Being Corrupt Requires Being Clever, But Detecting Corruption Doesn't

09/27/2018
by   Yan Jin, et al.
0

We consider a variation of the problem of corruption detection on networks posed by Alon, Mossel, and Pemantle '15. In this model, each vertex of a graph can be either truthful or corrupt. Each vertex reports about the types (truthful or corrupt) of all its neighbors to a central agency, where truthful nodes report the true types they see and corrupt nodes report adversarially. The central agency aggregates these reports and attempts to find a single truthful node. Inspired by real auditing networks, we pose our problem for arbitrary graphs and consider corruption through a computational lens. We identify a key combinatorial parameter of the graph m(G), which is the minimal number of corrupted agents needed to prevent the central agency from identifying a single corrupt node. We give an efficient (in fact, linear time) algorithm for the central agency to identify a truthful node that is successful whenever the number of corrupt nodes is less than m(G)/2. On the other hand, we prove that for any constant α > 1, it is NP-hard to find a subset of nodes S in G such that corrupting S prevents the central agency from finding one truthful node and |S| ≤α m(G), assuming the Small Set Expansion Hypothesis (Raghavendra and Steurer, STOC '10). We conclude that being corrupt requires being clever, while detecting corruption does not. Our main technical insight is a relation between the minimum number of corrupt nodes required to hide all truthful nodes and a certain notion of vertex separability for the underlying graph. Additionally, this insight lets us design an efficient algorithm for a corrupt party to decide which graphs require the fewest corrupted nodes, up to a multiplicative factor of O( n).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/16/2020

A Linear Time Algorithm for Computing the Eternal Vertex Cover Number of Cactus Graphs

The eternal vertex cover problem is a dynamic variant of the classical v...
research
07/10/2018

Efficient Reassembling of Three-Regular Planar Graphs

A reassembling of a simple graph G = (V,E) is an abstraction of a proble...
research
10/05/2020

Weak Unit Disk Contact Representations for Graphs without Embedding

Weak unit disk contact graphs are graphs that admit representing nodes a...
research
06/25/2018

Maximum Rooted Connected Expansion

Prefetching constitutes a valuable tool toward efficient Web surfing. As...
research
05/24/2018

Semi-Random Graphs with Planted Sparse Vertex Cuts: Algorithms for Exact and Approximate Recovery

The problem of computing the vertex expansion of a graph is an NP-hard p...
research
02/05/2022

Path eccentricity of graphs

Let G be a connected graph. The eccentricity of a path P, denoted by ecc...
research
10/13/2020

Multiple Node Immunisation for Preventing Epidemics on Networks by Exact Multiobjective Optimisation of Cost and Shield-Value

The general problem in this paper is vertex (node) subset selection with...

Please sign up or login with your details

Forgot password? Click here to reset