Next Article in Journal
Deep Individual Active Learning: Safeguarding against Out-of-Distribution Challenges in Neural Networks
Previous Article in Journal
Tighter Constraints of Multi-Qubit Entanglement in Terms of Nonconvex Entanglement Measures LCREN and LCRENoA
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Directed Network Comparison Using Motifs

1
Research Center for Complexity Sciences, Hangzhou Normal University, Hangzhou 311121, China
2
College of Media and International Culture, Zhejiang University, Hangzhou 310027, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(2), 128; https://doi.org/10.3390/e26020128
Submission received: 11 January 2024 / Revised: 28 January 2024 / Accepted: 28 January 2024 / Published: 31 January 2024

Abstract

:
Analyzing and characterizing the differences between networks is a fundamental and challenging problem in network science. Most previous network comparison methods that rely on topological properties have been restricted to measuring differences between two undirected networks. However, many networks, such as biological networks, social networks, and transportation networks, exhibit inherent directionality and higher-order attributes that should not be ignored when comparing networks. Therefore, we propose a motif-based directed network comparison method that captures local, global, and higher-order differences between two directed networks. Specifically, we first construct a motif distribution vector for each node, which captures the information of a node’s involvement in different directed motifs. Then, the dissimilarity between two directed networks is defined on the basis of a matrix, which is composed of the motif distribution vector of every node and the Jensen–Shannon divergence. The performance of our method is evaluated via the comparison of six real directed networks with their null models, as well as their perturbed networks based on edge perturbation. Our method is superior to the state-of-the-art baselines and is robust with different parameter settings.

1. Introduction

Many systems in various domains featuring intricate interaction relationships can be effectively represented in the form of complex networks [1], including social platforms [2,3], biological systems [4], and economic systems [5]. Due to the diversity of network forms [6,7] and the high-order features of networks [8,9], the precise measurement of similarity between different networks, namely, the design of an effective network comparison method, has emerged as a central focus in the field of network science. Network comparison aims to quantify the differences between two networks based on the network topological structure, allowing the effective handling of different types of tasks [10,11]. For example, in the field of pattern recognition, network comparison can be applied to classify contents such as images, documents, and videos [12]. In the biological domain, network comparison can be used to analyze which protein interactions may have equivalent functions [13]. In neuroscience, the comparison of brain networks contributes to understanding the functional differences between normal and pathological brains [14].
The original term used to compare networks was the graph isomorphism problem [15], which has been proven to fall within the NP complexity class [16]. In recent years, researchers have proposed various methodologies from different perspectives and technologies to measure the similarity between networks [17,18,19,20,21,22]. The majority of these methods have primarily concentrated on the comparison of undirected networks. However, interactions among distinct entities in the real world commonly exhibit asymmetry. In social networks, an instance of user i trusting user j does not necessarily imply reciprocal trust from j to i. The directionality of the interactions between nodes in a network, which can not be captured by an undirected network, has boosted the research of directed network comparison. For example, Bagrow and Bollt [23] utilized portrait divergence, a metric based on the distribution of the shortest path lengths, to evaluate the structural similarities between networks. Koutra et al. [24] proposed DeltaCon by calculating the Matusita distance of similarity matrices between two networks. Sarajlic et al. [25] extended network distance measures to directed networks using directed graphlets and demonstrated their efficacy in distinguishing various directed networks. Centrality-based methods, such as the degree [26], closeness [27], and the clustering coefficient [28], compare networks based on the centrality values of each node. Although these methods are capable of comparing networks effectively to some extent, most of them do not consider the higher-order structure, i.e., interactions among more than two nodes, of a network, which has been shown to be ubiquitous in various complex systems [9]. The interactions among multiple nodes have been modeled by simplexes, hypergraphs, and subgraphs such as motifs in work from different domains [29,30,31]. To capture the higher-order interactions between nodes in directed networks, we propose using direct motifs to quantify the dissimilarity between two networks. Motifs refer to recurring subgraphs in a network, where these subgraphs exhibit specific interaction patterns that facilitate the understanding of the functionality of networks [32]. Motifs have been widely used in different network tasks, i.e., community detection [33], link prediction [34], and node-ranking problems [35]. In contrast to traditional conventional methods, motif-based approaches consistently exhibit superior performance in tackling these problems.
To explore the similarity between different directed network structures, in this paper, we propose a motif-based directed network comparison method, D m , i.e., using motifs to examine smaller components of directed networks to assess the similarity between networks. We start by constructing a node motif distribution matrix, where the elements in the matrix are obtained by computing the distribution of nodes appearing in different directed motifs. Due to computational complexity, we consider the motifs composed of 2 to 4 nodes and thus obtain 35 different directed motifs. Later on, we use the Jensen–Shannon divergence to quantify the dissimilarity between two directed networks both locally and globally. We validate the effectiveness of D m in six real directed networks. Compared to the baseline methods, D m exhibits notable distinguishability and robustness in comparing networks.
The rest of this paper is organized as follows. Section 2 introduces the definition of motifs in a directed network and details the motif-based directed network comparison method. We provide a clear description of the baseline methods and directed network datasets in Section 3. All experimental results are presented in Section 4. Section 5 summarizes the full paper.

2. Method

2.1. The Definition of Motifs in a Directed Network

A directed unweighted network is represented by G = ( V , E ) , where V = v 1 , v 2 , , v N and E = e k = v i , v j | k = 1 , , M | v i , v j V are the sets of nodes and edges, respectively. The numbers of nodes and edges are given by N and M. The adjacent relationship between two nodes in G is given by the adjacency matrix A, with A i j = 1 indicating that there is a directed edge between v i and v j and A i j = 0 implying that there are no edges between them. We note that the directionality of G determines that A is an asymmetric matrix.
Motifs are the most common graphical patterns in complex networks, consisting of a group of closely connected nodes and edges. Due to the high complexity of computing motifs in a network, we normally consider motifs formed by 2 to 4 nodes. Motifs play a crucial role in the study of complex networks, acting as fundamental building blocks for large complex networks, analogous to genes in biology. In a directed network, the motifs are formed by nodes with directed edges. We show examples of directed motifs in Figure 1. There are 35 directed motifs, each comprising 2 to 4 nodes, individually represented by m 1 to m 35 , respectively. For instance, there are two kinds of motifs if we consider two nodes, which are given by m 1 and m 2 in the figure.

2.2. The Motif-Based Directed Network Comparison Method

Motifs contain important topological information of a network and thus are essential for network comparison. Based on the distinctive topological properties of directed motifs, we first compute the motif distribution in a directed network. As the time complexity of computing motifs is quite high, we will use the motifs listed in Figure 1 that are formed by 2 , 3 , and 4 nodes for the computation of motif distribution. Specifically, we use T i = t i ( j ) | 1 j 35 to represent the motif distribution of node v i , where t i ( j ) represents the fraction of motif j that contains v i . Consequently, an N × 35 matrix T = T 1 , T 2 , , T N can be constructed based on the motif distribution of every node. We further define the directed network node dispersion ( D N N D ) to measure the connectivity heterogeneity between nodes [22]. A larger D N N D indicates greater heterogeneity in the connectivity of nodes within the network, while a smaller D N N D suggests a more uniform distribution of node connections. And D N N D is given by the following formula:
D N N D ( G ) = ζ ( T 1 , T 2 , , T N ) ln ( N + 1 ) ,
where ζ ( T 1 , T 2 , , T N ) is the Jensen–Shannon divergence of the N motif distributions and is given by
ζ ( T 1 , T 2 , , T N ) = 1 N i , j t i ( j ) ln ( t i ( j ) μ j ) ,
where μ j represents the average value of N motif distributions, and the specific calculation is as follows:
μ j = i = 1 N t i ( j ) N
Given two directed networks G 1 V 1 , E 1 and G 2 V 2 , E 2 , the structural dissimilarity between them can be calculated based on their motif distribution matrices T 1 and T 2 . We use D m ( G 1 , G 2 ) to represent the dissimilarity between G 1 and G 2 , and thus,
D m ( G 1 , G 2 ) = φ ζ ( μ G 1 , μ G 2 ) ln 2 + ( 1 φ ) D N N D ( G 1 ) D N N D ( G 2 ) ,
where
ζ ( μ G 1 , μ G 2 ) = 1 2 j = 1 35 μ j G 1 ln ( μ j G 1 μ j G 1 + μ j G 2 ) + 1 2 j = 1 35 μ j G 2 ln ( μ j G 2 μ j G 1 + μ j G 2 )
The dissimilarity D m comprises two terms, and we use the parameter φ ( 0 φ 1 ) to adjust their weights. The first term illustrates the difference between the average motif distributions, that is, μ G 1 = ( μ 1 G 1 , μ 2 G 1 , , μ N 1 G 1 ) and μ G 2 = ( μ 1 G 2 , μ 2 G 2 , , μ N 2 G 2 ) , and predominantly signifies the global distinctions between the two networks. The second term mainly describes the difference between the DNNDs of the two networks, indicating the local difference between them. A lower value of D m indicates a higher network similarity and vice versa.

3. Baselines and Datasets

3.1. Baselines

Portrait-based directed network comparison method [23]: For a directed network G, we construct a portrait matrix B based on the distance between nodes. Each element B l , k represents the number of nodes that have k nodes at distance l, where 0 l d , 0 k N 1 , and d represents the diameter of G. We note that we utilize the shortest directed path length to calculate the distance between nodes. In addition, B is independent of the ordering and labeling of the nodes. Based on B l , k , we can derive the probability that a randomly selected node has k nodes at a distance of l and is given by
Q l , k = 1 N B l , k
For two directed networks, G 1 and G 2 , the probability distributions Q 1 and Q 2 are employed to interpret the rows of the network portraits for each of them. The similarity between G 1 and G 2 is represented by D p G 1 , G 2 and is defined as follows:
D p G 1 , G 2 = 1 2 K L Q 1 M + 1 2 K L Q 2 M ,
where M = 1 2 Q 1 + Q 2 , and K L represents the Kullback–Liebler divergence between two distributions.
DeltaCon-based directed network comparison method [24]: DeltaCon considers the similarity between two networks by quantifying the difference between r-step paths other than the edges. Given a directed and unweighted network G and its adjacency matrix A, the r-step paths are encoded in the similarity matrix S = I + ε 2 D ε A 1 , where D and I are diagonal matrices with diagonal elements equal to the node degree and 1, respectively, and ε = 1 / ( 1 + max ( D i i ) ) ( i = 1 , , N ) . We assume that the similarity matrices for two directed and unweighted networks G 1 and G 2 are denoted by S and S , and the dissimilarity D d between them is given by the following equation:
D d G 1 , G 2 = i , j = 1 N S i j S i j 2 1 2
Closeness-based directed network comparison method: Centrality measures, such as degree, betweenness, and closeness, were used to compare networks [27]. However, in this part of the experiments, we found that closeness centrality surpasses other centrality methods in network comparison. Therefore, we omit the other centrality measures and only use closeness for directed network comparison. Closeness centrality measures the importance of a node within a network by evaluating the proximity of its connections to other nodes. The closeness centrality of a node is defined by
c i = 1 i j d i j ,
where d i j represents the directed shortest path length from node v i to node v j . For two directed networks G 1 and G 2 , we assume that the closeness centrality vectors for them are given by c = c 1 , c 2 , , c N T and c = c 1 , c 2 , , c N T . Therefore, the dissimilarity between G 1 and G 2 based on closeness centrality is given as follows:
D c G 1 , G 2 = i = 1 N c i c i

3.2. Description of Directed Network Datasets

To evaluate the performance of our proposed methods and the state-of-the-art baselines, we selected six real-world directed networks from diverse domains, including biological networks, transportation networks, and social networks. The descriptions of each of the datasets are as follows:
Mac [36] describes the interactions between adult female Japanese macaques and is about the dominance behavior between them. Each node denotes a macaque, and a directed edge from node v i to v j indicates the dominance of v i over v j .
Caenorhabditis elegans (Elegans) [37] is a neural network of Caenorhabditis elegans. It uses directed edges to represent neural connections among neurons in the nervous system of Caenorhabditis elegans.
Physicians [38] is a directed network that describes the spread of innovation among physicians. A directed edge ( v i , v j ) between two physicians v i and v j implies that v i would turn to v j if he or she needs suggestions or is interested in a discussion.
Email-Eu-core (Email) [39] is an email network that captures email interactions between institution members in a large European research institution. A directed edge between two staff members v i and v j means that staff member v i has sent an email to staff member v j .
US airport [40] illustrates the flight connections between US airports. A directed edge ( v i , v j ) between two airports v i and v j illustrates that there is at least a flight from airport v i to v j .
Chess [40] is a network that characterizes the interaction between players in an international chess game within a month. A directed edge is formed from a white player to a black player in this network.
Table 1 shows the basic properties of the directed networks mentioned above, including the number of nodes N , the number of edges M , the average degree A d , the average shortest path length A v l , and the network diameter d .

4. Experimental Results

4.1. The Dissimilarity between a Real Network and Its Null Models

The null model is widely used as a tool for the comparison of network topology [41] and retains specific network properties, such as the degree distribution or clustering coefficient, via the random reshuffling of network connections. In this section, we propose three null models for directed networks to gradually change the network topology and use our comparison method to compare each directed network and its null models.
We extend the d k -series null models that were originally proposed for undirected networks to directed networks [42], which retain the degree distributions, correlations, and clustering of a real directed network to some extent. Concretely, the models are illustrated as follows: D k 1.0 preserves the out-degree and in-degree of a node by randomly rewiring each directed edge. Therefore, the degree sequence of the original network is preserved in the reshuffling process. D k 2.0 reshuffles every edge in the network while maintaining the out-degree, in-degree, and joint degree distribution of the original network. D k 2.5 rewires every edge by preserving the distribution of the degree-dependent clustering coefficient. We note that the newly formed directed edges should never have existed in the original network.
We show examples of how to generate the null models in Figure 2a–c, in which the blue dashed lines indicate the newly connected edges. The left panel shows the original network, and the right panel shows the network after the rewiring process in each of the figures. Figure 2a shows an instance for D k 1.0 . Specifically, we disconnect the edges v 1 , v 2 and v 3 , v 4 and form new edges, i.e., ( v 1 , v 4 ) and ( v 3 , v 2 ) . Therefore, the in-degree and out-degree of each node are preserved in this process. Figure 2b demonstrates the generation of a random network through D k 2.0 , which is more strict than D k 1.0 . For example, if we disconnect the directed edge between v 1 and v 2 , that is, ( v 1 , v 2 ) , we need to find a node that has the same in-degree and out-degree as v 2 , and the appropriate node is v 4 . Accordingly, we connect v 1 and v 4 and form a new directed edge ( v 1 , v 4 ) . Therefore, D k 2.0 maintains the degree sequence and the joint degree distribution of a network. In Figure 2c, the degree (sum of in-degree and out-degree) and clustering coefficient for each node are { 2 , 3 , 3 , 3 , 3 , 1 , 1 , 1 , 1 } and { 1 / 2 , 1 / 6 , 0 , 0 , 1 / 6 , 0 , 0 , 0 , 0 } , respectively. Therefore, the average clustering coefficients for nodes that have degrees of { 1 , 2 , 3 } are { 0 , 1 / 2 , 1 / 12 } , respectively, which are also called degree-dependent clustering coefficients. We disconnect the directed edges ( v 1 , v 2 ) and ( v 4 , v 3 ) and form new directed edges as ( v 1 , v 3 ) and ( v 4 , v 2 ) . In the rewired network, the degree-dependent clustering coefficient distribution is the same as that in the original network.
A lower value of k implies a greater disruption of the original network structure. In Figure 3, we use the four directed network comparison methods mentioned above to quantify the dissimilarity between each of the directed networks and its three null models. Figure 3a–d represent the comparison results via D m , D p , D d , and D c , respectively. The experimental results for six networks suggest that as k increases, the similarity between the original network and its null models gradually increases for our proposed method. The dissimilarity observed in our approach aligns with the generation of null models, providing further confirmation of the effectiveness and stability of our model in comparing directed networks from different domains. For the baseline models, D d shows a similar trend to our method. However, D p and D c show bad performance in networks such as Email and Physicians, respectively.

4.2. The Comparison of the Directed Network and Its Perturbed Network

In this section, we report perturbation experiments performed on the edges of six real directed networks to further assess the stability and applicability of the motif-based comparison method. Specifically, for each given network, we randomly add or remove edges with a certain proportion, f, where the range of f is 0.9 , 0.9 . The positive value of f indicates that we randomly add an | f | fraction of directed edges to the network, and the negative value of f means that we randomly remove an | f | fraction of directed edges. We compare the original network with the perturbed network by adding or removing edges using different network comparison methods, as shown in Figure 4. The four comparison methods ( D m , D p , D d , and D c ) show similar trends; that is, the increase in | f | will make the perturbed network have a greater difference from the original network, which is consistent with intuition. This conclusion is especially significant when f is negative, where our method, as well as the baselines, can significantly distinguish between the original network and the ones after perturbation. However, the motif-based comparison method is much better than the rest of the baselines for positive values of f. The curves of the other three baselines for f > 0 are flatter than those of our method. Taking the Mac network as an example (Figure 4a), the values of D p range from 0.07 to 0.13 for f [ 0 , 1 ] , and the values of D p are the same for f = 0.1 and f = 0.2 , which is unreasonable. D d and D c also show insignificant dissimilarities between networks in Figure 4a–f. The baseline methods, such as D p and D c , are based on the distance between nodes, and D d considers the r-step paths of a network for network comparison. However, they do not consider the higher-order organization of a network, i.e., at the level of subgraphs, and thus may result in poor performance in network comparison. For example, the distance between nodes is obtained through pairwise interactions (i.e., edges) between nodes. In addition, the r-step paths are also constructed using edges.

4.3. Parameter Sensitivity Analysis

The motif-based directed network comparison method involves a parameter, denoted by φ , that determines how much importance is given to the global or local differences between two networks, with a larger value of φ indicting that we consider more of global difference and vice versa. Therefore, we performed a parameter analysis for φ in the six real-world directed networks via the comparison of the original network and its perturbed networks. The results are given in Figure 5, in which we use curves with different colors to indicate different chosen values of φ ( φ { 0.1 , 0.3 , 0.5 , 0.7 , 0.9 } ) . The figure displays curves that exhibit a similar trend for different values of φ , and there is small deviation among the curves when f < 0 . However, the network dissimilarity for different f is more significant for φ = 0.5 in most networks (except Physicians and Email), which means that we need to consider the global or local differences between networks for comparison. Therefore, we used φ = 0.5 in the above analysis.

5. Conclusions

In this paper, we introduce a comparison method D m that utilizes network motifs to assess similarities between directed networks. The method, which considers both local and global differences between two directed networks as well as higher-order information, is based on node motif distributions and employs the Jensen–Shannon divergence. In detail, we use motifs with sizes up to 4 that are listed in Figure 1 to compute the motif distribution of nodes in a directed network. Based on the Jensen–Shannon divergence and motif distributions of nodes, we define the dispersion of directed network nodes ( D N N D ) to quantify the heterogeneity of connectivity between nodes. Lastly, for two given directed networks, the similarity between them is further defined by the combination of the D N N D metrics and the average motif distributions. Our method aims to better understand the internal connection patterns of the network nodes by capturing essential subgraph structures. To show the effectiveness of our method, we compare a directed network with its null models, which gradually change the structure of the original network. In addition, we further compare our method with the baselines to characterize the similarity between an original network and its perturbed networks. The results show that our method outperforms these baseline methods across networks from different domains.
Motifs have been widely used to address a range of tasks. In our analysis, we take into account the directionality of edges by utilizing directed motifs to compare directed networks. We limit our analysis to motifs with sizes up to 4 due to the high computational expenses involved. It is worthwhile to investigate the impact on network comparison performance when analyzing motifs with varying numbers of nodes. Although considering larger motifs could potentially enhance the effectiveness of our approach, it may pose scalability challenges when dealing with large networks containing millions of nodes. Given the success of motifs in network comparison, we believe that developing efficient algorithms for computing motifs could be a promising avenue for research. This has the potential not only to enhance network comparison but also to improve other network tasks, such as community detection, node classification, influence maximization, and more.

Author Contributions

Conceptualization, C.X., H.C., C.L. and X.-X.Z.; Methodology, C.X. and X.-X.Z.; Validation, Q.K.; Formal analysis, H.C.; Investigation, C.X. and C.L.; Data curation, Q.K.; Writing—original draft, C.X.; Writing—review & editing, X.-X.Z.; Visualization, Q.K. and H.C.; Supervision, X.-X.Z.; Funding acquisition, C.L. and X.-X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Zhejiang Province (Grant No. LQ22F030008), the Natural Science Foundation of China (Grant No. 61873080), and the Scientific Research Foundation for Scholars of HZNU (2021QDL030).

Data Availability Statement

Data will be available on request.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Barabási, A.L. Network Science. Philos. Trans. Royal Soc. A 2013, 371, 20120375. [Google Scholar] [CrossRef]
  2. Knoke, D.; Yang, S. Social Network Analysis; SAGE Publications: New York, NY, USA, 2019. [Google Scholar]
  3. Zhan, X.X.; Li, Z.; Masuda, N.; Holme, P.; Wang, H. Susceptible-infected-spreading-based network embedding in static and temporal networks. EPJ Data Sci. 2020, 9, 30. [Google Scholar] [CrossRef]
  4. Liu, C.; Ma, Y.; Zhao, J.; Nussinov, R.; Zhang, Y.C.; Cheng, F.; Zhang, Z.K. Computational Network Biology: Data, Models, and Applications. Phys. Rep. 2020, 846, 1–66. [Google Scholar] [CrossRef]
  5. Schweitzer, F.; Fagiolo, G.; Sornette, D.; Vega-Redondo, F.; Vespignani, A.; White, D.R. Economic Networks: The New Challenges. Science 2009, 325, 422–425. [Google Scholar] [CrossRef]
  6. Bretto, A. Hypergraph Theory. An Introduction; Mathematical Engineering; Springer: Cham, Switzerland, 2013. [Google Scholar]
  7. Kivelä, M.; Arenas, A.; Barthelemy, M.; Gleeson, J.P.; Moreno, Y.; Porter, M.A. Multilayer networks. J. Complex Netw. 2014, 2, 203–271. [Google Scholar] [CrossRef]
  8. Benson, A.R.; Gleich, D.F.; Leskovec, J. Higher-order organization of complex networks. Science 2016, 353, 163–166. [Google Scholar] [CrossRef]
  9. Xie, X.; Zhan, X.; Zhang, Z.; Liu, C. Vital node identification in hypergraphs via gravity model. Chaos 2023, 33, 013104. [Google Scholar] [CrossRef] [PubMed]
  10. Tantardini, M.; Ieva, F.; Tajoli, L.; Piccardi, C. Comparing methods for comparing networks. Sci. Rep. 2019, 9, 17557. [Google Scholar] [CrossRef]
  11. Soundarajan, S.; Eliassi-Rad, T.; Gallagher, B. A guide to selecting a network similarity method. In Proceedings of the 2014 SIAM International Conference on Data Mining, Philladelphia, PA, USA, 24–26 April 2014; pp. 1037–1045. [Google Scholar]
  12. Conte, D.; Foggia, P.; Sansone, C.; Vento, M. Thirty years of graph matching in pattern recognition. Intern. J. Pattern Recognit. Artif. Intell. 2004, 18, 265–298. [Google Scholar] [CrossRef]
  13. Sharan, R.; Ideker, T. Modeling cellular machinery through biological network comparison. Nat. Biotechnol. 2006, 24, 427–433. [Google Scholar] [CrossRef] [PubMed]
  14. Mheich, A.; Wendling, F.; Hassan, M. Brain network similarity: Methods and applications. Netw. Neurosci. 2020, 4, 507–527. [Google Scholar] [CrossRef]
  15. Zemlyachenko, V.N.; Korneenko, N.M.; Tyshkevich, R.I. Graph isomorphism problem. J. Sov. Math. 1985, 29, 1426–1481. [Google Scholar] [CrossRef]
  16. Cook, S.A. The complexity of theorem-proving procedures. In Logic, Automata, and Computational Complexity: The Works of Stephen A. Cook; ACM: New York, NY, USA, 2023; pp. 143–152. [Google Scholar]
  17. Latora, V.; Marchiori, M. A measure of centrality based on network efficiency. New J. Phys. 2007, 9, 188. [Google Scholar] [CrossRef]
  18. Xiao, Y.H.; Wu, W.T.; Wang, H.; Xiong, M.; Wang, W. Symmetry-based structure entropy of complex networks. Phys. A Stat. Mech. Appl. 2008, 387, 2611–2619. [Google Scholar] [CrossRef]
  19. Babai, L. Graph isomorphism in quasipolynomial time. In Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing, Boston, MA, USA, 19–21 June 2016; pp. 684–697. [Google Scholar]
  20. Lv, L.; Zhang, K.; Zhang, T.; Li, X.; Zhang, J.; Xue, W. Eigenvector centrality measure based on node similarity for multilayer and temporal networks. IEEE Access 2019, 7, 115725–115733. [Google Scholar] [CrossRef]
  21. Wang, B.; Sun, Z.; Han, Y. A Path-Based Distribution Measure for Network Comparison. Entropy 2020, 22, 1287. [Google Scholar] [CrossRef] [PubMed]
  22. Schieber, T.A.; Carpi, L.; Díaz-Guilera, A.; Pardalos, P.M.; Masoller, C.; Ravetti, M.G. Quantification of network structural dissimilarities. Nat. Commun. 2017, 8, 13928. [Google Scholar] [CrossRef] [PubMed]
  23. Bagrow, J.P.; Bollt, E.M. An information-theoretic, all-scales approach to comparing networks. Appl. Netw. Sci. 2019, 4, 45. [Google Scholar] [CrossRef]
  24. Koutra, D.; Vogelstein, J.T.; Faloutsos, C. Deltacon: A principled massive-graph similarity function. In Proceedings of the 2013 SIAM International Conference on Data Mining, Alexandria, VA, USA, 2–4 May 2013; pp. 162–170. [Google Scholar]
  25. Sarajlić, A.; Malod-Dognin, N.; Yaveroğlu, Ö.N.; Pržulj, N. Graphlet-based characterization of directed networks. Sci. Rep. 2016, 6, 35098. [Google Scholar] [CrossRef] [PubMed]
  26. Pržulj, N. Biological network comparison using graphlet degree distribution. Bioinformatics 2007, 23, e177–e183. [Google Scholar] [CrossRef]
  27. Cohen, E.; Delling, D.; Fuchs, F.; Goldberg, A.V.; Goldszmidt, M.; Werneck, R.F. Scalable similarity estimation in social networks: Closeness, node labels, and random edge lengths. In Proceedings of the First ACM Conference on Online Social Networks, Boston, MA, USA, 7–8 October 2013; pp. 131–142. [Google Scholar]
  28. Yaveroğlu, Ö.N.; Milenković, T.; Pržulj, N. Proper evaluation of alignment-free network comparison methods. Bioinformatics 2015, 31, 2697–2704. [Google Scholar] [CrossRef]
  29. Liu, K.; Lü, X.; Gao, F.; Zhang, J. Expectation-maximizing network reconstruction and most applicable network types based on binary time series data. Phys. D Nonlinear Phenom. 2023, 454, 133834. [Google Scholar] [CrossRef]
  30. Lotito, Q.F.; Musciotto, F.; Montresor, A.; Battiston, F. Higher-order motif analysis in hypergraphs. Commun. Phys. 2022, 5, 79. [Google Scholar] [CrossRef]
  31. Wang, T.; Peng, J.; Peng, Q.; Wang, Y.; Chen, J. FSM: Fast and scalable network motif discovery for exploring higher-order network organizations. Methods 2020, 173, 83–93. [Google Scholar] [CrossRef]
  32. Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.; Alon, U. Network motifs: Simple building blocks of complex networks. Science 2002, 298, 824–827. [Google Scholar] [CrossRef]
  33. Li, P.Z.; Huang, L.; Wang, C.D.; Huang, D.; Lai, J.H. Community detection using attribute homogenous motif. IEEE Access 2018, 6, 47707–47716. [Google Scholar] [CrossRef]
  34. Qiu, Z.; Wu, J.; Hu, W.; Du, B.; Yuan, G.; Yu, P. Temporal link prediction with motifs for social networks. IEEE Trans. Knowl. Data Eng. 2023, 35, 3145–3158. [Google Scholar] [CrossRef]
  35. Zhao, X.; Yu, H.; Huang, R.; Liu, S.; Hu, N.; Cao, X. A novel higher-order neural network framework based on motifs attention for identifying critical nodes. Phys. A Stat. Mech. Appl. 2023, 629, 129194. [Google Scholar] [CrossRef]
  36. Takahata, Y. Diachronic changes in the dominance relations of adult female Japanese monkeys of the Arashiyama B group. In The Monkeys of Arashiyama; State University of New York Press: Albany, NY, USA, 1991; pp. 123–139. [Google Scholar]
  37. White, J.G.; Southgate, E.; Thomson, J.N.; Brenner, S. The structure of the nervous system of the nematode Caenorhabditis elegans. Philos. Trans. R. Soc. Lond. B, Biol. Sci. 1986, 314, 1–340. [Google Scholar] [PubMed]
  38. Coleman, J.; Katz, E.; Menzel, H. The diffusion of an innovation among physicians. Sociometry 1957, 20, 253–270. [Google Scholar] [CrossRef]
  39. Leskovec, J.; Kleinberg, J.; Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 2007, 1, 2-es. [Google Scholar] [CrossRef]
  40. Kunegis, J. Konect: The koblenz network collection. In Proceedings of the 22nd International Conference on World Wide Web, Rio de Janeiro, Brasil, 13–17 May 2013; pp. 1343–1350. [Google Scholar]
  41. Wang, Z.; Zhan, X.X.; Liu, C.; Zhang, Z.K. Quantification of network structural dissimilarities based on network embedding. iScience 2022, 25, 104446. [Google Scholar] [CrossRef] [PubMed]
  42. Orsini, C.; Dankulov, M.M.; Colomer-de Simón, P.; Jamakovic, A.; Mahadevan, P.; Vahdat, A.; Bassler, K.E.; Toroczkai, Z.; Boguná, M.; Caldarelli, G.; et al. Quantifying randomness in real networks. Nat. Commun. 2015, 6, 8627. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Motifs formed by 2 to 4 nodes in directed networks. All the motifs are labeled from m 1 to m 35 .
Figure 1. Motifs formed by 2 to 4 nodes in directed networks. All the motifs are labeled from m 1 to m 35 .
Entropy 26 00128 g001
Figure 2. Toy examples of three d k -series null models: (a) D k 1.0 ; (b) D k 2.0 ; (c) D k 2.5 . The blue dashed lines indicate the newly connected edges. In (ac), the left panel shows the original network, and the right panel shows the rewired network.
Figure 2. Toy examples of three d k -series null models: (a) D k 1.0 ; (b) D k 2.0 ; (c) D k 2.5 . The blue dashed lines indicate the newly connected edges. In (ac), the left panel shows the original network, and the right panel shows the rewired network.
Entropy 26 00128 g002
Figure 3. Comparison between real directed networks and their null models via motif-based directed network comparison method and baseline methods. The null models are D k 1.0 , D k 2.0 , and D k 2.5 . With the increase in k, more topological properties of the original network will be preserved. We show results for different methods: (a) D m ; (b) D p ; (c) D d ; (d) D c . Smaller values in the heatmap indicate a higher similarity, and vice versa. The results are the average of 100 realizations.
Figure 3. Comparison between real directed networks and their null models via motif-based directed network comparison method and baseline methods. The null models are D k 1.0 , D k 2.0 , and D k 2.5 . With the increase in k, more topological properties of the original network will be preserved. We show results for different methods: (a) D m ; (b) D p ; (c) D d ; (d) D c . Smaller values in the heatmap indicate a higher similarity, and vice versa. The results are the average of 100 realizations.
Entropy 26 00128 g003
Figure 4. Similarity between a real directed network and a perturbed network generated by randomly adding or deleting edges, where positive values of f indicate that we randomly add an f fraction of edges, and vice versa. We show the results for the following networks: (a) Mac; (b) Elegans; (c) Physicians; (d) Email; (e) US airport; (f) Chess. The parameter φ of D m is set to 0.5 . Each point in the figure is averaged over 100 realizations.
Figure 4. Similarity between a real directed network and a perturbed network generated by randomly adding or deleting edges, where positive values of f indicate that we randomly add an f fraction of edges, and vice versa. We show the results for the following networks: (a) Mac; (b) Elegans; (c) Physicians; (d) Email; (e) US airport; (f) Chess. The parameter φ of D m is set to 0.5 . Each point in the figure is averaged over 100 realizations.
Entropy 26 00128 g004
Figure 5. Parameter analysis for motif-based directed network comparison. We compare the real network with its perturbed network via edge addition or deletion. Different curves show different chosen values of φ , which is the only parameter in our method, φ 0.1 , 0.3 , 0.5 , 0.7 , 0.9 . Positive values of f indicate a random edge addition, and vice versa. We show the results for the following networks: (a) Mac; (b) Elegans; (c) Physicians; (d) Email; (e) US airport; (f) Chess. All results are averaged over 100 realizations.
Figure 5. Parameter analysis for motif-based directed network comparison. We compare the real network with its perturbed network via edge addition or deletion. Different curves show different chosen values of φ , which is the only parameter in our method, φ 0.1 , 0.3 , 0.5 , 0.7 , 0.9 . Positive values of f indicate a random edge addition, and vice versa. We show the results for the following networks: (a) Mac; (b) Elegans; (c) Physicians; (d) Email; (e) US airport; (f) Chess. All results are averaged over 100 realizations.
Entropy 26 00128 g005
Table 1. Basic properties of real directed networks, where N, M, A d , A v l , and d represent the number of nodes, the number of edges, the average degree, the average shortest path length, and the network diameter, respectively.
Table 1. Basic properties of real directed networks, where N, M, A d , A v l , and d represent the number of nodes, the number of edges, the average degree, the average shortest path length, and the network diameter, respectively.
NetworksNMAdAvld
Mac62118738.291.382
Elegans237429628.922.475
Physicians24110989.112.584
Email100525,57150.842.947
US airport157428,23635.873.138
Chess730165,05317.823.9213
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, C.; Ke, Q.; Chen, H.; Liu, C.; Zhan, X.-X. Directed Network Comparison Using Motifs. Entropy 2024, 26, 128. https://doi.org/10.3390/e26020128

AMA Style

Xie C, Ke Q, Chen H, Liu C, Zhan X-X. Directed Network Comparison Using Motifs. Entropy. 2024; 26(2):128. https://doi.org/10.3390/e26020128

Chicago/Turabian Style

Xie, Chenwei, Qiao Ke, Haoyu Chen, Chuang Liu, and Xiu-Xiu Zhan. 2024. "Directed Network Comparison Using Motifs" Entropy 26, no. 2: 128. https://doi.org/10.3390/e26020128

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop