zurück zum Zitat Vondrak J (2010) Submodularity and curvature: the optimal algorithm. RIMS Kokyuroku Bessatsu B23:253–266MathSciNetMATH Vondrak J (2010) Submodularity and curvature: the optimal algorithm. RIMS Kokyuroku Bessatsu B23:253–266MathSciNetMATH
50.
Zurück zum Zitat Watts DJ, Strogatz SH (1998) Collective dynamics of ’small-world’ networks. Nature 393:440–442 Watts DJ, Strogatz SH (1998) Collective dynamics of ’small-world’ networks. Nature 393:440–442
51.
Zurück zum Zitat Zafarani R, Liu H (2009) Social Computing Data Repository at ASU Zafarani R, Liu H (2009) Social Computing Data Repository at ASU
Metadaten
Titel
Triangle minimization in large networks
verfasst von
Rong-Hua Li
Jeffrey Xu Yu
Publikationsdatum
01.12.2015
Verlag
Springer London
Erschienen in
Knowledge and Information Systems / Ausgabe 3/2015
Print ISSN: 0219-1377
Elektronische ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-014-0800-9

Weitere Artikel der Ausgabe 3/2015

Knowledge and Information Systems 3/2015 Zur Ausgabe

Premium Partner