Overlapping Community Detection Using Bayesian Nonnegative Matrix Factorization

Overlapping Community Detection Using Bayesian Nonnegative Matrix Factorization

Overlapping Community Detection using Bayesian Nonnegative Matrix Factorization Ioannis Psorakis,∗ Stephen Roberts, and Mark Ebden Pattern Analysis and Machine Learning Research Group Department of Engineering Science, University of Oxford. Ben Sheldon Edward Grey Institute Department of Zoology, University of Oxford. Identifying overlapping communities in networks is a challenging task. In this work we present a novel approach to community detection that utilizes a Bayesian nonnegative matrix factorization (NMF) model to extract overlapping modules from a network. The scheme has the advantage of soft-partitioning solutions, assignment of node participation scores to modules and an intuitive foundation. We present the performance of the method against a variety of benchmark problems and compare and contrast it to several other algorithms for community detection. I. INTRODUCTION ‘fitness’ function (based on internal link density) by modi- fying nodes’ community ‘appropriateness’ scores through a Community structure, or modular organization, is a signifi- series of inclusion-exclusion moves. The work of Evans and cant property of real-world networks as it is often considered Lambiotte [12] detects communities of links — in contrast to account for the functional characteristics of the system un- to node communities, which occupy the vast body of the lit- der study [1–4]. Although the notion of ‘community’ appears erature [2, 3] — after losslessly transforming the adjacency intuitive [2, 3] (for example people form cliques in social net- matrix to a line graph. By assigning links, rather than nodes, works and web pages of similar content have links to one an- among communities, the method allows a node to participate other) there is no disciplined, context-independent definition naturally in more than one group, as determined by the la- of what communities are [2, 4]; we adopt here the loose defi- bels assigned to its adjacent links. The advantages of this ap- nition that these modules are subgraphs with more links con- proach have also been presented by Ahn et al. in [13]. Fi- necting the nodes inside than outside them [2, 3, 5]. The task nally, Nepusz et al. [14], propose that communities should of identifying such subgraphs in a given network can be chal- comprise ’similar’ nodes, assuming that a distance metric be- lenging [1, 2], both in terms of recognition and computational tween nodes is defined and that similarity is inversely related feasibility. to distance. When a partition matrix, representing a reason- One of the key issues in community detection is describ- able community partition, is multiplied by itself it would then ing the overlapping nature of network modules. Traditional be expected to approximate the similarity matrix; this leads to ‘hard-partitioning’ algorithms [6–9] may yield excellent iden- a nonlinear constrained optimization problem. The number of tification results, but omit the important characteristic of real- communities of the proposed incidence matrix is selected by world networks where a node may participate in more than performing multiple runs and selecting the one with the high- one group (for example, individuals belong to various so- est fitness score based on a Newman modularity-like function. cial circles and scientists may participate in more than one Further discussion on similar methods, along with a compre- research group). A popular approach to tackle this problem hensive review of community detection algorithms in general, is the Clique Percolation Method (CPM) by Palla et al. [10], is presented in a survey by Fortunato [2]. which is based on the belief that communities are unions of adjacent k-cliques (complete graphs with k nodes) and that inter-community regions of the network do not possess In this work we propose a novel approach to community de- such strong link density. Because communities are defined as tection based on computationally efficient Bayesian nonnega- the largest network component containing adjacent k-cliques tive matrix factorization (NMF) [15]. The advantages of this (cliques sharing k nodes), overlaps arise naturally between −1 methodology are: i) overlapping or soft-partitioning solutions, modules. Performance may be compromised for networks where communities are allowed to share members; ii) soft- with weak clique presence, because many nodes are left out, membership distributions, which quantify ‘how strongly’ each or for networks with very high link density, because we reach individual participates in each group; iii) excellent module the trivial solution of describing the network as a single com- identification capabilities; and iv) the method does not suffer munity. from the drawbacks of modularity optimization methods, such Other approaches include the algorithm of Lancichinetti as the resolution limit. In the following section we present the et al. [11], which seeks a local maximum of the community theoretical foundations of our approach along with an illustra- tive example to provide intuition behind the method. Follow- ing the model formulation section, we test our algorithm on a variety of artificial and real-world benchmark problems and ∗ [email protected] present our experimental results. 2 II. MODEL FORMULATION ors [18] with scale hyperparameters β = {βk} on the latent variables wik,hkj , as presented in [15]. By starting with a A. Generative Model large K (say N, which is the maximum possible number of communities), the effect of these priors is to moderate com- W We consider the generative graphical model of Fig. 1. The plexity by ‘shrinking’ close to zero irrelevant columns of and rows of H that do not contribute to explaining the ob- observed variable vij denotes the nonnegative count of inter- V actions between two individuals i,j in a weighted undirected served interactions . This is achieved by placing a distribu- V RN×N tion over the latent variables wik,hkj whose expectation ap- network with adjacency matrix ∈ + . In the commu- nity detection context, we assume that there are a number K of proaches zero unless non-zero values are required by the data. This approach avoids the computational load of multiple runs ‘hidden’ classes of nodes in the network that affect vij . Thus we can define allocations of nodes to communities as latent and is free of the resolution bias problems [19] of modularity. (unobserved) variables that allow us to explain the increased Based on the graphical model of Fig. 1, where the distribu- interaction density in certain regions of the network: the more tion of βk is parameterized by fixed hyper-hyperparameters a two individuals interact the more likely they are to belong to and b, we express the joint distribution over all variables as: the same communities, and vice versa. p(V, W, H, β)= p(V|W, H)p(W|β)p(H|β)p(β), (1) hence the posterior over model parameters given the observa- a hkj tions is: p(V|W, H)p(W|β)p(H|β)p(β) v p(W, H, β|V)= . (2) βk ij p(V) b wik N K B. Posterior-based cost function We aim to maximize the model posterior given the observa- FIG. 1. (Color online) Graphical model showing the generation tions, or equivalently, to minimize the negative log posterior, V W H of count processes from the latent structure and , the which may be regarded as an energy (or error) function U. components of which have scale hyperparameters βk. The hyper- Noting that p(V) is a constant w.r.t. the inference over the hyperparameters a, b are fixed. model’s free parameters, we hence define: We assume that the pair-wise interactions described in U = − log p(V|W, H)−log p(W|β)−log p(H|β)−log p(β), V are influenced by an unobserved expectation network Vˆ , (3) where each vˆij denotes the expected number of interactions where the first term is the log-likelihood of our data, derived (or expected link weight) that take place between i and j. The from the probability p(V|W, H)= p(V|Vˆ ) of observing ev- expectation network is composed of two nonnegative matrices ery interaction vij given a Poisson rate vˆij. Therefore we ex- W RN×K H RK×N Vˆ WH ∈ + and ∈ + so that = . We hence press the negative log-likelihood of a single observation vij model each interaction vij as drawn from a Poisson distribu- as: K tion with rate vˆij = k=1 wikhkj. The inner rank K de- notes the unknown number of communities and each element − log p(v|vˆ)= −v logv ˆ +v ˆ + log v!. (4) k ∈ {1,...,K} in rowPi of W and column j of H represents the contribution of a single latent community to vˆij. In other Using the Stirling approximation to second order, namely: words, the expected number of times vˆij that two individuals i,j interact is a result of their mutual participation in the same 1 communities. log v! ≈ v log v − v + log(2πv), (5) In the typical community-detection setting, the value of K, 2 which we call complexity or model order, is initially unknown. Eq. (4) can be written as: In previous work [16, 17], the issue of inferring the appropri- ate number of communities has been addressed by performing v 1 − log p(v|vˆ) ≈ v log +v ˆ − v + log(2πv), (6) multiple runs for various K and selecting one that yields the vˆ 2 highest Newman modularity Q [5]. In our setting, the ap- propriate model order arises naturally from a single run, by thus the full negative log-likelihood for all the observed data placing shrinkage or automatic relevance determination pri- is: 3 N N N N ˆ vij 1 − log p(V|V)= − log p(vij|vˆij ) ≃ vij log +v ˆij − vij + log(2πvij ) + κ, (7) vˆij 2 i=1 j=1 i=1 j=1 X X X X where κ is a constant.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us