SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
Geometric correlations mitigate the extreme vulnerability
of multiplex networks against targeted attacks
Kaj Kolja Kleineberg | kkleineberg@ethz.ch
@KoljaKleineberg | koljakleineberg.wordpress.com
Percolation reveals robustness of complex networks:
Scale-free networks are robust yet fragile
Network Science, Barabasi
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
Percolation in multiplex networks:
Discontinuous hybrid transition
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
Degree correlations mitigate catastrophic failure
cascades in mutual percolation.
Robustness of multiplexes against targeted attacks:
percolation properties as a proxy
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Targeted attacks:
- Remove nodes in order of their Ki = max(k
(1)
i , k
(2)
i ) (k
(j)
i
degree in layer j = 1, 2)
- Reevaluate Ki’s after each removal
Control parameter: Fraction p of nodes that is present in the
system
Robustness of multiplexes against targeted attacks:
percolation properties as a proxy
Order parameter: Mutually connected component (MCC) is
largest fraction of nodes connected by a path in every layer using
only nodes in the component
Targeted attacks:
- Remove nodes in order of their Ki = max(k
(1)
i , k
(2)
i ) (k
(j)
i
degree in layer j = 1, 2)
- Reevaluate Ki’s after each removal
Control parameter: Fraction p of nodes that is present in the
system
How robust/fragile against targeted attacks are real
multiplexes?
Reshuffling of node IDs destroys correlations
but preserves the single layer topologies
Real system Reshuffled
Reshuffled counterpart: Artificial multiplex that corresponds to
a random superposition of the individual layer topologies of the
real system.
Real systems are more robust
than their reshuffled counterparts
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Arxiv
Original
Reshuffled
0.5 0.6 0.7 0.8 0.9 1.0
0.00
0.25
0.50
0.75
1.00
p
MCC
CElegans
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Drosophila
Original
Reshuffled
0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Sacc Pomb
Real systems are more robust
than their reshuffled counterparts
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Arxiv
Original
Reshuffled
0.5 0.6 0.7 0.8 0.9 1.0
0.00
0.25
0.50
0.75
1.00
p
MCC
CElegans
Original
Reshuffled
0.80 0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Drosophila
Original
Reshuffled
0.85 0.90 0.95 1.00
0.00
0.25
0.50
0.75
1.00
p
MCC
Sacc Pomb
Why are real systems more robust than their
reshuffled counterparts?
Hypothesis: Geometric correlations are
responsible for the robustness of real
multiplexes against targeted attacks.
Hidden metric spaces underlying real complex networks
provide a fundamental explanation of their observed topologies
Nature Physics 5, 74–80 (2008)
Hidden metric spaces underlying real complex networks
provide a fundamental explanation of their observed topologies
We can infer the coordinates of nodes embedded in
hidden metric spaces by inverting models.
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Scale-free clustered networks
can be embedded into hyperbolic space
“Hyperbolic geometry of complex networks” [PRE 82, 036106]
Distribute:
ρ(r) ∝ e
1
2
(γ−1)r
Connect:
p(xij) =
1
1 + e
xij−R
2T
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Real networks can be embedded into hyperbolic
space by inverting the model.
Hyperbolic maps of complex networks:
Poincaré disk
Nature Communications 1, 62 (2010)
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Hyperbolic maps of complex networks:
Poincaré disk
Internet IPv6 topology
Polar coordinates:
ri : Popularity (degree)
θi : Similarity
Distance:
xij = cosh−1
(cosh ri cosh rj
− sinh ri sinh rj cos ∆θij)
Connection probability:
p(xij) =
1
1 + e
xij−R
2T
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated Correlated
Metric spaces underlying different layers
of real multiplexes could be correlated
Uncorrelated Correlated
Are there metric correlations in real multiplex
networks?
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
Radial and angular coordinates are correlated
between different layers in many real multiplexes
Degreecorrelations
Random superposition
of constituent layers
What is the impact of geometric correlations for the
robustness of multiplexes against targeted attacks?
Model with geometric (similarity) correlations
behaves similar to real multiplexes
(with similarity correla�ons)
(without similarity correla�ons)
Model
Largest cascade size decreases with system size
only if similarity correlations are present
Without similarity correlations the removal of a single node
triggers a large cascade
∆N: Number of nodes whose removal reduces size M of MCC
from 0.4M to less than M0.4.
[Science 323, 5920, pp. 1453-1455 (2009)]
Distribution of component sizes behaves very different
depending on the existence of similarity correlations
Without similarity correla�ons With similarity correla�ons
Scaling of the size of the second largest component
for the case with similarity correlations
Strength of geometric correlations predicts robustness
of real multiplexes against targeted attacks
Arx12Arx42
Arx41
Arx28
Phys12
Arx52
Arx15
Arx26
Internet
Arx34
CE23
Phys13
Phys23
Sac13
Sac35
Sac23
Sac12
Dro12
CE13
Sac14
Sac24
Brain
Rattus
CE12
Sac34
AirTrain
0.0 0.1 0.2 0.3 0.4 0.5 0.6
0.0
0.2
0.4
0.6
0.8
1.0
NMI
Ω
Datasets
AirTrain
Sac34
CE12
Ra�us
Brain
Sac24
Sac14
CE13
Dro12
Sac12
Sac23
Sac35
Sac13
Phys23
Phys13
CE23
Arx34
Internet
Arx26
Arx15
Arx52
Phys12
Arx28
Arx41
Arx42
Arx12
Relative mitigation of
vulnerability:
Ω =
∆N − ∆Nrs
∆N + ∆Nrs
NMI: Normalized mutual
information, measures the
strength of similarity (angular)
correlations
Targeted attacks lead to catastrophic cascades
even with degree correlations
Geometric correlations mitigate this extreme vulnerability
and can lead to continuous transition
Edge overlap is not responsible
for the mitigation effect
id
an
rs
un
103
104
105
106
100
101
102
103
104
N
ΔN
∝ N0.822
∝ N0.829
-47.6+0.696 log[x]2.304
∝ N-0.011
id
an
rs
un
103
104
105
106
100
101
102
103
104
N
Max2ndcomp
id
an
rs
un
103
104
105
106
10-1
100
N
Rela�vecascadesize
Largest cascade
id
an
rs
un
103
104
105
106
10-2
10-1
N
Rela�vecascadesize
2nd largest cascade
Geometric correlations can explain the robustness
of real multiplexes against targeted attacks
Summary:
- Multiplexes are vulnerable against random failures and
targeted attacks (discontinuous transition)
- Degree correlations mitigate vulnerability against random
failures (percolation), lead to continuous transition
- Degree correlations fail to mitigate vulnerability against
targeted attacks
- Geometric (similarity) correlations mitigate vulnerability
against targeted attacks, may lead to continuous transition
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg
• koljakleineberg.wordpress.com
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg ← Slides
• koljakleineberg.wordpress.com
Reference:
»Geometric correlations mitigate the extreme vulnerability of multiplex
networks against targeted attacks«
PRL 118, 218301 (2017)
K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano
Kaj Kolja Kleineberg:
• kkleineberg@ethz.ch
• @KoljaKleineberg ← Slides
• koljakleineberg.wordpress.com ← Data & Model

Más contenido relacionado

La actualidad más candente

A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
 
Visual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonVisual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonApache MXNet
 
Towards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureTowards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureKolja Kleineberg
 
(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systemsKolja Kleineberg
 
Fractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayFractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayXin-She Yang
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTcsandit
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...Xi Wang
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms ijcseit
 
Chaos in Small-World Networks
Chaos in Small-World NetworksChaos in Small-World Networks
Chaos in Small-World NetworksXin-She Yang
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficientsAustin Benson
 
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...Artem Lutov
 
Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Kolja Kleineberg
 
Entropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksEntropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksJuan David Cruz-Gómez
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:Sean Golliher
 
Kdd'20 presentation 223
Kdd'20 presentation 223Kdd'20 presentation 223
Kdd'20 presentation 223Manh Tuan Do
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnnBrian Kim
 
Higher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalHigher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalAustin Benson
 
Higher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsHigher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsAustin Benson
 
Graph and Density Based Clustering
Graph and Density Based ClusteringGraph and Density Based Clustering
Graph and Density Based ClusteringAyushAnand105
 

La actualidad más candente (20)

A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
 
Visual Search Engine with MXNet Gluon
Visual Search Engine with MXNet GluonVisual Search Engine with MXNet Gluon
Visual Search Engine with MXNet Gluon
 
Towards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital futureTowards a democratic, scalable, and sustainable digital future
Towards a democratic, scalable, and sustainable digital future
 
(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems(Digital) networks and the science of complex systems
(Digital) networks and the science of complex systems
 
Geographic routing in
Geographic routing inGeographic routing in
Geographic routing in
 
Fractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time DelayFractals in Small-World Networks With Time Delay
Fractals in Small-World Networks With Time Delay
 
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
 
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
2013 KDD conference presentation--"Multi-Label Relational Neighbor Classifica...
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
 
Chaos in Small-World Networks
Chaos in Small-World NetworksChaos in Small-World Networks
Chaos in Small-World Networks
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficients
 
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
 
Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...Is bigger always better? How local online social networks can outperform glob...
Is bigger always better? How local online social networks can outperform glob...
 
Entropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networksEntropy based algorithm for community detection in augmented networks
Entropy based algorithm for community detection in augmented networks
 
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
A Unifying Probabilistic Perspective for Spectral Dimensionality Reduction:
 
Kdd'20 presentation 223
Kdd'20 presentation 223Kdd'20 presentation 223
Kdd'20 presentation 223
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnn
 
Higher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western SectionalHigher-order graph clustering at AMS Spring Western Sectional
Higher-order graph clustering at AMS Spring Western Sectional
 
Higher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifsHigher-order spectral graph clustering with motifs
Higher-order spectral graph clustering with motifs
 
Graph and Density Based Clustering
Graph and Density Based ClusteringGraph and Density Based Clustering
Graph and Density Based Clustering
 

Similar a Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks

Topology ppt
Topology pptTopology ppt
Topology pptboocse11
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachElena Sügis
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network ClusteringGuang Ouyang
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networksjilung hsieh
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...butest
 
Ground Fault in OH lines
Ground Fault in OH linesGround Fault in OH lines
Ground Fault in OH linesNaresh Raju
 
Milcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniMilcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniElisa Rondini
 
Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIAustin Benson
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringaciijournal
 

Similar a Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks (20)

Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
Interpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approachInterpretation of the biological knowledge using networks approach
Interpretation of the biological knowledge using networks approach
 
TopologyPPT.ppt
TopologyPPT.pptTopologyPPT.ppt
TopologyPPT.ppt
 
D031202018023
D031202018023D031202018023
D031202018023
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Scott Complex Networks
Scott Complex NetworksScott Complex Networks
Scott Complex Networks
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
Ground Fault in OH lines
Ground Fault in OH linesGround Fault in OH lines
Ground Fault in OH lines
 
Milcom 2008 - Elisa Rondini
Milcom 2008 - Elisa RondiniMilcom 2008 - Elisa Rondini
Milcom 2008 - Elisa Rondini
 
Higher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoIHigher-order clustering coefficients at Purdue CSoI
Higher-order clustering coefficients at Purdue CSoI
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
 

Más de Kolja Kleineberg

Catastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesCatastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesKolja Kleineberg
 
Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Kolja Kleineberg
 
Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Kolja Kleineberg
 
Ecology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksEcology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksKolja Kleineberg
 
A 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldA 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldKolja Kleineberg
 
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellFrom the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellKolja Kleineberg
 
Evolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldEvolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldKolja Kleineberg
 

Más de Kolja Kleineberg (7)

Catastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remediesCatastrophic instabilities in interacting networks and possible remedies
Catastrophic instabilities in interacting networks and possible remedies
 
Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...Towards a democratic, scalable, and sustainable digital future (a complex sys...
Towards a democratic, scalable, and sustainable digital future (a complex sys...
 
Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...Re-inventing society in the digital age: Catastrophic instabilities in intera...
Re-inventing society in the digital age: Catastrophic instabilities in intera...
 
Ecology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networksEcology 2.0: Coexistence and domination among interacting networks
Ecology 2.0: Coexistence and domination among interacting networks
 
A 1:1000 scale model of the digital world
A 1:1000 scale model of the digital worldA 1:1000 scale model of the digital world
A 1:1000 scale model of the digital world
 
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a NutshellFrom the Evolution of Online Social Networks to Digital Ecology in a Nutshell
From the Evolution of Online Social Networks to Digital Ecology in a Nutshell
 
Evolution and Ecology of the Digital World
Evolution and Ecology of the Digital WorldEvolution and Ecology of the Digital World
Evolution and Ecology of the Digital World
 

Último

Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 

Último (20)

Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 

Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks

  • 1. Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks Kaj Kolja Kleineberg | kkleineberg@ethz.ch @KoljaKleineberg | koljakleineberg.wordpress.com
  • 2. Percolation reveals robustness of complex networks: Scale-free networks are robust yet fragile Network Science, Barabasi
  • 3. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component
  • 4. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component M. Angeles Serrano et al. New J. Phys. 17 053033 (2015)
  • 5. Percolation in multiplex networks: Discontinuous hybrid transition Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component M. Angeles Serrano et al. New J. Phys. 17 053033 (2015) Degree correlations mitigate catastrophic failure cascades in mutual percolation.
  • 6. Robustness of multiplexes against targeted attacks: percolation properties as a proxy Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component Targeted attacks: - Remove nodes in order of their Ki = max(k (1) i , k (2) i ) (k (j) i degree in layer j = 1, 2) - Reevaluate Ki’s after each removal Control parameter: Fraction p of nodes that is present in the system
  • 7. Robustness of multiplexes against targeted attacks: percolation properties as a proxy Order parameter: Mutually connected component (MCC) is largest fraction of nodes connected by a path in every layer using only nodes in the component Targeted attacks: - Remove nodes in order of their Ki = max(k (1) i , k (2) i ) (k (j) i degree in layer j = 1, 2) - Reevaluate Ki’s after each removal Control parameter: Fraction p of nodes that is present in the system How robust/fragile against targeted attacks are real multiplexes?
  • 8. Reshuffling of node IDs destroys correlations but preserves the single layer topologies Real system Reshuffled Reshuffled counterpart: Artificial multiplex that corresponds to a random superposition of the individual layer topologies of the real system.
  • 9.
  • 10. Real systems are more robust than their reshuffled counterparts Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Arxiv Original Reshuffled 0.5 0.6 0.7 0.8 0.9 1.0 0.00 0.25 0.50 0.75 1.00 p MCC CElegans Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Drosophila Original Reshuffled 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Sacc Pomb
  • 11. Real systems are more robust than their reshuffled counterparts Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Arxiv Original Reshuffled 0.5 0.6 0.7 0.8 0.9 1.0 0.00 0.25 0.50 0.75 1.00 p MCC CElegans Original Reshuffled 0.80 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Drosophila Original Reshuffled 0.85 0.90 0.95 1.00 0.00 0.25 0.50 0.75 1.00 p MCC Sacc Pomb Why are real systems more robust than their reshuffled counterparts?
  • 12. Hypothesis: Geometric correlations are responsible for the robustness of real multiplexes against targeted attacks.
  • 13. Hidden metric spaces underlying real complex networks provide a fundamental explanation of their observed topologies Nature Physics 5, 74–80 (2008)
  • 14. Hidden metric spaces underlying real complex networks provide a fundamental explanation of their observed topologies We can infer the coordinates of nodes embedded in hidden metric spaces by inverting models.
  • 15. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij)
  • 16. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij)
  • 17. Scale-free clustered networks can be embedded into hyperbolic space “Hyperbolic geometry of complex networks” [PRE 82, 036106] Distribute: ρ(r) ∝ e 1 2 (γ−1)r Connect: p(xij) = 1 1 + e xij−R 2T xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Real networks can be embedded into hyperbolic space by inverting the model.
  • 18. Hyperbolic maps of complex networks: Poincaré disk Nature Communications 1, 62 (2010) Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 19. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 20. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 21. Hyperbolic maps of complex networks: Poincaré disk Internet IPv6 topology Polar coordinates: ri : Popularity (degree) θi : Similarity Distance: xij = cosh−1 (cosh ri cosh rj − sinh ri sinh rj cos ∆θij) Connection probability: p(xij) = 1 1 + e xij−R 2T
  • 22. Metric spaces underlying different layers of real multiplexes could be correlated
  • 23. Metric spaces underlying different layers of real multiplexes could be correlated
  • 24. Metric spaces underlying different layers of real multiplexes could be correlated
  • 25. Metric spaces underlying different layers of real multiplexes could be correlated
  • 26. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated
  • 27. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated Correlated
  • 28. Metric spaces underlying different layers of real multiplexes could be correlated Uncorrelated Correlated Are there metric correlations in real multiplex networks?
  • 29. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers
  • 30. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers
  • 31. Radial and angular coordinates are correlated between different layers in many real multiplexes Degreecorrelations Random superposition of constituent layers What is the impact of geometric correlations for the robustness of multiplexes against targeted attacks?
  • 32. Model with geometric (similarity) correlations behaves similar to real multiplexes (with similarity correla�ons) (without similarity correla�ons) Model
  • 33. Largest cascade size decreases with system size only if similarity correlations are present
  • 34. Without similarity correlations the removal of a single node triggers a large cascade ∆N: Number of nodes whose removal reduces size M of MCC from 0.4M to less than M0.4. [Science 323, 5920, pp. 1453-1455 (2009)]
  • 35. Distribution of component sizes behaves very different depending on the existence of similarity correlations Without similarity correla�ons With similarity correla�ons
  • 36. Scaling of the size of the second largest component for the case with similarity correlations
  • 37. Strength of geometric correlations predicts robustness of real multiplexes against targeted attacks Arx12Arx42 Arx41 Arx28 Phys12 Arx52 Arx15 Arx26 Internet Arx34 CE23 Phys13 Phys23 Sac13 Sac35 Sac23 Sac12 Dro12 CE13 Sac14 Sac24 Brain Rattus CE12 Sac34 AirTrain 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.0 0.2 0.4 0.6 0.8 1.0 NMI Ω Datasets AirTrain Sac34 CE12 Ra�us Brain Sac24 Sac14 CE13 Dro12 Sac12 Sac23 Sac35 Sac13 Phys23 Phys13 CE23 Arx34 Internet Arx26 Arx15 Arx52 Phys12 Arx28 Arx41 Arx42 Arx12 Relative mitigation of vulnerability: Ω = ∆N − ∆Nrs ∆N + ∆Nrs NMI: Normalized mutual information, measures the strength of similarity (angular) correlations
  • 38. Targeted attacks lead to catastrophic cascades even with degree correlations
  • 39. Geometric correlations mitigate this extreme vulnerability and can lead to continuous transition
  • 40. Edge overlap is not responsible for the mitigation effect id an rs un 103 104 105 106 100 101 102 103 104 N ΔN ∝ N0.822 ∝ N0.829 -47.6+0.696 log[x]2.304 ∝ N-0.011 id an rs un 103 104 105 106 100 101 102 103 104 N Max2ndcomp id an rs un 103 104 105 106 10-1 100 N Rela�vecascadesize Largest cascade id an rs un 103 104 105 106 10-2 10-1 N Rela�vecascadesize 2nd largest cascade
  • 41. Geometric correlations can explain the robustness of real multiplexes against targeted attacks Summary: - Multiplexes are vulnerable against random failures and targeted attacks (discontinuous transition) - Degree correlations mitigate vulnerability against random failures (percolation), lead to continuous transition - Degree correlations fail to mitigate vulnerability against targeted attacks - Geometric (similarity) correlations mitigate vulnerability against targeted attacks, may lead to continuous transition
  • 42. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg • koljakleineberg.wordpress.com
  • 43. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg ← Slides • koljakleineberg.wordpress.com
  • 44. Reference: »Geometric correlations mitigate the extreme vulnerability of multiplex networks against targeted attacks« PRL 118, 218301 (2017) K-K. Kleineberg, L. Buzna, F. Papadopoulos, M. Boguñá, M. A. Serrano Kaj Kolja Kleineberg: • kkleineberg@ethz.ch • @KoljaKleineberg ← Slides • koljakleineberg.wordpress.com ← Data & Model