Interacting Network
Interacting Network
and Projects
Ha Pham
January 24, 2024
This model is often referred to by its mathematical name G(n, m). The average degree of a node in such
network is
2m
hki =
n
However other properties are not so easy to calculate.
Most mathematical work has actually been conducted on a slightly different model that is considerably
easier to handle such as Rényi-Erdös (ER) network or Poisson random graph or G(n, p).
Example 1.2 (Rényi-Erdös network G(n, p) - fix number of node and probability of connecting two random
chosen node). In G(n, p), we fix the number of vertices, not the number but the probability p of edges between
vertices.
The technical definition of the random graph is not in terms of a single network, but in terms of an
ensemble, a probability distribution over all possible networks. To be specific, G(n, p) is the ensemble of
networks with n vertices in which each simple graph G appears with probability
n
P (G) = pm (1 − p)( 2 )−m
1
where m is the number of edges in the graph.
Probability that we obtain a graph with exactly m edges in G(n, p) is
n
n
P (m) = 2 pm (1 − p)( 2 )−m
m
(n2 ) n
n n
m 2 pm (1 − p)( 2 )−m =
X
hmi = p
m=0
m 2
The average degree of a node in a graph of m edges and n nodes is 2mn . So the mean degree of a vertex in
the random graph is
(n2 )
X 2m
hki = c = P (m) = (n − 1)p
m=0
n
A given node is connected randomly and indepenently to each of other n − 1 nodes with probability p. So
probability that it has exactly k neighbors is
ck
n−1 k
pk = p (1 − p)n−1−k → e−c
k k!
as n → ∞.
As n → ∞, G(n, p) has tree form with no loop, no multiedge and no self-edge with probability 1. The
network has at most one giant component.
Example 1.3 (Degree distribution). Define pk as fraction of node with degre k in the network. Then pk
can be seen as the probability that a random choosen node in the network has degree k.
Remark that degree distribution does not tell us the complete structure of a network
Figure 2: Two different networks with same degree distribution p1 = 0.4, p2 = 0.6
Example 1.4 (Configuration model - fix sequence degree of nodes in network). The configuration model is
a network with a given degree sequence k1 , k2 , . . . rather than degree distribution. That is exactly degree of
each node in the network is fixed rather than the probability distribution from which the degrees are choosen.
2
Construction random network from sequence degree: Suppose that Pki is the degree of the node
i for i = 1, . . . , n. Given each node i a total of ki ”stubs”. There are totally ki = 2m stubs. We choose
two stubs uniformly at random and create an edge by connecting them. Then we choose another pairs from
the remaining 2m − 2 stubs and so on.
Figure 4: Each vertex is given a number of “stubs” of edges equal to its desired degree. Then pairs of stubs
are chosen at random and connected together to form edges (dotted line).
Probability that we reach a vertex of degree k upon following an edge is proprotion to kpk . The number of
other neighbor of the node at the end of such edge is called excess degree.
Excess degree of a node is in fact equal to its degree minus 1. Hence probability that a random node has
excess degree k is
(k + 1)pk+1
qk = (2)
hki
P
where hki is the average degree of a node to guarantee the normalization condition qk = 1.
Let g1 (z) be generating function of excess degree distribution, that is
X
g1 (z) = qk z k (3)
k
g00 (z)
g1 (z) = (4)
hki
3
2.2 Generating function for number of second neighbor
(2)
Denote pk be probability that a node has exactly k second neighbors and P (2) (k|m) be the conditional
probability of having exactly k second neighbor given that it has first m neighbors (or degree of m). We
have
(2)
X
pk = pm P (2) (k|m) (5)
m≥0
The number of second neighbor is equal to the total excess degree of the first neighbor. Suppose that excess
degree of all nodes are independent Qm then given that the node has m first neighbors, the probability that their
excess degree are j1 , . . . , jm is i=1 qji . Thus
X m
Y
P (2) (k|m) = qji (6)
j1 +···+jm =k i=1
Hence
m
(2)
X X Y
pk = pm qji (7)
m≥0 j1 +···+jm =k i=1
We derive the powers property of generating function: given a node of degree m, the number of second
neighbour is the total exceed degree of m node. Hence the generating function of the conditional number of
second neighbor given that a node has degree m is (g1 (z))m
X
P (2) (k|m)z k = (g1 (z))m (12)
k
For number of the third neighbor, we use similar argument. Denote P (3) (k|m) be the probability that
there are exactly k third neighbor given that there are m second neighbors. Then the generating function
of the number of the third neighbors is given by
XX
g (3 (z) = p(2)
m P
(3)
(k|m)z k (13)
k≥0 m≥0
X X
= p(2)
m P (3) (k|m)z k (14)
m≥0 k≥0
X
= p(2)
m (g1 (z))
m
(15)
m≥0
4
We can achieve the generating function of the nth neighbors recursively as following
XX
g (n (z) = p(n−1)
m P (n) (k|m)z k
k≥0 m≥0
X X
= p(n−1)
m P (n) (k|m)z k
m≥0 k≥0
X
= p(n−1)
m (g1 (z))m
m≥0
where P (n) (k|m) is the probability that the number of nth neighbor is k given the number of (n − 1)th is m.
Such generating function allows us to compute the mean degree of neighbors at any distance n
n−1
c2
cn = (g (n) )0 (1) = (g (n−1) )0 (g1 (1))g10 (1) = (g (n−1) )0 (1)g10 (1) = cn−1 c1 = · · · = c1 (18)
c1
Let ρs be the probability that a node at the end of an edge belongs to a small component of size s after the
edge is removed. Generating function for this distribution is defined as
X
h1 (z) = ρs z s (20)
s≥0
Denote P (s − 1|k) be the conditional probability that a node belong to a component of size s given that
its degree is k. In other word, after removing this node, the total size of its neighbor components are s − 1.
By total law, we have
X
πs = pk P (s − 1|k) (21)
k
Hence
∞ X
X ∞
h0 (z) = pk P (s − 1|k)z s
s=1 k=0
∞ X
X ∞
=z pk P (s|k)z s
s=0 k=0
P (s|k) is the probability that the k neighbors belong to small components whose size sums to s. Denote si be
the size of the neighbor i which happens with probability ρsi then s1 + · · · + sk = s. Using the independent
of size of small components, we have
X k
Y
P (s|k) = ρsi
s1 +···+sk =s i=1
5
So
∞ X
X ∞ X k
Y
h0 (z) = z pk ρsi z s
s=0 k=0 s1 +···+sk =s i=1
∞
X ∞
X X k
Y
=z pk ρsi z si
k=0 s=0 s1 +···+sk =s i=1
X∞
=z pk [h1 (z)]k
k=0
= zg0 (h1 (z))
Intuitively, h0 refers for generating function of the sum of ”neighbor component” size while h1 refers for
generating function for the size of a ”neighbor component” following an edge. Given an edge of degree k,
the size of the component that it belongs will be equal to the sum of the size of k ”neighbor component”
and add by 1 to count itself into the ”fullzise component”.
Moreover, in large networks, the removal of a node has no effect on the degree distribution. So if a
neighbor of a removed node has degree k then its probability of belonging to a component of size s is
P (s − 1|k) just as before. After removing, the degree of such node is its orgin excess degree qk . Hence
X
ρs = qk P (s − 1|k) (22)
k
It leads that
X XX
h1 (z) = ρs z s = qk P (s − 1|k)z s = zg1 (h1 (z))
s s k
In summary, we have
u = g1 (u) (26)
The equation u = g1 (u) always has a solution u = 1. If it is the unique solution on [0, 1] then S = 0 and
hence there does not exist the giant component.
The giant component exists if and only if the equation g1 (u) = u has another solution on [0, 1). Because
g1 is an increasing and convex function, it happens if and only if
6
Hence
X 1 X
g10 (1) = kqk z k = k(k + 1)pk+1
hki
k k
!
1 X X
= (k + 1)2 pk+1 − (k + 1)pk+1
hki
k k
k 2 − hki
=
hki
Hence the condition for the existence of giant component becomes
k 2 − hki
> 1 ⇐⇒ k 2 > 2 hki (27)
hki
ck
pk = e−c
k!
where c = hki is the average degree.
The generating function of degree distribution is
X ck k X (zc)k
g0 (z) = e−c z = e−c = e−c ecz = ec(z−1)
k! k!
k k
u = g1 (u) = ec(u−1)
Giant component exists if and only if g10 (1) > 1 or c > 1. In this case, the size of giant component is
S = 1 − ec(u−1)
Example 2.2 (Power law). Pure power law distribution
(
0 if k = 0
pk = k−α (28)
ζ(α) if k > 0
where ζ(α) = k −α .
P
Condition for existence of giant component
We have
1 X −α 1 X −(α−1) ζ(α − 1)
hki = kk = k =
ζ(α) ζ(α) ζ(α)
and
1 X 2 −α 1 X −(α−2) ζ(α − 2)
k2 = k k = k =
ζ(α) ζ(α) ζ(α)
Hence the giant component exists if and only if
k −α+1 uk
P
Liα−1 (u)
u= =
ζ(α − 1) ζ(α − 1)
where X
g0 (z) = pk z k
k
Probability that a node is not remove is φ. Hence the probability that a node belong to the giant cluster is
S = φ(1 − g0 (u))
8
Calculation for probability that a node is not connected to the giant via a particular neighbor is as following:
There are two ways that a neighbor of a node does not belong to the giant cluster
1. the neighbor is removed with probability 1 − φ
2. the neighbor is not removed with probability φ but itself is not in the giant component. If such neighbor
is has other k neighbors with probability qk then this case happens with probability φuk
Hence
X X
u= qk (1 − φ + φuk ) = 1 − φ + φ qk uk = 1 − φ + φg1 (u) (29)
k k
d
(1 − φ + φg1 (z)) =1 (30)
dz z=1
9
2.3.3 Non-uniform removal of nodes
Size of giant cluster
As before, we denote u as the average probability that a node does not belong to the giant cluster via any
neighbor.
Let φk be the probability that a node of degree k is occupied (not removed). Given a node of degree k,
it does not belong to a giant component via a particular neighbor with probability uk . So probability that
it belongs to the giant component is φk (1 − uk ). The average probability that a random node is in the giant
component is
X X X
S= pk φi (1 − uk ) = p k φk − pk φk uk = f0 (1) − f0 (u) (33)
k k k
where
X
f0 (z) = pk φk z k (34)
k
= 1 − f1 (1) + f1 (u)
where
X
f1 (z) = qk φk+1 z k (36)
k≥0
(k+1)pk+1
Using the fact that qk = hki , we have
1 X f 0 (z)
f1 (z) = kpk φk z k−1 = 00 (37)
hki g0 (1)
k≥1
Condition for the existence of the giant component f10 (1) > 1
Find the size of the giant componnent First solve the equation
u = 1 − f1 (1) + f1 (u)
and
0 −2
kX
ck k
f1 (z) = e−c z
k!
k=0
and
k0 −1 −α 0 −1
kX
ζ(α) X k k −α+1 k−1
f1 (z) = kz k−1 = z
ζ(α − 1) ζ(α) ζ(α − 1)
k=1 k=1
11
2.3.4 Generating function for size of small percolation cluster
We repeat the argument to find generating function of size of small component in a random network to study
size of small percolation cluster.
Let h1 (z) be generating function for the probability that the end of a randomly chosen edge leads to a
percolation cluster of a given number of occupied nodes (generating function for size of a ”neighbor cluster”).
The cluster may contain 0 edge if the mode at the end of the edge is removed with probability 1 − f1 (1) or
may leads to an occupied node with excess degree of k. Hence the size of the origin cluster will be equal to
the sum of the size of k subclusters coming from the node at the end of the edge and 1. Hence
h1 (z) = 1 − f1 (1) + zf1 (h1 (z)) (39)
Let h0 (z) be the generating function for the probability distribution for the size of cluster to which a
random choson node belong to. Then
h0 (z) = 1 − f0 (1) + zf0 (h1 (z)) (40)
Size of giant cluster is
S = 1 − h0 (1) = f0 (1) + f0 (h1 (1)) = f0 (1) + f0 (u) (41)
where u = h1 (1) is the solution to the equation
u = 1 − f1 (1) + f1 (u) (42)
as in the approach in the previous section.
Strategy description: remove all the node of degree higher than k0 . For the node with degree k ∈ [0, k0 ],
it is removed with probability 1 − φk . For a = 0, we cover the highest degree attack strategy.
So we modify the above simulation algorithm as following
Let h0 be the generating function for size of small percolation cluster then
13
where h1 (x) is the generating function for size of ”neighbor cluster” and satisfies
The condition for existence of giant component is f10 (1) > 1. In this case, the size of giant component
(LCC) is S = 1 − u where u is the solution to the equation
Example 3.1 (ER network or Poisson network - attack without using cutoff degree - Strategy 1). Consider
an ER graph with parameter p: two random nodes are connected with probability p. An ER(p) network is one
of some ways to build a graph G(m, n) whose number of nodes and edges are fixed (m nodes and n edges).
However it differs from the Quang’s setting for bimodular: fixed the number of wings (open edges) of each
nodes first and then match randomly a pair of wings to create an edge.
Let c = hki be the mean of average degree of a node then
ck
pk = e−c
k!
For a large network with N nodes then c = N p.
We have
X ck
g0 (x) = e−c xk = e−c ecx = ec(x−1)
k!
k≥0
X ck 1 X (cx)k
f0 (x) = e−c x k
= e −c
k! ak + 1 k!(ak + 1)
k≥1 k≥0
ck
pk = e−c
k!
We have
X ck
g0 (x) = e−c xk = e−c ecx = ec(x−1)
k!
k≥0
k0 k
−c
X ck 1 k −c
X0
(cx)k
f0 (x) = e x = e
k! ak + 1 k!(ak + 1)
k=0 k=0
0 −1
kX
f00 (x) (cx) k
f1 (x) = = e−c
c k!(ak+1 + 1)
k=0
0 −2
kX
ck
ce−c >1 (54)
k!(ak+1 + 1)
k=0
The critical value of the power a when k0 is fixed or critical value of k0 when a is fixed is the solution to the
equation
0 −2
kX
ck
ce−c =1 (55)
k!(ak+1 + 1)
k=0
If k0 is large enough then this critical value can be used to approximate the critical value of a in the case of
attacking without degree threshold.
Need to solve the equation
1 − f1 (1) + f1 (u) = u
numerically to find the size of giant component is S = 1 − u.
Remark 3.1. Since there is no closed form for generating function in strategy 1, we consider strategey 1 as
the limit of strategy 2 when the cutoff degree k0 tends to infinity.
Remark 3.2. Concerning on computing, one may face to error for large k0 due to out of memory problem
to calculate k!. In this case, we may need to use normal approximation to poisson distribution for high degree
pk ≈ P (k − 0.5 ≤ X ≤ k + 0.5)
Example 3.3 (Scale-free network- Strategy 2). Use the same argument as in the case of ER network. The
degree distribution is given by
(
0 if k = 0
pk = k−α (56)
ζ(α) if k>0
15
k −α . We have
P
where ζ(α) =
X X k −α
g0 (x) = pk xk = xk (57)
ζ(α)
k k≥1
k0
X X k −α
f0 (x) = φk pk xk = xk (58)
(ak + 1)ζ(α)
k k=1
k
f 0 (x) X0
k 1−α
f1 (x) = 0 = xk−1 (59)
hki (ak + 1)ζ(α − 1)
k=1
Example 3.4. Consider a network of 103 nodes. Among these node, there are 100 nodes of degree 0, 700
nodes of degree 3, 150 nodes of degree 7, 30 node of degree 10 and 20 nodes of degree greater than or equal
to 100. Degree distribution of such network can be estimated by
Then we can estimate the LCC of this network with respect to degreee attack strategies using degree distri-
bution.
Of course, degree distribution can not capture all the structure of the network. Hence the LCC estimated
by this way can be different from the true LCC that we obtain from attacking the real network but it can be
considered as an approach to forecast LCC.
16
3.3.1 Uniformly random attack
3.3.2 Degree attack
3.4 Question
Does it make sense to modify random walk attack strategy (proposed in Turchetto et all 2013) with the
same idea as Cassi: instead of choosing uniformly a neighbor of vertex u, we choose the next node with
probability depending on its excess degree. For example, consider a vertex in Figure 5 which has three first
neighbors. From the left to the right, their excess degrees are 1, 3 and 2 respectively.
Let
1
qk =
ak + 1
for some a > 0.
Denote these neighbors from the left to the right be a, b, c Then the conditional probabilities that the
next node to be chosen among these three neighbors are
q1 q3 q2
q̃a = , q̃b = , q̃c =
q1 + q3 + q2 q1 + q3 + q2 q1 + q3 + q2
Such setting for random walk on network makes any sense? Is it applicable for node attack?
17
defined by
∞
X
Gµ (x1 , x2 , . . . , xl ) = pµk1 ,k2 ,...,kl xk11 xk22 . . . xkl l (61)
k1 ,...,kl =0
We have
∞ ∞
∂Gµ X X
(x) = kν pik1 ,...,kν ,...,kl xk11 . . . xkνν −1 . . . xkl l (62)
∂xν
kν =1 kp =0,p6=ν
and
∞ ∞
∂Gµ X X µ
(1) = kν pµk1 ,...,kν ,...,kl = hkiν (63)
∂xj
kν =1 kp =0,p6=j
Figure 6: An illustration of the remaining edges incident to a node in a network µ reached by following a
random edge between networks ν and µ ([leicht2009percolation ])
For a µ - node following an ν−µ edge with excess degree (k1 , . . . , kν , . . . , kl ), its multidegree is (k1 , . . . , kν +
1, . . . , kl ). Let qkνµ
1 ,...,kn u,...,kl
be probability that a µ-node following a ν−µ edge has excess degree (k1 , . . . , kν , . . . , kl )
then
1
qkµν1 ,...,kn u,...,kl = µ
µ (kν + 1)p (k1 , . . . , kν + 1, . . . , kl ) (65)
hkiν
∞ ∂Gµ
∂xν (x)
X
Gµν (x) = qkµν1 ,...,kn u,...,kl xk11 . . . xkl l = ∂Gµ
(66)
ki =0,i=1,...l ∂xν (1)
18
Example 4.1 ([leicht2009percolation ]). [leicht2009percolation ] considers a concrete example for a
network of two modules α and β. Interconnection in each modules is an ER networks with average node
degree kα and kβ respectively. Each node from module α is connected randomly with any node in module
β with the same probabilty and has in average kαβ neighbors in module β. Similar, a node in module β
has average kβα neighbors in module α. Suppose the indpendence between connections. The multiple degree
distribution is given by
k2
kk1 kβ
α kα k1 α kαβ k2 α
p (k1 , k2 ) = e e
k1 ! k2 !
k1
k kα k2
k β α k
β
In fact,
∞
X
k1 k2
Gα (x1 , x2 ) = pα
k1 ,k2 x1 x2
k1 ,k2 =0
k2
∞ k k1 kβ
X k1 α kαβ k2 α
= e kα
e xk1 xk2
k1 ! k2 ! 1 2
k1 ,k2 =0
k β k2
∞ k 1 ∞ k
X k1 α k1 X kαβ k2 α
= e kα
x1 e xk 2
k1 ! k2 ! 2
k1 =0 k2 =0
β
kα (x1 −1) kα (x2 −1)
=e e
19
Multidegree generating function are
β
Gα (x1 , x2 ) = ekα (x1 −1)+kα (x2 −1)
α Liτ (x2 e−1/κ )
Gβ (x1 , x2 ) = ekβ (x1 −1)
Liτ (e−1/κ )
So
Gαα = Gαβ = Gα
α Liτ −1 (x2 e−1/κ )
Gββ (x) = ekβ (x1 −1)
x2 Liτ −1 (e−1/κ )
Gβα (x) = Gβ (x)
Example 4.2 ([shai2015critical ]). A network is divided into m equal-size modules. Both intra and inter
connectivity follows Poisson distribution. The connection inside any module is the same as an ER network
with average intra degree kintra . Each node has average km−1
inter
neighors in each other module. Such model is
a particular case of [leicht2009percolation ] with kα = kintra and kαβ = km−1 inter
for all module α 6= β. The
multidegree generating function is given by
Y kinter
(xj −1)
Gi (x1 , . . . , xm ) = ekintra (xi −1) e m−1 (67)
j6=i
Example 4.3 ([dong2018resilience ]). Consider a network of m equal size modules. In each module, only
a fraction r of nodes has interlink with nodes from other modules. So one can divide nodes in a module
in two classes: inward and outward. Take a random node, it belongs to inward class with probability 1 − r
and outward class with probability r. For a node in the inward class, its has intra degree distribution p(k)
and has inter degree 0 with probability 1. For an outward node in module i, the number of intra links
has distribution p(k) with generating function Gii (xi ) and it can connect with a random node from module j
according to a degree distribution with generating function Gji (xj ). Assuming the independence of connection,
the multidegree generating function of an i-node is
Y j
Gi (x) = (1 − r)Gii (xi ) + rGii (xi ) Gi (xj ) (69)
j6=i
20
In the case that each module is an ER network with average intra-degree k then
Gii (xi ) = ek(xi −1)
If the interconnection degree distribution is also Poisson with average interlink K then for i 6= j, we have
Gji (xj ) = eK(xj −1)
So Y
Gi (x) = (1 − r)ek(xi −1) + rek(xi −1) eK(xj −1)
j6=i
[dong2018resilience ] also provides an explicit formula for scale free module and Poisson interlink.
Size of component following a ν −µ edge is equal to the total size of component following the edge starting
fromt this µ-node and add by 1 to take account into this µ-node.
Let Hµν (x) be generating function for the size of components following an ν − µ-edge. Given that the
node following an ν − µ edge has excess degree (k1 , . . . , kl ), denote P (s1 , . . . , sl |k1 , . . . , kl ) be the number of
nodes in the module 1,2, . . . , l. belonging to the component following this edge Then
XX
Hµν (x) = qµν (k1 , . . . , kl )P (s1 , . . . , sµ − 1, sl |k1 , . . . , kl ) xs11 . . . xsl l
sj ki
| {z }
ρµν (s1 ,...,sl )
X X
= qµν (k1 , . . . , kl ) P (s1 , . . . , sµ − 1, sl |k1 , . . . , kl )xs11 . . . xsl l
ki sj
X X
= xµ qµν (k1 , . . . , kl ) P (s1 , . . . , sµ , sl |k1 , . . . , kl )xs11 . . . xsµµ . . . xsl l
ki sj
As in [newman2018networks ], using
X X Y
P (s1 , . . . , sl |k1 , . . . , kl ) = ρλµ (ui11 , . . . , uill ) (72)
i1 =1,k1 ,...,il =1,...kl uλ λ
1 +...uk =sλ
λ
λ
21
and decomposing sλ = u1λ + · · · + ukλλ , we obtain
i1 il
u u
X X Y
Hµν (x) = xµ qµν (k1 , . . . , kl ) ρλµ (ui11 , . . . , uil l )x1 1 . . . xl l
ki i1 =1,k1 ,...,il =1,...kl λ
Sum of size of all components following the edges leading to component λ from this µ-node given this node
has is kλ neighbors in module λ has generating function [Hλµ (x)]kλ . We obtain
X
Hµν (x) = xµ qµν (k1 , . . . , kl )(H1µ (x)k1 . . . (Hlµ (x)kl ) (73)
k1 ,...,kl
Such kind of argument comes from power law property of generating function.
Example 4.4 ([leicht2009percolation ]). 1. 2 ER modules and Poisson interlink
β
Hα (x1 , x2 ) = Hαα (x1 , x2 ) = Hαβ (x1 , x2 ) = x1 Gα (Hαα (x), Hβα (x)) = x1 ekα (Hαα (x)−1) ekα (Hβα (x)−1)
α
Hβ (x1 , x2 ) = Hβα (x1 , x2 ) = Hββ (x1 , x2 ) = x2 Gβ (Hαβ (x), Hββ (x)) = x2 ekβ (Hαβ (x)−1) ekβ (Hββ (x)−1)
Sµ = 1 − Hµ (1) (76)
22
2. ER module + power law with cutoff degree module + Poisson interlink
β
Hα (1, 1) = Hαα (1, 1) = Hαβ (1, 1) = Gα (Hαα (1), Hβα (1)) = ekα (Hαα (1)−1) ekα (Hβα (1)−1)
α Liτ (Hββ (1)e−1/κ )
Hβα (1, 1) = Hβ (1, 1) = Gβ (Hαβ (1), Hββ (1)) = ekβ (1−1)
Liτ (e−1/κ )
α Liτ −1 (Hββ (1)e−1/κ )
Hββ (1, 1) = Gββ (1, 1) = ekβ (Hαβ (1)−1 )
Liτ −1 (e−1/κ )
Solve numerically the above system equations to find Hα (1), Hαα (1), Hαβ (1), Hβ (1), Hβα (1), Hββ (1)
to find
Sα = 1 − Gα (Hαα (1), Hβα (1))Sβ = 1 − Gβ (Hαβ (1), Hββ (1))
Example 4.9 ([shai2015critical ]).
Example 4.10 ([dong2018resilience ]).
Example 4.11 ([shai2014resilience ]).
In order to study the phase for the existence of giant component, one uses the condition under which
the average size component diverges where the average number of ν -nodes in the component of a randomly
chosen µ-node is
∂
hsµ iν = Hµ (x)
∂xν x=1
and
∞
X
Fij (x) = rki 1 ,k2 ,...,km qkij1 ,k2 ,...,km xk11 xk22 . . . xkmm (79)
k1 ,...,km =0
We have
∂Fi
∂xj (x)
Fij (x) = i
(80)
hkij
Define the generating function for the distribution of the number of occupied nodes in the component
reachable by following a randomly chosen ij-edge to an i-node and then following its additional outgoing
links
Jij (x) = 1 − Fij (1) + xi Fij (J1i (x, J2i (x), . . . , Jmi (x)) (81)
The distribution of the number of nodes reachable from a randomly chosen i-node (rather than ij-edge) is
generated by
23
Then, the average number of occupant j-nodes in the component of a randomly chosen i-node, is given
by
i ∂Ji
hsij = (1) (83)
∂xj
The threshold for divergence of the above quantity is used as percolation threshold.
Fraction of i-nodes belonging to the giant cluster is
We’ll try to apply this approach to find LCC of a network under degree attack strategies. The degree
attack in [shai2015critical ], [dong2018resilience ] are uniform random attack.
Example 4.12 ([shai2015critical ]). [shai2015critical ] studies uniformly random attack on intercon-
nected node, that is the occupied probability is
(
1 if kj = 0∀j 6= i , that is i has no interlink
rki 1 ,...,km =
q otherwise, that is i has at least one interlink
So ki
e−kintra kintra −kij
Q P
k−i! j6=i e if j6=i kj = 0
rki 1 ,...,km pik1 ,...,km = j kj
qe−kintra (ki )kintra Q e−kij (ki ) if
P
kj > 0
k−i! j6=i kj ! j6=i
Hence
∞ ki ∞ ki
X X kintra Y j k X X kintra Y j k
Fi (x) = e−kintra xki i e−ki xj j + q e−kintra xki i e−ki xj j
P k − i! P k − i!
j6=i kj =0 ki =0 j6=i j6=i kj >0 ki =0 j6=i
∞ ki
X kintra Y j
= e−kintra xki i e−ki
k − i!
ki =0 j6=i
∞ ki ∞ ki
X X k Y j k X X k Y j k
+q e−kintra intra xki i e−ki xj j − e−kintra intra xki i e−ki xj j
P k − i! P k − i!
j6=i kj ≥0 i
k =0 j6=i k =0
j6=i kj =0 i
j6=i
= ekintra (xi −1) e−kinter + q Gi (x) − ekintra (xi −1) e−kinter
= (1 − q)ekintra (xi −1) e−kinter + qGi (x)
where
kij (xj −1)
P
Gi (x) = ekintra (xi −1) e j6=i
p = Fi (1) = (1 − q)e−kinter + q
p − e−kinter
q=
1 − e−kinter
24
Furthermore
(
∂Fi kintra Fi (x) if j = i
(x) = kinter
∂xj m−1 Gi (x) 6 i
if j =
So we obtain (
Fi (x) if j = i
Fij (x) =
qGi (x) 6 i
if j =
The generating functions for the number of occupied node in a given component following an edge or a node
are satisfied the equations
(
1 − p + xi Fi (J1i (x), . . . , Jmi (x)) if j = i
Jij (x) =
1 − q + qxi Gi (J1i (x), . . . , Jmi (x)) if j 6= i
j
( P
(1 − q)(1 − e−kinter + xi ekintra (Jii (x)−1) e−kinter + qxi ekintra (Jii (x)−1) e j6=i ki (Jji (x)−1) if j = i
= P j
qxi ekintra (Jii (x)−1) e j6=i ki (Jji (x)−1) 6 i
if j =
Ji (x) = 1 − p + xi Fi (J1i (x), . . . , Jmi (x))
kij (Jji (x)−1)
P
= (1 − q)(1 − e−kinter + xi ekintra (Jii (x)−1) e−kinter + qxi ekintra (Jii (x)−1) e j6=i
Let uij = Jij (1) and ui = Ji (1) then we have ui = uii and uij is the solution to the system
j
( P
(1 − q)(1 − e−kinter + ekintra (uii −1) e−kinter + qekintra (uii −1) e j6=i ki (uji −1) if l = i
uil = P j
1 − q + qekintra (uii −1) e j6=i ki (uji −1) if l 6= i
1
In the case that βj = m−1 , we have uii = ui = u for all i and uij = v for all i 6= j such that
(
u = 1 − q − (1 − q)e−kinter + (1 − q)ekintra (u−1) e−kinter + qekintra (u−1) ekinter (v−1)
v = 1 − q + qekintra (u−1) ekinter (v−1)
h i h −kinter
i
(1−ekintra (u−1) )
u = 1 − (1 − q)e−kinter 1 − ekintra (u−1) − q 1 − e(kinter +kintra )(u−1) e−(1−q)e
Denote 1 − fii and 1 − fij be probability that a random chosen intra and inter-link belong to the giant
component then after a random removal, the probability that a node to connect to the giant component through
25
intra-links and inter-link are p(1 − fii ) and p(1 − fij ). Hence the respective probability that it belong to a
small cluster is 1 − p(1 − fii ) and 1 − p(1 − fij ). Hence fii and fij satisfy the self-consistence equation
So
Fij (x) = pGij (x)
Denote uij = Jij (1) then it saftisfies the equation
which is equivalent to
fij = Gij (1 − p(1 − f1i ), . . . , 1 − p(1 − fmi ))
First we can try to find an analytic formula for LCC under different degree attack on the models in these
papers and then for the inter-all model.
where (
1 if x = 0
δ0 (x) =
0 6 0
if x =
26
and pji (k) is probability that an i-node in the interconnection group has k neighbors in module j. Hence
X
Gi (x) = pik1 ,...,km xk11 xkmm
k1 ,...,km
X X m
Y
= (1 − r) pii (ki )xki i + r pji (kj ) xk11 . . . xkmm
ki k1 ,...,km j=1
m
k
Y X j
= (1 − r)Gii (xi ) + r pi (kj )xj j
j=1 kj
m
Y
= (1 − r)Gii (xi ) + r Gji (xj )
j=1
Probability that randomly an interconnection node is occupied is q. So the generating function for multide-
gree of a random occupied node is
X X
Fi (x) = pik1 ,...,km xk11 . . . xkmm + q pik1 ,...,km xk11 . . . xkmm
P P
j6=i kj =0 j6=i kj >0
Y m
Y
= (1 − r) Gii (x) + r (1 − q)Gii (xi ) pji (0) + q Gji (x)
j6=i j=1
and then
∂Fi
∂xj (x)
Fij (x) = j
=
hki i
Using the approach in [shai2014resilience ] to find the condition for the existence of phase transition for
q and then for p. Thus find the size of giant component in the case of existence. The following example
provides a detail computing for the case of network with ER modulars and Poison interlink.
Example 5.1 (Intentional random attack of [shai2015critical ] on [dong2018resilience ] with ER mod-
ular, Poisson interconnection). The degree distributions are
kl
pii (l) = e−k
l!
and
Kl
pji (l) = e−K for j 6= i
l!
The multidegree generating function is
Y
Gi (x) = (1 − r)ek(xi −1) + rek(x1 −1) eK(xj −1)
j6=i
where k is the average intra degree of any node and K is the average inter degree of the interconnection
group in a modular to a given another modular, that is kintra = k and kinter = (m − 1)K.
It leads to
(
∂Gi kGi (x) if i = j
(x) =
Krek(x1 −1) j6=i eK(xj −1) if i 6= j
Q
∂xj
So
i ∂Gi j ∂Gi
hki i = (1) = k and hki i = (1) = rK
∂xi ∂xi
27
and then
(
Gi (x) if i = j
Gij (x) =
rek(x1 −1) j6=i eK(xj −1)
Q
6 j
if i =
and
(
Fi (x) if j = i
Fij (x) =
qek(xi −1) l6=i eK(xl −1)
Q
6 i
if j =
Generating functions for size of small component are satisfied the self-consistence equations
which satisfies
Jii (x) = Ji (x)
Condition for the existence of giant cluster
The average number of j-node in a component of a random chosen occupied i-node is
m
∂Ji X ∂Fi ∂Jli
hsi ij = (x) = δi (j)Fi (1) + (1) (1)
∂xj x=1 ∂xl ∂xj
l=1
∂Jii X ∂Jli
= δi (j)Fi (1) + kFi (1) (1) + qK (1)
∂xi ∂xj
l6=i
28
∂Jij
Denote yij = ∂x1 (1), we have
X ∂Fi ∂Jl1
y11 = F1 (1) + (1)
(1)
∂xl∂x1
l
∂F1 X ∂Fi
= F1 (1) + (1)y11 + (1)yl1
∂x1 ∂xl
l6=1
X
= F1 (1) + kF1 (1)y11 + qrK yl1
l6=1
∂F1j X ∂F1j
y1j = F1j (1) + (1)y11 + (1)yl1 for j 6= 1
∂x1 ∂xl
l6=i
X
= q + qky11 + qK yl1
l6=1
X
yii = kFi (1)yii + qrK yli for i 6= 1
l6=i
X
yij = qkyii + qrK yli for i 6= 1, i 6= j
l6=i
Hence
m
X m
X X m
X X
yii = F1 (1) + k Fi (1)yii + qrK yli = F1 (1) + kF1 (1) yii + qrK yli
i=1 i=1 l6=i i=1 l6=i
X m
X X
yij = (m − 1)q + (m − 1)qk yii + (m − 1)qK yli
i6=j i=1 l6=i
P P
Solving the above system of two variable i yii and l6=i yli , we obtain
m
X F1 (1)[1 − (m − 1)Kq] + (m − 1)Kq 2 r
yii =
i=1
(1 − kF1 (1))(1 − (m − 1)Kq) − (m − 1)Krq 2
kF1 (1) − 1 = 0
which is equivalent to
∗
k(1 − r + re−(m −1)K
)=0
5.4 Attack the interconnected node with high total interconnection degree
5.5 Attack the interconnected node with high interconnection degree to at least
one module
5.6 Project: Inter-all model (Quang Nguyen) - an extension of [dong2018resilience
]
5.6.1 Model description
Consider an interacting network consisting of M module. Each module has a fraction r of nodes with
high inter-connectivity and a fraction 1 − r of nodes with low connectivity. A node of module i in high
30
- interconnectivity group and low -interconnectivity group has a link with a node from module j with
probability Pij1 and Pij2 or average number of neighbors Kij 1
in module j and Kij2
respectively. We also
denote pii (k) as intra - degree distribution of a node in module i. The multi-degree distribution of a node
in module i is hence given by
1 kj 2 kj
Y 1 (Kij ) Y 2 (Kij )
pik1 ,...,km = rpii (ki ) e−Kij + (1 − r)pii (ki ) e−Kij
kj ! kj !
j6=i j6=i
If the number of interlink from a random node a module to another modules not Poisson distributed but has
generating function Gil ih
j or Gj depending on the group of high or low connectivity that the node belongs to
then similar to [dong2018resilience ], under the assumption of independent connection, we have
Y Y
Gi (x) = rGii (xi )e Gil i
j (xj ) + (1 − r)Gi (xi ) Gih
j (xj )
j6=i j6=i
In such kind of set up, each pair of nodes is connected randomly with some probability depending on the
groups that they come from. A similar kind of set up for ER network instead of G(m, n). We can fix the
number of edges in each group of a module, not fix the number of interlink and intralink but the probability
of connecting any pair of node in the groups. In the case that we fix both number of node and edge, we face
to the same problem as the network G(m, n) whose node degree distribution is not available and we cannot
find the generating function.
31
For a node of degree k, it is occupied with probability φk . Given that, exact j of its neighbors are occupied
with average probability
Hence the average probability of an occupied node has new degree j after the percolation process is proportion
to
X
p̃j = pk φk Ckj q j (1 − q)k−j (90)
k≥j
= f0 (B(z))
f0 (B(z))
g̃0 (z) =
f0 (1)
Denote q̃k be the probability that a node at the end of a edge from an occupied node is occupied and
has new excess degree k. Given that its excess degree before being attack is l, there are exactly k occupied
neighbor which happens with probability
Hence
X
q̃k = φl+1 ql Clk φ̄k (1 − φ̄)l−k (92)
l≥k
and we obtain the generating function of the excess degree distribution in the new network as following
X
g̃1 (z) = q̃k z k (93)
k≥0
1 XX
= φl+1 ql Clk φ̄k (1 − φ̄)l−k z k (94)
f0 (1)
k≥0 l≥k
1 XX
= φl+1 ql Clk φ̄k (1 − φ̄)l−k z k (95)
f0 (1)
l≥0 k≤l
1 XX
= φl+1 ql (B(z))l (96)
f0 (1)
l≥0 k≤l
1
= f1 (B(z)) (97)
f0 (1)
That is the generating functions for degree and excess degree distribution of the network after the first
attack. Which is useful to evaluate the size of giant cluster and recalculate the degree distibution after the
second attack and so on.
32
Example 6.1 (Poisson random network - random attack).
33