Abstract
The graph edit distance is an intuitive measure to quantify the dissimilarity of graphs, but its computation is \(\mathsf {NP}\)-hard and challenging in practice. We introduce methods for answering nearest neighbor and range queries regarding this distance efficiently for large databases with up to millions of graphs. We build on the filter-verification paradigm, where lower and upper bounds are used to reduce the number of exact computations of the graph edit distance. Highly effective bounds for this involve solving a linear assignment problem for each graph in the database, which is prohibitive in massive datasets. Index-based approaches typically provide only weak bounds leading to high computational costs verification. In this work, we derive novel lower bounds for efficient filtering from restricted assignment problems, where the cost function is a tree metric. This special case allows embedding the costs of optimal assignments isometrically into \(\ell _1\) space, rendering efficient indexing possible. We propose several lower bounds of the graph edit distance obtained from tree metrics reflecting the edit costs, which are combined for effective filtering. Our method termed EmbAssi can be integrated into existing filter-verification pipelines as a fast and effective pre-filtering step. Empirically we show that for many real-world graphs our lower bounds are already close to the exact graph edit distance, while our index construction and search scales to very large databases.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
In various applications such as cheminformatics (Garcia-Hernandez et al. 2019), bioinformatics (Stöcker et al. 2019), computer vision (Xiao et al. 2013) and social network analysis, complex structured data arises, which can be naturally represented as graphs. To analyze large amounts of such data, meaningful measures of (dis)similarity are required. A widely accepted approach is the graph edit distance, which measures the dissimilarity of two graphs in terms of the total cost of transforming one graph into the other by a sequence of edit operations. This concept is appealing because of its intuitive and comprehensible definition, its flexibility to adapt to different types of graphs and annotations, and the interpretability of the dissimilarity measure. However, computing the graph edit distance for a pair of graphs is \(\mathsf {NP}\)-hard (Zeng et al. 2009) and challenging in practice even for small graphs. This renders similarity search regarding the graph edit distance in databases difficult, which is relevant in many applications. A prime example is a molecular information system, which often contains millions of graphs representing small molecules. A standard task in computational drug discovery is similarity search in such databases, for which the concept of graph edit distance has proven useful (Garcia-Hernandez et al. 2019). However, the extensive use of graph-based methods in such systems is still hindered by the computational burden, especially in comparison to embedding-based techniques, for which efficient similarity search is well studied (Nasr et al. 2010). Moreover, similarity search is the fundamental problem when using the graph edit distance in downstream supervised or unsupervised machine learning methods such as k-nearest neighbors classification. Promising results have been reported for classifying graphs from diverse applications representing, e.g., small molecules (Kriege et al. 2019), petroglyphs (Seidl et al. 2015), or cuneiform signs (Kriege et al. 2018). However, this approach does not readily scale to large datasets, where embedding-based methods such as graph kernels (Kriege et al. 2020) and graph neural networks (Wu et al. 2021) have become the dominating techniques.
Algorithms for exact (Gouda and Hassaan 2016), (Lerouge et al. 2017), (Chang et al. 2020), (Chen et al. 2019) or approximate (Neuhaus et al. 2006), (Riesen and Bunke 2009), (Kriege et al. 2019) graph edit distance computation have been extensively studied. They are typically optimized for pairwise comparison but can be accelerated in cases when a distance cutoff is given as part of the input. While not directly suitable for searching large databases, these algorithms are used in the verification step after a set of candidates has been obtained by filtering. In the filtering step, lower bounds on the graph edit distance are typically used to eliminate graphs that cannot satisfy the distance threshold, while upper bounds are used to add graphs to the answer set without the need for verification. Several techniques following this paradigm have been proposed, see Table 1 for an overview. An important characteristic for scalability is whether these techniques use an index to avoid scanning every graph in the database. This is not directly possible for many of the existing bounds on the graph edit distance, which were often studied in other contexts. A recent systematic comparison of existing bounds (Blumenthal et al. 2019) shows that there is a trade-off between the efficiency of computation and the tightness of lower and upper bounds. Lower bounds based on linear programming relaxations and solutions of the linear assignment problem were found to be most effective. However, the computation of such bounds requires solving non-trivial optimization problems and is inefficient compared to computing standard distances on vectors. Moreover, their combination with well-studied indices for vector or metric data is often not feasible because they do not satisfy the necessary properties such as being metric or embeddable into vector space. (Qin et al. 2020) concluded, that methods without an index do not scale well to very large databases, while those with an index often provide only loose bounds leading to a high computational cost for verification. To overcome this, they proposed an inexact filtering mechanism based on hashing, which cannot guarantee a complete answer set. We show that exact similarity search in very large databases using the filter-verification paradigm is possible. We achieve this by developing tight lower bounds based on assignment costs which are embedded into a vector space for index-based acceleration.
Our Contribution We develop multiple efficiently computable tight lower bounds for the graph edit distance, that allow exact filtering and can be used with an index for scalability to large databases. Our techniques are shown to achieve a favorable trade-off between efficiency and effectivity in filtering. Specifically, we make the following contributions.
(1) Embedding Assignment Costs. We build on a restricted version of the combinatorial assignment problem between two sets, where the ground costs for assigning individual elements are a tree metric. With this constraint, the cost of an optimal assignment equals the \(\ell _1\) distance between vectors derived from the sets and the weighted tree representing the metric (Kriege et al. 2019). We show that these vectors can be computed in linear time and optimized for combination with well-studied indices for vector data (Schubert and Zimek 2019).
(2) Lower Bounds. We formulate several assignment-based distance functions for graphs that are proven to be lower bounds on the graph edit distance. We show that their ground cost functions are tree metrics and derive the corresponding trees, from which suitable vector representations are computed. We propose bounds supporting uniform as well as non-uniform edit cost models for vertex labels. Further bounds based on vertex degrees and labeled edges are introduced, some of which can be combined to obtain tighter lower bounds. We analyze the proposed lower bounds and formally relate them to existing bounds from the literature.
(3) EmbAssi. We use the vector representation for similarity search in graph databases following the filter-verification paradigm, building upon established indices for the Manhattan (\(\ell _1\)) distance on vectors. Our approach supports range queries as well as k-nearest neighbor search using the optimal multi-step k-nearest neighbor search algorithm (Seidl and Kriegel 1998). This allows employing our approach in downstream machine learning and data mining methods such as nearest neighbors classification, local outlier detection (Schubert et al. 2014), or density-based clustering (Ester et al. 1996).
(4) Experimental Evaluation. We show that, while the proposed bounds are often close to or even outperform state-of-the-art bounds (Blumenthal et al. 2019), (Zeng et al. 2009), they can be computed much more efficiently. In the filter-verification framework, our approach obtains manageable candidate sets for verification in a very short time even in databases with millions of graphs, for which most competitors fail. Our approach supports efficient construction of an index used for all query thresholds and is, compared to several competitors (Liang and Zhao 2017), (Zhao et al. 2012), not restricted to connected graphs with a certain minimum size. We show that our approach can be combined with more expensive lower and upper bounds in a subsequent step to further reduce overall query time.
2 Related work
We summarize the related work on similarity search in graph databases and graph edit distance computation and conclude by a discussion motivating our approach.
2.1 Similarity search in graph databases
Several methods for accelerating similarity search in graph databases have been proposed, see Table 1. Most approaches follow the filter-verification paradigm and rely on lower and upper bounds of the graph edit distance. These techniques focus almost exclusively on range queries and assume a uniform cost function for graph edit operations. Most of the methods suitable for similarity search can be divided into two categories depending on whether they compare overlapping or non-overlapping substructures.
Representatives of the first category are k-AT (Wang et al. 2012), CStar (Zeng et al. 2009), Segos (Wang et al. 2012) and GSim (Zhao et al. 2012). These methods are inspired by the concept of q-grams commonly used for string matching. In (Wang et al. 2012) tree-based q-grams on graphs were proposed. The k-adjacent tree of a vertex \(v \in V(G)\), denoted k-AT(v), is defined as the top-k level subtree of a breadth-first search tree in G, starting with vertex v. For example, the 1-AT(v) is a tree rooted at v with the neighbors of v as children. These trees can be generated for each vertex of a graph and the graph can then be represented as the set of its k-ATs. Lower bounds for filtering are computed from these representations, which are organized in an inverted index. CStar (Zeng et al. 2009) is a method for computing an upper and lower bound on the graph edit distance using so-called star representations of graphs, which consist of a 1-AT for each vertex, called star. An optimal assignment between the star representations of graphs regarding a ground cost function on stars the assignment cost yields a lower bound (Zeng et al. 2009). An upper bound can be obtained by using the cost of an edit path induced by the optimal assignment. Segos (Wang et al. 2012) also uses these stars as (overlapping) substructures, but enhances the computation of the mapping distance and makes use of a two-layered index for range queries. Another view on q-grams is given by the GSim method (Zhao et al. 2012), which uses path-based q-grams, i.e., simple path of length q, instead of stars. Since the number of path-based q-grams affected by an edit operation is lower than the number of tree-based q-grams, the derived lower bound is tighter (Zhao et al. 2012).
The second category includes Pars (Zhao et al. 2013), MLIndex (Liang and Zhao 2017) and Inves (Kim et al. 2019), which partition the graphs into non-overlapping substructures. They essentially obtain lower bounds based on the observation, that if x partitions of a database graph are not contained in the query graph, the graph edit distance is at least x. Pars uses a dynamic partitioning approach to exploit this, while MLIndex uses a multi-layered index to manage multiple partitionings for each graph. Inves is a method used to verify whether the graph edit distance of two graphs is below a specified threshold by first trying to generate enough mismatching partitions. Mixed (Zheng et al. 2015) combines the idea of q-grams and graph partitioning. First, a lower bound that uses the same idea as Inves (Kim et al. 2019), but a different approach to find mismatching partitions, is proposed. Another lower bound based on so-called branch structures (a vertex and its adjacent edges without the opposite vertex) is combined with the first one to gain an even tighter lower bound. This bound can be generalized to non-uniform edit costs and is referred to as Branch (Blumenthal et al. 2019). Recently, it has been proven that this bound is metric and its combination with an index to speed up similarity search for attributed graphs has been proposed (Bause et al. 2021).
2.1.1 Pairwise computation of the graph edit distance
In the verification step, the remaining candidates have to be validated by computing the exact graph edit distance. Both general-purpose algorithms (Lerouge et al. 2017) as well as approaches tailored to the verification step have been proposed (Chang et al. 2020), which are usually based on depth- or breadth-first search (Gouda and Hassaan 2016), (Chang et al. 2020) or integer linear programming (Lerouge et al. 2017).
On large graphs, these methods are not feasible and approximations are used (Neuhaus et al. 2006), (Chen et al. 2019), (Riesen and Bunke 2009), (Kriege et al. 2019). These can be obtained from the exact approaches, e.g., using beam search (Neuhaus et al. 2006) or linear programming relaxations (Blumenthal et al. 2019). BeamD (Neuhaus et al. 2006) finds a sub-optimal edit path following the \(A^*\) algorithm by extending only a fixed number of partial solutions. A state-of-the-art approach is BSS_GED (Chen et al. 2019), which reduces the search space based on beam stack search. It is not only used for computation of the exact graph edit distance, but also for similarity search by filtering with lower bounds during a linear database scan. Recently, an approach using neural networks to improve the performance of the beam search algorithm was proposed (Yang and Zou 2021).
A successful technique referred to as bipartite graph matching (Riesen and Bunke 2009) obtains a sub-optimal edit path from the solution of an optimal assignment between the vertices where the ground costs also encode the local edge structure. The assignment problem is solved in cubic time using Hungarian-type algorithms (Burkard et al. 2012), (Munkres 1957) or in quadratic time using simple greedy strategies (Riesen et al. 2015). The running time was further reduced by defining ground costs for the assignment problem that are a tree metric (Kriege et al. 2019). This allows computing an optimal assignment in linear time by associating elements to the nodes of the tree and matching them in a bottom-up fashion. A tree metric gained from the Weisfeiler-Lehman refinement showed promising results.
2.1.2 Discussion
Various upper and lower bounds for the graph edit distance are known, some of which have been proposed for similarity search, while others are derived from algorithms for pairwise computation and are not directly suitable for fast searching in databases. Recently, an extensive study (Blumenthal et al. 2019) of different bounds confirmed, that there is a trade-off between computational efficiency and tightness. Lower bounds based on linear programming relaxations and the linear assignment problem were found to be most effective. However, the computation of such bounds requires solving an optimization problem and the combination with indices is non-trivial. Therefore, it has been proposed to compute graph embeddings optimized by graph neural networks, which reflect the graph edit distance, to make efficient index-based filtering possible (Qin et al. 2020). This and numerous other approaches (Li et al. 2019), (Bai et al. 2019) that use neural networks to approximate the similarity of graphs do not compute lower or upper bounds on the graph edit distance and hence cannot be used to obtain exact results. Because of this, they are only suitable in situations in which incomplete answer sets are acceptable and are not in direct competition with exact approaches.
Recently, distance measures based on optimal assignments or, more generally, optimal transport (a.k.a. Wasserstein distance) have become increasingly popular for structured data. A method for approximate nearest neighbor search regarding the Wasserstein distance has been proposed recently (Backurs et al. 2020). Another line of work studies special cases, which allow vector space embeddings, e.g., in the domain of kernels for structured data (Kriege et al. 2016), (Le et al. 2019), (Kriege et al. 2019). On that basis we develop embeddings of novel assignment-based lower bounds for the graph edit distance, which are effective and allow index-accelerated similarity search, while guaranteeing exact results.
3 Preliminaries
We first give an overview of basic definitions concerning graph theory and database search. Then, we introduce tree metrics and the assignment problem, which play a major role in our new approach.
3.1 Graph theory
A graph \(G = (V,E,\mu ,\nu )\) consists of a set of vertices \(V(G)=V\), a set of edges \(E(G)=E \subseteq V\times V\), and labeling functions \(\mu : V \rightarrow L\) and \(\nu : E \rightarrow L\) for the vertices and edges. The labels L can be arbitrarily defined. We consider undirected graphs and denote an edge between u and v by uv. The neighbors of a vertex v are denoted by \(N(v) = \{u\mid uv\in E(G)\}\) and the degree of v is \(\delta (v) = |N(v)|\). The maximum degree of a graph G is \(\delta (G) = \max _{v\in V} \delta (v)\) and we let \(\Delta = \max _{G\in \text {DB}} \delta (G)\) for the graph dataset \(\text {DB}\).
A measure commonly used to describe the similarity of two graphs is the graph edit distance. An edit operation can be deleting or inserting an isolated vertex or an edge or relabeling any of the two. An edit path between graphs G and H is a sequence \((e_1,e_2,\dots ,e_k)\) of edit operations that transforms G into H. This means, that if we apply all operations in the edit path to G, we get a graph \(G'\) that is isomorphic to H, i.e., we can find a bijection \(\xi :V(G') \rightarrow V(H)\), so that \(\forall v \in V(G'). \mu (v) = \mu (\xi (v)) \wedge \forall uv \in E(G'). \nu (uv) = \nu (\xi (u)\xi (v))\). The graph edit distance is the cost of the (not necessarily unique) cheapest edit path.
Definition 1
(Graph Edit Distance (Riesen and Bunke 2009) Let c be a function assigning non-negative costs to edit operations. The graph edit distance between two graphs G and H is defined as
where \(\Upsilon (G,H)\) denotes all possible edit paths from G to H.
Computation of the graph edit distance is \(\mathsf {NP}\)-hard (Zeng et al. 2009). Hence, exact computation is possible only for small graphs. There are several heuristics, see Sect. 2, many of which are based on solving an assignment problem.
3.2 Optimal assignments and tree metrics
The assignment problem is a well-studied combinatorial optimization problem (Munkres 1957), (Burkard et al. 2012).
Definition 2
(Assignment Problem) Let A and B be two sets with \({|}{A}{|}={|}{B}{|}=n\) and \(c:A \times B \rightarrow {\mathbb {R}}\) a ground cost function. An assignment between A and B is a bijection \(f:A \rightarrow B\). The cost of an assignment f is \(c(f) = \sum _{a\in A} c(a,f(a))\). The assignment problem is to find an assignment with minimum cost.
For an assignment instance (A, B, c), we denote the cost of an optimal assignment by \(d^c_\mathrm {oa}(A,B)\). The assignment problem can be solved in cubic running time using a suitable implementation of the Hungarian method (Munkres 1957), (Burkard et al. 2012). The running time can be improved when the cost function is restricted, e.g., to integral values from a bounded range (Duan and Su 2012). Of particular interest for our work is the requirement that the cost function is a tree metric, which allows to solve the assignment problem in linear time (Kriege et al. 2019) and relates the optimal cost to the Manhattan distance, see Sect. 4.1 for details. We summarize the concepts related to these distances.
Definition 3
(Metric) A metric d on X is a function \(d:X \times X \rightarrow {\mathbb {R}}\) that satisfies the following properties for all \(x,y,z \in X\): (1) \(d(x,y)\ge 0\) (non-negativity), (2) \(d(x,y)=0 \Longleftrightarrow x = y\) (identity of indiscernibles), (3) \(d(x,y)=d(y,x)\) (symmetry), (4) \(d(x,y)\le d(x,z) + d(y,z)\) (triangle inequality).
The Manhattan metric (also city-block or \(\ell _1\) distance) is the metric function \(d_m(\varvec{x},\varvec{y})= {\Vert }{\smash {\varvec{x}-\varvec{y}}}{\Vert }_1 = \sum _{i=1}^{n} \mid x_i -y_i\mid \). A tree T is an acyclic, connected graph. To avoid confusion, we will call its vertices nodes. A tree with non-negative edge weights \(w: E(T) \rightarrow {\mathbb {R}}_{\ge 0}\) yields a function \(d_{T\!,w}(u,v) = \sum _{e \in P(u,v)} w(e)\) on V(T), where P(u, v) is the unique simple path from u to v in T.
Definition 4
(Tree Metric) A function \(d: X \times X \rightarrow {\mathbb {R}}\) is a tree metric if there is a tree T with \(X \subseteq V(T)\) and strictly positive real-valued edge weights w, such that \(d(u,v) = d_{T\!,w}(u,v)\), for all \(u,v \in X\).
Vice versa, every tree with strictly positive weights induces a tree metric on its nodes. Equivalently, a metric d is a tree metric iff \(\forall v,w,x,y \in X.\) \( d(x,y)+d(v,w)\le \max \{d(x,v)+d(y,w), d(x,w)+d(y,v)\}\) (Semple and Steel 2003). For such a tree with leaves X, a distinguished root, and the additional constraint that all paths from the root to a leaf have the same weighted length, the induced tree metric is an ultrametric. Equivalently, a metric d on X is an ultrametric if it satisfies the strong triangle inequality \(\forall x,y,z \in X.\) \( d(x,y) \le \max \{d(x,z),d(y,z)\}\) (Semple and Steel 2003). In the following, we also allow edge weight zero. Therefore, the distances induced by a tree may violate property (2) of Definition 3 and are therefore pseudometrics. For the sake of simplicity, we still use the terms tree metric and ultrametric.
We consider the assignment problem, where the cost function \(c:A \times B \rightarrow {\mathbb {R}}\) is a tree metric \(d: X \times X \rightarrow {\mathbb {R}}\). To formalize the link between these two functions and, hence, Definitions 2 and 4, we introduce the map \(\varrho :A \cup B \rightarrow X\). Given a tree metric specified by the tree T with weights w and the map \(\varrho \), the cost for assigning an object \(a \in A\) to an object \(b \in B\) is defined as \(c(a,b)=d_{T\!,w}(\varrho (a), \varrho (b))\). Note that \(\varrho \) is not required to be injective. Therefore, c may be a pseudometric even for trees with strictly positive weights. The input size of the assignment problem according to Definition 2 typically is quadratic in n as c is given by an \(n\times n\) matrix. If c is a tree metric, it can be compactly represented by the tree T with weights w having a total size linear in n.
3.3 Searching in databases
Databases can store data in order to retrieve, insert or change it efficiently. Regarding data analysis, retrieval (search) is usually the crucial operation on databases, because it will be performed much more often than updates. We focus on two types of similarity queries when searching a database \(\text {DB}\), the first of which is the range query for a radius r.
Definition 5
(Range Query) Given a query object q and a threshold r, determine \({\text {range}}(q, r)= \{o \in \text {DB}\mid d(o,q)\le r\}\).
A range query finds all objects with a distance no more than the specified range threshold r to the query object q. If the distance d is expensive to compute, it makes sense to use the so-called filter-verification principle. In this approach different lower and upper bounds are used to filter out a hopefully large portion of the database. A function \(d'\) is a lower bound on d if \(d'(x,y)\le d(x,y)\), and an upper bound if \(d'(x,y)\ge d(x,y)\) for all \(x, y \in X\). Clearly, objects where one of the lower bounds is greater than r can be dismissed since the exact distance would be even greater. Objects, where an upper bound is at most r can be added to the result immediately. Only the remaining objects need to be verified by computing the exact distance.
The second type of query considered here is the nearest neighbor query, which returns the objects that are closest to the query object.
Definition 6
(k-Nearest Neighbor Query, knn Query) Given a query object q and a parameter k, determine the smallest set \({\text {NN}}(q, k)\subseteq \text {DB}\), so that \({|}{{\text {NN}}(q, k)}{|}\ge k\) and \(\forall o \in {\text {NN}}(q, k), \forall o^\prime \in \text {DB}\setminus {\text {NN}}(q, k):d(o,q)< d(o^\prime ,q).\)
In conjunction with range queries, it is preferable to return all the objects with a distance, that does not exceed the distance to the kth neighbor, which may be more than k objects when tied. That yields an equivalency of the results of knn queries and range queries, i.e., we have \({\text {range}}(q, r)={\text {NN}}(q, {|}{{\text {range}}(q, r)}{|})\) and \({\text {NN}}(q, k)={\text {range}}(q, r_k)\), where \(r_k\) is the maximum distance in \({\text {NN}}(q, k)\).
The optimal multi-step k-nearest neighbor search algorithm (Seidl and Kriegel 1998) minimizes the number of candidates verified by using an incremental neighbor search, which returns the objects in ascending order regarding the lower bound. As new candidates are discovered, their exact distance is computed. The current kth smallest exact distance is used as a bound on the incremental search: once we have found at least k objects with an exact distance smaller than the lower bound of all remaining objects, the result is complete. This approach is optimal in the sense that none of the exact distance computations could have been avoided (Seidl and Kriegel 1998).
4 EmbAssi: embedding assignment costs for graph edit distance lower bounds
We define lower bounds for the graph edit distance obtained from optimal assignments regarding tree metric costs. These bounds are embedded in \(\ell _1\) space and used for index-accelerated filtering. In Sect. 4.1 we describe the general technique for embedding optimal assignment costs for tree metric ground costs based on (Kriege et al. 2019). In Sect. 4.2 we propose several embeddable lower bounds for the graph edit distance derived from such assignment problems. These are suitable for graphs with discrete labels and uniform edit costs and are generalized to non-uniform edit costs. In Sects. 5.1 and 5.2 we show how to use these bounds for both range and k-nearest neighbor queries and discuss optimization details.
4.1 Embedding assignment costs
Let (A, B, c) be an assignment problem, where the cost function c is a tree metric defined by the tree T with weights w. The cost of an optimal assignment is equal to the Manhattan distance between vectors derived from the sets A and B using the tree T and weights w (Kriege et al. 2019). Recall that the cost of an assignment is the sum of the costs of all matched pairs. A matched pair (a, b) contributes the cost defined by the weight of the edges on the unique path between the nodes \(\varrho (a)\) and \(\varrho (b)\) in T. Hence, the total cost can be obtained from the number of times the edges occur on such paths.
Let \(S_{\overleftarrow{uv}}\) correspond to the number of elements of a set S, that are associated by the mapping \(\varrho \) with nodes in the subtree of T containing u, when the edge uv is deleted (see Fig. 1). It was shown in (Kriege et al. 2019) that an optimal assignment has cost
Note that the roles of u and v are interchangeable and we indicate the choice by directing the edge accordingly. Although this does not affect the assignment cost when applied consistently, there are subtle technical consequences, which we discuss for concrete tree metrics in Sect. 5.1. Using T and w we can map sets to vectors having a component for every edge of T defined as \(\Phi _c(S) = \left[ \smash {S_{\overleftarrow{uv}}} \cdot w(uv)\right] _{uv \in E(T)}.\) From Eq. 1 it directly follows that the optimal assignment cost are
This embedding of the optimal assignment cost into \(\ell _1\) space is used in the following to obtain assignment-based lower bounds on the graph edit distance.
4.2 Embeddable lower bounds
Several lower bounds on the graph edit distance can be obtained from optimal assignments (Blumenthal et al. 2019). However, these typically do not use a tree metric cost function, which complicates the embedding of assignment costs. In (Kriege et al. 2019) two tree metrics, one based on Weisfeiler-Lehman refinement for graphs with discrete labels and one using clustering for attributed graphs, were introduced. These, however, both do not yield a lower bound. We develop new lower bounds on the graph edit distance from optimal assignment instances, which have a tree metric ground cost function. Most similarity search techniques for the graph edit distance assume a uniform cost model, where every edit operation has the same cost. We also support variable cost functions and discuss choices that are supported by our approach. We use \(c_v\)/\(c_e\) to denote the costs of inserting or deleting vertices/edges and \(c_{vl}\)/\(c_{el}\) for the costs of changing the respective label.
4.2.1 Vertex label lower bounds
A natural method for defining a lower bound on the graph edit distance is to just take the labels into account ignoring the graph structure. We first discuss the case of uniform cost for changing a label, which is common for discrete labels. Then, non-uniform costs are considered.
Uniform Cost Functions Clearly, each vertex of one graph, that cannot be assigned to a vertex of the other graph with the same label has to be either deleted or relabeled. The idea leads to a particularly simple assignment instance when we assume fixed costs \(c_{vl}\) and \(c_v\). Let \(G\) and \(H\) be two graphs with n respectively m vertices. Following the common approach to obtain an assignment instance (Riesen and Bunke 2009), we extend \(G\) by m and \(H\) by n dummy nodes denoted by \(\epsilon \).Footnote 1 We consider the following assignment problem.
Definition 7
(Label Assignment) The label assignment instance for \(G\) and \(H\) is given by \((V(G), V(H), c_{\text {llb}})\), where the ground cost function is
We define \(\textit{LLB}(G,H)=d^{c_{\text {llb}}}_\mathrm {oa}(V(G),V(H))\) and show that it provides a lower bound on the graph edit distance.
Proposition 1
(Label lower bound) For any two graphs \(G\) and \(H\), we have \(\textit{LLB}(G,H) \le \textit{GED}(G, H)\).
Proof
Every assignment directly induces a set of edit operations, which can be arranged to form an edit path. Vice versa, every edit path can be represented by an assignment (Riesen and Bunke 2009), (Blumenthal et al. 2019). Let \(\varvec{e}\) be a minimum cost edit path. We construct an assignment f from the vertex operations in \(\varvec{e}\), where the deletion of v is represented by \((v,\epsilon ) \in f\), insertion by \((\epsilon , v) \in f\), and relabeling of the vertex u with the label of v by \((u,v) \in f\), where \(u,v \ne \epsilon \). We have \(c(\varvec{e}) = Z_v+Z_e\), where \(Z_v\) and \(Z_e\) are the costs of vertex and edge edit operations, respectively. According to the definition of \(c_{\text {llb}}\) and the construction of f we have \(Z_v=c_{\text {llb}}(f)\). An optimal assignment o satisfies \(c_{\text {llb}}(o) \le c_{\text {llb}}(f)\) and \(\textit{LLB}(G,H)=c_{\text {llb}}(o) \le c_{\text {llb}}(f) \le c(\varvec{e})=\textit{GED}(G, H)\) follows, since \(Z_e \ge 0\). \(\square \)
To obtain embeddings, we investigate for which choices of edit costs the ground cost function \(c_{\text {llb}}\) is a tree metric.
Proposition 2
(LLB tree metric) The ground cost function \(c_{\text {llb}}\) is a tree metric if and only if \(c_{vl} \le 2c_v\).
Proof
First we assume \(c_{vl} \le 2c_v\) and define a tree T with a central node r having a neighbor for every label \(l \in L\) and a neighbor d. Let \(w(rl)=\tfrac{1}{2} c_{vl}\) for all \(l \in L\) and \(w(rd)=c_v-\tfrac{1}{2} c_{vl}\), cf. Figure 2b. The assumption guarantees that all weights are non-negative. We consider the map \(\varrho (v)=\mu (v)\) for \(v\ne \epsilon \) and \(\varrho (\epsilon )=d\). We observe that \(c_{\text {llb}}(u,v)=d_{T\!,w}(\varrho (u), \varrho (v))\) by verifying the three cases.
The reverse direction is proven by contradiction. Assume \(c_{vl} > 2c_v\) and \(c_{\text {llb}}\) a tree metric. Let u and v be two vertices with \(\mu (u)\ne \mu (v)\), then \(c_{\text {llb}}(u,v) =c_{vl}\) and \(c_{\text {llb}}(u, \epsilon )=c_{\text {llb}}(\epsilon , v) = c_v\). Therefore, \(c_{\text {llb}}(u,v) > c_{\text {llb}}(u, \epsilon )+c_{\text {llb}}(\epsilon , v)\) contradicting the triangle inequality, Definition 3, (4). Thus, \(c_{\text {llb}}\) is not a metric and, in particular, not a tree metric contradicting the assumption. \(\square \)
The requirement \(c_{vl} \le 2c_v\) states that relabeling a vertex is at most as expensive as deleting and inserting it with the correct label. This is generally reasonable and not a severe limitation. Because the proof is constructive, it allows us to represent \(c_{\text {llb}}\) by a weighted tree, from which we can compute the graph embedding representing the assignment costs following the approach described in Sect. 4.1.
Figure 2 illustrates the embedding of the label lower bound for an example. The tree representing the cost function is shown in Fig. 2b. The weight of the edge from the dummy node to the root is chosen, such that the path length from a label to the dummy node is \(c_v\). Figure 2c shows the vectors \(\Phi \) of the two example graphs, which allows obtaining \(\textit{LLB}(G,H)={\Vert }{\Phi (G) - \Phi (H)}{\Vert }_1 = c_{vl}\) as the Manhattan distance.
Non-Uniform Cost Functions We have discussed the case where changing one label into another has a fixed cost of \(c_{vl}\). In general, the cost for this may depend on the two labels involved, i.e., we assume that a cost function \(c_{vl}:L\times L \rightarrow {\mathbb {R}}_{\ge 0}\) is given. Two common scenarios can be distinguished: First, L is a (small) finite set of labels that are similar to varying degrees. An example are molecular graphs, where the costs are defined based on vertex labels encoding their pharmacophore properties (Garcia-Hernandez et al. 2019). Second, L is infinite (or very large), e.g., vertices are annotated with coordinates in \({\mathbb {R}}^2\) and the cost is defined as the Euclidean distance. We propose a general method and then discuss its applicability to both scenarios.
We can extend the tree defining the metric used in the above paragraph to allow for more fine-grained vertex relabel costs. To this end, an arbitrary ultrametric tree on the labels L is defined, where the node d representing deletions is added to its root r. Recall that in an ultrametric tree the lengths of all paths from the root to a leaf are equal to, say, u. We define the weight of the edge between r and d as \(c_v - u\) and observe that \(c_v \ge u\) is required to obtain a valid tree metric in analogy to the proof of Proposition 2.
To obtain an ultrametric tree that reflects the given edit cost function \(c_{vl}\), we employ hierarchical clustering. To guarantee that the assignment costs are a lower bound on the graph edit distance, it is crucial that interpreting the hierarchy as an ultrametric tree will underestimate the real edit costs. For optimal results, we would like to obtain a tight lower bound. We formalize the requirements. Let \(c_{vl}:L{\times } L \rightarrow {\mathbb {R}}_{\ge 0}\) be the given cost function and \(d_{hc}:L{\times } L \rightarrow {\mathbb {R}}_{\ge 0}\) the ultrametric induced by hierarchical clustering of L with cost function \(c_{vl}\). Let \(U^{-}\!(c_{vl})\) be the set of all ultrametrics that are lower bounds on \(c_{vl}\). There is a unique ultrametric \(d^* \in U^{-}\!(c_{vl})\) defined as \(d^*(l_1,l_2) = \sup _{d \in U^{-}\!(c_{vl})} \{d(l_1,l_2)\}\) for all \(l_1, l_2 \in L\) (Bock 1974). This \(d^*\) is an upper bound on all ultrametrics in \(U^{-}\!(c_{vl})\), a lower bound on \(c_{vl}\) and called the subdominant ultrametric to \(c_{vl}\). The subdominant ultrametric is generated by single-linkage hierarchical clustering (Bock 1974), which therefore is, in this respect, optimal for our purpose. In particular, it reconstructs an ultrametric tree if the original costs are ultrametric. Moreover, single-linkage clustering can be implemented with running time \(O({|}{L}{|}^2)\) (Sibson 1973).
For a finite set of labels L, our method is a viable solution if the edit cost function \(c_{vl}\) is close to an ultrametric and L is small. If L is infinite, we need to approximate it with a finite set through quantization or space partitioning. The realization of such an approach preserving the lower bound property depends on the specific application and is hence not further explored here.
4.2.2 Degree lower bound
The \(\textit{LLB}\) does not take the graph structure into account. We now introduce the degree lower bound, which focuses on how many edges have to be inserted or deleted at the minimum. When deleting or inserting vertices, all of the adjacent edges have to be deleted or inserted as well. If two vertices with differing degrees are assigned to one another, again edges have to be deleted or inserted accordingly. As in Sect. 4.2.1, we extend the graphs \(G\) and \(H\) by dummy nodes \(\epsilon \) and define an assignment problem.
Definition 8
(Degree Assignment) The degree assignment instance for \(G\) and \(H\) is given by \((V(G), V(H), c_{\text {dlb}})\), where the ground cost function is \(c_{\text {dlb}}(u,v) = \tfrac{1}{2} c_e \mid \delta (u)-\delta (v)\mid \) with \(\delta (\epsilon ):=0\) for the dummy nodes.
We define \(\textit{DLB}(G,H)=d^{c_{\text {dlb}}}_\mathrm {oa}(V(G),V(H))\), and show that it is a lower bound.
Proposition 3
(Degree lower bound) For any two graphs \(G\) and \(H\), we have \(\textit{DLB}(G,H) \le \textit{GED}(G, H)\).
Proof
Using the same arguments as in the proof of Proposition 2, let \(\varvec{e}\) be a minimum cost edit path and f an assignment that induces \(\varvec{e}\). We divide the costs \(c(\varvec{e}) = Z_v{+}Z_e\) into costs \(Z_v\) and \(Z_e\) of vertex and edge edit operations. For the matched vertices v and f(v) at least \(\mid \delta (v)-\delta (f(v))\mid \) edges must be deleted or inserted to balance the degrees; in case of insertion and deletion all adjacent edges must be inserted or deleted. Since each edge edit operation increases or decreases the degree of its two endpoints by one, the sum of these costs over all vertices must be divided by two and \(c_{\text {dlb}}(f)=Z_e\) follows. \(\square \)
To obtain an embedding, we show that \(c_{\text {dlb}}\) is a tree metric.
Proposition 4
(DLB tree metric) The ground cost function \(c_{\text {dlb}}\) is a tree metric.
Proof
To prove that \(c_{\text {dlb}}\) is a tree metric, we construct a tree T with edge weights w and a map \(\varrho \), so that \(c_{\text {dlb}}(u,v) = d_{T\!,w}(\varrho (u),\varrho (v))\). Let T have nodes \(V(T)=\{r=0, 1,\dots ,\Delta \}\) and edges \(E(T)=\{ij \mid j=i{+}1\}\) with weight \(w_1=\tfrac{1}{2} c_e\). Since \(c_e\) cannot be negative, all edge weights are non-negative. We consider the map
It can easily be seen, that \(c_{\text {dlb}}(u,v) = d_{T\!,w}(\varrho (u),\varrho (v))\) by verifying the path lengths in the tree. \(\square \)
The proof gives a concept to construct a tree representing the DLB cost function. As there is no difference between a vertex with degree 0 and a dummy vertex, they can both be assigned to the root node r. Note, that the edge labels are not taken into account by this lower bound and edge insertion and deletion are not distinguished. Figure 3 illustrates the embedding of the degree lower bound, which yields \(\textit{DLB}(G,H) = c_{e}\) for the running example.
4.2.3 Combined lower bound
We can combine LLB and DLB to improve the approximation.
Definition 9
(CLB) The combined lower bound between \(G\) and \(H\) is defined as \(\textit{CLB}(G,H)= \textit{LLB}(G,H) + \textit{DLB}(G,H).\)
We show, that \(\textit{CLB}\) is a lower bound on the graph edit distance. Note that this lower bound is based on the two assignments given by \(\textit{LLB}\) and \(\textit{DLB}\), which are not necessarily equal.
Lemma 1
Let \(c_1, c_2\) and c be ground cost functions on X and \(c(x,y)=c_1(x,y)+c_2(x,y)\) for all \(x,y \in X\). Then for any \(A,B \subseteq X\), \({|}{A}{|}={|}{B}{|}=n\), the inequality \(d^{c_1}_\mathrm {oa}(A,B) + d^{c_2}_\mathrm {oa}(A,B) \le d^{c}_\mathrm {oa}(A,B)\) holds.
Proof
Let \(o_1, o_2\) and o be optimal assignments between A and B regarding the ground costs \(c_1, c_2\) and c, respectively. Due to the optimality we have \(c_1(o_1) \le c_1(o)\) and \(c_2(o_2) \le c_2(o)\). Hence, \(d^{c_1}_\mathrm {oa}(A,B) + d^{c_2}_\mathrm {oa}(A,B) = c_1(o_1) + c_2(o_2)\le c_1(o)+ c_2(o) = c(o) = d^{c}_\mathrm {oa}(A,B)\). \(\square \)
Proposition 5
(Combined lower bound) For any two graphs \(G\) and \(H\), we have \(\textit{CLB}(G,H) \le \textit{GED}(G, H)\).
Proof
Let \(\varvec{e}\) be a minimum cost edit path and f an assignment that induces \(\varvec{e}\). We divide the costs \(c(\varvec{e}) = Z_v+Z_e\) into costs \(Z_v\) and \(Z_e\) of vertex and edge edit operations. From the proof of Propositions 1 and 3 we know that \(Z_v \ge c_{\text {llb}}(f)\) and \(Z_e \ge c_{\text {dlb}}(f)\) and, hence, \(c(\varvec{e})\ge c_{\text {llb}}(f) + c_{\text {dlb}}(f)\). Application of Lemma 1 yields \(\textit{CLB}(G,H) = c_{\text {llb}}(f_1)+c_{\text {dlb}}(f_2) \le c_{\text {llb}}(f)+c_{\text {dlb}}(f) \le c(\varvec{e}) = \textit{GED}(G, H)\), where \(f_1\) and \(f_2\) are optimal assignments regarding \(c_{\text {llb}}\) and \(c_{\text {dlb}}\). \(\square \)
This lower bound is at least as tight as the ones it consists of and, therefore, most promising. The combined lower bound is embedded by concatenating the vectors for LLB and DLB.
4.3 Analysis
We provide a theoretical comparison of our proposed bounds to existing lower bounds and also give details on the time complexity of our approach.
4.3.1 Comparison with existing bounds
We relate the \(\textit{CLB}\) to two well-known lower bounds when applied to graphs with vertex labels. The simple label filter (SLF) is the intersection of vertex and edge label multisets, i.e., \(\textit{SLF}(G,H) = {|}{L_V(G) \cap L_V(H)}{|} + {|}{{|}{ E(G)}{|} -{|}{E(H)}{|}}{|}\) in our case, where \(L_V\) denotes the vertex label multiset of a graph. Although simple, this bound is often found to be selective (Kim et al. 2019) and, therefore, widely-used (Zhao et al. 2012), (Zhao et al. 2013). A very effective bound according to (Blumenthal et al. 2019) is BranchLB based on general optimal assignments. Several variants have been proposed (Riesen and Bunke 2009), (Zheng et al. 2015), (Blumenthal et al. 2019) with at least cubic worst-case time complexity. In our case, BranchLB is the cost of the optimal assignment regarding the ground costs \(c_{\text {branch}}(u,v) = c_{\text {llb}}(u,v)+c_{\text {dlb}}(u,v)\). Note that \(c_{\text {branch}}\) in general is not a tree metric. SLF assumes \(c_v=c_{vl}=c_e=1\) and we consider this setting although \(\textit{CLB}\) and BranchLB are more general. Using counting arguments and Lemma 1 we obtain the following relation:
Proposition 6
For any two vertex-labeled graphs \(G\) and \(H\), \(\textit{SLF}(G,H)\,{\le }\,\textit{CLB}(G,H){\le }\,\textit{BranchLB}(G,H){\le }\,\textit{GED}(G, H)\).
Experimentally we show in Sect. 6 that our combined lower bound is close to BranchLB for a wide-range of real-world datasets, but is computed several orders of magnitude faster and allows indexing. This makes it ideally suitable for fast pre-filtering and search.
4.3.2 Time complexity
We first consider the time required for generating the vector \(\Phi _c(S)\) for a set S and tree T defining the ground cost function c.
Proposition 7
Given a set S and a weighted tree T representing the ground cost function c, the vector \(\Phi _c(S)\) can be computed in \(O({|}{V(T)}{|}+{|}{S}{|})\) time.
Proof
We first associate the elements of S with the nodes of T via the map \(\varrho \) and then traverse T starting from the leaves progressively moving towards the center. The order guarantees that when the node u is visited, exactly one of its neighbors, say v, has not yet been visited. Then \(S_{\overleftarrow{uv}}\) can be obtained as \(\sum _{w\in N(u)\setminus \{v\}} S_{\overleftarrow{wu}}\) from the values computed previously. The tree traversal and computation of \(S_{\overleftarrow{uv}}\) for all \(uv\in E(T)\) takes \(O({|}{V(T)}{|})\) total time. Together with the time for processing the set S we obtain \(O({|}{V(T)}{|}+{|}{S}{|})\) time. \(\square \)
The time complexity of the different bounds depends on the size of the tree representing the metric and the size of the graphs.
Proposition 8
The bounds \(c_{\text {llb}}\), \(c_{\text {dlb}}\) and \(c_{\text {clb}}\) for two graphs G and H can be computed in \(O({|}{V(G)}{|}+{|}{V(H)}{|})\) time.
Proof
First the tree T defining the metric is computed. For the different tree metrics, the trees sizes are linear in the number of nodes of the two graphs G and H: For \(c_{\text {llb}}\) the tree (denoted \(T_{\text {llb}}\)) has size \({|}{L_v(G)\cup L_v(H)}{|}+2\), where \(L_v(G)\) denotes the set of vertex labels occurring in G. The tree consists of a node for each vertex label plus a dummy and a central node. In the worst case, where all labels occur only once, the tree is of size \({|}{V(G)}{|}+{|}{V(H)}{|}+2\). For \(c_{\text {dlb}}\), we have \({|}{V(T_{\text {dlb}})}{|} =\max (\delta (G),\delta (H))+1\), since there is a node for each vertex degree, up to the maximum degree (including degree 0). As shown in Proposition 7, the vector \(\Phi _c(G)\) can then be computed in time \(O({|}{V(T)}{|}+{|}{V(G)}{|})\). For \(c_{\text {clb}}\) we concatenate the vectors of \(c_{\text {llb}}\) and \(c_{\text {dlb}}\). The Manhattan distance between two vectors is computed in time linear in the number of components, which is \(O({|}{V(T)}{|})\). Thus, the total running time for computing any of the bounds is in \(O({|}{V(G)}{|}+{|}{V(H)}{|})\). \(\square \)
The bound \(\textit{SLF}\) also has a linear time complexity while BranchLB requires \(O(n^2 \Delta ^3 + n^3 )\) time for graphs with n vertices and maximum degree \(\Delta \) (Blumenthal et al. 2019). Our new approach matches the running time of \(\textit{SLF}\) but in most cases yields tighter bounds, cf. Proposition 6 and our experimental evaluation in Sect. 6. Hence, it provides a favorable trade-off between efficiency and quality and at the same time can conveniently be combined with indices.
5 EmbAssi for graph similarity search
We use the proposed lower bounds for similarity search by computing embeddings for all the graphs in the database in a preprocessing step. Given a query graph, we compute its embedding and realize filtering utilizing indices regarding the Manhattan distance. The approach is illustrated in Fig. 4. Algorithm 1 shows how the preprocessing is done, exemplary for \(\textit{LLB}\): We construct the tree metric based on the labels and associate the vertices with the leaves of the tree. Then for each graph the embedding is computed using Algorithm 2.
Several technical details must be considered. The choice of how to direct the edges has a huge impact on the resulting vectors and of course using a suitable index is also important. In the following, we briefly discuss our choices and explain how similarity search queries can be answered.
5.1 Index construction
We compute the vectors for all graphs in the database and store them in an index to accelerate queries. When defining the bounds, we considered the pairwise comparison of two graphs and added dummy vertices to obtain graphs of the same size. We have chosen the direction of edges in the trees representing the metrics carefully, cf. Section 4.1, to generate consistent embeddings for the entire database. By rooting the trees at the node \(\varrho (\epsilon )\) representing the dummy vertices (see Algorithm 1) and directing all edges towards the leaves the dummy vertices are not counted in any entry of the vectors, see Fig. 2 and 3. Moreover, this choice often leads to sparse vectors, e.g., for the LLB, where every entry just counts the number of vertices with one specific label. Labels that only appear in a small fraction of the graphs in the database then lead to zero-entries in the vectors of the other graphs and sparse data structures become beneficial. Moreover, this simplifies to dynamically add new vertex labels without requiring to update all existing vectors in the database. Using sparse vector representations, Algorithm 2 can be implemented in time \(O({|}{V(G)}{|})\) by considering only the relevant part of T. This is the subtree S formed by the nodes of T to which vertices of G are assigned to via \(\varrho \), and the nodes on the path to the root from these nodes. The subtree S is processed in a bottom-up fashion computing a non-zero component of \(\Phi (G)\) in each step. Note that S can be maintained and modified with low overhead using flags to indicate whether a node of T is contained in S.
The choice of a suitable index is crucial for the performance of our approach. We chose to use the cover tree (Beygelzimer et al. 2006) because our data is too high-dimensional for the popular k-d-tree, and our vectors have many zeros and discrete values. The cover tree is a good choice for an in-memory index because of its lightweight construction, low memory requirements, and good metric pruning properties. It is usually superior to the k-d-tree or R-tree if the data stored is high-dimensional but still has a small doubling dimension.
5.2 Queries
For similarity search, we compute the embedding of the query graph and use the index for similarity search regarding Manhattan distance. The index takes responsibility to disregard parts of the database that are too far away from the query object. In k-nearest neighbor search, we use the optimal multi-step k-nearest neighbor search (Seidl and Kriegel 1998) as described in Sect. 3.3 to stop the search as early as possible and compute the minimum necessary number of exact graph edit distances. Our lower bounds are especially useful for this because it is well understood how to index data for ranking by Manhattan distance. Further exact distance computations (in particular for range queries) can be avoided by checking additional bounds similar to Inves (Kim et al. 2019) or BSS_GED (Chen et al. 2019) prior to an exact distance computation.
A tighter (but more expensive) lower bound produces fewer candidates, while in some applications (such as DBSCAN clustering), where the exact distance is not necessary to have, an upper bound can identify true positives efficiently.
6 Experimental evaluation
In this section, we compare EmbAssi to state-of-the-art approaches regarding efficiency and approximation quality in range and k-nearest neighbor queries. We investigate the speed-up of existing filter-verification pipelines when EmbAssi is used in a pre-filtering step. Specifically, we address the following research questions:
- Q1:
-
How tight are our lower bounds compared to the state-of-the-art? How do our bounds perform when taking the trade-off between bound quality and runtime into account?
- Q2:
-
Can EmbAssi compete with state-of-the-art methods in terms of runtime and selectivity? Is \(\textit{CLB}\) a suitable lower bound to provide initial candidates for range queries?
- Q3:
-
Can EmbAssi perform similarity search on datasets with a million graphs or more?
- Q4:
-
Can k-nearest neighbor queries be answered efficiently?
6.1 Setup
This section gives an overview of the datasets, the methods, and their configuration used in the experimental comparison.
Methods and Distance Functions We compare EmbAssi to GSim (Zhao et al. 2012) and MLIndex (Liang and Zhao 2017), which are representative methods for similarity search based on overlapping substructures and graph partitioning. MLIndex is considered as state-of-the-art (Qin et al. 2020), although we observed that GSim often performs much better. We also compare to CStar (Zeng et al. 2009) and Branch (Blumenthal et al. 2019), which provide both upper and lower bounds on the graph edit distance, but are not accelerated with indices. Furthermore, we compare to the exact graph edit distance BLP (Lerouge et al. 2017), BSS_GED (Chen et al. 2019), and the approximations LinD (Kriege et al. 2019), BLPlb (Blumenthal et al. 2019) and BeamS (Neuhaus et al. 2006) regarding the approximation of the GED. The costs of all edit operations were set to one because some of the comparison methods only support uniform costs. For BeamD, we used a maximum list size of 100. For LinD, the tree was generated using the Weisfeiler-Lehman algorithm with one refinement iteration. For GSim, we used all provided filters and \(q=3\). For MLIndex, the default settings of the authors’ implementation were used.
The bounds computed by CStar can also be used separately and will be referred to as CStarLB, CStarUB, and CStarUBRef, which is obtained by improving an edit path using local search. SLF and BranchLB are the lower bounds discussed in Sect. 4.2.3 and were implemented following the description in (Kim et al. 2019) and (Blumenthal et al. 2019), respectively. BranchLB and the upper bound gained from the edit path induced by it (BranchUB) are referred to as Branch when applied together. Table 2 gives an overview of the distance functions compared in the experiments including those known from literature as well as those proposed here for use with EmbAssi. The graphs and their respective vectors are indexed using the cover tree (Beygelzimer et al. 2006) implementation of the ELKI framework (Schubert and Zimek 2019).
Datasets We tested all methods on a wide range of real-world datasets with different characteristics, see Table 3. The datasets have discrete vertex labels. Edge labels and attributes, if present, were removed prior to the experiments since not all methods support them. Also, since MLIndex and GSim do not work for disconnected graphs, only their largest connected components were used.
6.2 Results
In the following, we report on our experimental results and discuss the different research questions.
Q1: Bound Quality and Runtime Accuracy is crucial to obtain effective filters for similarity search. We investigate how tight the proposed lower bounds on the graph edit distance are. Figure 5 shows the average relative approximation error \(\frac{{|}{\text {GED} - d_{\text {approx}}}{|}}{\text {GED}}\) of the different bounds in comparison to their runtime. The newly proposed bounds, as well as SLF, are very fast, with varying degrees of accuracy. Although \(\textit{CLB}\) is much faster than BranchLB, its accuracy is in many cases on par or only slightly worse. Note that a timeout of 120 seconds per graph pair was used for the computation of the exact graph edit distance for this experiment. For this reason, values for BSS_GED are not present for the datasets with larger graphs.
Q2: Evaluation of Runtime and Selectivity The runtime of the algorithms consists of three parts: (1) preprocessing and indexing, (2) filtering, and (3) verification. Preprocessing and indexing is performed only once, and this cost amortizes over many queries, while the time required to determine the candidate set and its size are crucial. The verification step requires to compute the exact graph edit distance and is usually most expensive and essentially depends on the number of candidates.
In the following, we investigate how well EmbAssi performs on range queries, how much of a speed-up can be achieved for existing pipelines when filtering with EmbAssi first, and compare to state-of-the-art approaches. We omit bounds that were shown in the previous experiments to have a poor accuracy or a very high runtime. Figure 6 shows the runtime for preprocessing, filtering and the average number of candidates per query for range queries with thresholds 1 to 5. The solid lines show the results, when using EmbAssi with \(\textit{CLB}\) as a first filter, while the dotted line represent the original approaches. The solid red line shows the results using only EmbAssi with \(\textit{CLB}\) and no further filters. GSim and MLIndex are shown with dashed lines, since they are stand-alone approaches. These two methods skip database graphs that are smaller than the given threshold. To obtain a valid candidate set, these graphs were added back after filtering. For GSim and MLIndex the preprocessing time is rather high and highly dependent on the maximum threshold for range search, which must be chosen in advance.
It becomes evident that EmbAssi significantly accelerates all methods across the various datasets. The preprocessing and filtering time of EmbAssi is very low: While filtering only takes a few milliseconds, preprocessing ranges from 0.01 to 2 seconds over the various datasets. CStar and Branch have the best selectivity, but they also employ both upper and lower bounds and need more time for filtering. The usage of EmbAssi heavily accelerates both methods, while even increasing the selectivity of CStar (as seen in Fig. 5, CStarLB seems to be looser than \(\textit{CLB}\) in general). Note, that LinD is an upper bound, so the candidate set consist of all graphs, that could not be reported as a result. In combination with EmbAssi it is only slightly worse than the other approaches regarding filter selectivity, while being very fast.
Considering the properties of the datasets and the performance, we observe that a larger set of vertex labels and a high variance among the vertex degrees seem to lead to a better filter quality. The larger the graphs, the greater the improvement in runtime during the filtering step.
Since competing approaches do not use the fast verification algorithm BSS_GED (Chen et al. 2019) a comparison of verification time would not be fair. On the various datasets the time for verification (of 50 queries with threshold 5) using the candidates of \(\textit{CLB}\) ranged from around 35ms (KKI) to a maximum of 5s (MCF-7).
Combining these results, we can conclude that EmbAssi is well suited as pre-filtering for more effective computational demanding bounds. EmbAssi substantially reduces the filtering time and promises scalability even to very large datasets. We investigate this below.
Q3: Similarity Search on Very Large Datasets We investigate how well EmbAssi performs on very large graph databases using the datasets Protein Com and ChEMBL. Figure 7 shows the average number of candidates per query as reported by the different methods, as well as the time needed for preprocessing and filtering. MLIndex did not finish on ChEMBL within a time limit of 24 hours (for threshold 1). For dataset Protein Com our new approach is not only much faster, but also provides a better filter quality than state-of-the-art methods. It can clearly be seen, that EmbAssi with \(\textit{CLB}\) provides a substantial boost in runtime, while also improving the filter quality.
Q4: k-Nearest-Neighbor Search An advantage of EmbAssi is that it can also answer k-nn queries efficiently due to the use of the multi-step k-nearest neighbor search algorithm as described in Sect. 3.3. Table 4 compares the average number of candidates generated using EmbAssi (with \(\textit{CLB}\)) and BranchLB, as well as the average time needed for answering a k-nn query. In both methods, candidate sets were verified using the faster exact graph edit distance computation BSS_GED. The last column shows the average number of nearest neighbors reported, which may be larger than k because of ties.
It can be seen, that EmbAssi provides a runtime advantage in k-nearest neighbor search, and the number of candidates generated is not much higher than when using BranchLB. For larger datasets, we expect the advantage of EmbAssi to be more significant. Further optimization of the approach is possible. For example, it might be beneficial to combine both methods and use EmbAssi in combination with tighter lower bounds such as BranchLB to reduce the number of exact graph edit distance computations.
7 Conclusions
We have proposed new lower bounds on the graph edit distance, which are efficiently computed, readily combined with indices, and fairly selective in filtering. This makes them ideally suitable as a pre-filtering step in existing filter-verification pipelines that do not scale to large databases. Our approach supports efficient k-nearest neighbor search using the optimal multi-step k-nearest neighbor search algorithm unlike many comparable methods. Other methods have to first perform a range query with a sufficient range and find the k-nearest neighbors among those candidates.
An interesting direction of future work is the combination and development of indices for computational demanding lower bounds such as those obtained from general assignment problems or linear programming relaxations. Efficient methods for similarity search regarding the Wasserstein distance have only recently been investigated (Backurs et al. 2020). Moreover, approximate filter techniques for the graph edit distance based on embeddings learned by graph neural networks were only recently proposed (Qin et al. 2020). With the increasing amount of structured data, scalability is a key issue in graph similarity search.
References
Backurs A, Dong Y, Indyk P, Razenshteyn I, Wagner T (2020) Scalable nearest neighbor search for optimal transport. In: Int. Conf. Machine Learning, ICML, 119, 497–506
Bai Y, Ding H, Bian S, Chen T, Sun Y, Wang W (2019) SimGNN: A neural network approach to fast graph similarity computation. In: ACM International Conference on Web Search and Data Mining, WSDM. https://doi.org/10.1145/3289600.3290967
Bause F, Blumenthal DB, Schubert E, Kriege NM (2021) Metric indexing for graph similarity search. In: SISAP 2021. Lecture Notes in Computer Science, vol. 13058 https://doi.org/10.1007/978-3-030-89657-7_24
Beygelzimer A, Kakade SM, Langford J (2006) Cover trees for nearest neighbor. In: Int. Conf. Machine Learning, ICML, vol. 148. https://doi.org/10.1145/1143844.1143857
Blumenthal D, Boria N, Gamper J, Bougleux S, Brun L (2019) Comparing heuristics for graph edit distance computation. VLDB J 29(1):419–458. https://doi.org/10.1007/s00778-019-00544-1
Bock HH (1974) Automatische Klassifikation. Vandenhoeck & Ruprecht, ???
Burkard RE, Dell’Amico M, Martello S (2012) Assignment Problems. SIAM, ???. https://doi.org/10.1137/1.9781611972238
Chang L, Feng X, Lin X, Qin L, Zhang W, Ouyang D (2020) Speeding up GED verification for graph similarity search. In: Int. Conf. Data Engineering, ICDE, pp. 793–804. https://doi.org/10.1109/ICDE48307.2020.00074
Chen X, Huo H, Huan J, Vitter JS (2019) An efficient algorithm for graph edit distance computation. Knowl-Based Syst 163:762–775. https://doi.org/10.1016/j.knosys.2018.10.002
Duan R, Su H-H (2012) A scaling algorithm for maximum weight matching in bipartite graphs. In: Symposium on Discrete Algorithms, SODA https://doi.org/10.1137/1.9781611973099.111
Ester M, Kriegel H, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Int. Conf. Knowledge Discovery and Data Mining (KDD), pp. 226–231
Garcia-Hernandez C, Fernández A, Serratosa F (2019) Ligand-based virtual screening using graph edit distance as molecular similarity measure. J Chem Inf Model 59(4):1410–1421. https://doi.org/10.1021/acs.jcim.8b00820
Gaulton A, Hersey A, Nowotka M, Bento AP, Chambers J, Mendez D, Mutowo P, Atkinson F, Bellis LJ, Cibrián-Uhalte E, Davies M, Dedman N, Karlsson A, Magariños MP, Overington JP, Papadatos G, Smit I, Leach AR (2016) The ChEMBL database in 2017. Nucleic Acids Res 45(D1):945–954. https://doi.org/10.1093/nar/gkw1074
Gouda K, Hassaan M (2016) CSI_GED: An efficient approach for graph edit similarity computation. In: Int. Conf. Data Engineering, ICDE. https://doi.org/10.1109/ICDE.2016.7498246
Kim J, Choi D, Li C: Inves: Incremental partitioning-based verification for graph similarity search. In: EDBT, pp. 229–240 (2019). https://doi.org/10.5441/002/edbt.2019.21
Kriege NM, Fey M, Fisseler D, Mutzel P, Weichert F (2018) Recognizing cuneiform signs using graph based methods. In: Int. Workshop on Cost-Sensitive Learning, COST@SDM. PMLR, 88
Kriege NM, Giscard P, Bause F, Wilson RC: Computing optimal assignments in linear time for approximate graph matching. In: ICDM, pp. 349–358 (2019). https://doi.org/10.1109/ICDM.2019.00045
Kriege NM, Giscard P, Wilson RC. (2016) On valid optimal assignment kernels and applications to graph classification. In: Advances in Neural Information Processing Systems, pp. 1615–1623
Kriege NM, Johansson FD, Morris C (2020) A survey on graph kernels. Appl. Netw. Sci. 5(1):6. https://doi.org/10.1007/s41109-019-0195-3
Lerouge J, Abu-Aisheh Z, Raveaux R, Héroux P, Adam S (2017) New binary linear programming formulation to compute the graph edit distance. Pattern Recognit 72:254–265. https://doi.org/10.1016/j.patcog.2017.07.029
Le T, Yamada M, Fukumizu K, Cuturi M (2019) Tree-sliced variants of Wasserstein distances. In: Neural Information Processing Systems
Liang Y, Zhao P (2017) Similarity search in graph databases: A multi-layered indexing approach. In: Int. Conf. Data Engineering, ICDE. https://doi.org/10.1109/ICDE.2017.129
Li Y, Gu C, Dullien T, Vinyals O, Kohli P (2019) Graph matching networks for learning the similarity of graph structured objects. In: ICML
Morris C, Kriege NM, Bause F, Kersting K, Mutzel P, Neumann, M (2020) TUDataset: A collection of benchmark datasets for learning with graphs. In: ICML Workshop on Graph Representation Learning and Beyond, GRL+
Munkres JR (1957) Algorithms for the assignment and transportation problems. J Soc Ind Appl Math 5(1):32–38
Nasr R, Hirschberg DS, Baldi P (2010) Hashing algorithms and data structures for rapid searches of fingerprint vectors. J Chem Inf Model 50(8):1358–1368. https://doi.org/10.1021/ci100132g
Neuhaus M, Riesen K, Bunke H (2006) Fast suboptimal algorithms for the computation of graph edit distance. In: Structural, Syntactic, and Statistical Pattern Recognition, pp. 163–172. https://doi.org/10.1007/11815921_17
Qin Z, Bai Y, Sun Y (2020) GHashing: Semantic graph hashing for approximate similarity search in graph databases. In: ACM SIGKDD, pp. 2062–2072
Riesen K, Bunke H (2009) Approximate graph edit distance computation by means of bipartite graph matching. Image Vision Comput 27(7):950–959. https://doi.org/10.1016/j.imavis.2008.04.004
Riesen K, Ferrer M, Fischer A, Bunke H: Approximation of graph edit distance in quadratic time. In: Graph-Based Representations in Pattern Recognition, pp. 3–12 (2015)
Schubert E, Zimek A, Kriegel H (2014) Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min Knowl Discov 28(1):190–237. https://doi.org/10.1007/s10618-012-0300-z
Schubert E, Zimek A (2019) ELKI: A large open-source library for data analysis - ELKI release 0.7.5 Heidelberg. CoRR arXiv: abs/1902.03616
Seidl T, Kriegel H (1998) Optimal multi-step k-nearest neighbor search. In: SIGMOD Int. Conf. Management of Data, pp. 154–165. https://doi.org/10.1145/276304.276319
Seidl M, Wieser E, Zeppelzauer M, Pinz A, Breiteneder C (2015) Graph-based shape similarity of petroglyphs. In: ECCV Workshops Computer Vision, pp. 133–148
Semple C, Steel M (2003) Phylogenetics. Oxford lecture series in mathematics and its applications. Oxford University Press, ???
Sibson R (1973) SLINK: An optimally efficient algorithm for the single-link cluster method. The Computer Journal 16(1):30–34. https://doi.org/10.1093/comjnl/16.1.30
Stöcker BK, Schäfer T, Mutzel P, Köster J, Kriege, NM, Rahmann S (2019) Protein complex similarity based on Weisfeiler-Lehman labeling. In: 12th Int. Conf. Similarity Search and Applications, SISAP, 11807, 308–322. https://doi.org/10.1007/978-3-030-32047-8_27
Wang G, Wang B, Yang X, Yu G (2012) Efficiently indexing large sparse graphs for similarity search. IEEE Trans Knowl Data Eng 24(3):440–451. https://doi.org/10.1109/TKDE.2010.28
Wang X, Ding X, Tung A, Ying S, Jin H (2012) An efficient graph indexing method. In: Int. Conf. Data Engineering, ICDE https://doi.org/10.1109/ICDE.2012.28
Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2021) A comprehensive survey on graph neural networks. IEEE Trans Neural Networks Learn Syst 32(1):4–24. https://doi.org/10.1109/TNNLS.2020.2978386
Xiao B, Cheng J, Hancock ER (2013) Graph-based Methods in Computer Vision: Developments and Applications. Premier reference source. Information Science Reference, ???
Yang L, Zou L (2021) Noah: Neural-optimized A* search algorithm for graph edit distance computation. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 576–587. https://doi.org/10.1109/ICDE51399.2021.00056
Zeng Z, Tung AKH, Wang J, Feng J, Zhou L (2009) Comparing stars: On approximating graph edit distance. Proc. VLDB Endow. 2(1):25–36. https://doi.org/10.14778/1687627.1687631
Zhao X, Xiao C, Lin X, Liu Q, Zhang W (2013) A partition-based approach to structure similarity search. Proc VLDB Endow 7(3):169–180. https://doi.org/10.14778/2732232.2732236
Zhao X, Xiao C, Lin X, Wang W (2012) Efficient graph similarity joins with edit distance constraints. In: Int. Conf. Data Engineering, ICDE https://doi.org/10.1109/ICDE.2012.91
Zheng W, Zou L, Lian X, Wang D, Zhao D (2015) Efficient graph similarity search over large graph databases. IEEE Trans Knowl Data Eng 27(4):964–978. https://doi.org/10.1109/TKDE.2014.2349924
Acknowledgements
This work was supported by the Vienna Science and Technology Fund (WWTF) through project VRG19-009. Additional funding was provided by the German Research Foundation (DFG) within the Collaborative Research Center SFB 876 Providing Information by Resource-Constrained Data Analysis, DFG project number 124020371, SFB projects A2 and A6, http://sfb876.tu-dortmund.de.
Funding
Open access funding provided by University of Vienna.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Responsible editor: Albrecht Zimmermann and Peggy Cellier.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Bause, F., Schubert, E. & Kriege, N.M. EmbAssi: embedding assignment costs for similarity search in large graph databases. Data Min Knowl Disc 36, 1728–1755 (2022). https://doi.org/10.1007/s10618-022-00850-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10618-022-00850-3