SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
Geometric correlations mitigate the extreme vulnerability
of multiplex networks against targeted attacks
Kaj Kolja Kleineberg | kkleineberg@ethz.ch
@KoljaKleineberg | koljakleineberg.wordpress.com
Percolation reveals robustness of complex networks:
Scale-free networks are robust yet fragile
Network Science, Barabasi
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
Degree correlations mitigate catastrophic failure
cascades in mutual percolation.
Robustness of multiplexes against targeted attacks:
percolation properties as a proxy
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Targeted attacks:
- Remove nodes in order of their Ki = max(k
(1)
i , k
(2)
i ) (k
(j)
i
degree in layer j = 1, 2)
- Reevaluate Ki’s after each removal
Control parameter: Fraction p of nodes that is present in the
system
Robustness of multiplexes against targeted attacks:
percolation properties as a proxy
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Targeted attacks:
- Remove nodes in order of their Ki = max(k
(1)
i , k
(2)
i ) (k
(j)
i
degree in layer j = 1, 2)
- Reevaluate Ki’s after each removal
Control parameter: Fraction p of nodes that is present in the
system
How robust/fragile against targeted attacks are real
multiplexes?
Reshuffling of node IDs destroys correlations
but preserves the single layer topologies
Real system Reshuffled
Reshuffled counterpart: Artificial multiplex that corresponds to
a random superposition of the individual layer topologies of the
real system.
Real systems are more robust
than their reshuffled counterparts
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Arxiv
Original
Reshuffled
0.5 0.6 0.7 0.8 0.9 1.0
0.00
0.25
0.50
0.75
1.00
p
MCC
CElegans
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Drosophila
Original
Reshuffled
0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Sacc Pomb
Real systems are more robust
than their reshuffled counterparts
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Arxiv
Original
Reshuffled
0.5 0.6 0.7 0.8 0.9 1.0
0.00
0.25
0.50
0.75
1.00
p
MCC
CElegans
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Drosophila
Original
Reshuffled
0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Sacc Pomb
Why are real systems more robust than their
reshuffled counterparts?
Hypothesis: Geometric correlations are
responsible for the robustness of real
multiplexes against targeted attacks.
Hidden metric spaces underlying real complex networks
provide a fundamental explanation of their observed topologies
Nature Physics 5, 74–80 (2008)
Hidden metric spaces underlying real complex networks
provide a fundamental explanation of their observed topologies
We can infer the coordinates of nodes embedded in
hidden metric spaces by inverting models.
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Real networks can be embedded into hyperbolic
space by inverting the model.
Hyperbolic maps of complex networks:
Poincaré disk
Nature Communications 1, 62 (2010)
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated Correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated Correlated
Are there metric correlations in real multiplex
networks?
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
What is the impact of geometric correlations for the
robustness of multiplexes against targeted attacks?
Model with geometric (similarity) correlations
behaves similar to real multiplexes
(with similarity correla�ons)
(without similarity correla�ons)
Model
Largest cascade size decreases with system size
only if similarity correlations are present
Without similarity correlations the removal of a single node
triggers a large cascade
∆N: Number of nodes whose removal reduces size M of MCC
from 0.4M to less than M0.4.
[Science 323, 5920, pp. 1453-1455 (2009)]
Distribution of component sizes behaves very different
depending on the existence of similarity correlations
Without similarity correla�ons With similarity correla�ons
Scaling of the size of the second largest component
for the case with similarity correlations
Strength of geometric correlations predicts robustness
of real multiplexes against targeted attacks
Arx12Arx42
Arx41
Arx28
Phys12
Arx52
Arx15
Arx26
Internet
Arx34
CE23
Phys13
Phys23
Sac13
Sac35
Sac23
Sac12
Dro12
CE13
Sac14
Sac24
Brain
Rattus
CE12
Sac34
AirTrain
0.0 0.1 0.2 0.3 0.4 0.5 0.6
0.0
0.2
0.4
0.6
0.8
1.0
NMI
Ω
Datasets
AirTrain
Sac34
CE12
Ra�us
Brain
Sac24
Sac14
CE13
Dro12
Sac12
Sac23
Sac35
Sac13
Phys23
Phys13
CE23
Arx34
Internet
Arx26
Arx15
Arx52
Phys12
Arx28
Arx41
Arx42
Arx12
Relative mitigation of
vulnerability:
Ω =
∆N − ∆Nrs
∆N + ∆Nrs
NMI: Normalized mutual
information, measures the
strength of similarity (angular)
correlations
Targeted attacks lead to catastrophic cascades
even with degree correlations
Geometric correlations mitigate this extreme vulnerability
and can lead to continuous transition
Edge overlap is not responsible
for the mitigation effect
id
an
rs
un
103
104
105
106
100
101
102
103
104
N
ΔN
∝ N0.822
∝ N0.829
-47.6+0.696 log[x]2.304
∝ N-0.011
id
an
rs
un
103
104
105
106
100
101
102
103
104
N
Max2ndcomp
id
an
rs
un
103
104
105
106
10-1
100
N
Rela�vecascadesize
Largest cascade
id
an
rs
un
103
104
105
106
10-2
10-1
N
Rela�vecascadesize
2nd largest cascade
Geometric correlations can explain the robustness
of real multiplexes against targeted attacks
Summary:
- Multiplexes are vulnerable against random failures and
targeted attacks (discontinuous transition)
- Degree correlations mitigate vulnerability against random
failures (percolation), lead to continuous transition
- Degree correlations fail to mitigate vulnerability against
targeted attacks
- Geometric (similarity) correlations mitigate vulnerability
against targeted attacks, may lead to continuous transition
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg
• koljakleineberg.wordpress.com
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg ← Slides
• koljakleineberg.wordpress.com
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg ← Slides
• koljakleineberg.wordpress.com ← Data & Model

Weitere ähnliche Inhalte

Was ist angesagt?

A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
 
Visual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonVisual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonApache MXNet
 
Towards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureTowards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureKolja Kleineberg
 
(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systemsKolja Kleineberg
 
Fractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayFractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayXin-She Yang
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTcsandit
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...Xi Wang
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms ijcseit
 
Chaos in Small-World Networks
Chaos in Small-World NetworksChaos in Small-World Networks
Chaos in Small-World NetworksXin-She Yang
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficientsAustin Benson
 
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...Artem Lutov
 
Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Kolja Kleineberg
 
Entropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksEntropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksJuan David Cruz-Gómez
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:Sean Golliher
 
Kdd'20 presentation 223
Kdd'20 presentation 223Kdd'20 presentation 223
Kdd'20 presentation 223Manh Tuan Do
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnnBrian Kim
 
Higher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalHigher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalAustin Benson
 
Higher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsHigher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsAustin Benson
 
Graph and Density Based Clustering
Graph and Density Based ClusteringGraph and Density Based Clustering
Graph and Density Based ClusteringAyushAnand105
 

Was ist angesagt? (20)

A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
 
Visual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonVisual Search Engine with MXNet Gluon
Visual Search Engine with MXNet Gluon
 
Towards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureTowards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital future
 
(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems
 
Geographic routing in
Geographic routing inGeographic routing in
Geographic routing in
 
Fractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayFractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time Delay
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
 
Chaos in Small-World Networks
Chaos in Small-World NetworksChaos in Small-World Networks
Chaos in Small-World Networks
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficients
 
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
 
Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...
 
Entropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksEntropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networks
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
 
Kdd'20 presentation 223
Kdd'20 presentation 223Kdd'20 presentation 223
Kdd'20 presentation 223
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnn
 
Higher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalHigher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western Sectional
 
Higher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsHigher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifs
 
Graph and Density Based Clustering
Graph and Density Based ClusteringGraph and Density Based Clustering
Graph and Density Based Clustering
 

Ähnlich wie Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks

Topology ppt
Topology pptTopology ppt
Topology pptboocse11
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachElena Sügis
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network ClusteringGuang Ouyang
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networksjilung hsieh
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...butest
 
Ground Fault in OH lines
Ground Fault in OH linesGround Fault in OH lines
Ground Fault in OH linesNaresh Raju
 
Milcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniMilcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniElisa Rondini
 
Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIAustin Benson
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringaciijournal
 

Ähnlich wie Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks (20)

Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
 
TopologyPPT.ppt
TopologyPPT.pptTopologyPPT.ppt
TopologyPPT.ppt
 
D031202018023
D031202018023D031202018023
D031202018023
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networks
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
Ground Fault in OH lines
Ground Fault in OH linesGround Fault in OH lines
Ground Fault in OH lines
 
Milcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniMilcom 2008 - Elisa Rondini
Milcom 2008 - Elisa Rondini
 
Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoI
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
 

Mehr von Kolja Kleineberg

Catastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesCatastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesKolja Kleineberg
 
Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Kolja Kleineberg
 
Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Kolja Kleineberg
 
Ecology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksEcology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksKolja Kleineberg
 
A 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldA 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldKolja Kleineberg
 
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellFrom the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellKolja Kleineberg
 
Evolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldEvolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldKolja Kleineberg
 

Mehr von Kolja Kleineberg (7)

Catastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesCatastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remedies
 
Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...
 
Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...
 
Ecology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksEcology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networks
 
A 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldA 1:1000 scale model of the digital world
A 1:1000 scale model of the digital world
 
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellFrom the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
 
Evolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldEvolution and Ecology of the Digital World
Evolution and Ecology of the Digital World
 

Kürzlich hochgeladen

development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusNazaninKarimi6
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIADr. TATHAGAT KHOBRAGADE
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptxryanrooker
 
Exploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdfExploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdfrohankumarsinghrore1
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)Areesha Ahmad
 
Stages in the normal growth curve
Stages in the normal growth curveStages in the normal growth curve
Stages in the normal growth curveAreesha Ahmad
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingadibshanto115
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxSuji236384
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...Monika Rani
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....muralinath2
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptxSilpa
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceAlex Henderson
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flyPRADYUMMAURYA1
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxUse of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxRenuJangid3
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspectsmuralinath2
 
Introduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxIntroduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxrohankumarsinghrore1
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 

Kürzlich hochgeladen (20)

development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
Exploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdfExploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdf
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Stages in the normal growth curve
Stages in the normal growth curveStages in the normal growth curve
Stages in the normal growth curve
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mapping
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxUse of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptx
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
 
Introduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxIntroduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptx
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 

Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks

  • 1. Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks Kaj Kolja Kleineberg | kkleineberg@ethz.ch @KoljaKleineberg | koljakleineberg.wordpress.com
  • 2. Percolation reveals robustness of complex networks: Scale-free networks are robust yet fragile Network Science, Barabasi
  • 3. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component
  • 4. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
  • 5. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component M. Angeles Serrano et al. New J. Phys. 17 053033 (2015) Degree correlations mitigate catastrophic failure cascades in mutual percolation.
  • 6. Robustness of multiplexes against targeted attacks: percolation properties as a proxy Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component Targeted attacks: - Remove nodes in order of their Ki = max(k (1) i , k (2) i ) (k (j) i degree in layer j = 1, 2) - Reevaluate Ki’s after each removal Control parameter: Fraction p of nodes that is present in the system
  • 7. Robustness of multiplexes against targeted attacks: percolation properties as a proxy Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component Targeted attacks: - Remove nodes in order of their Ki = max(k (1) i , k (2) i ) (k (j) i degree in layer j = 1, 2) - Reevaluate Ki’s after each removal Control parameter: Fraction p of nodes that is present in the system How robust/fragile against targeted attacks are real multiplexes?
  • 8. Reshuffling of node IDs destroys correlations but preserves the single layer topologies Real system Reshuffled Reshuffled counterpart: Artificial multiplex that corresponds to a random superposition of the individual layer topologies of the real system.
  • 9.
  • 10. Real systems are more robust than their reshuffled counterparts Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Arxiv Original Reshuffled 0.5 0.6 0.7 0.8 0.9 1.0 0.00 0.25 0.50 0.75 1.00 p MCC CElegans Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Drosophila Original Reshuffled 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Sacc Pomb
  • 11. Real systems are more robust than their reshuffled counterparts Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Arxiv Original Reshuffled 0.5 0.6 0.7 0.8 0.9 1.0 0.00 0.25 0.50 0.75 1.00 p MCC CElegans Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Drosophila Original Reshuffled 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Sacc Pomb Why are real systems more robust than their reshuffled counterparts?
  • 12. Hypothesis: Geometric correlations are responsible for the robustness of real multiplexes against targeted attacks.
  • 13. Hidden metric spaces underlying real complex networks provide a fundamental explanation of their observed topologies Nature Physics 5, 74–80 (2008)
  • 14. Hidden metric spaces underlying real complex networks provide a fundamental explanation of their observed topologies We can infer the coordinates of nodes embedded in hidden metric spaces by inverting models.
  • 15. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij)
  • 16. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij)
  • 17. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Real networks can be embedded into hyperbolic space by inverting the model.
  • 18. Hyperbolic maps of complex networks: Poincaré disk Nature Communications 1, 62 (2010) Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 19. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 20. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 21. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 22. Metric spaces underlying different layers of real multiplexes could be correlated
  • 23. Metric spaces underlying different layers of real multiplexes could be correlated
  • 24. Metric spaces underlying different layers of real multiplexes could be correlated
  • 25. Metric spaces underlying different layers of real multiplexes could be correlated
  • 26. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated
  • 27. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated Correlated
  • 28. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated Correlated Are there metric correlations in real multiplex networks?
  • 29. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers
  • 30. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers
  • 31. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers What is the impact of geometric correlations for the robustness of multiplexes against targeted attacks?
  • 32. Model with geometric (similarity) correlations behaves similar to real multiplexes (with similarity correla�ons) (without similarity correla�ons) Model
  • 33. Largest cascade size decreases with system size only if similarity correlations are present
  • 34. Without similarity correlations the removal of a single node triggers a large cascade ∆N: Number of nodes whose removal reduces size M of MCC from 0.4M to less than M0.4. [Science 323, 5920, pp. 1453-1455 (2009)]
  • 35. Distribution of component sizes behaves very different depending on the existence of similarity correlations Without similarity correla�ons With similarity correla�ons
  • 36. Scaling of the size of the second largest component for the case with similarity correlations
  • 37. Strength of geometric correlations predicts robustness of real multiplexes against targeted attacks Arx12Arx42 Arx41 Arx28 Phys12 Arx52 Arx15 Arx26 Internet Arx34 CE23 Phys13 Phys23 Sac13 Sac35 Sac23 Sac12 Dro12 CE13 Sac14 Sac24 Brain Rattus CE12 Sac34 AirTrain 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.0 0.2 0.4 0.6 0.8 1.0 NMI Ω Datasets AirTrain Sac34 CE12 Ra�us Brain Sac24 Sac14 CE13 Dro12 Sac12 Sac23 Sac35 Sac13 Phys23 Phys13 CE23 Arx34 Internet Arx26 Arx15 Arx52 Phys12 Arx28 Arx41 Arx42 Arx12 Relative mitigation of vulnerability: Ω = ∆N − ∆Nrs ∆N + ∆Nrs NMI: Normalized mutual information, measures the strength of similarity (angular) correlations
  • 38. Targeted attacks lead to catastrophic cascades even with degree correlations
  • 39. Geometric correlations mitigate this extreme vulnerability and can lead to continuous transition
  • 40. Edge overlap is not responsible for the mitigation effect id an rs un 103 104 105 106 100 101 102 103 104 N ΔN ∝ N0.822 ∝ N0.829 -47.6+0.696 log[x]2.304 ∝ N-0.011 id an rs un 103 104 105 106 100 101 102 103 104 N Max2ndcomp id an rs un 103 104 105 106 10-1 100 N Rela�vecascadesize Largest cascade id an rs un 103 104 105 106 10-2 10-1 N Rela�vecascadesize 2nd largest cascade
  • 41. Geometric correlations can explain the robustness of real multiplexes against targeted attacks Summary: - Multiplexes are vulnerable against random failures and targeted attacks (discontinuous transition) - Degree correlations mitigate vulnerability against random failures (percolation), lead to continuous transition - Degree correlations fail to mitigate vulnerability against targeted attacks - Geometric (similarity) correlations mitigate vulnerability against targeted attacks, may lead to continuous transition
  • 42. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg • koljakleineberg.wordpress.com
  • 43. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg ← Slides • koljakleineberg.wordpress.com
  • 44. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg ← Slides • koljakleineberg.wordpress.com ← Data & Model