Recently, convex optimization methods have become increasingly popular for data analysis. For example, in compressed sensing , we observe the measurements and aim to recover an unknown sparse solution of a system of linear equations via minimization. In many other cases, we have the perfect knowledge of a signal which possibly looks complicated, however it has a simpler underlying structure and we aim to reveal this structure by decomposing it into meaningful pieces. For example, decomposing a signal into a sparse superposition of sines and spikes is one of the well-known problems of this type . Decomposing a matrix into low rank and sparse components is another key problem of this nature and it has recently been studied in various settings [4, 5, 6, 7]. In this problem, we observe the matrix , where is low rank and is sparse, and we aim to find and . The suggested convex optimization program is as follows:
is the nuclear norm i.e. sum of the singular values of a matrix andis the norm, i.e., the sum of the absolute values of the entries. Problem (1) can be considered as the natural convex relaxation of “low rank sparse” decomposition as norm and nuclear norm are the tightest convex relaxations of the sparsity and rank functions respectively. Consequently, this program promotes sparsity for and low rankness for . For the correct choice of , if and satisfies certain incoherence requirements, it is known that we’ll have where is output of problem (1).
This result is actually very useful as low rankness and sparsity are the underlying structures in many problems. In , Gaussian graphical models with latent variables were investigated and the problem of finding conditional dependencies of the observed variables was connected to problem (1). On the other hand, in the problem of finding cliques in a given unweighted graph, the key observation is the fact that, in the adjacency matrix, a clique corresponds to a submatrix of all ’s which is clearly rank . Based on these observations, in this paper, we aim to extend the results of Ames and Vavasis [2, 3] for detection of the planted cliques to detection of “densely connected clusters”. This problem comes up naturally, as most of the times, it might be unreasonable to expect full-cliques in a graph. For example, there might be missing edges naturally, or data might be corrupted or we might be observing only partial information. However, even if we miss some of the edges, it is very likely that most of the edges will be preserved and the cluster, we want to identify, will still be denser than the rest. We’ll view these dense clusters as imperfect cliques with some missing edges and, in our approach, full cliques will correspond to low rank piece, , whereas the missing edges inside and (extra) edges outside of the clusters will correspond to sparse piece, .
We analyze the problem under a general probabilistic setting, which we call “probabilistic cluster model”. In our model, an edge inside
’th cluster exists with probabilityand an edge which is not inside any of the clusters exists with probability independent of other edges in the graph, where are constant. Here, by “inside a cluster”, we mean an edge lying between two nodes which belong to the same cluster. Notice that, this model can be viewed as a slight modification of well-known Erdös-Rényi random graph model where we introduce a nonuniform distribution which makes the clusters identifiable. We additionally assume the clusters are disjoint.
We’ll analyze two convex programs for detection of the clusters using the knowledge of the graph. We name the first program “blind approach” and it is just a slight modification to problem (1), given in (10), and we show that if
as long as the clusters are sufficiently large, with high probability, problem (10) can detect the clusters. Our second program is called “intelligent approach” which is given in problem (15). In this case, we require an extra information but we can guarantee the detection for any . Problem (15) can be considered as a mixture of (1) and (12) of  because it focuses on the subgraph induced by the edges inside the clusters similar to (12) of  but additionally accounts for the missing edges. This approach also trivially extends to the case where we observe the partial graph, in which, each edge is observed with same probability independent of others. In this case, clusters can still be recovered but we need clusters to be slightly larger compared to the case we observe the full graph.
2 Basic Definitions and Notations
Let denote the set for all integers . We differentiate a subset of nodes in a graph by calling that subset a cluster. For the rest of the paper, we assume the graph is unweighted with nodes, and there are disjoint planted clusters with sizes nodes. By unweighted we mean edges do not carry weights. Assume nodes are labeled from to and let be the set of the nodes inside the cluster hence , and for any . We also let denote rest of the nodes i.e. and .
We call a subset of , a region. denotes the complement, which is given by .
Let be the region corresponding to the union of regions induced by the clusters, i.e., . Note that is simply a subset of . We also let for . basically divides into disjoint regions similar to a grid. Also is simply the region induced by ’th cluster for any .
. We say a random variableis if
For a given matrix , denotes the entry lying on ’th row and ’th column. is a matrix where entries are all ’s. Assume is a subset of . Then, can be viewed as a set of coordinates and if , we denote the matrix which is induced by entries of on by :
In particular, is a matrix, whose entries on are and rest of the entries are .
Now, we introduce some definitions to explain the model we’ll work on.
Definition 1 (Random Support).
A random set is called “random support” with parameter if each coordinate is an element of with probability , independent of other coordinates.
A random set is called “corrected random support” with parameter if it is statistically identical to where is a random support with parameter . Basically, we include the diagonal coordinates.
Let be the adjacency matrix of . For simplicity, we let for all . Also for
Note that, is symmetric, i.e., for all , as a result, it is uniquely determined by the entries on the lower triangular part.
Definition 2 (Probabilistic Cluster Model).
Recall that with and for all . Also for all and . Let be constants between and . Then, a random graph , generated according to probabilistic cluster model, has the following adjacency matrix. Entries of on the lower triangular part are independent random variables and for any :
Verbally, an edge inside ’th cluster exists with probability and an edge which is not inside any of the clusters exists with probability , independent of other edges, where . In order to distinguish clusters we’ll assume they are denser i.e. an edge inside the region is more likely to exist compared to an edge which is not. Consequently, we have:
for the rest of the paper. One can similarly treat the case where by considering the complement graph whose adjacency for all . In this case, will still satisfy probabilistic model with inside and outside cluster edge probability respectively where . Notice that, in the special case of cliques, we have for all .
In this model, can be characterized also by using random supports.
where are independent corrected random supports with parameters respectively.
Let be the set of nonzero coordinates of , i.e., . Basically, is the region induced by the edges inside the graph with the addition of diagonal coordinates. For example, the set corresponds to the missing edges inside the clusters. Clearly, is random, as is drawn from probabilistic cluster model.
We’ll call a matrix (or vector) positive (negative) if all its entries are positive (negative). Finally, we letdenote sum of the entries of i.e. for . If matrix is nonnegative then .
3 Proposed Convex Programs
Our aim is finding the clusters in a graph drawn from the probabilistic cluster model described in Definition 2. This can be achieved by finding . This is not hard to see, because, in the matrix , nonzero entries of each column will exactly correspond to one of the clusters, as clusters are disjoint. Then, we can simply scan through all columns to find the clusters.
3.1 Blind Approach
As our first approach, in order to find , we suggest the following, slightly modified version of problem (1)
Advantage of this approach is the fact that we don’t need any additional information about clusters such as number (or sizes) of the clusters. The desired solution is where corresponds to the full cliques, when missing edges inside are completed, and corresponds to the missing edges and the extra edges between the clusters. In particular we want:
It is easy to see that the pair is feasible, later we’ll argue that under correct assumptions is indeed unique optimal solution.
3.2 Intelligent Approach
The second convex problem to be analyzed is a mixture of problems (1) and (12) of . We’ll require an extra information which is the size of the region induced by clusters, i.e., . Suggested program focuses on subgraph induced by the edges inside the clusters and is given below:
Actually, knowledge of ,will help us guess the solution of problem (15) (under the right assumptions). should correspond to the full cliques similar to (15), however should only correspond to the missing edges inside the clusters. Formally, we want:
In the next section, we’ll state the main results of the paper regarding the problems 10 and 15. Proofs of the theorems in section 4 will be given in sections 6, 7 and 8. Finally, section 5 will conclude the paper.
4 Main Results
In this section, we’ll explain the conditions for which the candidates given in (13) and (19) are the unique optimal solutions of problems (10) and (15) respectively. This will also naturally answer the question of finding the densely connected clusters . Let be the size of the minimum cluster
and was given previously in (8). Our analysis yields the following following fundamental constraints.
for some constant (In particular will work).
for all .
Actually, both of these constraints are natural. In , is used as the weight for problem (1). It is not surprising that we are using a similar weight as our random graph model has strong similarities with the uniformly random support of the sparse component in . Secondly, we observe that implies which suggests that for recoverability, we need size of the ’th cluster to be at least and as gets smaller, this size should grow. This condition is consistent with the previous results of [2, 3] which says for recoverability of disjoint cliques, one needs a minimum clique size of .
The main results of this paper are summarized in the following theorems.
Theorem 1 (Main Result for Intelligent Approach).
Set . Let be a random graph generated according to the probabilistic cluster model (2) with cluster sizes and parameters . Assume and for all . Then, (independent of rest of the parameters) there exists constants such that as a result of convex program (15) we have
with probability at least (w.p.a.l.)
In Theorem 1, one can simplify the condition on by simply requiring however statement of the theorem will be weaker unless all ’s are equal. Following corollary gives an idea about the case where we observe the partial graph.
Corollary 1 (Result for Partially Observed Graphs).
Let be a random graph as described in Theorem 1 and we observe each edge of with probability independent of the other edges. Let be the adjacency matrix of the observed subgraph. Then, statement of Theorem 1 holds with variables instead of respectively where and for all . Hence for recovery (w.h.p.), we require for all .
Theorem 2 (Main Result for Blind Approach).
Let and be a random graph generated according to the probabilistic cluster model with cluster sizes . Set and assume for all . Then, there exists constants such that as the output of problem 10 we have
with probability at least
We should emphasize that slightly stronger results can be given for both theorems. For example, we can reduce the lower bound required for by a factor of four in both theorems at the expense of the error exponent . In fact, one can get even better lower bounds for by choosing as a function of however we preferred to make independent of .
The following theorem provides a converse result for blind method.
Remark: Note that if there is nothing to solve as all nodes are in the same cluster.
5 Future Extensions and Conclusion
5.1 Simulation Results
We considered two relatively small cases. For the first case, we have , , , and is variable. We plotted the empirical probability of success for both methods as a function of in Figure 1.
Secondly, in order to illustrate the difference between intelligent and blind approaches, we set , , , and varied . Due to Theorem 3, for blind approach to work, we always need . On the other hand, intelligent approach will work for any as long as is sufficiently large. Hence, when we increase we expect to see a better recovery region for intelligent approach compared to blind. We should remark that, in a probabilistic setting, case is trivial as we can find the cluster with high probability by looking at the nodes with high degree. Empirical curve is given in Figure 2.
Remark: In order to keep the model size small, we used in both of the simulations.
5.2 Future Extensions
5.2.1 Alternative approaches
Our simulation results indicate that a slight modification to problem (1) of  might be an alternative to the methods analyzed in this paper. Let be the vector of all ’s. Then assuming we know the number of clusters , proposed convex program is as follows
The desired solution of this problem is
It is easy to see that is feasible. Program (29) might be a more useful approach compared to (15) as it requires number of clusters as a prior information instead of . However, we only considered “low rank sparse” decompositions in this paper.
5.2.2 Removing the disjointness assumption
As a natural extension, we consider removing the assumption of disjoint clusters. When clusters are allowed to intersect, intuitively is no longer low rank. Although, we don’t provide a proof, we believe rank of is equal to the number of distinct nonempty sets of type where . This suggests rank of can be as high as which grows exponentially with number of clusters. This intuition is verified by simulation results. Consequently, convex programs (15) and (10) might not be good candidates when clusters are allowed to intersect as we aim to find as a solution in these approaches. As a result, an alternative approach which will naturally result in a low rank solution is of significant interest. Another related problem is, when clusters can intersect, how to obtain from the knowledge of assuming we are able to find as a result of the optimization. Certainly, we may not always be able to uniquely decompose into , but in general decomposition which yields smallest number of clusters might be of interest.
5.2.3 Extremely sparse graph
In many cases decays as the model size grows. For example, in order to have a connected graph with high probability, Erdös-Rényi model with edge probability requires only i.e. average node degree of . Sparse graphs are very common and useful in social networks  and web graphs  hence it would be of interest to extend results of this paper to the setting where are not constant. We believe this can be done by using concentration results specific to the spectral norm of sparse matrices.
5.3 Final Comments
In this paper, we analyzed two novel approaches for detection of disjoint clusters in a general probabilistic model. Our results are consistent with the existing works in literature and significantly extend results of , . Simulation results suggest that even for a relatively small model, our methods yield the desired result with high probability.
6 Proof of Theorem 1
Analysis of problems (15) and (10) are similar to a great extent. Therefore, many of the results for this section will also be used for section 7. In the following discussion, and is always assumed to be positive.
6.1 Perturbation Analysis for
Let denote the optimal solution of problem (15). We’ll follow a conventional proof strategy to show that under some conditions, for any feasible nonzero perturbation over given in (19), the objective function strictly increases i.e.
Consequently, due to convexity we’ll conclude .
For optimal solution of problem 15, we have .
From (17) we have
This follows from the fact that . Combining this with (16), we can conclude that
since for all .
Secondly, one can observe that if is feasible for problem (15), then is also feasible and gives a lower (or equal) cost. This is because:
The only constraint on entries of over is and will trivially satisfy this.
with equality if and only if . Therefore, the objective will not increase by substituting by .
Hence for optimality, we require:
A natural interpretation of 40 is that, the only role of is filling the missing edges inside the clusters. Actually, we can write a simpler and equivalent optimization, where we get rid of the variable ; but still get the same result as problem (15), as follows
Finally notice that satisfies (40) as expected.
6.1.2 Optimality Conditions for
Let denote the usual inner product i.e. . Also let such that
We would like to show any feasible nonzero perturbation over will strictly increase the objective. Due to Lemma 1, we can assume
as satisfies (40). In the following discussion, we analyze the increase in the objective due to the perturbation.
Increase due to : Similar to , by using the subgradient of the norm we can write:
for all , as is nonzero over . Here is the infinity norm, i.e., .
Increase due to : Let be the characteristic vector of with unit norm i.e. for , ’th entry of is
Let and . Also denotes the spectral norm, i.e., the maximum singular value. Then, following lemma characterizes the increase in the objective due to .
For any and with , we have
6.1.3 Main Cases
The following lemma will help us separate the problem into two main cases.
Given , assume there exists with such that . Then at least one of the followings holds:
There exists with and
For all , .
Let . Assume for some . Since is linear in , WLOG, let , . Then choose . Clearly, , and
Notice that, for all , is equivalent to which is the orthogonal complement of in . has the following simple characterization:
Secondly, in section 6.3, we’ll argue that, under certain conditions, there exists a with such that w.h.p. for all feasible . This is called the dual certificate. Finally, combining these two arguments, we’ll conclude that is the unique optimal w.h.p.
6.2 Solving for case
In order to simplify the following discussion, we let
so that in (55). Also let where . Thus, is basically obtained by, normalizing columns of to make its nonzero entries . Assume . Then, we can write
Let denote ’th columns of respectively. Notice that hence from (18)
Similarly, from and (16) it follows that
Now, we list some simple observations regarding structure of . We can write
Notice that is contributed by only two components which are: and .
Let be an (arbitrary) indexing of elements of i.e. . For a vector let denote the vector induced by entries of in . Basically, for any , . Also, let which is induced by entries on . In other words,
Basically, is same as when we get rid of trivial zero rows and zero columns. Then
Clearly, given , is uniquely determined. Now, assume we fix for all and we would like to find the worst subject to these constraints. Variables in such an optimization are . Basically we are interested in
where are constants. Constraint (66) follows from (59). Essentially, based on (58), we would like to show that with high probability for any nonzero with we have . Remark: For the special case of , notice that .
Let be a set of coordinates defined as follows. For any