Abstract:In the well known planted clique problem, a clique (or alternatively, an independent set) of size k is planted at random in an Erdos-Renyi random G ( n , p ) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size planted in a random graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size in a G ( n , p ) graph with , there is no polynomial time algorithm that finds an independent set of size k , unless NP has randomized polynomial time algorithms.
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the problem of hiding cliques in an adversarial environment. Specifically, in the traditional random hidden - clique problem, a clique of size \(k\) is randomly implanted into a random graph \(G(n, p)\), and the goal is to design an algorithm to find this maximum clique. However, in this paper, the author introduces a variant, that is, the clique is not randomly implanted but implanted by an adversary, who tries to make it difficult to find the maximum clique.
The main contributions of the paper are as follows:
1. **Algorithm Extension**: For standard parameter settings (for example, a clique of size \(k = \sqrt{n}\) is implanted into a random graph \(G(n,\frac{1}{2})\)), known polynomial - time algorithms can be extended (in a non - trivial way) to work in an adversarial environment.
2. **NP - hardness Results**: For other natural parameter settings (for example, an independent set of size \(k=\frac{n}{2}\) is implanted into a random graph \(G(n, p)\) where \(p = n^{-\frac{1}{2}}\)), there is no polynomial - time algorithm that can find an independent set of size \(k\), unless the NP problem has a randomized polynomial - time algorithm (i.e., NP = RP).
### Key Points of the Paper
- **Random Hidden - Clique Model**: Starting from the classical random graph model \(G(n, p)\), the problem of hiding cliques in random graphs is discussed. In particular, when \(p=\frac{1}{2}\), known polynomial - time algorithms can find the hidden clique when \(k > c\sqrt{n\log n}\).
- **Adversarial Hidden - Clique Model**: In the adversarial model, the adversary can choose any \(k\) vertices to form a clique. This makes the problem more complicated because the hidden clique may no longer be the unique maximum clique.
- **Algorithm and Complexity**: The paper shows that under certain parameter settings, known polynomial - time algorithms can be extended to the adversarial environment. At the same time, for other parameter settings, the problem becomes NP - hard.
### Main Results
- **Theorem 1.1**: For every fixed \(\epsilon> 0\) and every \(k\geq\epsilon\sqrt{n}\), there exists an explicitly described algorithm with a running time of \(n^{O(\log(1 /\epsilon))}\) that can almost surely find the maximum clique in the graph \(G\sim AG(n,\frac{1}{2}, k)\).
- **Theorem 1.2**: For \(p = n^{\delta - 1}\) (where \(0 <\delta< 1\)), for every \(k\), there exists an explicitly described algorithm with a running time of \(n^{O(1/(1 - \delta))}\) that can almost surely find the maximum clique in the graph \(G\sim AG(n, p, k)\).
- **Theorem 1.3**: For \(0 <\gamma< 1\), \(0 <\delta< 1\), \(p = n^{\delta - 1}\) and \(c n^{1-\delta}\log n\leq k\leq\frac{2}{3}n\) (where \(c\) is a large enough constant), there is no polynomial - time algorithm that can find an independent set of size \(k\) with a probability of at least \(\gamma\), unless the NP problem has a randomized polynomial - time algorithm (i.e., NP = RP).
### Related Work
- **Lovász θ Function**: The algorithms in the paper are based on the Lovász θ function, which is a semi - definite programming method for calculating the upper bound of the maximum independent set of a graph.
- **Semi - random Model**: The research model of the paper is a semi - random model, in which part of the input is randomly generated and the other part is determined by the adversary. This model has a wide range of applications in graph theory and other problems.