Patterns and anomalies in k-cores of real-world graphs with applications

被引:0
作者
Kijung Shin
Tina Eliassi-Rad
Christos Faloutsos
机构
[1] Carnegie Mellon University,Computer Science Department
[2] Northeastern University,Network Science Institute
来源
Knowledge and Information Systems | 2018年 / 54卷
关键词
Graph; -core; Degeneracy; Influential node; Anomaly detection; -truss;
D O I
暂无
中图分类号
学科分类号
摘要
How do the k-core structures of real-world graphs look like? What are the common patterns and the anomalies? How can we exploit them for applications? A k-core is the maximal subgraph in which all vertices have degree at least k. This concept has been applied to such diverse areas as hierarchical structure analysis, graph visualization, and graph clustering. Here, we explore pervasive patterns related to k-cores and emerging in graphs from diverse domains. Our discoveries are: (1) Mirror Pattern: coreness (i.e., maximum k such that each vertex belongs to the k-core) is strongly correlated with degree. (2) Core-Triangle Pattern: degeneracy (i.e., maximum k such that the k-core exists) obeys a 3-to-1 power-law with respect to the count of triangles. (3) Structured Core Pattern: degeneracy–cores are not cliques but have non-trivial structures such as core–periphery and communities. Our algorithmic contributions show the usefulness of these patterns. (1) Core-A, which measures the deviation from Mirror Pattern, successfully spots anomalies in real-world graphs, (2) Core-D, a single-pass streaming algorithm based on Core-Triangle Pattern, accurately estimates degeneracy up to 12×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times $$\end{document}faster than its competitor. (3) Core-S, inspired by Structured Core Pattern, identifies influential spreaders up to 17×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times $$\end{document}faster than its competitors with comparable accuracy.
引用
收藏
页码:677 / 710
页数:33
相关论文
共 53 条
[1]  
Akoglu L(2015)Graph based anomaly detection and description: a survey Data Min Knowl Discov 29 626-688
[2]  
Tong H(1999)Internet: diameter of the world-wide web Nature 401 130-131
[3]  
Koutra D(2006)Large scale networks fingerprinting and visualization using the Adv Neural Inf Process Syst 18 41-395
[4]  
Albert R(2008)-core decomposition Netw Heterog Media 3 371-577
[5]  
Jeong H(2003)-core decomposition of Internet graphs: hierarchies, self-similarity and measurement biases BMC Bioinform 4 2-160
[6]  
Barabsi AL(2000)An automated method for finding molecular complexes in large protein interaction networks Soc Netw 21 375-32
[7]  
Alvarez-Hamelin JI(1973)Models of core/periphery structures Commun ACM 16 575-151
[8]  
Dall’Asta L(1963)Algorithm 457: finding all cliques of an undirected graph Israel J Math 1 156-893
[9]  
Barrat A(1982)On the structure of linear graphs J ACM (JACM) 29 24-123
[10]  
Vespignani A(2003)A sufficient condition for backtrack-free search ACM SIGKDD Explor Newslett 5 149-90