1. Introduction
Information propagation (also known as diffusion, cascade or spread) is of great importance in complex networks where, given information at a small number of nodes of the network, the aim is to understand the propagation to all the nodes. Social media networks provide typical examples including the breaking of a news story and the spread of product advertisements, internet memes and misinformation to different users. The ability to predict propagation plays a key role in tasks such as informing how to seed information for obtaining maximal coverage and influence [Reference Jalili and Perc24, Reference Kempe, Kleinberg and Tardos26], or for identifying likely sources of information provided that the times are given when the information was received [Reference Paluch, Lu, Suchecki, Szymański and Hołyst34]. Models may be used for control and management of the propagation.
Our starting point is to model the underlying network as a given graph. The aim of this work is to formulate models for inspired by the propagation of waves passing through continuous media. Elements of the approach are that information has either arrived at a graph vertex or not, that information is transmitted to a node only from neighbouring nodes at which information has arrived already and that there is an arrival time for each node. These models for information propagation can then be used in applications ranging from social media networks to semi-supervised learning.
1.1. Continuum front propagation
In the continuum setting, there are three common viewpoints for modelling waves: front propagation, first arrival times and local equations. To introduce these viewpoints, we consider an open bounded domain $\Omega \subset \mathbb {R}^d$ for $d\geqslant 1$ with a Lipschitz boundary $\Gamma$ , a given point $x_0 \in \Omega$ and a continuous, positive function $s \colon \bar \Omega \to \mathbb {R}$ which can be regarded as the impedance of the medium $\bar \Omega$ .
A first approach proposes a propagating front separating the region for which the wave has arrived from the remainder. The fronts initiate at $x_0$ and are characterised by being level surfaces of the arrival time from $x_0$ . The impedance $s(x)$ is specific for the underlying medium and controls the additional time required for the front to travel through the medium at $x$ . We also refer to this approach as front propagation.
A second classical approach consists of formulating a model based on finding the smallest travel time over a set of possible paths and hence results in an optimisation problem. The aim of this model is to determine the shortest travel time along any path from $x_0$ to every $x \in \bar \Omega, x\neq x_0$ , in the medium $\bar \Omega$ for a given impedance $s$ . This task can be expressed as the minimisation problem
cf. [Reference Deckelnick, Elliott and Styles11], where $\|{\cdot}\|_2$ denotes the 2-norm in $\mathbb {R}^d$ and $\xi ({\cdot})$ is a parameterised path in the Sobolev space $W^{1,\infty }$ . Note that $\xi \in W^{1,\infty }([0,1])$ is locally Lipschitz continuous and hence the integral in (1.1) is well defined. Since large values of $s$ slow down the movement and increase the travel time within the medium, we sometimes refer to $s$ as the slowness function, while its inverse $\tfrac {1}{s}$ can be regarded as a velocity. We also refer to this approach as first arrival times.
A third approach arises when regarding an optimal value $u$ of (1.1) as a solution to the eikonal equation, an isotropic static Hamilton-Jacobi partial differential equation. The eikonal equation is given by
with boundary conditions
where $\nu$ is the unit outer normal to $\Gamma$ . We also refer to this approach as a local equation. Also it is possible to pose and solve eikonal equations on connected (sub)Riemannian manifolds, see e.g. [Reference Gromov23].
These three approaches of wave propagation in continuum settings have been exploited to advance different fields of research. The optimisation over paths (also referred to as first arrival times) arises in modelling of optimal logistics such as accessibility, evacuation planning, robot navigation and ray models. The study of the graph eikonal equation (i.e. a local equation) is of importance for proving theoretical results on existence and uniqueness of solutions with certain monotonicity properties. Efficient numerical methods such as fast marching algorithms take advantage of the front propagation approach when solving the continuum eikonal equation [Reference Kimmel and Sethian27, Reference Sethian37, Reference Sethian38]. This demonstrates that diverse perspectives on modelling waves are crucial in the continuum setting for getting more insights into modelling, analysis and numerical methods of the underlying continuum problem.
In contrast to the continuum setting, only a scattered picture is currently available for graphs, including shortest paths, Dijkstra’s algorithm and graph-eikonal models. Motivated by the continuum setting, the aim of this work is to propose and unify corresponding perspectives in the graph setting. We formulate and relate several classes of models based on front propagation, first arrival time over sets of admissible paths and a local equation considering arrival times at a given node and its neighbours. As part of this, we introduce appropriate graph-based generalisations of the continuum counterparts for the three classes of models. In the context of the Dijkstra algorithm, for instance, the Dijkstra algorithm can be regarded as a front propagation model. For the local equation, we replace (1.2)–(1.3) in the continuum setting by a graph-based version of the local equation
for $p=\infty$ with boundary conditions (1.3), which leads to an $\ell ^\infty$ graph-eikonal equation. We also propose a first arrival time model, based on the travel time over paths, and prove its equivalence to Dijkstra’s algorithm. Motivated by the special case $p=\infty$ for the local equation, we derive front propagation, first arrival time and local equations for other cases of $p$ . The main contribution of this paper is to model wave propagation in the graph-based setting using three perspectives (front propagation, first arrival times and local equations). We prove the equivalence of the models for special cases of $p$ . It is important to note that in the models we do not embed the vertices in any ambient Euclidean space.
1.2. Applications
It is natural to introduce the concept of information propagation to data classification and semi-supervised learning. Motivated by this, we apply front propagation on graphs to classical examples in semi-supervised learning such as the Two moons problem and Text classification datasets. Here the information consists of a given finite set of labels, and the aim is to label all vertices in a graph based on the knowledge of the labels on given small number of nodes. Labels are attached by ordering the magnitudes of the arrival times of the information. In addition, we apply information propagation to Trust networks. These are social networks whose users rate each other by trustworthiness. Examples include collaborative networks such as a community of software engineers, or partners of a transaction within cryptocurrency exchanges. Applied to the software community dataset soc-advogato [Reference Rossi and Ahmed35], we show that information propagation can use local trust information to create rankings of any collaborator on the network. Our model-rankings are resistant to Sybil attack [Reference Al-Qurishi, Al-Rakhami, Alamri, Alrubaian, Rahman and Hossain1, Reference Douceur, Druschel, Kaashoek and Rowstron15, Reference Zhang, Liang, Lu and Shen44], where users artificially inflate their reputation, by creating a group of fake users to giving them positive ratings.
1.3. PDE approaches
Many computational methods for semi-supervised and unsupervised classification [Reference Belkin, Matveeva and Niyogi2, Reference Blum and Chawla6, Reference Zhu45] are based on variational models and PDEs [Reference García Trillos and Slepčev22]. Examples include algorithms based on phase fields [Reference Bertozzi and Flenner4] and the MBO scheme [Reference Merkurjev, Kostic and Bertozzi31], as well as $p$ -Laplacian equations [Reference Elmoataz, Toutain and Tenbrinck20, Reference Kreusser and Wolfram29]. In a series of papers, Elmoataz et al. [Reference Desquesnes, Elmoataz and Lézoray12, Reference Desquesnes, Elmoataz, Lézoray and Ta13, Reference Elmoataz, Lezoray and Bougleux19, Reference Ta, Elmoataz, Lézoray, Tai, Mørken, Lysaker and Lie39] postulate discrete eikonal equations and investigate label propagation on graphs with applications in imaging and machine learning. Current analytical results include an investigation of viscosity solutions for Hamilton-Jacobi equations on networks [Reference Camilli and Marchi10], the well-posedness of nonlinear PDEs such as the Eikonal equation on finite graphs [Reference Oberman, Sviridov and Manfredi32] and an approximation scheme for an eikonal equation on a network [Reference Camilli, Festa and Schieborn9], producing an approximation of shortest paths to the boundary. In addition, limits and consistency of non-local and graph approximations to the time-dependent (local) eikonal equation have been studied in [Reference Fadili, Forcadel, Nguyen and Zantout21]. The robustness of the solution to the eikonal equation for $p=1$ and its convergence to the shortest path distance as $p\to \infty$ is shown in [Reference Calder and Ettehad8].
1.4. Contributions
Our contributions are as follows:
-
• Derivation of general model formulations for three perspectives (front propagation models, first arrival time models, and local equations) in the graph-based setting that include established models (Dijkstra’s algorithm, shortest paths, and $\ell ^p$ graph-eikonal equations for $p\geq 1$ ) as special instances.
-
• Unification of the three perspectives in the graph-based setting by proving equivalence of the models (front propagation, first arrival times and discrete generalised eikonal models) depending on $p$ .
-
• Application of front propagation on a weighted social network to calculate metrics of trust securely.
-
• Application of front propagation on graphs to classical problems in semi-supervised learning for point cloud datasets (two moons problem, text classification datasets Cora and CiteSeer).
1.5. Outline
We introduce several models for travel times on a graph in Section 2. Equivalences between certain instances of the models are established in Section 3. In Section 4.1, we apply information propagation to trust networks. The use of front propagation on graphs to semi-supervised learning via label propagation is illustrated in Section 4.2. Finally, we make some concluding remarks in Section 5.
1.6. Notation
Following the terminology and setting in [Reference Dunlop, Slepčev, Stuart and Thorpe17, Reference Elmoataz, Lezoray and Bougleux19, Reference García Trillos and Slepčev22], we consider a finite, connected weighted graph $G=(V,E,w)$ with vertices $V=\{1,\ldots, n\},$ edges $E\subset V^2$ and nonnegative edge weights $w$ . We assume that the graph is simple, i.e. there exists at most one edge between any two vertices. We suppose that there is a decomposition of $V\,:\!=\,\partial V\cup \mathring V$ into two disjoint non-empty sets $\partial V$ and $\mathring V$ . The edge between node $i$ and node $j$ is denoted by $(i,j)$ . For ease of notation, we regard the weights $w$ as a weight matrix $w\in \mathbb {R}^{n\times n}$ with entries $w_{ij}$ , where we assume that there exists an edge $(i,j)\in E$ if and only if $w_{ij}\gt 0$ , while $w_{ij}=0$ if $(i,j)\notin E$ . Since $G$ is not necessarily undirected, $w_{ij}\neq w_{ji}$ in general. This framework also includes unweighted graphs corresponding to the cases in which $w_{ij}=1$ for all $(i,j)\in E$ . Given a graph $G$ , we denote by $N(i)\subset V$ the set of neighbours of node $i\in V$ . We define $j\in N(i)$ if there exists an edge $(j,i)\in E$ , and in general this does not imply existence of $(i,j) \in E$ . The direction of this relationship is chosen for convenient notation in the following. We introduce the notion of a path from node $x\in V$ to $y\in V$ and write $p_{x,y}=(x=i_1,\ldots, y=i_{n(p_{x,y})})$ for a path with $n(p_{x,y})$ nodes and $n(p_{x,y})-1$ edges $(i_{m-1},i_m)\in E$ for $m=2,\ldots, n(p_{x,y})$ such that all nodes $i_m$ for $m\in \{1,\ldots, n(p_{x,y})\}$ are distinct, i.e. a path must not self-intersect. Due to the assumption that the graph $G$ is connected, for every $x,y \in V$ there exists a path $p_{x,y}$ connecting $x$ and $y$ , i.e. there exists $n(p_{x,y})\gt 1$ such that $p_{x,y}=(x=i_1,\ldots, y=i_{n(p_{x,y})})$ is a path with edges $(i_{m-1},i_m)\in E$ for $m=2,\ldots, n(p_{x,y})$ . For a graph with $|V|=n$ nodes, we denote by $\mathcal H^n$ the function space of all functions defined on $V$ , i.e. all $v\in \mathcal H^n$ are of the form $v\colon V\rightarrow \mathbb R$ . For $v\in \mathcal H^n$ , we write $v_x=v(x)$ for $x\in V$ . We also assume that there is a given slowness function $s\in \mathcal H^n$ with $s\ge 0$ .
2. Description of models
In this section, we propose several models for the propagation of information on graphs. The common elements of the models are
-
• We suppose that either all information has arrived at a vertex or none.
-
• We introduce the variable $u\in \mathcal H^n$ with $u_i$ for $i\in V$ to denote the arrival time of information at vertex $i$ .
-
• We assume that $u$ is prescribed on $\partial V$ and we set $u=0$ on $\partial V$ , though in general the models can accommodate a wider class of boundary conditions.
-
• We suppose that information propagation is local. That is, information arrives at a vertex only by propagation from a neighbouring vertex for which information has arrived. Thus, there is a unique travel time $u_i$ at each node $i$ that can only depend on travel times at nodes $j\in N(i)$ with $u_j \lt u_i$ .
-
• The edge weights reflect the distance or resistance to propagation along an edge.
-
• The function $s\in \mathcal H^n$ is a measure of slowness or resistance associated with each vertex.
The aim of a model is to associate a travel time $u_i$ with each vertex of the graph. Since the graph is finite, $u=\{u_i,i=1,2,\ldots, n\}$ attains an unknown number of $J+1\in \mathbb {N}$ distinct values consisting of prescribed initial data $U_0\in \mathbb R$ and unknown values $U_1,\ldots, U_J\in \mathbb {R}$ ordered so that $U_0\lt \ldots \lt U_J$ . We set $V_0\,:\!=\,\partial V$ as the set of initially labelled vertices and prescribe the initial data $U_0$ , i.e. $u_i=U_0$ for all $i\in V_0$ . In the following, we set $U_0=0$ . We consider three classes of models. The first class of models is based on the propagation of discrete fronts from an initial front $\partial V$ (Model 1). The second class of models considers first arrival times of sets of paths that link vertices in the initial set $\partial V$ to vertices in $\mathring V=V\backslash \partial V$ (Model 2). For the third class of models, we postulate a generalised discrete $\ell ^p$ eikonal equation model (Model 3) depending on parameter $p$ . We mainly focus on $p\in \{1,2,\infty \}$ below. Note that some of the model instances may look rather complicated. However, the main motivation is to unify graph-based models from three perspectives (front propagation, first arrival times, and local equations) by proving their equivalence.
2.1. Front propagation models
In this approach, we view information propagation as an evolving front, i.e. a boundary that separates the region for which the wave has arrived from the remainder. We decompose the set $\mathring V$ of initially unlabelled vertices into $J$ disjoint sets $V_1,\ldots, V_J$ such that for $j\in \{1,\ldots, J\}$ all vertices $i\in V_j$ satisfy $u_i=U_j$ . We define known sets $K_0,\ldots, K_J$ and candidate sets $C_0,\ldots, C_J$ as follows:
Under the assumption that $U_j$ and $V_j$ for $j=0,\ldots, k-1$ are known, implying that the value of $u_i$ for all $i \in K_{k-1}$ is known, our task is to determine $U_k$ and $V_k$ . The front $F_{k-1}$ consists of all vertices in $K_{k-1}$ with neighbours in $C_{k-1}$ and with $F_0=V_0$ . We determine candidate values $\tilde {u}_i$ for each $i\in C_{k-1}$ using a model (specified below), and we define $U_k$ by choosing the smallest candidate value in the candidate set $C_{k-1}$ :
We then define $V_k\subset C_{k-1}$ to be the set where the minimum is attained and we set $u_i=U_k$ for all $i\in V_k$ . The above procedure depends on the definition of candidate values $\tilde u_i$ for $i\in C_{k-1}$ . We define relationships for $\tilde u_i$ that depend upon the set $N(i)\cap K_{k-1}$ . Using (2.1), the values $U_1,\ldots, U_L$ of the solution $u$ can then be determined. By construction, the solution $u$ is unique for the function $i\mapsto \tilde u_i$ .
2.1.1. Model 1(i)
Given the known arrival time $u_j$ for $j\in K_{k-1}$ , and let $j\in N(i)$ so edge $(j,i)$ exists, then a candidate for the arrival time at $i$ , is given by $u_j + \tfrac {s_{i}}{w_{j,i}}$ . Choosing the smallest value of all these possible candidate values results in the candidate
for $i\in C_{k-1}$ . Here, $u_j + \tfrac {s_{i}}{w_{j,i}}$ is the sum of the first arrival time $u_j$ at node $j$ and $\tfrac {s_{i}}{w_{j,i}}$ , which is the travel time from $j$ to $i$ along edge $(j,i)$ . The travel time along $(j,i)$ only depends on the slowness $s_i$ at the endpoint of $(j,i)$ and the edge weight $w_{j,i}$ . The term $\tfrac {s_{i}}{w_{j,i}}$ is inspired from the continuum setting (1.1) which suggests that the travel time along an edge $(i,j)$ is antiproportional to the velocity $\tfrac {1}{s_i}$ and hence proportional to $s_i$ . (1.1) also suggests that the travel time is proportional to the length of an edge and thus proportional to $\tfrac {1}{w_{i,j}}$ if we regard $w_{i,j}$ as a characterisation of the connectivity of vertices $i$ and $j$ .
As the minimum in (2.2) can be associated with the $\ell ^\infty$ -norm, we will also see later that this model is equivalent to the $\ell ^\infty$ graph-eikonal equation.
2.1.2. Model 1(ii)
While only the smallest neighbouring value has been considered in (2.2), which can be associated with the $\ell ^\infty$ -norm, we consider a more averaging approach in the following instance of a front propagation model motivated by weighing neighbouring known values in an $\ell ^2$ -sense. We define $ z_i^2\,:\!=\, \sum _{j\in N(i)\cap K_{k-1}} w_{j,i}^2 $ for $i\in C_{k-1}$ , i.e. $z_i^2=\|(w_{j,i})_{j\in N(i)\cap K_{k-1}}\|_2^2$ . For $i\in C_{k-1}$ , we set
Here,
can be regarded as the weighted mean travel time between any node $j\in {N}(i)\cap K_{k-1}$ and node $i$ as $ \frac {1}{ z_i^2} \sum _{j\in {N}(i)\cap K_{k-1}} w_{j,i}^2=1 $ . The weighted mean travel time to $i$ balances the travel time to each known node $j$ with the squared weights between $i$ and $j$ . Further, we set
as the variance of the weighted mean travel time.
As an interpretation of (2.3), we can regard the wavefront of information travelling simultaneously from all known nodes $j\in K_{k-1}$ to candidate node $i$ where the averaged wavefront (in the $\ell ^2$ -sense) depends on the weighted mean travel time $\mu _i$ and its variance $\sigma _i^2$ . With this model, one can interpret the neighbours’ values as forming an estimate of a candidate value $\tilde {u}_i$ from below, with a weighted mean square error $(\tilde {u}_i - \mu _i)^2 + \sigma ^2_i = \frac {s^2_i}{z^2_i}$ . We will also see later that this model is equivalent to the $\ell ^2$ graph-eikonal equation.
2.1.3. Model 1(iii)
Similarly to (2.3), we consider an averaging approach in the following instance of a front propagation model, but here we weigh neighbouring known values in an $\ell ^1$ -sense. For $i\in C_{k-1}$ , we define $M_{i,k}=| N(i)\cap K_{k-1} |$ and $y_i \,:\!=\,\sum _{j\in N(i)\cap K_{k-1} }w_{j,i}$ , i.e. $y_i=\|(w_{j,i})_{j\in N(i)\cap K_{k-1}}\|_1$ . We set
for $i\in C_{k-1}$ . The first term in (2.4) can be regarded as a weighted mean travel time to $i$ , obtained by balancing the travel time from each known node $j$ with the weight $w_{j,i}$ between $j$ and $i$ , while the second term $\tfrac {s_i}{y_i}$ can be interpreted as bias. Like for the other instances, we can interpret (2.4) as the wavefront of information travelling simultaneously from all known nodes $j\in K_{k-1}$ to candidate node $i$ where the averaged wavefront (in the $\ell ^1$ -sense) depends on the weighted mean travel time and its bias. We will also see later that this model is equivalent to the $\ell ^1$ graph-eikonal equation.
2.2. First arrival times
In this approach, we optimise travel times over path sets as a generalisation of travel times over paths. For this, we define useful quantities for describing path sets. Then, we define some generalised travel time models and first arrival times over path sets. In Remark 2.2, we show how this generalises the standard travel time defined over paths. For two nodes $x_0,i\in V$ , let $\mathbb {P}_{x_0,i}$ be the set of admissible paths $p_{x_0,i}$ from $x_0$ to $i$ . Since the graph $G=(V,E,w)$ is connected, $\mathbb {P}_{x_0,i}$ is non-empty. Let $P_{x_0,i}\subset \mathbb {P}_{x_0,i}$ denote a non-empty subset of paths from $x_0$ to $i$ , and we refer to $P_{x_0,i}$ as a path set. We define the penultimate truncation of a path $p_{x_0,i}\in \mathbb {P}_{x_0,i}$ as a path $p_{x_0,j}$ , where $j \in N(i)$ and $p_{x_0,i} = (p_{x_0,j},(j,i))$ . Similarly, for a path set $P_{x_0,i}$ , we define the penultimate truncations of $P_{x_0,i}$ as the set $\{ p_{x_0,j} \colon j\in K(P_{x_0,i}) \}$ where $K(P_{x_0,i})\subset N(i)$ such that for every $j\in K(P_{x_0,i})$ there exist a path $p_{x_0,j}$ and a path $p_{x_0,i}\in P_{x_0,i}$ such that $p_{x_0,i} = (p_{x_0,j},(j,i))$ . Note, unlike the set $N(i)$ which depends only on the graph structure, $K(P_{x_0,i})$ depends on the choice of the path set $P_{x_0,i}$ . An illustration of a path set and its penultimate truncation is shown in Figure 1.
We assume that there exists a formula for a generalised travel time $T(Q)$ for any path set $Q\subset \mathbb {P}_{x_0,i}$ . Some specific examples are introduced below. We define $u_i$ for $i\in V$ , as the first arrival travel times over path sets by
For boundary nodes $x_0 \in \partial V$ , we set $u_{x_0} = 0$ . The inner minimisation in (2.5) is not over paths $p_{x_0,i}\in \mathbb {P}_{x_0,i}$ , but over path sets $P_{x_0,i}\subset \mathbb {P}_{x_0,i}$ .
We define a travel time $T$ over a path set $P_{x_0,i}$ with a local formula over the penultimate truncations of $P_{x_0,i}$ . In particular, $T\!\left(P_{x_0,i}\right)$ is calculated as a function of $T\!\left(P^i_{x_0,j}\right)$ with $j \in K(P_{x_0,i})$ , where $P^i_{x_0,j}=\{p_{x_0,j}\in \mathbb{P}_{x_0,j} \colon (p_{x_0,j},(j,i))\subset P_{x_0,i}\}$ . By definition $P^i_{x_0,j}$ is also a path set. Since all nodes of a path are distinct by definition, for all $p_{x_0,j}\in P^i_{x_0,j}$ we have $i\notin p_{x_0,j}$ .
The models we propose for the travel time $T$ share similarities with the front propagation models 1(i), 1(ii), 1(iii) in Section 2.1 and are specified further below.
2.2.1. Model 2(i)
Similar to Model 1(i) in (2.2), we define
We will see later that this model is equivalent to the $\ell ^\infty$ graph-Eikonal equation.
2.2.2. Model 2(ii)
Similar to Model 1(ii) in (2.3), we consider
where
and
We will see later that this model is equivalent to the $\ell ^2$ graph-Eikonal equation.
2.2.3. Model 2(iii)
Similar to Model 1(iii) in (2.4), we define
where $y_{x_0,i}\,:\!=\,\sum _{j\in K(P_{x_0,i})}w_{j,i}$ . We will see later that this model is equivalent to the $\ell ^1$ graph-Eikonal equation.
Remark 2.1. Due to the assumption that the graph $G$ is connected and the weights $w_{j,i}$ are positive, there exists a solution to (2.5) for all the above choices of the travel time $T$ . Clearly, first arrival time solutions are well defined and unique. However, the minimising path sets are not unique in general.
Remark 2.2. Consider a singleton path set $P_{x_0,i} = \{p_{x_0,i}\} = \{(x_0 = i_1, \dots, i = i_M)\}$ . We observe that the value of $T\!\left(P_{x_0,i}\right)$ calculated using models 2(i), 2(ii) or 2(iii) is equal to the following:
where we used that the models 2(i), 2(ii) and 2(iii) satisfy
If we suppose that $w_{i_{m-1},i_m}$ characterises the connectivity between nodes $i_{m-1}$ and $i_m$ , and thus $\tfrac {1}{w_{i_{m-1},i_m}}$ is proportional to the travel time, the form of the travel time (2.9) can be regarded as a discretisation of $\int _0^1 s(\xi (r)) \|\xi ^{\prime}(r)\|_2\,\mathrm {d}r$ in (1.1).
Classically, there is a known relationship between the discretisation of problem (1.1) and the minimisation problem
where $u_{x_0} = 0$ on boundary nodes $x_0\in \partial V$ . Under the assumption that only singleton sets $P_{x_0,i}=\{p_{x_0,i}\}$ may be considered in (2.5), then (2.5) reduces to (2.11).
To understand the behaviour of model 2(i) in (2.6), substituting its definition in (2.5), we obtain (2.11). Indeed,
Thus, when using model 2(i), a minimisation over path sets is thus reduced to a minimisation over paths.
To understand the behaviour of models 2(ii) and 2(iii), we calculate the generalised travel time of some simple path sets over the square grid in two space dimensions with constant unit weights and slowness function; see Figures 2 and 3, respectively. In each case, we calculate the travel times for the three path sets $P^{(1)}_{x_0,i}$ , $P^{(2)}_{x_0,i}$ and $P^{(3)}_{x_0,i}$ , where $x_0=(0,0)$ and $i=(2,2)$ . Let $U$ and $R$ be the paths travelling ‘up’ and ‘right’ from a node to a neighbour on the square grid. We set $P^{(1)}_{x_0,i}=\{(U,R,U,R)\}$ , $P^{(2)}_{x_0,i} = P^{(1)}_{x_0,i} \cup \{(R,U,R,U)\}$ and $P^{(3)}_{x_0,i} = P^{(2)}_{x_0,i} \cup \{(U,U,R,R)$ , $(R,R,U,U) \}$ , so these path sets have 1, 2 and 4 elements, respectively. We show the generalised travel time for path sets $P^{(1)}_{x_0,i}$ , $P^{(2)}_{x_0,i}$ and $P^{(3)}_{x_0,i}$ for models 2(ii) and 2(iii) in Figures 2 and 3, respectively. Here, the numbers at nodes along the different paths denote the generalised travel time from the origin $x_0$ to the respective nodes. We see that $P^{(3)}_{x_0,i}$ is optimal for model 2(ii) and 2(iii) among $\{P^{(1)}_{x_0,i},P^{(2)}_{x_0,i},P^{(3)}_{x_0,i}\}$ as shown in Figures 2 and 3. In fact, $P^{(3)}_{x_0,i}$ is an optimal path set for model 2(ii) and 2(iii) among all subsets of $\mathbb {P}_{x_0,i}$ on the square grid.
The properties of minimising path sets are left to future investigation. Heuristically, we see that the travel times given by model 2(ii) or 2(iii) are small for path sets that contain short paths or paths, which have many cross-overs among themselves (i.e. multiple distinct paths pass through common nodes). Such behaviour is observed in Figures 2 and 3, where the support of the minimizing paths is the rectangular lattice between nodes $x_0$ and $i$ .
Remark 2.3. The notion of a minimising path in (2.5) also includes the case of a single element of $\partial V$ , which corresponds to one label, i.e. $\partial V=\{x_0\}$ in which case
Remark 2.4. It is possible that Gromov’s theory (e.g. [23]) provides a suitable framework with which to view these constructions. In [23], a metric space $(G,d)$ is endowed with an additional length structure over curves between points in the space. A path-metric space is then defined if $d(x,y)$ for $x,y\in G$ is equal to the shortest length of the curve connecting the $x$ and $y$ . This theory applies to the path-distance metric $d$ on a connected graph $G$ , defining a length structure by (2.6). It will be an interesting future direction of research to see if (2.7) and (2.8) define length structures and along with a suitable metric $d$ form a path-metric space.
2.3. Discrete generalised eikonal models
For $i\in V$ , we define one-sided edge derivatives $ \nabla _w^+ u_i \in \mathbb R^{|N(i)|}$ by
Set,
and
2.3.1. Model 3(p)
Motivated by monotone discretisations of the continuum eikonal equation, we consider for any $1\leq p \leq \infty$ ,
Note that (2.14) with $p=2$ is of the same form as the continuum eikonal equation (1.2). We can rewrite (2.14) as
for $1\leq p\lt \infty$ , and
for $p=\infty$ . The models satisfy a monotonicity condition characteristic of discrete Hamilton-Jacobi equations (c.f. [Reference Deckelnick, Elliott and Styles11]). Using a monotonicity condition and comparison principles, it has been shown that the boundary value problems admit a unique solution and are well-posed, see [Reference Desquesnes, Elmoataz and Lézoray12] and [Reference Calder and Ettehad8, Th. 12]. The authors in [Reference Calder and Ettehad8, Th. 12] also construct sub- and supersolutions of the unique solution, resulting in explicit lower and upper bounds of the solution which are both linked to the graph distance.
Note that the $\ell ^\infty$ eikonal equation is related to shortest path graph distances that approximate geodesic distances. However, this is not the case for the $\ell ^p$ eikonal equation with $p$ finite as interaction between neighbouring nodes is of importance here.
3. Relations between models
In this section, we investigate relations between the different modelling approaches, that is front propagation, first arrival time and discrete eikonal models, which are introduced in Section 2. The relationships we prove between the models are summarised in Table 1, and the proofs are provided in the following sections.
3.1. Equivalence of front propagation and discrete eikonal models
In this section, we show the equivalence of front propagation models (2.2), (2.3), (2.4) (i.e. models 1(i),(ii),(iii)) and discrete eikonal models (2.15) for $p=1, p=2$ and (2.16) for $p=\infty$ (i.e. models 3( $p=1$ ), 3( $p=2$ ), 3( $p=\infty$ )).
3.1.1. Equivalence of models 1(i) and 3( $p=\infty$ )
Let $i\in \mathring V$ be given. Hence, there exists $k\in \{1,\ldots, L\}$ such that $i\in V_k$ . For this $k$ , the definition of sets $V_k, K_{k-1}$ and $C_{k-1}$ , and of model 1(i) (2.2), give the value of $u_i$ as
that is
Since $w_{j,i}\gt 0$ for all edges $(j,i)\in E$ , the model is equivalent to
From minimality of $u_i\in C_{k-1}$ , we have $u_j\geq u_i$ for all $j\in V\backslash K_{k-1}$ . Recall $w_{j,i}\gt 0$ and $s_i\gt 0$ , then extending the set over which the maximum is taken from $N(i)\cap K_{k-1}$ to all of $N(i)$ does not affect the maximum value. Similarly, $K_{k-1}$ necessarily contains at least one point $j$ with $u_j \lt u_i$ , therefore replacing $(u_i-u_j)$ with $(u_i - u_j)^+$ does not affect the maximum. This leaves
which is precisely (2.16), i.e. model 3( $p=\infty$ ). The counter direction runs exactly the same, with the exception that one must show that $u_i$ is minimal over $C_{k-1}$ , however, this follows by monotonicity of the construction, as any $j$ with $u_j\lt u_i$ must belong to $K_{k-1}$ and cannot be in $C_{k-1}$ .
3.1.2. Equivalence of models 1(ii) and 3( $p=2$ )
Let $i\in \mathring V$ , that is, there exists $k\in \{1,\ldots, L\}$ such that $i\in V_k$ . First, we show that model 3( $p=2$ ) in (2.15) follows from model 1(ii) in (2.3). For this $k$ , the definition of sets $V_k, K_{k-1}$ and $C_{k-1}$ , the definition $z_i= \sum _{j\in N(i)\cap K_{k-1}} w_{j,i}^2$ , and (2.3) implies that $u_i$ satisfies
For this, we square both sides of the equality which yields
Since $z_i\gt 0$ , we obtain
From the definition of $K_{k-1}$ , the sum can be expanded to the entire neighbourhood $N(i)$ , by introducing the maximum with zero,
This is equivalent to model 3( $p=2$ ) in (2.15)
Next, we start from model 3( $p=2$ ) in (2.15) for $p=2$ , or equivalently (3.1), and show that model 1(ii) in (2.3) follows. Note that (3.1) can be regarded as a quadratic equation in $u_i$ whose solution $u_i$ satisfies
The discriminant is nonnegative due to the existence of a unique real solution to (2.15). Since
this implies that the smaller solution contradicts the definition of $i\in V_k$ and the larger solution of the quadratic equation has to be considered, i.e.
which yields (2.3), that is model 1(ii). $u_i$ is minimal over $C_{k-1}$ by construction, as any $j$ with $u_j\lt u_i$ must belong to $K_{k-1}$ and thus cannot be in $C_{k-1}$ .
3.1.3. Equivalence of models 1(iii) and 3( $p=1$ )
Let $i\in \mathring V$ be given. Hence, there exists $k\in \{1,\ldots, L\}$ such that $i\in V_k$ . For this $k$ , the definition of sets $V_k, K_{k-1}$ and $C_{k-1}$ , and Model 1(iii) in (2.4) show that $u_i$ satisfies
which is equivalent to model 3( $p=1$ ) in (2.15) by the definition of $y_i$ and the properties of $i\in V_k$ , i.e. $\sum _{j\in N(i)} w_{j,i} (u_i-u_j)^+ = s_i$ .
3.1.4. Derivation of model of type 1 from model 3( $p$ ) for general $p$
We have proved in the previous subsections that there exists a model of type 1 for any model 3( $p$ ), for $p\in \{1,2,\infty \}$ . In this subsection, we provide a procedure for deriving such a model of type 1.
For any finite $p\geq 1$ , the solution $u$ of 3( $p$ ) satisfies (2.15). Starting from the boundary condition $\partial V$ , we initialise the front propagation algorithm. At the $k$ th iteration, the following steps are done:
-
1. From $K_{k-1}$ and the graph neighbourhood structure, create $C_{k-1}$ .
-
2. By construction of solutions to Model 1, any admissible solution $\tilde u_i$ has to satisfy $\tilde u_i \gt u_j$ for all $j\in N(i)\cap K_{k-1}$ and $\tilde u_i \leq u_j$ for all $j\in V\backslash K_{k-1}$ . To compute the traveltimes $\tilde u_i$ at candidates $i\in C_{k-1}$ , we use (2.15). Due to the properties of admissible solutions, it is sufficient to restrict the sum in (2.15) to $N(i)\cap K_{k-1}$ instead of $N(i)$ . Over this domain, the restriction to the positive part $({\cdot})^+$ may be removed, and the problem is reduced to solving a polynomial equation in $u_i$ (via analytic formulae or numerical solvers). As $s_i$ and $w_{j,i}$ are positive, there exists at least one admissible solution $\tilde u_i$ . The uniqueness of $\tilde u_i$ follows from contradiction: suppose that (2.15) has two admissible solutions $\bar u_i$ and $\hat u_i$ with $\bar u_i \gt \hat u_i \geq u_j$ $\forall j\in N(i) \cap K_{k-1}$ . Then,
\begin{equation*}s_i^p= \sum _{j\in N(i)\cap K_{k-1}} \!\left({w_{j,i} }(\bar u_i-u_j) \right)^p\gt \sum _{j\in N(i)\cap K_{k-1}} \!\left({w_{j,i} }(\hat u_i-u_j) \right)^p=s_i^p\end{equation*}This is clearly a contradiction, and thus there is exactly one admissible solution. For all $i\in C_{k-1}$ , we denote this admissible solution by $\tilde u_i$ and determine $U_k$ with (2.1). -
3. Add all nodes $i\in C_{k-1}$ with $U_k = \tilde u_i$ into $V_k$ , then generate $K_k$ .
3.2. Equivalence of first arrival times over path sets and discrete eikonal models
In this section, we equate the arrival time model (2.5) with travel times (2.6), (2.7), (2.8) (collectively models 2(i), (ii), (iii)) of Section 2.2 with the discrete eikonal models, i.e. model 3( $p=\infty$ ) in (2.16), and models 3( $p=1$ ), 3( $p=2$ ) in (2.15).
3.2.1. Equivalence between models 2(i) and 3 $(p=\infty )$
Substituting travel time (2.6) of model 2(i) into (2.5) and using the definition of $K(P_{x_0,i})$ for $P_{x_0,i}\subset \mathbb {P}_{x_0,i}$ yields
Note that $P^i_{x_0,j}$ contains paths between $x_0$ and $j$ not containing node $i$ . If we now consider $P_{x_0,j}\subset \mathbb {P}_{x_0,j}$ , then there may be a path from $x_0$ to $j$ via $i$ in $P_{x_0,j}$ , but it is not a minimiser. To see that a path $p_{x_0,j}$ with $i\in p_{x_0,j}$ is indeed not a minimiser, we consider $p_{x_0,j}=(i_1=x_0,\ldots, i_k=i,\ldots, i_M = j)$ for some $M\in \mathbb {N}$ and $1\lt k\lt M$ , implying that $i_{k-1}\in N(i)$ and hence $p_{x_0,i}=(i_1=x_0,\ldots, i_{k-1}, i_k=i)\in (P^i_{x_0,\tilde j},(\tilde j,i))\subset \mathbb {P}_{x_0,i}$ for $\tilde j=i_{k-1}\in N(i)$ and some path set $P^i_{x_0,\tilde j}\subset \mathbb{P}_{x_0,\tilde j}$ . As the travel time is nonnegative on every edge by (2.10), the travel time is monotone over increasing path length, and we have $T(p_{x_0,i_{k-1}})\lt T(p_{x_0,j})$ with $i_{k-1},j\in N(i)$ , implying that $p_{x_0,j}$ with $i\in p_{x_0,j}$ cannot be a minimiser. Hence, we write
We move $u_i$ to the right-hand side and use that $\min\!(x) = -\max\!({-}x)$ , so that we obtain
Due to the positivity of $w_{ij}$ , this is equivalent to $\max _{j\in N(i)} \left ( w_{j,i} \left ( u_i-u_j \right )-s_{i}\right )=0$ , and as $u_i\geq u_j$ , this yields $\max _{j\in N(i)} \left ( w_{j,i} \left ( u_i-u_j \right )^+\right )=s_{i}$ , that is, we obtain model 3( $p=\infty$ ) in (2.16).
3.2.2. Equivalence between models 2(ii) and 3 $(p=2)$
Starting with (2.5) and considering travel time of model 2(ii) in (2.7) yields
where $z_{x_0,i}=\sum _{j\in K(P_{x_0,i})}w^2_{j,i}$ . We can write $u_i$ as
where $z_K=\sum _{j\in K}w^2_{j,i}$ . Since $T\!\left(P^i_{x_0,j}\right)$ is the only term depending on $x_0\in \partial V$ and $P^i_{x_0,j}$ satisfying $P_{x_0,i}=(P^i_{x_0,j},(j,i))\subset \mathbb {P}_{x_0,i}$ with $j\in K(P_{x_0,i})$ , we may pull the minimisation with respect to these parameters inside the expression and replace the minimisation with respect to $P_{x_0,i}=(P^i_{x_0,j},(j,i))\subset \mathbb {P}_{x_0,i}$ with $j\in K(P_{x_0,i})$ by $P_{x_0,j}\subset \mathbb{P}_{x_0,j}$ as in Section 3.2.1. This yields
where $u_j= \min _{x_0\in \partial V}\min _{P_{x_0,j}\subset \mathbb {P}_{x_0,j}} T(P_{x_0,j})$ by definition. Moving $u_i$ to the right-hand side and using $\min\!(x)=-\max\!({-}x)$ provides
To achieve that the expression vanishes, we require that the first term is nonnegative which is equivalent to $K\subset N(i)$ such that $u_j\leq u_i$ for all $j\in K$ . Note that the first term is maximal for the set $\{j \in N(i) \colon u_j \leq u_i\}$ and the magnitude of the second term decreases as the size of the set $K$ increases. Hence, the maximiser $K$ with $K = \{j \in N(i) \colon u_j \leq u_i\}$ satisfies
Squaring both sides and dividing by $z_K$ yields
i.e.
that is model 3( $p=2$ ) in (2.15).
3.2.3. Equivalence between models 2(iii) and 3 $(p=1)$
We begin by using the first arrival model (2.5) with travel time $T$ given as in model 2(iii) by (2.8) which yields
where we can use a similar argument as in Section 3.2.1 in the fourth equality to consider the sets $P_{x_0,j}\subset \mathbb{P}_{x_0,j}$ instead of the sets $P_{x_0,i}=(P^i_{x_0,j},(j,i))\subset \mathbb {P}_{x_0,i}$ with $j\in K(P_{x_0,i})$ . Then we rearrange the equation resulting in
and as $\sum _{j\in K}w_{j,i}\gt 0$ , we obtain
If $u_j\leq u_i$ , then the summand is positive and therefore the maximiser over $K\subset N(i)$ is the set $\{j \in N(i) \colon u_j \leq u_i\}$ . Hence, we arrive at
that is, model 3( $p=1$ ) in (2.15).
4. Applications
In this section, we use information propagation in two applications: trust networks and semi-supervised learning.
4.1. Applications to trust networks
In this section, we apply information propagation to a trust network, which is a weighted directed graph, with nodes being users of a social network. The edges and their trust weights are reviews of trust among users, for example, $\omega _{i,j}$ implies that $i$ trusts $j$ with a rating $\omega _{i,j}$ . The neighbourhood structure is therefore built around trusting nodes and their neighbours of trusted nodes. It is a directed relationship, as trust may not be reciprocated (i.e. $(i,j)$ may exist, but $(j,i)$ does not), and may not be symmetric ( $\omega _{i,j}\neq \omega _{j,i}$ ).
An example of a trust network is the advocato dataset [Reference Massa, Salvetti and Tomasoni30], specifically soc-advocato obtained from [Reference Rossi and Ahmed35]. The dataset is a snapshot in time of a social network comprised of around 5000 software developers, with four categorical weightings of trust based on users’ perceived contributions to open software and programming skills. These weightings have been numerically equated, though somewhat arbitrarily [Reference Massa, Salvetti and Tomasoni30], to four values $\omega _{i,j} \in (0.4,0.6,0.8,1.0)$ where larger values correspond to larger levels of trust. Structural information of the graph is found in [Reference Rossi and Ahmed35]. For this experiment, we will investigate only the largest connected component of this graph, which contains 5167 nodes (of which 4017 are trusting, and 4428 are trusted) and 47,337 edges.
Consider the application of a software team searching for a new collaborator from the network. The team seeks a notion of trustworthiness for each candidate collaborator. One can assess the level of trust in each candidate by the team by using the information from the trust network. A seemingly simple way to do this is to aggregate the trust given to them directly by other users (i.e. the weights from users to the candidate). Unfortunately, a common subversion of this method is a Sybil attack [Reference Al-Qurishi, Al-Rakhami, Alamri, Alrubaian, Rahman and Hossain1, Reference Douceur, Druschel, Kaashoek and Rowstron15, Reference Zhang, Liang, Lu and Shen44]. In its simplest form, a candidate creates a network of artificial community members, colloquially called ’Sybils’, who have high trust with each other and with the candidate. This will boost the candidates aggregate trust. Instead of a neighbourhood-only measurement of trust, we propose using information propagation of distrust to provide a ranking candidates from the perspective of the team in a way that is resistant to Sybil attack.
We perform the propagation of distrust by setting boundary nodes $\partial V$ as the software team. We then set $s=1$ at all nodes. We define the distrust weights $w_{j,i} = \frac {1}{\omega _{j,i}}$ , a reciprocal of the trust weights. Candidates are selected on the network, and we calculate the (first arrival) times for the information to propagate to all candidates from the team members by using a propagation model. The candidates with greater arrival time are less trustworthy according to the model. This method of measuring distrust accounts for both the degree of separation between the team and the candidates, as well as the trust of each review along such paths. It is resistant to Sybil attacks, as ’Sybils’ form a (largely) disconnected cluster around a candidate, and so have little or no effect on path structures between the team and the candidate.
The experiment configuration is shown overlaying a relevant portion of the network in the left panel of Figure 4, we randomly select both a four-member team in magenta, and eight candidates in cyan that we label $A$ - $H$ . For illustration, the travel times (level of distrust) of the displayed nodes according to the propagation model with $p=1$ are given in the right panel of Figure 4. We perform two control experiments. In the first control experiment (Ctrl), we directly use the network of soc-advocato. In a second experiment (GSyb), we modify the network by adding a fully connected Sybil cluster (of size 50) to candidate $G$ . The members of this cluster are given by the highest trust weighting 1 from each other and the candidate $G$ , and vice versa. For each experiment, we use different information propagation models and the neighbour-averaging approach to calculate a trust ranking of the eight candidates. The results of the experiments are given in Table 2. Candidates $A$ - $H$ are alphabetically assigned by the order of the first column. The first three columns show ranks given by propagation model for $p=1,2,\infty$ , which is based on globally averaging distrust. The final two columns show ranks for candidate $j$ based on locally averaging distrust $w_{i,j}$ over $i$ such that $j\in N(i)$ .
First, we look at experiment (Ctrl) in Table 2. Comparing the propagation-based and neighbour-based ranks, we offer an interpretation of some interesting candidates. As candidate $A$ is deemed trustworthy across all methods, this implies that both locally and globally $A$ is a trustworthy candidate. Candidate $H$ , on the other hand, is deemed trustworthy locally but suffers globally which indicates that there is an overall untrustworthy pathway of reviewers between the team and $H$ . Candidate $D$ shows a difference in ranking between travel time models $p=1,2$ and $p=\infty$ , which implies that although the most trustworthy review path from the team to $D$ is not very trustworthy ( $p=\infty$ ranks $D$ eighth), there are many similarly trusted pathways from the team to $D$ ( $p=1,2$ rank $D$ fourth and fifth). In this way, the models for $p\lt \infty$ encode a concept of confidence over the network uncertainty into their travel time. In general, we see that for $p=1$ and $p=2$ , candidates enjoy similar rankings, while the $p=\infty$ model tends to group candidates together, as for this model the travel times can only take more restrictive discrete values. These preliminary results suggest that $p \lt \infty$ approaches provide solutions richer in information from the network and may be more robust in discrete settings, and so we advocate further investigation of their use in graph-based algorithms where $p=\infty$ may be the state of art.
Finally, the key result of comparing between the experiments (Ctrl) and (GSyb) is that the travel time-based ranking did not change between the experiments, whereas the neighbour-averaged distrust of candidate $G$ reduced from $1.333$ in (Ctrl) to $1.029$ in (GSyb), thus increasing their rank from 7 to 4. This provides concrete evidence to the susceptibility of neighbourhood-based approaches, while arrival time approaches are completely resilient to this form of attack.
4.2. Applications to label propagation/semi-supervised learning
In this section, we consider an application to a semi-supervised learning approach to label propagation. The model consists of attaching $L\gt 1$ labels to $n\gt 1$ sets of features $f_j\in \mathcal F_j,\,j=1,2,\ldots, n$ , where $\mathcal F_j=\{\mathcal F^i_j\in \mathbb F_i\}_{j=1}^m\,i=1,2,\ldots, m$ and $\mathbb F_i\,\,\mbox {is either}\,\mathbb R\,\,\mbox {or}\,\,\mathbb B,\,\mathbb B =\{0,1\}$ . The first step consists of assigning weights $w_{i,j}\ge 0$ whose reciprocal measures the distance between features $f_i$ and $f_j$ . If the distance between features is sufficiently large according to some criterion, then the weight is set to zero. From this we obtain the graph with vertices $V=\{1,2,\ldots, n\}$ and edges $E\in V^2$ consisting of the pairs satisfying $w_{i,j}\gt 0.$ We assume there is a set of nodes $\partial V_\ell$ for each category $\ell =1,\dots, L$ so that label $(i) = \ell$ for all $i\in \partial V_\ell$ , that is, a set where the classification is known. Our semi-supervised learning task is to provide all unlabelled nodes in $V\setminus \{\cup _\ell \partial V_\ell \}$ with a label. The front propagation semi-supervised learning model is to assign
for any $i \in V\setminus \{\cup _{\ell } \partial V_\ell \}$ , where $u^{(k)}_i$ is the solution to a discrete eikonal equation (2.14) on a weighted graph for some $p\in [1,+\infty ]$ , with boundary $u_i=0$ for $i\in \partial V_k$ . We assume for this model that the slowness function $s\equiv 1$ . In this way, $i$ is assigned the label $\ell$ if the smallest travel time is found between $\partial V_\ell$ and $i$ among all sets of labels. This model requires to solve the discrete eikonal problem per label category, which can be performed independently in parallel to each other. For each of the following experiments, we carry out 20 simulations with differing random choices of known initial labels. We present the average (and standard deviation) of the classification accuracy over these 20 simulations. The labelling accuracy is calculated as the percentage of unlabelled nodes that are correctly classified.
4.2.1. High-dimensional two moons problem
We follow the construction of the two moons problem for classification as in [Reference Bertozzi and Flenner5, Reference Bühler and Hein7]. The feature vectors here are taken to be the spatial coordinates of $n$ nodes in $\mathbb {R}^{m},$ i.e. $\mathbb F_i= \mathbb R, \,\forall i.$ The construction is formed by considering two planar half circles of radius 1. One is centred at the origin and the other is rotated by $\pi$ and centred $(1,0.5)$ . We take $n=2000$ points on these initial planar circles and then embed them in $\mathbb R^{100}$ by adding uniform Gaussian noise $N(0,0.02I_{100})$ where $I_{100}$ is the identity matrix in $\mathbb R^{100}$ . We define a classification problem by giving points on each initial circle a different binary label; for visualisation we project back onto the plane as seen in Figure 5. We proceed again as in [Reference Bertozzi and Flenner5, Reference Bühler and Hein7] by calculating distances between pairs of points in $\mathbb R^{100}$ and then setting all weights $w_{i,j}=0$ unless point $j$ is within the 10 nearest neighbours of point $i$ . The non-zero weights are then set according to the weight function of [Reference Zelnik-Manor and Perona43]; a squared exponential function of distance, weighted by a local scaling $d_{10}(x_i)=\|x_i-x_{j(i,10)}\|$ , where $j(i,10)$ is the 10 $^{\text {th}}$ nearest neighbour of $i$ (see Table 3). We perform each of the experiments by choosing at random 15 nodes per moon to have known labels. The illustration of the travel time-based classification is given in Figure 5. The accuracy results are given in Table 3. Here we observe high accuracy, with all choices of eikonal model comparable to experiments of unsupervised clustering in [Reference Bertozzi and Flenner5] with near optimal parameter choices. Our method has no tuneable parameters, though the experiment suggests best performance for $p=1$ .
4.2.2. Text classification dataset
We demonstrate the performance on the standard Cora and CiteSeer document classification datasets [Reference Sen, Namata, Bilgic, Getoor, Galligher and Eliassi-Rad36]. In both cases, the graph nodes correspond to journal articles, and links between them are obtained from citations, forming a directed graph. The featue vectors are binary valued of length 1433 (Cora, i.e. $\mathbb F_i=\mathbb B,\,\forall i$ ) and 3703 (CiteSeer $\mathbb F_i=\mathbb B,\,\forall i$ ), based on whether or not the article contained specific words from a unique dictionary. Following [Reference Kipf and Welling28, Reference Yang, Cohen and Salakhudinov42], we symmetrise the adjacency matrix for each citation link. We benchmark with the resulting largest connected component of each dataset. The resulting graphs have 2485 nodes and 5069 edges (Cora) and 2110 nodes and 3694 edges (CiteSeer). The reference did not provide suggestion for the graph weights, thus some naive choices were taken, based on the $\ell ^2$ -norm over binary vectors (see Table 4). There are $L=7$ (Cora) and $L=6$ (CiteSeer) labels, respectively, for each dataset, representing journal categories that we wish to classify. We take 20 labels from each category. The classification accuracy experiments for the different datasets were applied to 20 random seeds, and we display the results of the eikonal models for $p\in \{1,2,\infty \}$ . We assume for this application that the slowness function $s\equiv 1$ . The results are shown in Table 4. Performance is robust across seeds and eikonal models chosen. The experiment suggests best performance at $p=1$ . The exponential-based weighted graphs outperform the reciprocal distance-based weights and have less variation due to random seeding. For this graph, $d_{\max }$ was relatively constant and did not aid performance. We did not optimise the constants appearing in the weight functions and the algorithms performed similarly across an order of magnitude. Several approaches have applied to these datasets in [Reference Yang, Cohen and Salakhudinov42]. Here comparisons are qualitative, as different methods (e.g., [Reference Belkin, Niyogi and Sindhwani3, Reference Joachims25, Reference Weston, Ratle, Mobahi and Collobert41]) use differing levels of information. On these datasets, the front propagation approach performs comparably to Planetoid-T and Planetoid-I, the flagship methods of [Reference Yang, Cohen and Salakhudinov42].
5. Conclusion
In this paper, we proposed some models for information propagation on graphs. Underlying components of the models include a subset of nodes forming the initial source of information, the arrival times of information and the laws governing the transfer of information to nodes from their neighbours. The models are collected into three viewpoints: an information wavefront hitting time, an optimal travel time over sets of paths and a local equation for the time to receive information at a node given the times to receive information at its neighbours. We showed equivalences between these different views, as summarised in Table 1. In this framework, we provide examples such as a generalisation of classical equivalence between optimal paths and Djikstra’s algorithm [Reference Dijkstra14]. We applied our models to a social network dataset soc-advogato [Reference Rossi and Ahmed35], where directed edges are weighted by trust. Propagation of wavefronts from a group of nodes over such weighted networks define a notion of (dis)trust of this group on all other nodes defined by the travel times to other nodes. This notion of trust is robust to local Sybil attacks [Reference Douceur, Druschel, Kaashoek and Rowstron15]. More generally, our models could be used as a back-end to replace path length or distance calculations in other cybersecurity strategies [Reference Al-Qurishi, Al-Rakhami, Alamri, Alrubaian, Rahman and Hossain1], as qualitatively the $p\lt \infty$ approaches displayed better solution properties than $p=\infty$ . Extending the work of [Reference Toutain, Elmoataz and Lézoray40], we applied these models to label propagation in a semi-supervised learning application. The eikonal-based classification algorithm obtains comparable performance to clustering algorithms with two labels (e.g. [Reference Bertozzi and Flenner5]), and with simple choices of weight functions, it achieves comparable performance to machine-learning methods that learn graph embeddings (e.g., [Reference Yang, Cohen and Salakhudinov42]) without any tuning or training. While graph Laplacian methods are often used to model information propagation on networks (e.g., [Reference Elmoataz, Desquesnes and Toutain18, Reference Elmoataz, Toutain and Tenbrinck20, Reference Olfati-Saber, Fax and Murray33]), the eikonal approach can also be applied and encapsulates control problems (using $s$ or $w$ as controllers). Procedures based on front propagation offer adjoint equations at no additional cost, leading to very efficient methods for inverse problems in these settings [Reference Deckelnick, Elliott and Styles11, Reference Dunbar and Elliott16].
Financial support
ORAD would like to acknowledge the support of Schmidt Sciences, LLC, the National Science Foundation (Grant No. AGS-1835860), the Cisco Foundation and the Office of Naval Research (Grant No. N00014-23-1-2654). LMK acknowledges support from the Warwick Research Development Fund through the project ‘Using Partial Differential Equations Techniques to Analyse Data-Rich Phenomena’, the European Union Horizon 2020 research and innovation programmes under the Marie Skłodowska-Curie grant agreement No. 777826 (NoMADS) and the Cantab Capital Institute for the Mathematics of Information and Magdalene College, Cambridge (Nevile Research Fellowship).
Competing interests
There are no competing interests to report.