
Citation: Roy H. Goodman, Maurizio Porfiri. Topological features determining the error in the inference of networks using transfer entropy[J]. Mathematics in Engineering, 2020, 2(1): 34-54. doi: 10.3934/mine.2020003
[1] | Zheming An, Nathaniel J. Merrill, Sean T. McQuade, Benedetto Piccoli . Equilibria and control of metabolic networks with enhancers and inhibitors. Mathematics in Engineering, 2019, 1(3): 648-671. doi: 10.3934/mine.2019.3.648 |
[2] | Lorenzo Pistone, Sergio Chibbaro, Miguel D. Bustamante, Yuri V. Lvov, Miguel Onorato . Universal route to thermalization in weakly-nonlinear one-dimensional chains. Mathematics in Engineering, 2019, 1(4): 672-698. doi: 10.3934/mine.2019.4.672 |
[3] | Simon Lemaire, Julien Moatti . Structure preservation in high-order hybrid discretisations of potential-driven advection-diffusion: linear and nonlinear approaches. Mathematics in Engineering, 2024, 6(1): 100-136. doi: 10.3934/mine.2024005 |
[4] | Zeljko Kereta, Valeriya Naumova . On an unsupervised method for parameter selection for the elastic net. Mathematics in Engineering, 2022, 4(6): 1-36. doi: 10.3934/mine.2022053 |
[5] | G. Gaeta, G. Pucacco . Near-resonances and detuning in classical and quantum mechanics. Mathematics in Engineering, 2023, 5(1): 1-44. doi: 10.3934/mine.2023005 |
[6] | D. S. Citrin . Fibonacci signals with timing jitter. Mathematics in Engineering, 2023, 5(4): 1-13. doi: 10.3934/mine.2023076 |
[7] | Zaffar Mehdi Dar, M. Arrutselvi, Chandru Muthusamy, Sundararajan Natarajan, Gianmarco Manzini . Virtual element approximations of the time-fractional nonlinear convection-diffusion equation on polygonal meshes. Mathematics in Engineering, 2025, 7(2): 96-129. doi: 10.3934/mine.2025005 |
[8] | Federico Bernini, Simone Secchi . Existence of solutions for a perturbed problem with logarithmic potential in $\mathbb{R}^2$. Mathematics in Engineering, 2020, 2(3): 438-458. doi: 10.3934/mine.2020020 |
[9] | Emilia Blåsten, Fedi Zouari, Moez Louati, Mohamed S. Ghidaoui . Blockage detection in networks: The area reconstruction method. Mathematics in Engineering, 2019, 1(4): 849-880. doi: 10.3934/mine.2019.4.849 |
[10] | Carlo Danieli, Bertin Many Manda, Thudiyangal Mithun, Charalampos Skokos . Computational efficiency of numerical integration methods for the tangent dynamics of many-body Hamiltonian systems in one and two spatial dimensions. Mathematics in Engineering, 2019, 1(3): 447-488. doi: 10.3934/mine.2019.3.447 |
Networks arise in all areas of science and engineering whenever we study the interactions between discrete actors [4]. To understand the functioning of the brain, it is critical to know which regions are sending signals to which other regions [8]. In ecology, the goal may be to understand the structure of the food web, that is, to identify which organisms depend on which others for sustenance [10]. In social science or epidemiology, the question may be to identify links between people along which information or disease might spread [14]. Similarly, financial regulators often wish to understand the interdependence of financial institutions that are enmeshed by a web of investments and loans, in order to determine how a shock might ripple through the community [26].
The network topology is not known explicitly in most of these real-world examples, thereby calling for data-driven computational methods to identify links from time-series collected at each node. In this process of network inference, one seeks to determine which actors influence the dynamics of which other actors, from the joint time evolution of their states. Despite considerable progress in network inference, the precise quantification of the errors associated with the implementation of these methods remain elusive. This is the motivating question for the present study.
In mathematical terms, a network is modeled by a graph Γ=(V,E), a collection V of vertices (or nodes), some subset of which are connected pairwise by a set E of edges (or links) [12]. In particular, we consider weighted directed networks, in which each edge is interpreted as beginning at a node j and end ending at a node i, and to which there is associated a scalar weight Wij. With respect to network inference, given two nodes i and j, one seeks to infer if node j influences the behavior of node i and, in addition, the strength Wij of that influence. In particular, the interest is in direct influence, that is, if node i depends on node j and node j on node k, then node k influences node i, but perhaps only indirectly, and it is important to distinguish this from the direct influence of j on i.
In an authentic model-free vein, information theory provides a mathematical framework for drawing such inferences based solely on time-series [5]. Information theory grew out of the effort to understand the transmission of signals along noisy communication channels and has strong connections both with statistical physics and with optimal strategies for gambling and investment [9]. The information in an event is associated with the uncertainty in its outcome, with unlikely events possessing more information. Information may flow among the units of a network, and can be used to reconstruct its topology. For example, Squartini and colleagues [26] have recently reviewed information-theoretic results for network inference, focusing on financial networks, and Wibral and colleagues [30] have presented an overview of the state-of-the-art of information-theoretic methods in neuroscience.
Introduced almost twenty years ago by Schreiber [25] to quantify asymmetries in coupled dynamical systems, transfer entropy is emerging as an approach of choice to guide the process of network inference from time-series. A thorough survey of its mathematical properties and many applications is provided in [6]. Given a pair of time-series, transfer entropy measures the reduction in uncertainty in predicting the future state of one of the time-series from its present value, compared with predicting its future state from both its present value and that of the second series. In the context of network inference, one predicts that a link is present from node j to node i given a value of transfer entropy from node j to node i that is statistically different from zero.
While network inference based on transfer entropy is intuitive and computationally inexpensive, it is not free of technical limitations that may beget false positive and negative results. Most of these limitations are rooted in the pairwise definition of transfer entropy that does not contemplate the existence of indirect influence from any other node in the network. Extending the transfer entropy definition to multivariate interactions could address some of these limitations, but it would require the estimation of high dimensional probability mass functions that could be computationally unfeasible beyond simple motifs [6]. While Runge [24] and Sun and colleagues [28] pinpoint several pathological instances in which transfer entropy-based network reconstruction can fail, we currently lack analytical results that can help assess the accuracy of the inference and determine scenarios where false results should be expected. Filling this gap in knowledge is the chief aim of this study.
Specifically, we continue the mathematically-principled treatment of a random Boolean network (RBN) model proposed in [20] as a minimalistic representation of policy diffusion. The model is a simplification of the more general setup presented in [2,13] to describe enactment and changes to alcohol-related policies in the 50 state of the United States of America from 1980. In the RBN, each node is assigned a Boolean variable, whose probability of activation at a given time-step depends on both the state of its neighboring nodes and on its own internal dynamics, each of which is specified by weighting parameters. The model possesses a small parameter that allows for the use of perturbation methods to compute closed-form equations approximating the relations between system parameters and the transfer entropy, allowing the reconstruction of the former from the latter. In [19], the analysis was completed and extended to the case in which the parameters vary with a prescribed temporal period τ, while here we assume, for simplicity, that it is time-independent.
The model provides an interesting test case for a number of reasons. Foremost is that its explicit and linear mathematical formulation allows for closed-form analysis that is not possible for real-world datasets, nor for most nonlinear mathematical models. Second is that because it is defined in terms of predetermined parameters, the ground truth is known and deviations from that ground truth can be exactly measured. It is exceptionally simple and fast to evaluate, allowing us to compute long time-series that would be unavailable in most experimental settings. Finally, because the state space of the model is binary, computation of the transfer entropy is especially fast and inexpensive.
The RBN model consists of N nodes with state Xi,i=1…N, each of which can take the two states zero or one. The system's state at a given time depends on its previous state according to the linear transition law
Pr[Xi(t+1)=1|X1(t)=x1,…,XN(t)=xN]=Θ[1+N∑j=1Wijxj], | (1.1) |
where the constants Θ and Wij are chosen to ensure that the right-hand side of the equation lies in [0,1]. The right-hand side consists of two terms. The first, Θ is simply the spontaneous probability of node activation. The second is the increased probability of activation due to the activation of the other nodes connected to it. Specifically, the term Wij represents the nonnegative weighted influence on node i from its neighbor j. We assume for simplicity that the network contains no self-connected edges, that is,
Wii≡0. | (1.2) |
In the context of policy diffusion, Θ measures the tendency of a legal unit to spontaneously enact or change a policy in the absence of any interaction with other legal units. With reference to real policy-making in the United States of America, adopting a time-step of one month would yield small values of Θ for policies that have a high start-up cost and unknown, long-term, benefits as well as for policies that attend rare, specific problems that could have significant opposition [2,13]. The RBN shares similarities with synapsis models in theoretical neuroscience, where influence between neurons is represented through excitatory networks [23]. This is the case of slowly-varying dynamics on which we focus, thereby enabling a perturbation argument that treats Θ as a small parameter.
The primary analytical result of [19] is a closed-form expression relating the transfer entropy from j to i with the weight Wij, namely,
TEj→i=Θ2G(2)(Wij)+O(Θ3). | (1.3) |
where G(2) is the map
G(2)(x)=−x+(1+x)log(1+x), | (1.4) |
which is one-to-one for x>0. This expression was derived earlier in [20] where Wij was assumed to take only the binary values zero or one. In [19], it is proposed that truncating this expression and solving for Wij should be an effective way to estimate the network weights. This is shown via a handful of examples to largely reproduce the network structure of several small time-dependent networks and of a larger random network. These examples include networks with as few as two and as many as 100 nodes.
In the present work, we compute the next-order, O(Θ3), term in this approximation, providing an estimate of the error associated with indirect influence from other nodes in the network. Approximation (1.3) is local in the sense that the weight corresponding to a link (i,j) is determined entirely by the transfer entropy from j to i. The correction, by contrast, depends on the difference between the total weighted inputs incident on each of the nodes i and j, revealing the effect of the more global network structure on the transfer entropy.
This paper is organized as follows. In Section 2 we introduce our motivating example, whose surprising behavior we wish to explain. In Section 3, we summarize additional mathematical background to this problem. In Section 4, we calculate the next order term in the expansion (1.3) to understand the errors made in the example calculation. Then in Section 5 we return to this example, which is illuminated by our calculation. To offer evidence in favor of the generality of the analysis, we numerically study a network of coupled chaotic maps in Section 6. Finally, we present our main conclusions in Section 7.
We begin by describing the network at the center of the example. The Barabási-Albert (BA) network was introduced in 1999 to model the network structure of the internet, although related models date back at least to Yule's work in 1925 [1,31]. Such a network is constructed by an algorithm exhibiting preferential attachment that proceeds as follows. Begin with a small "seed'' graph, which we take to be the complete network with m0 nodes. Then at step k=m0+1,…N, choose m existing nodes at random according to the weights
pj=dj∑k−1i=1di, |
where di is the in-degree of node i (the number of links pointing toward i), and create links between node k+1 and the m chosen nodes. By construction, the network have no self-directed edges connecting a node to itself (assuming that the seed network satisfies this property.)
The standard BA network is undirected; Prettejohn et al. describe a directed network variation [21]. In their model, the links added at each step are directed edges from node k to node j, corresponding to a nonzero weight above the diagonal. If that were the entire model all links would point toward the seed graph, and none would point away from it. In the modified version, once such a directed edge is chosen, then with the same probability pj another directed edge is created in the opposite direction (i.e., from j to k), corresponding to a nonzero entry below the diagonal in the weight matrix.
After constructing such a network Γ we introduce a random weight Wij, chosen from the uniform distribution on [0,1], to each link from a node j to a node i. By the above construction, most of the nonzero weights lie above the diagonal. The elements of the weight matrix W in (1.1) represent the influence of j on i. The matrix W visualized in Figure 1. Due to the method of construction, the out-degree of each node, that is, the number of nonzero entries in each column is fairly homogeneous: 40 of the 50 nodes have out-degree equal to five, while the in-degree (number of nonzero entries per row) is much more heterogeneous, with 15 different values ranging from 0 to 20.
In the computational example we apply the result of [19] to reconstruct two distinct but related networks. The first is described above and the second is its transpose ΓT, obtained by reversing the orientation of each directed link. The weight matrix for ΓT is simply the transposed weight matrix WT. The in-degree of a node i of ΓT is equal to the out-degree of the same node in Γ, and vice-versa.
To analyze the model, we run 100 time-series each of 105 steps. For each of the 2,450 pairs (i,j) (excluding the terms with i=j since there are no self-loops by construction), we compute the transfer entropy TEj→i via a simple plug-in estimation [17] where we count the occurrences of the possible states that define the interaction between the node pair. Then we calculate, using the leading-order term in (1.3), an approximate value of the corresponding weight. We utilize Θ=0.05, which is sufficiently small to ensure that the probability on the right-hand side of (1.1) is less than one for all i, since no row of the matrix has more than 20 nonzero entries. We average the computed value of the transfer entropy over the 100 realizations. If the O(Θ3) error term in (1.3) is negligible, then the inferred influence of j on i in Γ should be identical to the influence of i on j in ΓT.
In Figure 2, we plot the inferred weights as a function of their exact values for both these matrices, here showing only the 262 nonzero entries. When the weight is small, the computation significantly overestimates it in both cases. For larger weights, there is an increased amount of variation in the predicted values, but it is distributed in markedly different ways for the two matrices. For the network Γ, the variation appears to be distributed evenly above and below the exact value. For the network ΓT, the error in the inference is nearly always positive, and appears to be much smaller. This is confirmed in the right panel of the figure, which shows histograms of the errors, normalized to have unit area. The histogram for the network Γ has mean close to zero and is considerably broader than the histogram for ΓT, which has a positive mean value.
Since most of the entries of the weight matrix W are zero, a critical measure of success in the network reconstruction is minimizing false positives, that is, links that are inferred between disconnected nodes. The overestimation of weights lower than 0.1 evident in Figure 2 suggests that some false positives are unavoidable. Of the 262 largest inferred weights for both Γ and ΓT, 11 entries for W and 13 for WT would be classified as false positives. Note that this computation was performed using the value of the transfer entropy averaged over 100 realizations. Significantly more false positives were found if the calculation was performed using a single realization.
Clearly, the calculated errors in the weights in the calculation for Γ are larger than for the similar calculation using ΓT, despite the fact that equation (1.3) predicts the same leading-order accuracy. The analysis of this paper aims to determine what topological features of the two networks conspire to create this difference and to determine how to correct it.
We assume familiarity with the basics of Markov chains and use this section mainly to set notation [7]. We consider a discrete-time finite-state Markov chain Z(t),t∈N evolving in a sample space Z whose generic element is denoted as zi,i=1…|Z| where |Z| is the cardinality of the set. Lower case letters will be used to denote realizations of random variables. The transition matrix is a matrix P∈R|Z|×|Z|+, whose columns each sum to one. The entry Pij represents the probability that the the Markov chain will transition from state zi to state zj at any given step,
Pij=Pr[Z(t+1)=zj|Z(t)=zi]. |
Considered as a row vector, the distribution ν(t) evolves according to the following recursion,
ν(t+1)=ν(t)P, | (3.1) |
for t∈N and initial distribution ν(0)=ν0.
The solution to this recursion is a probability distribution for all times t, such that its entries are non-negative and sum to one. Given mild assumptions on the transition matrix P, the recursion converges exponentially as t→∞ to a unique limiting distribution denoted π, called the stationary distribution[7]. This is given by the left eigenvector with unit eigenvalue,
π=πP,N∑i=1πi=1. | (3.2) |
Our goal is to reconstruct the network Γ from a time-series of finite duration generated by the dynamics of (1.3). Since this time series is finite, it is impossible to determine with certainty the matrix used to create it. The object, then, is to find the network that is consistent with the data while requiring the fewest unsupported assumptions. Loosely speaking, we can say that it should not be too surprising [9]. The idea of surprise is that unlikely events convey more information, so a "surprise function'' should assign a large value to unlikely events and a small value to expected events.
The information associated with the event that a random variable X drawn from a sample space X takes the value x is
I(x)=−logPr(X=x). |
Here, we make use of natural logarithms, so that information is measured in nats. The (Shannon) entropy of the random variable X is then the expectation of the information
H(X)=E[I(X)]=−∑x∈XPr(X=x)logPr(X=x), | (3.3) |
which quantifies the amount of uncertainty in X, where E denotes expectation. The entropy is the unique functional over probability distributions that satisfies the Shannon-Khinchin axioms [15], making it the best choice for measuring the uncertainty of a distribution. Since the entropy is the expectation of I(X), it is generically non-negative.
Given another random variable Y, the notions of joint and conditional entropies are similarly defined by
H(X,Y)=−∑x∈X,y∈YPr(X=x,Y=y)logPr(X=x,Y=y), | (3.4a) |
H(X|Y)=−∑x∈X,y∈YPr(X=x,Y=y)logPr(X=x|Y=y), | (3.4b) |
where Y is the sample space of Y.
These notions can be readily extended to stochastic processes, such that given two stationary processes X and Y, transfer entropy from Y to X is defined as [25]
TEY→X=H(X(t+1)|X(t))−H(X(t+1)|X(t),Y(t))=∑x+∈Xx∈Xy∈Y{Pr[X(t+1)=x+,X(t)=x,Y(t)=y]×logPr[X(t+1)=x+|X(t)=x,Y(t)=y]Pr[X(t+1)=x+|X(t)=x]}. | (3.5) |
Transfer entropy measures the reduction in the uncertainty of predicting X(t+1) from both X(t) and Y(t) relative to predicting it from X(t) alone. As a simple consequence of its definition, transfer entropy is non-negative.
We acknowledge that building on this definition, a variety of ameliorations could be undertaken. For example, one may consider delayed interactions between the two processes, such that Y(t) in (3.5) should be replaced with Y(t−δ) with δ being a suitable time-delay [29]. Also, one may attempt a symbolic treatment of the time-series [27], or pursue an analysis in terms of recurrence plots [22]. In this work, we focus on the classical definition in (3.5) toward gathering analytical insight into the role of the topology on the accuracy of transfer entropy-based network inference.
We briefly present the computation of the next-order correction in the transfer entropy formula (1.3) and of the probabilities used to construct it. This necessarily builds on the calculation in [19], the details of which are summarized below. As in most perturbative calculations [16], the number and complexity of terms greatly increases as the order of the calculation increases. The details of this calculation were assisted and verified using Mathematica.
System (1.1) can be reformulated as a Markov chain, with |Z|=2N states z=[X1,…,XN]∈{0,1}N, such that each state is a binary vector whose entries take the value one or zero depending on whether that node is active. Letting Z(t)=[X1(t),…,XN(t)], then the transition probability in (1.1) can be written as
Pr[Xi(t+1)=1|Z(t)=z]=Θ[1+eTiWz], | (4.1) |
where the unit vector ei is column i of the identity matrix. For both possible realizations xi+ of Xi(t+1), this can be written as
Pr[Xi(t+1)=xi+|Z(t)=z]=(1−xi+)+Θ(2xi+−1)[1+eTiWz]. | (4.2) |
Taking a product of such terms yields the transition matrix of this Markov chain
Pij(t)=Pr[Z(t+1)=zj|Z(t)=zi]=N∏k=1{(1−eTkzj)+Θ(2eTkzj−1)[1+eTkWzi]}. | (4.3) |
The transition matrix P can be expanded in powers of Θ as follows:
P=P(0)+ΘP(1)+Θ2P(2)+Θ3P(3)+O(Θ4). |
The first three terms are given in [19]. Specifically, the zeroth order term is
P(0)ij=N∏k=1[(1−eTkzj)]={1,‖zj‖=0,0,‖zj‖>0. | (4.4a) |
Here, the norm of a binary vector is taken to be the number of nonzero entries, namely,
‖z‖=N∑i=1Xi. |
The first order term is
P(1)ij=N∑r=1{(2eTrzj−1)[1+eTrWzi]N∏k=1k≠r(1−eTkzj)}={−[N+1TNWzi],‖zj‖=0,[1+zTjWzi],‖zj‖=1,0,‖zj‖>1, | (4.4b) |
where 1N denotes a column vector of N ones. Finally, the second order term is
P(2)ij=N∑r,s=1r>s{(2eTrzj−1)[1+eTrWzi](2eTszj−1)[1+eTsWzi]N∏k=1k≠r,s(1−eTkzj)}={N∑r,s=1r>s{[1+eTrWzi][1+eTsWzi]},‖zj‖=0,−[1+zTjWzi][N−1+(1TN−zTj)Wzi],‖zj‖=1,{1+zTjWzi+[eTI1(zj)Wzi][eTI2(zj)Wzi]},‖zj‖=2.0,‖zj‖>2, | (4.4c) |
where I1(zj) and I2(zj) are used to identify the two entries of zj that are different from zero for the case ‖zj‖=2.
In a similar manner, we compute P(3). The calculation below will only need the values of P(3) for which ‖zi‖=0 (it appears only in Eq. (4.7d)). Accordingly, that is all we report here
P(3)ij|zi=0={−(N3),‖zj‖=0,(N−12),‖zj‖=1,−(N−2),‖zj‖=2,1,‖zj‖=3,0,‖zj‖>3. | (4.5) |
We remark that P(n)ij≠0 only in the case that both ‖zi‖≤n and ‖zj‖≤n. There are of course (Nn) vectors z with ‖z‖=n, so that if n≪N then the approximate matrix, computed for all transitions with ‖z‖≤n, is low rank. Given a time-series of system (1.1), this provides a way to check whether Θ has been chosen small enough that the proposed approximation is reasonable.
Next, we expand the stationary distribution to the third order, in a manner similar to the transition matrix,
π=3∑j=0Θjπ(j)+O(Θ4). | (4.6) |
By replacing (4.6) into (3.2) and grouping terms of the same power in Θ, we determine the following chain of relationships:
π(0)(I−P(0))=0,N∑j=1π(0)j=1, | (4.7a) |
π(1)(I−P(0))=π(0)P(1),N∑j=1π(1)j=0, | (4.7b) |
π(2)(I−P(0))=π(0)P(2)+π(1)P(1),N∑j=1π(2)j=0, | (4.7c) |
π(3)(I−P(0))=π(0)P(3)+π(1)P(2)+π(2)P(1),N∑j=1π(3)j=0. | (4.7d) |
The left column of equations contains the expansion of the stationary equation, while the right column enforces the condition that π is a probability distribution. The matrix (I−P(0)) in each equation is singular, with a one-dimensional null space. The first Eq. (4.7a) is solved by its null vector. The other equations are all solvable, as long as the vectors on their right-hand sides sum to zero, and they all do.
The first three equations in (4.7) for the zeroth, first, and second order terms in the expansion are solved in [19] and are given by
π(0)i={1,‖zi‖=0,0,‖zi‖>0, | (4.8a) |
π(1)i={−N,‖zi‖=0,1,‖zi‖=1,0,‖zi‖>1, | (4.8b) |
and
π(2)i={(N2)−1TNW1N,‖zi‖=0,−(N−1)+zTiW1N,‖zi‖=1,1,‖zi‖=2,0,‖zi‖>2, | (4.8c) |
To extend the computation to the next order, we replace (4.6) and (4.8) into (4.7d). By solving the equation and imposing the constraint that the perturbation is zero-sum, we determine
π(3)={−(N3)+(N−1)1TNW1N+121TN(WWT−W∘W)1N−1TNW21N,‖zj‖=0,(N−12)−(N−2)zTiW1N−1TNW1N+N∑k=1((zTiWek)2+(zTiWek)(eTkW1N−1TNWek)),‖zi‖=1,−(N−2)+zTiW1N+∑Nk=1(eI1(zi)Wek)(eI2(zi)Wek),‖zi‖=2,1,‖zi‖=3,0,‖zi‖>3, | (4.9) |
where the Hadamard product [3], or element-wise product, (A∘B)ij=AijBij, is in the ‖zj‖=0 term.
Marginalizing (4.6) via (4.8) and (4.9), we compute the stationary periodic distribution of each node
Pr(Xi(t)=xi)=(1−xi)+(2xi−1)(Θ+Θ2eTiW1N+Θ3eTiW21N)+O(Θ4). | (4.10) |
This distribution describes the probability that a node is active or non-active at a given time. Should the expansion be truncated at the second order in Θ, only the row sum of W at node i (quantifying the weighted in-degree of node i) will enter the probability distribution in (4.10). These nodes are those that influence node i with respect to system (1.1). Extending the analysis to the third power in Θ brings forward a more complex dependence of node i on the ith row sum of the square of the matrix W, representing the dependence of the state of X at time t on its state at time (t−2).
Similarly, marginalizing (4.6) with respect to any nodes but node pair (i,j), we determine the following joint distribution for (i,j):
Pr(Xi(t)=xi,Xj(t)=xj)=Pr(Xi(t)=xi)Pr(Xj(t)=xj)+(2xi−1)(2xj−1)eTiWWTejΘ3+O(Θ4). | (4.11) |
While a second order expansion in Θ would yield that node i and j are independent, retaining the third order power yields a different claim. Specifically, (4.11) cannot be obtained from (4.9) if we are interested in the quantification of the third order term in Θ.
We now develop the two leading-order terms in the expansion of the transfer entropy, using the definition (3.5) and the expansion (4.6) developed in the last section. Without loss of generality we consider the transfer entropy from node 2 to node 1:
TE2→1=∑x1+,x1,x2Pr[X1(t+1)=x1+,X1(t)=x1,X2(t)=x2]logPr[X1(t+1)=x1+|X1(t)=x1,X2(t)=x2]Pr[X1(t+1)=x1+|X1(t)=x1], | (4.12) |
where the probabilities are evaluated using the stationary distributions derived in the previous section.
We can compute the conditional probability in the denominator of the logarithm term using the transition probability (4.2) and properly marginalizing the stationary distribution (4.6), as follows:
Pr[X1(t+1)=x1+|X1(t)=x1]=(1−x1+)+(2x1+−1)(Θ[1+W11x1]+Θ2N∑j=2W1j+Θ3N∑j=2(W2)1j)+O(Θ4) | (4.13) |
Up to terms of order O(Θ2), this expansion matches that given in [19]. In agreement with one's expectation, for small values of Θ, such that an affine expansion would hold, the probability of a transition does not depend on the network topology. Retaining the second order power in Θ introduces a dependence on all the nodes that influence node 1. Increasing further the order of the expansion, we observe a richer influence from the entire network, expressed through the term involving W2.
A similar calculation yields the term in the numerator of (4.12). By using (4.11) and (4.6), we establish
Pr[X1(t+1)=x1+|X1(t)=x1,X2(t)=x2]=(1−x1+)+(2x1+−1)(Θ[1+W11x1+W12x2]+Θ2N∑j=3W1j+Θ3N∑j=3(W2)1j)+O(Θ4). | (4.14) |
Again, the expansion agrees with that found in [19] up to order O(Θ2). Similarly to (4.13), for small values of Θ, the probability that node 1 transitions to a given state conditional to its present state and the present state of node 2 depends only on W11 and W12. Including to the second power in Θ brings about the effect of all the other nodes that influence node 1 (excluding node 2). The third power in Θ depicts a further degree of interaction, wherein the entire network contributes to the probability of transition (4.14), through the term involving W2.
The joint probability Pr[X1(t+1)=x1+,X1(t)=x1,X2(t)=x2] in (4.12) is calculated as the product of (4.11) and (4.14), although, remarkably, the O(Θ3) correction terms in these equations do not enter into the calculation to this order. From this joint probability and the conditional probabilities in (4.13) and (4.14), we can calculate an expansion for transfer entropy. Switching from labeling the indices from (1,2) to (i,j) with i≠j, we establish
TEj→i=Θ2G(2)(Wij)+Θ3G(3)ij(W)+O(Θ4) | (4.15) |
where the scalar function G(2) is defined in (1.4) and the matrix function G(3) is defined entry-wise as
G(3)ij(W)=Wij(Wij−di−dj)+log(1+Wij)(di−Wij+(1+Wij)dj) | (4.16) |
where
dj=N∑k=1Wjk. | (4.17) |
is the weighted in-degree of node j. The calculation presented in this paragraph is the first place that assumption (1.2) is used.
In agreement with the discussion on the effect of the network network topology on local joint and transition probabilities in (4.13) and (4.14), the asymptotic expansion for transfer entropy in (4.15) suggests that increasing the order of the expansion in TEj→i hampers the possibility of mapping transfer entropy one-to-one with the corresponding weights. Surprisingly, the term in Θ3 depends on the influence of j on i along with the in-degree of both i and j, which encapsulate the overall influence of any other network node on the pair.
In the process of network inference, we should compute all the entries of W from transfer entropy values estimated from time-series. To accomplish this goal, we must solve the system of Eq. (4.15) with i,j=1,…,N, i≠j, for W. For convenience, we scale transfer entropy by Θ2, yielding the following matrix-valued equation for W
Tij=G(2)(Wij)+ΘG(3)ij(W)+O(Θ2),i,j=1,…,N,i≠j | (4.18) |
where Tij=Θ−2TEj→i.
Formally, we can solve (4.18) for W as a series in Θ, as follows:
W=W(0)+ΘW(1)+O(Θ2) |
and find the two equations
O(1):Tij=G(2)(W(0)ij),O(Θ):0=ddwG(2)(w)|w=W(0)ijW(1)ij+G(3)ij(W(0)). |
These have formal solutions
W(0)ij=[G(2)]−1(Tij), | (4.19a) |
W(1)ij=−G(3)ij(w)ddwG(2)(w)|w=W(0)ij. | (4.19b) |
Ultimately, we compute any element of W by following these steps: (i) For every pair i≠j, we solve (4.19a) to compute the value W(0)ij and we assemble the matrix W(0) (with zeros on the diagonal). (ii) For every pair i≠j, we compute the correction W(1)ij by using the entire matrix W(0).
To shed light on the topological underpinnings of the correction W(1) that relate TEj→i to weights beyond that between i and j, we can perform a further perturbation analysis. Specifically, we can estimate the correction term in (4.19b) in the case that the entries in W are small using Taylor series. As shown in [19], G(2)(Wij)∼W2ij2. Similarly, expanding (4.16) under the assumption that all elements of W are small, i.e., Wij≪1, we find
G(3)ij(W)∼W2ij2(dj−di+Wij)+O(||W||3). | (4.20) |
Interestingly, this result holds even if assumption (1.2) is not satisfied. Therefore the correction (4.19b) approximately satisfies
W(1)ij∼W(0)ij2(d(0)j−d(0)i+W(0)ij)+O(‖W(0)‖2), | (4.21) |
where d(0)i is the in-degree of node i with respect to matrix W(0), which, based on (4.19a) encapsulates the overall information transfer to node i from its neighbors. The same expansion holds, with a different remainder, if Wij≪1 but the other weights in (4.16) are O(1).
Overall, (4.21) indicates that W(1)ij depends on all the transfer entropy values associated with incoming information to nodes i and j. Note that d(0)i and d(0)j have opposite signs in the term (4.21). Specifically, the correction in the inference of the weight between nodes i and j can be split into two terms Wlinkij=12(W(0)ij)2 and Wtopologyij=12W(0)ij(d(0)j−d(0)i). The first of these, Wlinkij, represents a correction that depends only on the computed transfer entropy for the pair (i,j). The second, by contrast, depends on the mismatch between their weighted in-degrees from W(0) measures the differing rate at which information is transferred to the two nodes from the network. Stretching the thermodynamics analogy, we could refer to this mismatch as a common uncertainty bath upon which we must tackle the inference problem. The computation of W(0)ij treats the pair (i,j) in isolation, while the correction term Wtopologyij accounts for the information which both nodes i and j receive from the rest of the network; see Figure 3. We attribute the different behaviors of the simulations reported in Section 2 to this observation, as we relate in the next Section.
We further comment that to this order in the expansion, Eq. (4.16) yields that if Wij=0 then Tij=0. Since transfer entropy TEj→i computed by time series is never exactly zero, this suggests that the third order approximation will do no better than the second-order approximation at discriminating between Wij=0 and Wij positive but small. However, it can contribute to the accuracy of the identification of nonzero weights, in terms of both the mean and variance of the prediction.
If transfer entropy TEj→i were a function solely of the weight Wij and not of further topological properties of the graph, then the inferred weights for a network Γ and its transpose, computed to leading order, should be identical. That they were not found to be identical in Section 2 motivated the computation, via perturbation expansion, of the next order correction terms, detailed in Section 4. Eq. (4.21) provides an intuitive explanation for the differing behaviors. The correction term Wtopologyij is proportional to the mismatch between the weighted in-degrees of nodes i and j, with an additional factor of Wij. Figure 1(b) shows that the weighted in-degrees for Γ vary more widely than the weighted in-degrees of ΓT (which equal the weighted out-degrees of Γ). Therefore, the range in their mismatch is larger, giving rise to the wider variation in the inferred weights for Γ than for ΓT.
We now apply the correction (4.19b) to the numerical simulations described in Section 2. In Figure 4 we compare the second and third order approximations for the computation with the networks Γ and ΓT. Subfigures (a) and (b) show the second and third order approximations to the weights for the network Γ. With respect to Γ, the variance of the error is reduced in the improved approximation, while the mean error, which was already close to zero, stays about the same. For the network ΓT, as shown in Subfigures (c) and (d), the mean error is reduced while the error variance is improved only slightly. After the correction is applied, the inferred weights for both the networks Γ and ΓT are computed to about the same accuracy.
Clearly, the correction term accounts for the marked difference between the inferred weights seen in the initial numerical experiment. When the correction term is included in the computation, then transfer entropy, already demonstrated to be a useful tool for network reconstruction, only improves. A notable study by Sun et al. demonstrates that TEj→i is in itself insufficient for reconstructing Wij since it fails to condition on the dynamics of the remaining nodes in the network [28]. That paper proposes an alternative measure of influence which the authors call causation entropy, and which is conditioned on a higher number of terms. The terms exerting influence are then identified by an optimization over the terms included. The procedure outlined in Section 4.3 provides an alternative method to measure indirect influence while relying only on dyadic interactions, allowing us to nonlinearly combine the transfer entropies of all node-pairs in order to effectively approximate such a conditioning.
The analysis performed in this paper applies only to the RBN model (1.1). It is tempting, however, to draw from it a more general conclusion about transfer entropy. Namely, consider models in which the coupling between the nodes of the network is weak. To leading-order, transfer entropy between two nodes should depend only on the strength of the coupling between them, but this is subject to a correction like that given in (4.20), dependent on the difference in total weighted in-degree of the two nodes forming the pair.
In this section, we explore this hypothesis with a numerical example. We consider a coupled system of chaotic tent maps subject to additive noise. The evolution of the ith state is given by the following equation:
xi(t+1)=F(xi(t))+ΘN∑j=1Wij(F(xj(t))−F(xi(t)))+σni(t). | (6.1) |
Here, ni(t) is additive noise drawn from a normal distribution, with small multiplier σ and the nonlinear function F, known as the tent map, is
F(x)={2x0≤x<12,2−2x12≤x≤1,0x<0 or x>1. | (6.2) |
In the absence of noise—that is, when σ=0—solutions to (6.2) may synchronize, so that their trajectories will tend to be identical and follow the individual dynamics of single tent map, bounded in the [0,1] interval. A condition for the existence of stable synchronous solutions for this system can be derived, based on the earlier work of [18], as follows. The condition is derived as follows. Define an N×N matrix L by
Lij={Wij,i≠j,−∑k≠iWik,i=j. | (6.3) |
Then stable solutions exist if, for all nonzero eigenvalues λ of L,
|1+Θλ|<12. | (6.4) |
We were unable to find any examples of networks of the type used in Section 2 for which synchronization was possible for both the weighted network Γ and its transpose ΓT. Instead, we construct the following simple family of weighted networks that may lead to synchronization. Let Γ be a directed Erdős-Rényi network [11]. In this class of networks, the nodes are connected randomly such that a directed link exists from j to i≠j, with a fixed probability p<1. Then, for each node i, we choose random weights Wij such that di=∑jWij=1.
Thus, the term Wtopologyij is identically zero for Γ but nonzero for the network ΓT. We expect from (4.21) that the computed transfer entropy for (6.2) using ΓT will be have larger variance than the computed transfer entropy for Γ. Figure 5 shows the results of this computation, performed with N=30, p=12, Θ=0.96, which satisfies the synchronization condition for both networks, and σ=0.1. The in-degree of each node of Γ equals one by construction, while for ΓT, the in-degree has mean one and variance 0.049. It is clear from the simulations that the computed transfer entropy is more widely scattered for Γ than for ΓT.
Therefore, we conclude that the wider variation in in-degree for Γ than for ΓT is responsible for the difference in the behaviors. This supports the idea that the claims analytically derived for the RBN apply to a wider class of coupled dynamical systems. The main message of this work is that the success of pairwise inference through transfer entropy depends on the topological features of the network to be discovered. Networks with homogeneous in-degree can be more accurately inferred than those with heterogeneous in-degree. The out-degree plays a surprisingly marginal role on the quality of the inference.
Transfer entropy is emerging as a promising approach to carry out network reconstruction from the time-series of the network nodes. In this vein, one utilizes the value of transfer entropy between a pair of network nodes to decide whether a link exists between them and, potentially, predict its weight. This process is based on the premise that transfer entropy maps one-to-one with the weight of the link between two nodes, which is in general difficult to guarantee. In fact, the definition of transfer entropy between two nodes deliberately excludes the effect of any other node in the network, thereby neglecting indirect influence between the two nodes that could be supported by the entire network.
In this work, we seek to offer a precise quantification of the topological features that challenge transfer-entropy network reconstruction in the context of a simple Boolean network model, inspired by policy diffusion. Through perturbation analysis of the high-dimensional Markov chain associated with the model evolution on the entire network, we establish a closed-form expression for the stationary distribution. This is, in turn, utilized to derive our main result, consisting of a third-order accurate form of transfer entropy between any two nodes in the network.
Our closed-form result indicates that, for sufficiently slow dynamics, transfer entropy between two nodes maps injectively to the corresponding weight of the link between them. As the perturbation parameter increases to encompass dynamics that could evolve at a faster scale, the one-to-one map breaks down, in favor of a more complex relationship between topology and transfer entropy. Specifically, we discover that inferring the weight between two nodes calls for examining transfer entropy from any other node in the network to the node pair under scrutiny. The higher the mismatch between the two nodes in terms of their total incoming transfer entropy, the less accurate is the one-to-one mapping between transfer entropy and influence.
This finding is particularly important when studying heterogeneous networks, such as scale-free models where wide variations in the incoming information flow should be expected as we seek to discover links around potential hubs. To detail this aspect, we have examined two instances of a weighted, directed scale-free network: one in which heterogeneity manifests in terms of out-degree and, the other, constructed through simple matrix transposition that displays heterogeneity in terms of the in-degree distribution. In the former case, transfer entropy between each pair of nodes offers an unbiased measure of the mutual influence between the nodes, such that one might estimate the corresponding weight from transfer entropy reading with an uncertainty of zero mean. In the latter case, we observe a systematic bias of transfer entropy-based inference, such that the uncertainty in the estimation has a non-zero mean, although it is characterized by a narrower variance. Accounting for the high-order correction derived in this paper, we successfully address network inference in both cases, attaining an unbiased, tight reconstruction of every weight in the network from transfer entropy measures.
Although numerical results on coupled chaotic tent maps seem to align with our analytical predictions, the generality of our results remains an open question for future research. Specifically, our future work should seek to establish a general framework for error quantification in transfer entropy-based network inference, beyond the case of Boolean network model examined herein. While it is unlikely that one could determine a closed-form expression of transfer entropy for general dynamics in terms of the network topology as proposed in this paper, it may be tenable to establish conservative bounds on information transfer associated with indirect influence between nodes. Another area of future inquiry includes the extension of the analytical framework to encompass time-varying dynamics, leading to a non-stationary Markov process, and self-loops in the network, which would likely exacerbate the role of heterogeneity on transfer entropy.
This work was undertaken while RG was on sabbatical at the NYU Tandon School of Engineering. He thanks them for their hospitality. MP acknowledges the support of the National Science Foundation under Grant nos. CMMI 1433670, CMMI 1561134, and CBET 1547864.
The authors declare no conflict of interest.
[1] | Albert R, Barabási AL (2002) Statistical mechanics of complex networks. Rev Mod Phys 74: 47-97. |
[2] | Anderson RP, Jimenez G, Bae JY, et al. (2016) Understanding policy diffusion in the us: An information-theoretical approach to unveil connectivity structures in slowly evolving complex systems. SIAM J Appl Dyn Syst 15: 1384-1409. |
[3] | Bernstein DS (2018) Scalar, Vector, and Matrix Mathematics: Theory, Facts, and Formulas-Revised and Expanded Edition, Princeton University Press. |
[4] | Boccaletti S, Latora V, Moreno Y, et al. (2006) Complex networks: Structure and dynamics. Phys Rep 424: 175-308. |
[5] | Bollt EM, Sun J, Runge J (2018) Introduction to focus issue: Causation inference and information flow in dynamical systems: Theory and applications. Chaos 28: 075201. |
[6] | Bossomaier T, Barnett L, Harré M, et al. (2016) An Introduction to Transfer Entropy: Information Flow in Complex Systems, Springer International Publishing. |
[7] | Brémaud P (2013) Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues, Springer Science & Business Media. |
[8] | Bullmore E, Sporns O (2009) Complex brain networks: Graph theoretical analysis of structural and functional systems. Nat Rev Neurosci 10: 186. |
[9] | Cover T, Thomas J (2012) Elements of Information Theory, Wiley. |
[10] | Dunne JA, Williams RJ, Martinez ND (2002) Food-web structure and network theory: The role of connectance and size. Proc Natl Acad Sci USA 99: 12917-12922. |
[11] | Erdös P, Rényi A (1959) On random graphs, I. Publ Math Debrecen 6: 290-297. |
[12] | Godsil C, Royle GF (2013) Algebraic Graph Theory, Springer Science & Business Media. |
[13] | Grabow C, Macinko J, Silver D, et al. (2016) Detecting causality in policy diffusion processes. Chaos 26: 083113. |
[14] | Keeling MJ, Eames KT (2005) Networks and epidemic models. J R Soc Interface 2: 295-307. |
[15] | Khinchin A (1957) Mathematical Foundations of Information Theory, Dover Publications. |
[16] | Nayfeh AH (2011) Introduction to Perturbation Techniques, John Wiley & Sons. |
[17] | Paninski L (2003) Estimation of entropy and mutual information. Neural Comput 15: 1191-1253. |
[18] | Pecora LM, Carroll TL (1990) Synchronization in chaotic systems, Phys Rev Lett 64: 821. |
[19] | Porfiri M, Ruiz Marín M (2018) Inference of time-varying networks through transfer entropy, the case of a Boolean network model. Chaos 28: 103123. |
[20] | Porfiri M, Ruiz Marín M (2018) Information flow in a model of policy diffusion: An analytical study. IEEE Trans Network Sci Eng 5: 42-54. |
[21] | Prettejohn BJ, Berryman MJ, McDonnell MD, et al. (2011) Methods for generating complex networks with selected structural properties for simulations: A review and tutorial for neuroscientists. Front Comput Neurosci 5: 11. |
[22] | Ramos AM, Builes-Jaramillo A, Poveda G, et al. (2017) Recurrence measure of conditional dependence and applications. Phys Rev E 95: 052206. |
[23] | Roxin A, Hakim V, Brunel N (2008) The statistics of repeating patterns of cortical activity can be reproduced by a model network of stochastic binary neurons. J Neurosci 28: 10734-10745. |
[24] | Runge J (2018) Causal network reconstruction from time series: From theoretical assumptions to practical estimation. Chaos 28: 075310. |
[25] | Schreiber T (2000) Measuring information transfer. Phys Rev Lett 85: 461-464. |
[26] | Squartini T, Caldarelli G, Cimini G, et al. (2018) Reconstruction methods for networks: The case of economic and financial systems. Phys Rep 757: 1-47. |
[27] | Staniek M, Lehnertz K (2008) Symbolic transfer entropy. Phys Rev Lett 100: 158101. |
[28] | Sun J, Taylor D, Bollt EM (2015) Causal network inference by optimal causation entropy. SIAM J Appl Dyn Syst 14: 73-106. |
[29] | Wibral M, Pampu N, Priesemann V, et al. (2013) Measuring information-transfer delays. PLoS One 8: e55809. |
[30] | Wibral M, Vicente R, Lizier JT (2014) Directed Information Measures in Neuroscience, Springer. |
[31] | Yule GU (1925) II.-A mathematical theory of evolution, based on the conclusions of Dr. JC Willis, FRS. Philos Trans R Soc London Ser B 213: 21-87. |
1. | Leonardo Novelli, Fatihcan M. Atay, Jürgen Jost, Joseph T. Lizier, Deriving pairwise transfer entropy from network structure and motifs, 2020, 476, 1364-5021, 20190779, 10.1098/rspa.2019.0779 | |
2. | Fumito Mori, Takashi Okada, Diagrammatic expansion of information flows in stochastic Boolean networks, 2020, 2, 2643-1564, 10.1103/PhysRevResearch.2.043432 | |
3. | Fumito Mori, Takashi Okada, Information-transfer characteristics in network motifs, 2023, 5, 2643-1564, 10.1103/PhysRevResearch.5.013037 | |
4. | Pietro De Lellis, Manuel Ruiz Marín, Maurizio Porfiri, Inferring directional interactions in collective dynamics: a critique to intrinsic mutual information, 2023, 4, 2632-072X, 015001, 10.1088/2632-072X/acace0 | |
5. | David P Shorten, Viola Priesemann, Michael Wibral, Joseph T Lizier, Early lock-in of structured and specialised information flows during neural development, 2022, 11, 2050-084X, 10.7554/eLife.74651 |