You are on page 1of 14

IEEE TRANSACTIONS ON CYBERNETICS 1

Resilient Consensus for Expressed


and Private Opinions
Yilun Shang

Abstract—This article proposes an opinion formation model individuals delineated by a social network. Although it is noto-
featuring both a private and an expressed opinion for a given riously challenging to characterize and assess the collective
topic over dynamical networks. Each individual in the network behaviors in which human psychological and emotional fac-
has a private opinion, which is not known by others but evolves
under local influence from the expressed opinions of its neighbors, tors are implicated, various agent-based models of opinion
and an expressed opinion, which varies under a peer pressure to dynamics have been investigated. According to the opinion
conform to the local environment. We design the opinion sifting value held by an individual, opinion dynamics models are cat-
strategies which are purely distributed and provide resilience to egorized as discrete and continuous models. For the discrete
a range of adversarial environment involving locally and globally models, we are inclined to indicate yes or no by using binary
bounded threats as well as malicious and Byzantine individuals.
We establish the sufficient and necessary graph-theoretic crite- values. Well-known examples include the Sznajd model [3],
ria for normal individuals to attain opinion consensus in both the voter model [4], and Galam’s majority-rule model [5].
directed-fixed and time-varying networks. Two classes of opinion There are also circumstances where the opinion of an individ-
clustering problems are introduced as an extension. By designing ual is preferably expressed using real numbers and they can
the resilient opinion separation algorithms, we develop necessary smoothly change between the two extremal values. Attitudes
and sufficient criteria, which characterize the resilient opinion
clustering in terms of the ratio of opinions as well as the differ- in a formal disputation, prices of a commodity, and predictions
ence of opinions. Numerical examples, including real-world jury about certain macroeconomic variables are some of the exam-
deliberations, are presented to illustrate the effectiveness of the ples. In the continuous case, two models involving bounded
proposed approaches and test the correctness of our theoretical confidence mechanism presented by Deffuant et al. [6] and
results. Hegselmann and Krause [7], respectively, have attracted con-
Index Terms—Clustering, consensus, multiagent system, siderable research interest. In these models, each individual
resilience, social dynamics, social network. only discuss with those who have an opinion close to its own
within a given threshold, capturing the tendency of homophily
in sociology. Pertinent models with hybrid opinion values,
I. I NTRODUCTION e.g., [8], have also been investigated.
The predominant assumption in most existing opinion
N RECENT years, the study of opinion formation among
I individuals and the resulting dynamics it induces in a social
network has become a canonical problem in social network
dynamics including those above is that each individual has
a single opinion for a given topic of discussion. However, an
individual in reality may hold a private opinion, for the same
analysis, where the phrase “opinion dynamics” encapsulates
topic, different to the opinion it expresses due to various rea-
a wide range of models differentiating in the phenomena of
sons, such as political correctness or peer pressure [9]. Such
interest, including minority opinion spreading, collective deci-
discrepancy has been well documented in empirical data and
sion making, polarization, emergence of fads, etc. In this
sociopsychological literatures, even linking to major political
setting, a common goal is to study the way individuals in
events, including the disintegration of the Soviet Union [10]
a social network exchange their attitudes or opinions to agree
and the Arab Spring movement [11]. A common reason for
on some topic or reach a consensus of opinions [1], [2].
the discrepancy between private and expressed opinions arises
As the classical consensus problems in the multiagent
is normative pressures on an individual to conform in a group
systems, the individuals can only communicate based upon
situation. This often leads to pluralistic ignorance [12], where
local available information obtained from their neighboring
individuals privately disapprove a view but publicly go along
Manuscript received June 19, 2019; revised August 28, 2019; accepted with it because they believe (sometimes even erroneously) the
September 2, 2019. This work was supported in part by the NNSFC under majority of others accept it. Examples include young Belgian
Grant 11505127 and in part by the UoA Flexible Fund at Northumbria
University under Grant 201920A1001. This article was recommended by men concerning their attitudes toward communal men’s self-
Associate Editor J. Liu. description and behavioral intentions [13], and college students
The author is with the Department of Computer and Information Sciences, concerning their opinions of the average exam study time of
Faculty of Engineering and Environment, Northumbria University, Newcastle
upon Tyne NE1 8ST, U.K. (e-mail: shylmath@hotmail.com). their peers [14]. One of the goals of this article is hence to
This article has supplementary downloadable material available at build a tractable agent-based model to accommodate both an
http://ieeexplore.ieee.org, provided by the author. expressed and a private opinion of an individual, and study
Color versions of one or more of the figures in this article are available
online at http://ieeexplore.ieee.org. the evolution of opinions based on individuals’ available local
Digital Object Identifier 10.1109/TCYB.2019.2939929 information in the network.
2168-2267 c 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
2 IEEE TRANSACTIONS ON CYBERNETICS

Beyond the implicit discrepancy between expressed and pri- However, the model in [9] required the global network knowl-
vate opinions, a more tangible and ever-increasing threat to the edge and did not offer resilience against misbehavior. The
decision making in social networks comes from the existence consensus was achieved by unpacking ergodicity and the row-
of misbehaving individuals [15], partly due to the pervasive stochastic matrix of the entire influence network. Our model,
applications of social network service. For example, there can on the other hand, is purely distributed in the sense that
be stubborn individuals in a company boardroom or in a dis- only local information is needed, and the approach adopted
cussion group, who influence others but would not vary their is totally different.
own opinions [16], and malicious users in a public forum or Second, inspired by the weighted-mean subsequence
an e-commerce site, who intentionally present their opinions reduced algorithm [22], [23], we propose the distributed sifting
giving wrong information in anticipation of manipulating the algorithms, in which normal agents remove the most extreme
behavior of the entire group [17]. While most of the exist- expressed opinions in their neighborhood compared to their
ing works on opinion evolution are built on the assumption private opinions at each iteration. We analyze the resilience
that the network is situated in a benign environment possibly capabilities of these algorithms under a range of threats,
with a handful of stubborn individuals, the system and control including malicious and Byzantine behaviors, and under the
community has been seeking intensively for resilient solutions assumption of either the total number of misbehaving agents in
to consensus problems in the multiagent systems against more the network or the number of them in the neighborhood of each
realistic cyber-physical attacks in the past decade. One of such normal agent being bounded by a fixed number R. Sufficient
attacks initiated by Byzantine agents [18], [19], meaning that and necessary graph-theoretic conditions are provided to guar-
these agents may arbitrarily collude with others and send dif- antee the resilient consensus of expressed and private opinions
ferent values to different neighbors, is extremely harmful yet when the underlying network is modeled as either a directed-
common in the setting of social networks. Based upon nonlo- fixed network or a time-varying network. Moreover, our model
cal information of the network, resilient coordination protocols allows that both the number and the identity of misbehaving
have been designed in [20] and [21] to relieve Byzantine agents are not made available to the normal agents, which
attacks, where the misbehaving agents can be determined pro- is highly desirable in the real-world scenarios as such the
vided the communication network is sufficiently connected. A information is typically unavailable.
set of local filtering algorithms is put forward in [22] and [23] Finally, we design the local strategies that provide resilience
to alleviate the influence of misbehaving agents, where each to malicious and Byzantine agents and meanwhile give rise
normal agent in the network discards the extremal values as to clustering and coexistence of expressed and private opin-
compared to its own value. Resilient learning-based proto- ions instead of reaching a common value. Drawing on the
cols are introduced in [24] to find the optimal solutions to methods of scaled consensus and formation generation, we
consensus problems in the presence of malicious attackers characterize the sufficient and necessary conditions for opin-
and uncertainties in system. By utilizing the mobile detec- ion separation in terms of quotient, meaning that the agents’
tors, it is shown in [25] that consensus can be maintained opinions approach dictated ratios in the asymptote, and in
against Byzantine agents whose number is not restrained by terms of difference, meaning that the agents’ opinions reach
the network connectedness. However, to our knowledge, only assigned differences as time goes to infinity. Opinion clus-
single-state value is assumed in the prior works, which are tering phenomenon has been observed extensively in many
thus unable to capture individuals in social networks who have social networks and described by other opinion dynamics mod-
private opinions deviating from the opinions they express. els [27]–[30], including the Deffuant–Weisbuch model, where
multiple opinion clusters emerge with probability one if the
confidence bound is below a critical value. The unique fea-
A. Contributions ture of expressed and private opinions, nevertheless, has been
In this article, we aim to unfold the influence of private and overlooked in these works.
expressed opinions as well as that of normal and misbehaving We mention that the idea of accommodating additional
individuals on opinion evolution building on social dynam- source of opinion has been embodied in [31], where by adding
ics and agent-based modeling literature. This is achieved some random edges an informal network is introduced to
by model construction, convergence analysis, and clustering complement the formal network based on observations in the
study, which we will detail below. social organization structure. The efficacy of informal network
First, this article presents an agent-based model where each is numerically demonstrated to facilitate the consensus pro-
agent, that is, individual, in the network possesses both an cess over the formal network. Nevertheless, each individual
expressed and a private opinion regarding a given topic. An essentially has a single opinion value.
agent’s private opinion evolves under the social influence from
the expressed opinions of the agent’s neighbors, while the
agent determines its own expressed opinion under a pressure B. Organization
to conform to the group opinion in its neighborhood. The Section II introduces mathematical preliminaries and for-
psychological rationale behind has been first revealed by the mulates the problem. We provide the convergence analysis
celebrated experiments on conformity by Asch [26] and is ana- for resilient consensus when malicious agents and Byzantine
lytically validated by Ye et al. [9] in studying the evolution agents exist in the network in Section III. Resilient opin-
of discrepancy between the expressed and private opinions. ion clustering and separation are investigated in Section IV.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 3

The simulations examples are presented in Section V and


concluding remarks are drawn in Section VI.

II. P RELIMINARIES AND P ROBLEM F ORMULATION


A. Graph Theory
Denote by N, the set of non-negative integers. The
interaction between n agents in a social network is described
by a digraph or directed graph, denoted by G(t) = (V, E(t)),
where V = {v1 , . . . , vn } represents the vertex set describing
the agents of the network, and E(t) ⊆ V × V consists of the
arcs or directed edges present at time t ∈ N. We consider
a partition of the vertex set, V = N ∪ M, where the sub-
set N contains the set of normal agents while the subset M Fig. 1. Schematic illustration of opinion evolution for a normal agent vi .
contains the group of misbehaving ones, whose identities are
not available a priori to any normal agent. The directed edge
(vi , vj ) ∈ E(t) means that agent vj has access to the information Definition 3 (Resilient Consensus): In the network G, the
of agent vi . The (in-)neighbors of agent vi are defined by the normal agents in N are said to achieve resilient opinion
set Ni (t) = {vj : (vj , vi ) ∈ E(t)}. We set the extended neighbor- consensus in the presence of misbehaving agents in M if
hood N i (t) = {vi }∪Ni (t) to include the agent vi itself. We will limt→∞ xi (t) − xj (t) = 0 and limt→∞ x̃i (t) − x̃j (t) = 0 for all
suppress the dependence on t for time-invariant networks in vi , vj ∈ N and all initial conditions {xi (0)}ni=1 and {x̃i (0)}ni=1 .
the aforementioned notations. In the time-dependent networks, We regard the private opinion xi (t) as the agent’s true opin-
we also omit t for simplicity when the meaning is clear from ion, while the expressed opinion x̃i (t) can be different from
the context. its true opinion due to various reasons, such as political cor-
The following notions of reachable sets and network robust- rectness and peer pressure. Opinion consensus here requires
ness have been investigated intensively in [22], [23], and [32]. both expressed and private opinions to reach a consensus over
Reachable sets and network robustness play a vital part in the entire network (ideally without gap between private and
resilience control and they have an intimate tie with classic expressed opinions; see Remark 3). The dynamical model of
connectivity concept in the graph theory. each normal agent vi ∈ N is described as
Definition 1 (Reachable Sets): Let R, Q ∈ N. A set S ⊆ V   
is said to be R-reachable if there is an agent vi ∈ S satisfying xi (t + 1) = fi xi (t), x̃ji (t) : vj ∈ Ni (t) (1)
the condition |Ni \S| ≥ R, in which | · | represents the size of
a set. Furthermore, S is said to be (R, Q)-reachable if |{vi ∈ and
S : |Ni \S| ≥ R}| ≥ Q.  
x̃i (t) = λi xi (t) + (1 − λi )gi x̃ji (t − 1) : vj ∈ N i (t − 1) (2)
Definition 2 (Network Robustness): Let R, Q ∈ N. If for any
pair of nonempty disjoint subsets of V, at least one set of them
is R-reachable, then the directed graph G is called R-robust. where x̃ji (t) ∈ R is the opinion value communicated to agent
Moreover, G is said to be (R, Q)-robust if for any pair of vi from agent vj at time step t, and x̃ji (t) = x̃j (t) for all vj ∈ N,
nonempty, disjoint subsets S1 , S2 ⊆ V, it follows that: 1) |{vi ∈ meaning normal agents always send their real expressed opin-
j
S1 : |Ni \S1 | ≥ R}| = |S1 |; or 2) |{vi ∈ S2 : |Ni \S2 | ≥ R}| = ions to their neighbors. We also assume x̃j (t) = x̃j (t) for
|S2 |; or 3) |{vi ∈ S1 : |Ni \S1 | ≥ R}| + |{vj ∈ S2 : |Nj \S2 | ≥ vj ∈ N. Misbehaving agents, on the other hand, may send arbi-
R}| ≥ Q. trary values to their neighbors. The function fi to be designed
From the definition, it is clear that R-reachability and later describes the influence on the private opinion of vi at
(R, 1)-reachability are equivalent essentially. We will see that time t + 1 from its own private opinion and its neighbors’
these robustness concepts are essential in characterizing the expressed opinions at time t. The parameter λi ∈ [0, 1] char-
performance of local sifting algorithms. acterizes the resilience to pressure to conform to its local
environment encoded by gi . Agent vi is maximally resilient
if λi = 1, and minimally resilient if λi = 0. As is common
B. Opinion Model in the agent-based consensus problems [1], both functions fi
Suppose that a group of n agents, {v1 , . . . , vn }, form a and gi will be designed as some weighted average functions
directed social network G = (V, E) admitting V = N ∪ M, (see (3) and (4) below). It is natural (but not necessary for
where as defined above N encapsulates all the normal agents our theorems below) that we assume that xi (0) = x̃i (0) for
while M is composed of misbehaving ones. Let R be the set all 1 ≤ i ≤ n, meaning that the initial expressed opinions
of real numbers. On a given topic, the private and expressed are equivalent to initial private opinions for all agents in the
opinions of agent vi ∈ V at time t is represented by xi (t) ∈ R network. Obviously, the expressed and private opinions coin-
and x̃i (t) ∈ R, respectively. We aim to address the follow- cide for each agent when λi = 1 for all i = 1, . . . , n. The
ing resilient opinion consensus problem in the presence of influences that act to change agent vi ’s private and expressed
misbehaving agents. opinions are illustrated in Fig. 1.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
4 IEEE TRANSACTIONS ON CYBERNETICS

In (1) and (2), fi and gi delineate the update functions for R ∈ N. First, each normal agent vi ∈ N collects the expressed
normal agent vi . These functions will be instantiated later so opinions {x̃ji (t)} from its neighbors and creates an ordered
that the normal agents can reach the group’s goal resisting list array for {x̃ji (t)}vj ∈Ni arranging from largest to smallest.
the compromise of misbehaving agents, whose number and Second, the largest R opinions that are strictly greater than
identity are not available to the normal agents. Misbehaving xi (t) in the above array are deleted (if there are fewer than R
agents, on the other hand, can exert arbitrary strategies and greater opinions than xi (t), all of those opinions are discarded).
different rules which are beyond the reach of the normal The similar sifting process is exerted to the smaller opinions.
agents. Specifically, we will examine two kinds of misbehav- The set of agents that are removed by agent vi at time t is sig-
ing agents, namely, malicious and Byzantine agents in this nified by a set Ri (t). Third, each vi ∈ N updates its opinion
article. using the following fi (·) and gi (·), respectively, in (1) and (2):
Definition 4 (Malicious Agent): We call an agent vi ∈ M 
malicious if it exerts some distinct communication rule ĝi xi (t + 1) = aii (t)xi (t) + aij (t)x̃ji (t), t ∈ N (3)
in (2) at some time t ∈ N. vj ∈Ni (t)\Ri (t)
Definition 5 (Byzantine Agent): We call an agent vi ∈ M and
Byzantine if it exerts some distinct communication rule ĝi 
in (2) at some time t ∈ N, or it does not communicate the x̃i (t) = λi xi (t) + (1 − λi ) · bij (t − 1)x̃ji (t − 1)
j
same opinion x̃i to all of its out-neighbors vj , that is, vi ∈ Nj , vj ∈N i (t−1)\Ri (t−1)
at some time t ∈ N. t ∈ N\{0} (4)
A malicious agent is misbehaving due to, for example,
stubborn traits, and it sends information in a broadcast where {aij (t)} are the weights instantiating fi satisfying the
manner [8], [16]. Byzantine agents, on the other hand, are following three conditions for every t ∈ N: (Af) aij (t) = 0 if
often thought of as one of the most dangerous attack- vj ∈ N i (t)\Ri (t); (Bf) there is a constant number α ∈ (0, 1)
ers [18], [23], [25], who typically possess a thorough intelli- independent  of t, such that aij (t) ≥ α for any vj ∈ N i (t)\Ri (t);
gence of the entire network and hence can potentially collude and (Cf) vj ∈N i (t)\Ri (t) aij (t) = 1; and similarly, {bij (t)} are
with other Byzantine agents to manipulate the network by the weights instantiating gi satisfying the following three con-
sending wrong information in a point-to-point manner. By ditions for every t ∈ N: (Ag) bij (t) = 0 if vj ∈ N i (t)\Ri (t);
the aforementioned definitions, both malicious and Byzantine (Bg) there is a constant number β ∈ (0, 1) independent of
agents can renew their opinions in an arbitrary way at every t, such that bij (t) ≥ β for any vj ∈ N i (t)\Ri (t); and (Cg)

time step and, hence, all malicious agents turn out to be vj ∈N i (t)\Ri (t) bij (t) = 1. Moreover, we assume λi ∈ (0, 1],
Byzantine, but not vice-versa. It is worth noting that we do meaning naturally that the private opinion of agent i has an
not care private opinions of misbehaving agents, that is, not influence on its expressed opinion. Since there are finite agents
implicate fi in (1), in Definitions 4 and 5 because misbehaving within the network G, we obtain a constant λ > 0 satisfying
agents influence neighbors only via their expressed opinions. λi ≥ λ > 0 for every vi ∈ N.
We will investigate two types of opinion consensus mod- Remark 1: The time-shift t −1 in the summation term of (4)
els according to the number and location of the misbehaving is necessary since otherwise both sides of the equation rely on
agents. The first one is called R-globally bounded model. In x̃i (t), leading to an inconsistent equation. Given xi (0) and x̃i (0)
this model, the total number of misbehaving agents in the set for all vi ∈ V, at each time step t = 0, (3) comes into effect;
M is upper bounded by a constant R ∈ N. Another model is R- at subsequent time step t ≥ 1, (4) comes into effect followed
locally bounded model, where |Ni ∩ M| ≤ R for every vi ∈ N. by (3). The strategy is consistent with the description in Fig. 1.
Every normal agent has at most R misbehaving neighbors in Remark 2: Note that the weights aij and bij in (3) and (4)
the R-locally bounded model. In both models, misbehaving can be arbitrarily chosen provided the corresponding condi-
agents, be they malicious or Byzantine, pose a treat to the tions hold. A typical choice could be aij (t) = (|Ni (t)| + 1 −
group decision making through preventing other agents from |Ri (t)|)−1 and bij (t − 1) = (|N i (t − 1)| − |Ri (t − 1)|)−1 so
reaching common opinions or driving their opinions into a that the weights for all neighbors are equal. In this case, the
biased or even detrimental situation. Therefore, it is desirable expressed opinion x̃i takes a similar form as in [9], but the
to exercise caution and adopt resilient consensus strategies. global average of all agents in the network is used in [9]
(which is essential for the validity of the analysis therein)
rather than the adaptive local average adopted here.
C. Resilient Consensus Strategy The aforementioned algorithm has low complexity while
Based upon the nearest-neighbor interaction, we here adopt relatively accurate to capture relevant social phenomena with
the distributed local sifting algorithms for the expressed and minimum parameters. It is purely distributed and only local
private opinions of each normal agent vi ∈ N. As a misbe- information available to each agent is used. No prior awareness
having agent may affect both xi and x̃i through fi and gi , of the identity of misbehaving agents or the architecture of
respectively, at every time step, our strategy essentially goes network is assumed available to normal agents. Moreover, our
beyond the weighted-mean subsequence reduced algorithms algorithm will handle the situation where the roles of normal
detailed in [18], [22], and [23]. agents and misbehaving agents change. When a normal agent
Our sifting algorithm can be performed in three steps, exe- misbehaves at some point, it may apply a strategy freely devi-
cuted synchronously for all agents at each time step t ∈ N. Fix ated from the sifting strategy; if a misbehaving agent becomes

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 5

normal, it will then pick up the sifting strategy. See Example 2 strategy. Furthermore, x̃1 (t) = λ1 x1 (t) + (1 − λ1 )c1 = c1 for
in Section V for an illustration. all t. Likewise, we obtain x2 (t) = x̃2 (t) = c2 for all t. Thus,
In the remaining of this article, we will refer to the above consensus cannot be achieved among normal agents in G. The
algorithm as the opinion sifting strategy with parameter R necessity is proved.
or simply R-sifting strategy. A flowchart and the complexity Sufficiency: In light of the comments at the outset of this
analysis are provided in the supplementary material. section, we may assume that ρ∗ := limt→∞ ∗ (t) ≥ ρφ ∗ :=
limt→∞ φ ∗ (t), since both ∗ (t) and φ ∗ (t) are monotone and
III. R ESILIENCE AGAINST M ISBEHAVING AGENTS bounded with respect to t. If ρ∗ = ρφ ∗ , then both expressed
and private opinions will reach consensus eventually. In what
In this section, we study the resilient opinion consen-
follows, we assume that ρ∗ > ρφ ∗ and show that this
sus problem and present the convergence analysis for the
inequality does not hold by the method of contradiction.
opinion dynamics model in the presence of both malicious
Take ε0 > 0 satisfying ρ∗ − ε0 > ρφ ∗ + ε0 . For t ∈ N
and Byzantine agents. In each case, we provide resilience
and any εi > 0, we will need the following definitions of
results for both globally bounded threats and locally bounded
four sets, namely, X (t, εi ) := {vi ∈ V : xi (t) > ρ∗ − εi },
threats. To begin with, define (t) := maxvi ∈N xi (t) and
X˜ (t, εi ) := {vi ∈ V : x̃i (t) > ρ∗ − εi }, Xφ (t, εi ) := {vi ∈
φ(t) := minvi ∈N xi (t), respectively, as the maximum and
V : xi (t) < ρφ ∗ + εi }, and Xφ̃ (t, εi ) := {vi ∈ V : x̃i (t) <
minimum private opinions for normal agents. Similarly, let
˜ ρφ ∗ + εi }. These sets may contain both normal and malicious
(t) := maxvi ∈N x̃i (t) and φ̃(t) := minvi ∈N x̃i (t) be the max-
agents. By the definition of ε0 , X (t, ε0 ) ∩ Xφ (t, ε0 ) = ∅ and
imum and minimum expressed opinions, respectively, for
˜ X˜ (t, ε0 ) ∩ Xφ̃ (t, ε0 ) = ∅.
normal agents. Moreover, we set ∗ (t) = max{(t), (t)}
∗ Choose ε ∈ (0, ε0 ) such that
and φ (t) = min{φ(t), φ̃(t)}. It is not difficult to see that
for all vi ∈ N and t ∈ N, xi (t + 1) ∈ [φ ∗ (t), ∗ (t)]  |N| |N|
λ α ε0
and x̃i (t + 1) ∈ [φ ∗ (t), ∗ (t)] hold in both R-globally and ε < min
R-locally bounded models with malicious/Byzantine agents 1 − λ|N| α |N|

because opinions in the update rules (3) and (4) are the con- (1 + λ)|N| β |N| (1 − β(1 + λ))ε0
. (5)
vex combinations of values within the interval [φ ∗ (t), ∗ (t)]. 1 − β |N| (1 + λ)|N|
This indicates that the domain [φ ∗ (0), ∗ (0)] is an invariant
set meaning that the expressed and private opinions of normal Recall in (Bg) the lower bound β can be made arbitrarily
agents will stay in this interval for all time t. small. Let tε be the time step satisfying ∗ (t) < ρ∗ + ε
and φ ∗ (t) > ρφ ∗ − ε for all t ≥ tε . Next, we examine the
A. Convergence Analysis With Malicious Agents pairs of nonempty disjoint sets X (tε , ε0 ) and Xφ (tε , ε0 ), and
X˜ (tε , ε0 ) and Xφ̃ (tε , ε0 ) separately.
In the sequel, we establish some necessary and sufficient cri-
(I) X (tε , ε0 ) and Xφ (tε , ε0 ): Notice that the network G is
teria for opinion consensus in the globally and locally bounded
(R + 1, R + 1)-robust with at most R malicious agents. There
models with malicious agents. We first deal with the time-
must be a normal agent in the union X (t , ε0 ) ∪ Xφ (t , ε0 ),
invariant networks G = (V, E). The results for time-varying
which has at least R + 1 neighbors not in its set. Without loss
networks G(t) = (V, E(t)) are addressed as a corollary.
of generality (W.l.o.g.), assume that vi ∈ X (tε , ε0 ) ∩ N has at
Theorem 1 (Opinion Consensus in R-Globally Bounded
least R + 1 neighbors not in X (tε , ε0 ). Since these neighbors’
Model With Malicious Agents): Suppose that we have a time-
private opinions are less than or equal to ρ∗ − ε0 and at least
invariant network characterized by a directed graph G =
one of these opinions (say, that of vj ) will be used by vi , we
(V, E), where each normal agent updates its private and
obtain the following equation by using (4):
expressed opinions according to the opinion R-sifting strat-
egy. Then, in the R-globally bounded model having malicious

˜ ε)
x̃i (tε + 1) ≤ λj (ρ∗ − ε0 ) + 1 − λj (t
agents, resilient opinion consensus can be reached if and only

if G is (R + 1, R + 1)-robust. ≤ λj (ρ∗ − ε0 ) + 1 − λj (ρ∗ + ε)


Proof (Necessity): Suppose on the contrary that G is not an ≤ ρ∗ − λj ε0 + ε 1 − λj . (6)
(R + 1, R + 1)-robust network. Therefore, there exist disjoint
nonempty sets S1 , S2 ⊆ V such that none of the criteria 1)–3) Using (3), (6), and noting that xi (tε ) and the expressed opin-
in Definition 2 hold. Define XSR+1l
= {vi ∈ Sl : |Ni \Sl | ≥ R+1} ions of vi ’s neighbors that can be used at time step tε are up
for l = 1, 2. Fix c1 < c2 . Let xi (0) = x̃i (0) = c1 for any agent bounded by ∗ (tε ), we have
vi ∈ S1 , and xi (0) = x̃i (0) = c2 for any agent vi ∈ S2 . For all
the other agents vi in the network, set xi (0) = x̃i (0) ∈ (c1 , c2 ).


xi (tε + 1) ≤ (1 − α)∗ (tε ) + α ρ∗ − λj ε0 + ε 1 − λj
Since |XSR+1 | + |XSR+1 | ≤ R, we assume that all agents in


1 2 ≤ (1 − α)(ρ∗ + ε) + α ρ∗ − λj ε0 + ε 1 − λj
the sets XS1 and XSR+1
R+1
are malicious and that they tend to

2
preserve their expressed opinions unchanged. There is at least ≤ ρ∗ − αλj ε0 + ε 1 − αλj
one normal agent in both S1 and S2 , respectively (because ≤ ρ∗ − αλε0 + ε(1 − αλ). (7)
|XSR+1
1
| < |S1 | and |XSR+1
2
| < |S2 |), say, v1 ∈ S1 ∩ N and v2 ∈
S2 ∩ N. Since v1 has at most R neighbors not in S1 , we have Expression (7) is also valid for the private opinion of any
x1 (t +1) = x1 (t) = c1 for t ∈ N invoking the opinion R-sifting normal agent not in X (tε , ε0 ) since such agent will adopt its

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
6 IEEE TRANSACTIONS ON CYBERNETICS

own private opinion xi (tε ), and xi (tε ) ≤ ρ∗ − ε0 . Hence which is also applicable to the normal agents not in the set
∗ Xφ̃ (tε , ε0 ) similarly.
xi (tε + 1) ≤ (1 − α) (tε ) + α(ρ∗ − ε0 )
Define ε̃1 = ε0 β(1 + λ) − ε such that 0 < ε < ε̃1 < ε0 :=
≤ (1 − α)(ρ∗ + ε) + α(ρ∗ − ε0 ) ε̃0 . Recall that X˜ (tε + 1, ε̃1 ) and Xφ̃ (tε + 1, ε̃1 ) are disjoint
≤ ρ∗ − αε0 + ε(1 − α) sets. Since at least one of the normal agents in X˜ (tε , ε̃0 )
≤ ρ∗ − αλε0 + ε(1 − αλ) (8) decrements its private opinion to ρ∗ − ε̃1 or lower, or at
least one of the normal agents in Xφ̃ (tε , ε̃0 ) increments its
where in the last inequality we used λ < 1. Analogously, if private opinion to ρφ ∗ + ε˜1 or higher, the above comments
vi ∈ Xφ (tε , ε0 ) ∩ N which has at least R + 1 neighbors not in indicate that |X˜ (tε +1, ε̃1 )∩N| < |X˜ (tε , ε̃0 )∩N| or |Xφ̃ (tε +
Xφ (tε , ε0 ), we derive a parallel inequality 1, ε̃1 )∩N| < |Xφ̃ (tε , ε̃0 )∩N| holds. We recursively define ε̃j =
xi (tε + 1) ≥ ρφ ∗ + αλε0 − ε(1 − αλ) (9) β(1 + λ)ε̃j−1 − ε for each j ≥ 1 and notice that ε̃j < ε̃j−1 . This
derivation is also applicable to every time step tε + j provided
which is also valid for the normal agents outside the set there still exist normal agents in X˜ (tε +j, ε̃j ) and Xφ̃ (tε +j, ε̃j ).
Xφ (tε , ε0 ) similarly. Since there are |N| normal agents in the entire network G,
Define ε1 = αλε0 − ε(1 − αλ) such that 0 < ε < ε1 < there exists some T̃ ≤ |N| such that either X˜ (tε + T̃, ε̃T̃ ) ∩ N
ε0 . Recall that X (tε + 1, ε1 ) and Xφ (tε + 1, ε1 ) are disjoint or Xφ̃ (tε + T̃, ε̃T̃ ) ∩ N becomes empty. If the former case is
sets. Since at least one of the normal agents in X (tε , ε0 )
true, the expressed opinions of normal agents at step tε + T̃
decrements its private opinion to ρ∗ − ε1 or lower, or at
are no greater than ρ∗ − ε̃T̃ ; if the latter case is true, the
least one of the normal agents in Xφ (tε , ε0 ) increments its
expressed opinions of normal agents at step tε + T̃ are no less
private opinion to ρφ ∗ + ε1 or higher, the above comments
than ρφ ∗ + ε̃T̃ . Therefore, we have
indicate that |X (tε +1, ε1 )∩N| < |X (tε , ε0 )∩N| or |Xφ (tε +
1, ε1 )∩N| < |Xφ (tε , ε0 )∩N| holds. We now recursively define
ε̃T̃ = β(1 + λ)ε̃T̃−1 − ε
εj = αλεj−1 − (1 − αλ)ε for each j ≥ 1 and notice that εj <
εj−1 . The above derivations are applicable to every time step 1 − β T̃ (1 + λ)T̃
= β T̃ (1 + λ)T̃ ε̃0 − ε
tε + j as long as there still exist normal agents in X (tε + j, εj ) 1 − β(1 + λ)
and Xφ (tε + j, εj ). Since there are |N| normal agents in the 1 − β |N| (1 + λ)|N|
entire network G, there exists some T ≤ |N| such that either ≥ β |N| (1 + λ)|N| ε̃0 − ε >0 (12)
1 − β(1 + λ)
X (tε + T, εT ) ∩ N or Xφ (tε + T, εT ) ∩ N is an empty set. If
the former case is true, the private opinions of normal agents by the choice of ε in (5) and taking β(1 + λ) < 1 (since β
at step tε + T are no greater than ρ∗ − εT ; if the latter case is can be made arbitrarily small).
true, the private opinions of normal agents at step tε + T are Combining the above comments, any normal agent vi
no less than ρφ ∗ + εT . Therefore, εT = αλεT−1 − ε(1 − αλ) = in the network at time step tε + max{T, T̃} has opinion
α T λT ε0 − ε(1 − α T λT ) ≥ α |N| λ|N| ε0 − ε(1 − α |N| λ|N| ) > 0 max{xi (t), x̃i (t)} either at most ρ∗ − min{εT , ε̃T̃ } or no less
according to the choice of ε in (5). than ρφ ∗ + min{εT , ε̃T̃ }, leading to contradiction with the
(II) X˜ (tε , ε0 ) and Xφ̃ (tε , ε0 ): Since the network G is definitions of the limits ρ∗ and ρφ ∗ .
(R + 1, R + 1)-robust with no more than R malicious agents, Remark 3: We have shown in the sufficiency of Theorem 1
there is a normal agent in the union X˜ (t , ε0 ) ∪ Xφ̃ (t , ε0 ), that, if G is (R + 1, R + 1)-robust, both the private and
which has at least R + 1 neighbors not in its set. W.l.o.g., we expressed opinions of normal agents in the network G con-
assume that vi ∈ X˜ (tε , ε0 ) ∩ N has at least R + 1 neighbors verge to the same limit, which is stronger than what is
not in X˜ (tε , ε0 ). Since these neighbors’ expressed opinions required in Definition 3. This means the discrepancy between
do not exceed ρ∗ − ε0 and at least one of these opinions will the expressed and private will ultimately vanish, avoiding the
be used by vi , we obtain the following equation by using (4) harmful “spiral of silence” phenomenon observed in some
x̃i (tε + 1) ≤ λi (ρ∗ + ε) social networks [33]. Persistence to the individuals’ initial
opinions is found to be a possible cause of nonvanishing
+ (1 − λi )((1 − β)(ρ∗ + ε) + β(ρ∗ − ε0 ))
discrepancy between expressed and private opinions in [9]
≤ ρ∗ − ε0 β(1 + λi ) + ε(1 − β + λi β) and even contributes to shaping the final opinion configura-
≤ ρ∗ − ε0 β(1 + λ) + ε (10) tion [34]. In our framework, such “stubbornness” to the initial
opinions has been considered as a malicious behavior and
where we have used the condition λ ≤ λi ≤ 1 and noted that
is aimed to be overcome. Therefore, we are able to show
each normal agent’s expressed opinion is characterized as a
the strong result of vanishing discrepancy, which interestingly
convex combination of the expressed opinions of its neighbors
agrees with the recent report on Twitter [35].
having coefficients no less than β. Expression (10) is also
Note that the set Ri (t) in (3) and (4) is time varying.
applicable to the expressed opinion of any normal agent not in
Hence, the network structure G in Theorem 1 is no longer
X˜ (tε , ε0 ) as such agent will adopt its own expressed opinion
fixed essentially. Moreover, for time-dependent communica-
x̃i (tε ), and x̃i (tε ) ≤ ρ∗ −ε0 . Analogously, if vi ∈ Xφ̃ (tε , ε0 )∩N
tion topologies, we have the corollary stated as follows. The
which has at least R + 1 neighbors not in Xφ̃ (tε , ε0 ), we arrive
proof is given in the supplementary material.
at a parallel inequality
Corollary 1: Suppose that we have a time-varying network
x̃i (tε + 1) ≥ ρφ ∗ + ε0 β(1 + λ) − ε (11) characterized by a directed graph G(t) = (V, E(t)), where

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 7

each normal agent updates its private and expressed opin- malicious agents within Ni , vi will refer to no less than one
ions according to the opinion sifting strategy with param- of its normal neighbors’ private opinions not in X (tε , ε0 ) ∩ N
eter R. Signified by {tk }, the time steps in which G(t) is under the resilient opinion R-sifting strategy. Accordingly, pro-
(R + 1, R + 1)-robust. Then, in the R-globally bounded model ceeding as in the proof of Theorem 1, we arrive at xi (tε +1) ≤
having malicious agents, resilient opinion consensus can be ρ∗ −αλε0 +ε(1−αλ). This remains valid for the renewed pri-
reached if |{tk }| = ∞ and there is a constant τ ∈ N such that vate opinion of each normal agent not in X (tε , ε0 )∩N as such
|tk+1 − tk | ≤ τ for all k. an agent adopts its own private opinion in the renewal proce-
In the case of locally bounded models, in which misbehav- dure. Analogously, if vi ∈ Xφ (tε , ε0 )∩N has more than or equal
ing agents are much more prevalent but the number of them to 2R + 1 neighbors not in its set, we have a similar inequality
are still bounded in each normal agent’s neighborhood, an xi (tε + 1) ≥ ρφ ∗ + αλε0 − ε(1 − αλ), which is also applicable
amenable way to deal with malicious agents is to characterize to the normal agents not in Xφ (tε , ε0 ) ∩ N. Now by defining
the network structure by the notion of R-robustness. ε1 = αλε0 − (1 − αλ)ε which satisfies 0 < ε < ε1 < ε0 , we
Theorem 2 (Opinion Consensus in R-Locally Bounded can utilize the same proof in Theorem 1 [by setting recursively
Model With Malicious Agents): Suppose that we have a time- εj for j ≥ 1 and (13)] to conclude that there exists T ≤ |N|
invariant network characterized by a directed graph G = such that either X (tε + T, εT ) ∩ N or Xφ (tε + T, εT ) ∩ N is
(V, E), where each normal agent updates its private and empty and εT is positive.
expressed opinions according to the opinion R-sifting strat- Similar arguments can be applied for the two nonempty
egy. Then, in the R-locally bounded model having malicious and disjoint sets X˜ (tε , ε̃0 ) ∩ N and Xφ̃ (tε , ε̃0 ) ∩ N as far
agents, resilient opinion consensus can be reached when G is as expressed opinions are concerned. Then, we are able to
2R+1-robust. Moreover, G is R+1-robust when resilient opin- conclude that there exists T̃ ≤ |N| such that either X˜ (tε +
ion consensus in the R-locally bounded model with malicious T̃, ε̃T̃ ) ∩ N or Xφ̃ (tε + T̃, ε̃T̃ ) ∩ N is empty and ε̃T̃ is positive.
agents can be reached. Combining the above aspects for private and expressed opin-
Proof (Necessity): Assume to the contrary that G is not ions, we similarly derive the contradiction and hence conclude
R + 1-robust. There exist disjoint nonempty sets S1 , S2 ⊆ V the sufficiency.
such that each agent in these two sets has at most R neighbors Note that there is a gap between the necessary criterion and
not in the set. Suppose that there exist normal agents in both the sufficient criterion in Theorem 2. It would be interesting
S1 and S2 . Fix c1 < c2 . Let xi (0) = x̃i (0) = c1 for any to explore whether the above graph theoretical conditions are
agent vi ∈ S1 , and xi (0) = x̃i (0) = c2 for any agent vi ∈ S2 . tight. The following result for time-dependent networks can
For all the other agents, set xi (0) = x̃i (0) ∈ (c1 , c2 ). It is be shown in the same manner as Corollary 1.
obvious that the expressed or private opinions of agents in S1 Corollary 2: Suppose that we have a time-varying network
and S2 will not achieve consensus under the resilient opinion characterized by a directed graph G(t) = (V, E(t)), where
R-sifting strategy as they never refer to any opinions not in each normal agent updates its private and expressed opin-
their own sets. Thus, resilient consensus among normal agents ions according to the opinion sifting strategy with param-
in G cannot be reached. eter R. Signified by {tk }, the time steps in which G(t) is
Sufficiency: We proceed in a similar line as in Theorem 1. 2R + 1-robust. Therefore, in the R-locally bounded model
Suppose that ρ∗ := limt→∞ ∗ (t) and ρφ ∗ := limt→∞ φ ∗ (t). having malicious agents, resilient opinion consensus can be
In the sequel, we will prove ρ∗ = ρφ ∗ by contradiction. For reached if |{tk }| = ∞ and there is a constant τ ∈ N such that
this purpose, suppose that ρ∗ > ρφ ∗ . Choose ε0 > 0 so that |tk+1 − tk | ≤ τ for all k.
ρ∗ − ε0 > ρφ ∗ + ε0 . For t ∈ N and εi > 0, we consider
four sets defined by X (t, εi ) := {vi ∈ V : xi (t) > ρ∗ − εi },
X˜ (t, εi ) := {vi ∈ V : x̃i (t) > ρ∗ − εi }, Xφ (t, εi ) := {vi ∈ B. Convergence Analysis With Byzantine Agents
V : xi (t) < ρφ ∗ + εi }, and Xφ̃ (t, εi ) := {vi ∈ V : x̃i (t) < In this section, we investigate the necessary and sufficient
ρφ ∗ + εi }. By the definition of ε0 , X (t, ε0 ) ∩ Xφ (t, ε0 ) = ∅ criteria for opinion consensus in the globally and locally
and X˜ (t, ε0 ) ∩ Xφ̃ (t, ε0 ) = ∅. Set ε ∈ (0, ε0 ) such that bounded models when there are Byzantine agents in the
 network. Recall that the Byzantine agents have the ability
λ|N| α |N| ε0 to communicate disparate opinions to different neighbors at
ε<
1 − λ|N| α |N| any time step, and they are much more difficult to cope
with. Defining GN (t) = (N, EN (t)) to be the subnetwork of
(1 + λ)|N| β |N| (1 − β(1 + λ))ε0
. (13) G(t) = (V, E(t)) that is induced by the set of normal agents
1 − β |N| (1 + λ)|N|
N, where EN (t) consists of all directed edges among the nor-
Let tε be the time step satisfying ∗ (t) < ρ∗ +ε and φ ∗ (t) > mal agents at time step t. The following result deals with the
ρφ ∗ − ε for any t ≥ tε . fixed network structure in the globally bounded model.
Recall that the pair of sets X (tε , ε0 ) ∩ N and Xφ (tε , ε0 ) ∩ N Theorem 3 (Opinion Consensus in R-Globally Bounded
is nonempty and disjoint. Since G is 2R + 1-robust, at least Model With Byzantine Agents): Suppose that we have a time-
one of this couple of sets is 2R + 1-reachable. We suppose, invariant network characterized by a directed graph G =
w.l.o.g., that X (tε , ε0 ) ∩ N is 2R + 1-reachable and, hence, (V, E), where each normal agent updates its private and
there is an agent vi ∈ X (tε , ε0 )∩N having no less than 2R+1 expressed opinions according to the opinion R-sifting strategy.
neighboring agents not in its set. As there are no more than R Then, in the R-globally bounded model having the Byzantine

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
8 IEEE TRANSACTIONS ON CYBERNETICS

agents, resilient opinion consensus can be reached if and only Remark 3 can also be applied here as the sufficiency gives
if GN is R + 1-robust. a stronger result which indicates that the discrepancy between
Proof (Necessity): Suppose that GN is not R + 1-robust. the private and expressed opinions is ultimately vanishing.
There must exist a pair of nonempty and disjoint sets S1 , S2 ⊆ When moving to time-varying networks, we have the following
N which is not R + 1 reachable. Each agent in this couple result.
of sets has no more than R normal neighbors not in the set. Corollary 3: Suppose that we have a time-varying network
Fix c1 < c2 . Let xi (0) = x̃i (0) = c1 for any vi ∈ S1 , and characterized by a directed graph G(t) = (V, E(t)), where
xi (0) = x̃i (0) = c2 for any vi ∈ S2 . For all the other agents each normal agent updates its private and expressed opinions
vi in the network, set xi (0) = x̃i (0) ∈ (c1 , c2 ). Suppose that according to the opinion sifting strategy with parameter R.
all the Byzantine agents always communicate the expressed Signified by {tk }, the time steps in which G(t) is 2R+1-robust.
opinion c1 to each agent vi in S1 , and the expressed opinion Then, in the R-globally bounded model having the Byzantine
c2 to each agent vi in S2 at each time step t. By using the agents, resilient opinion consensus can be reached if |{tk }| =
resilient opinion R-sifting strategy, agents in S1 and S2 will ∞ and there is a constant τ ∈ N such that |tk+1 − tk | ≤ τ for
never adopt opinions not in their own sets. Thus, consensus all k.
is not reached among normal agents (in N). The necessity is Proof: Suppose that G(t) is 2R+1-robust, then GN (t) is R+1
proved. robust. This can be seen since there exist at most R Byzantine
Sufficiency: Similarly, we define that ρ∗ := limt→∞ ∗ (t) agents in the entire network G. Thanks to Theorem 3, we
and ρφ ∗ := limt→∞ φ ∗ (t). Assume that ρ∗ > ρφ ∗ . Choose prove the corollary by invoking a similar argument as that in
ε0 > 0 satisfying ρ∗ − ε0 > ρφ ∗ + ε0 . For t ∈ N and εi > 0, Corollary 1.
we define four sets Y (t, εi ) := {vi ∈ N : xi (t) > ρ∗ − We next turn to the locally bounded models when there are
εi }, Y˜ (t, εi ) := {vi ∈ N : x̃i (t) > ρ∗ − εi }, Yφ (t, εi ) := {vi ∈ Byzantine agents deploying across a fixed network topology.
N : xi (t) < ρφ ∗ + εi }, and Yφ̃ (t, εi ) := {vi ∈ N : x̃i (t) < ρφ ∗ + Theorem 4 (Opinion Consensus in R-Locally Bounded
εi }. According to the definition of ε0 , Y (t, ε0 )∩Yφ (t, ε0 ) = ∅ Model With Byzantine Agents): Suppose that we have a time-
and Y˜ (t, ε0 ) ∩ Yφ̃ (t, ε0 ) = ∅. Fix ε ∈ (0, ε0 ) such that (5) is invariant network characterized by a directed graph G =
satisfied. Define tε as the time step such that ∗ (t) < ρ∗ + ε (V, E), where each normal agent updates its private and
and φ ∗ (t) > ρφ ∗ − ε for all time step t ≥ tε . expressed opinions according to the opinion R-sifting strategy.
Since GN is R + 1-robust with no more than R Byzantine Then, in the R-locally bounded model having the Byzantine
agents, there exits an agent in Y (tε , ε0 ) or Yφ (tε , ε0 ) that has agents, resilient opinion consensus can be reached if and only
more than or equal to R + 1 normal neighboring agents not if GN is R + 1-robust.
in its set. W.l.o.g, we assume that vi ∈ Y (tε , ε0 ) has at least Proof (Necessity): The exact proof of necessity of
R + 1 normal neighboring agents not in Y (tε , ε0 ). With the Theorem 3 is applied here.
same argument as in Theorem 1, we establish the inequality Sufficiency: Reasoning similarly as in Theorem 3, we
xi (tε + 1) ≤ ρ∗ − αλε0 + (1 − αλ)ε. This expression also assume that ρ∗ := limt→∞ ∗ (t) and ρφ ∗ := limt→∞ φ ∗ (t).
holds for the renewed private opinion of every normal agent Suppose that ρ∗ > ρφ ∗ . Select ε0 > 0 satisfying ρ∗ − ε0 >
node not in Y (tε , ε0 ). Likewise, if vi ∈ Yφ (tε , ε0 ) which has ρφ ∗ + ε0 . For t ∈ N and εi > 0, we define four sets as in
at least R + 1 normal neighbors not in Yφ (tε , ε0 ), similarly, Theorem 3. By the definition of ε0 , Y (t, ε0 ) and Yφ (t, ε0 )
we obtain xi (tε + 1) ≥ ρφ ∗ + αλε0 − (1 − αλ)ε, which is also are disjoint; and Y˜ (t, ε0 ) and Yφ̃ (t, ε0 ) are also disjoint. Fix
applicable to the normal agents not in Yφ (tε , ε0 ). ε0 > ε > 0 following (5). Denote by tε be the time step
Define ε1 = αλε0 − (1 − αλ)ε such that 0 < ε < ε1 < ε0 . such that ∗ (t) < ρ∗ + ε and φ ∗ (t) > ρφ ∗ − ε for all time
Notice that the sets Y (tε +1, ε1 ) and Yφ (tε +1, ε1 ) are disjoint. step t ≥ tε .
The comments in the above paragraph imply that |Y (tε + Since GN is R + 1-robust, there exists an agent in Y (tε , ε0 )
1, ε1 )| < |Y (tε , ε0 )| or |Yφ (tε + 1, ε1 )| < |Yφ (tε , ε0 )| holds. or Yφ (tε , ε0 ) that has at least R + 1 normal neighboring agents
We can recursively define εj = αλεj−1 −(1−αλ)ε for every j ≥ not in its set. We assume, w.l.o.g., that vi ∈ Y (tε , ε0 ) has at
1 and recall that εj < εj−1 . The above discussion is applicable least R + 1 normal neighbors not in Y (tε , ε0 ). Noting that
to each time step tε +j provided Y (tε +j, εj ) and Yφ (tε +j, εj ) there are at most R Byzantine agents in Ni , vi will adopt at
are nonempty. Since GN contains |N| normal agents, there is least one of its normal neighbors’ expressed opinions not in
some T ≤ |N| such that either Y (tε + T, εT ) or Yφ (tε + T, εT ) Y (tε , ε0 ) under the opinion R-sifting strategy. Based upon the
is an empty set. On the other hand, εT = αλεT−1 − (1 − same reasoning as in Theorem 1, we obtain xi (tε +1) ≤ ρ∗ −
|N|
αλ)ε ≥ α |N| λ|N| ε0 − (1 − α |N|λ )ε > 0 according to the αλε0 + (1 − αλ)ε. This is also valid for the renewed private
choice of ε. opinion of each normal agent not in Y (tε , ε0 ). Likewise, if
Similar arguments can be applied for the two nonempty vi ∈ Yφ (tε , ε0 ) which has at least R + 1 normal neighbors
and disjoint sets Y˜ (tε , ε̃0 ) and Yφ̃ (tε , ε̃0 ) as far as expressed not in Yφ (tε , ε0 ), we arrive at xi (tε + 1) ≥ ρφ + αλε0 − (1 −
opinions are concerned (by Theorem 1). Then, we are able αλ)ε, which is also applicable to the normal agents not in
to conclude that there exists T̃ ≤ |N| such that either Yφ (tε , ε0 ).
Y˜ (tε + T̃, ε̃T̃ ) or Yφ̃ (tε + T̃, ε̃T̃ ) is empty and ε̃T̃ is posi- Define ε1 = αλε0 − (1 − αλ)ε, such that 0 < ε < ε1 < ε0 .
tive. Combining the above aspects for private and expressed The same reasoning in the proof of Theorem 3 (by recur-
opinions, we similarly derive the contradiction. The sufficiency sively defining εj = αλεj−1 − (1 − αλ)ε for each j ≥ 1) leads
is then proved. to εT > 0 for some T ≤ |N|. Similarly, we obtain ε̃T̃ > 0

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 9

for some T̃ ≤ |N| when expressed opinion update is taken Our separation algorithm can be performed in three steps,
into consideration. Combining the above aspects for private executed synchronously for all agents at each time step t ∈
and expressed opinions, we similarly derive the contradiction N. First, each normal agent vi ∈ N collects the expressed
which concludes the sufficiency. opinions {x̃ji (t)} from its neighbors and creates an ordered array
Using similar arguments as in Corollary 3, we can establish for {γj x̃ji (t)}vj ∈Ni arranging from largest to smallest. Second,
the following result for time-varying networks in the locally the largest R opinions that are strictly greater than γi xi (t) in
bounded model. the above array are deleted (if there are fewer than R greater
Corollary 4: Suppose that we have a time-varying network opinions than γi xi (t), all of those opinions are discarded). The
characterized by a directed graph G(t) = (V, E(t)), where similar sifting process is exerted to the smaller opinions. The
each normal agent updates its private and expressed opinions set of nodes that are discarded by agent vi at time t is signified
according to the opinion sifting strategy with parameter R. by a set Ri (t). Third, each vi ∈ N updates its opinion applying
Signified by {tk }, the time steps in which G(t) is 2R+1-robust. the functions fi (·) and gi (·), respectively, in (1) and (2)
Then, in the R-locally bounded model having the Byzantine ⎡
agents, resilient opinion consensus can be reached if |{tk }| =
∞ and there is a constant τ ∈ N such that |tk+1 − tk | ≤ τ for xi (t + 1) = sgn(γi )⎣aii (t)γi xi (t)
all k. ⎤

+ aij (t)γj x̃ji (t)⎦, t ∈ N (14)
IV. R ESILIENT O PINION C LUSTERING vj ∈Ni (t)\Ri (t)
In this section, we design the opinion sifting strategies to
and
allow opinion clustering and co-existence of different opin-
ions in the long term in the presence of both malicious and x̃i (t) = λi xi (t) + (1 − λi )
Byzantine agents. We will differentiate two situations, where  γj
opinions may approach assigned ratios or differences. In each × bij (t − 1) x̃ji (t − 1)
γi
case, the necessary and sufficient criteria are discussed under vj ∈N i (t−1)\Ri (t−1)
globally and locally bounded misbehaving conditions. t ∈ N\{0} (15)

where sgn(·) is the standard signum function, {aij (t)} are the
A. Opinion Separation in Terms of Quotient weights instantiating fi satisfying the following three condi-
Recall that the opinion network G = (V, E) with V = N ∪ tions for every t ∈ N: (Af’) aij (t) = 0 if vj ∈ N i (t)\Ri (t);
M consisting of n interacting agents. Given a scalar number (Bf’) there exists a constant number α ∈ (0, 1) independent
γi = 0 for every agent vi ∈ V, we define the opinion separation  that |γi |aij (t) ≥ α for any vj ∈ N i (t)\Ri (t); and
of t, such
in terms of quotient as follows. (Cf’) vj ∈N i (t)\Ri (t) |γi |aij (t) = 1; and similarly, {bij (t)} are
Definition 6 (Opinion Separation in Terms of Quotient): The the weights instantiating gi satisfying the following three con-
normal agents in N are said to achieve resilient opinion sep- ditions for every t ∈ N: (Ag) bij (t) = 0 if vj ∈ N i (t)\Ri (t);
aration in terms of quotient with respect to (γ1 , . . . , γn ) in (Bg) there exists a constant number β ∈ (0, 1) independent
the presence of misbehaving agents in M if limt→∞ γi xi (t) − of t, such that bij (t) ≥ β for any vj ∈ N i (t)\Ri (t); and (Cg)

γj xj (t) = 0 and limt→∞ γi x̃i (t) − γj x̃j (t) = 0 for all vi , vj ∈ N vj ∈N i (t)\Ri (t) bij (t) = 1. Moreover, as in the opinion sift-
and all initial conditions {xi (0)}ni=1 and {x̃i (0)}ni=1 . ing strategy, we assume λi ∈ (0, 1], and hence there exists a
If we set γ1 = γ2 = · · · = γn = 1 above, then we reproduce constant λ > 0 satisfying λi ≥ λ > 0 for every vi ∈ N.
the resilient opinion consensus in Definition 3. In general, we Theorem 5 (Resilient Opinion Separation in Terms of
have xi /xj → γj /γi and x̃i /x̃j → γj /γi as t tends to infinity. Quotient): Suppose that we have a time-invariant network
Here, by introducing different nonzero scales (can be positive characterized by a directed graph G = (V, E), where each
or negative) we are able to allow different expressed and pri- normal agent updates its private and expressed opinions
vate opinions when t tends to infinity. Opinion separation in according to the opinion separation strategy with parameters
terms of quotient is very useful in social opinion networks. In {γi }ni=1 and R.
the antagonistic or competitive scenario, an agent may simply 1) In the R-globally bounded model having malicious
reject whatever its competitors support and advocate whatever agents, resilient opinion separation in terms of quotient
its competitors object. This can be appropriately modeled by can be achieved if and only if G is (R + 1, R + 1)-robust.
setting γi = 1 while γj = −1 for a pair of rivals vi and vj . 2) In the R-locally bounded model having malicious agents,
In the literature of control theory, asymptotic approaching to resilient opinion separation in terms of quotient can be
prescribed ratios has been extensively under the name of scaled achieved if G is 2R + 1-robust; and G is R + 1-robust if
consensus (see [36]–[38]). However, only single-state value resilient opinion separation in terms of quotient in the
for each agent is considered in the existing literature. To real- R-locally bounded model with malicious agents can be
ize the resilient opinion separation, we need to modify the achieved.
proposed strategy in Section II to accommodate {γi }ni=1 . For 3) In the R-globally bounded model having the Byzantine
R ∈ N, we refer to the following algorithm as an opinion agents, resilient opinion separation in terms of quotient
separation strategy with parameters {γi }ni=1 and R. can be achieved if and only if GN is R + 1-robust.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
10 IEEE TRANSACTIONS ON CYBERNETICS

4) In the R-locally bounded model having Byzantine the functions fi (·) and gi (·), respectively, in (1) and (2)
agents, resilient opinion separation in terms of quotient ⎡
can be achieved if and only if GN is R + 1-robust. xi (t + 1) = hi /γi + sgn(γi )⎣aii (t)(γi xi (t) − hi )
Proof: Define (t) := maxvi ∈N γi xi (t) and φ(t) :=
minvi ∈N γi xi (t), respectively, as the maximum and minimum ⎤
  
private opinions for normal agents. Further, let (t) ˜ := + aij (t) γj x̃ji (t) − hj ⎦, t ∈ N
maxvi ∈N γi x̃i (t) and φ̃(t) := minvi ∈N γi x̃i (t) be the max- vj ∈Ni (t)\Ri (t)
imum and minimum expressed opinions, respectively, for (16)
normal agents. By setting ∗ (t) = max{(t), (t)} ˜ and

φ (t) = min{φ(t), φ̃(t)}, we can follow the similar arguments and
in Theorems 1–4 to show the statements 1)–4), respectively. x̃i (t) = hi /γi + λi (xi (t) − hi /γi ) + (1 − λi )
We omit the detailed proof due to the limitation of space.   
Remark 4: It might be tempting to introduce another set × bij (t − 1) x̃ji (t − 1) − hj /γj
of parameters, say, {γ̃i }ni=1 , to adjust the expressed opinions vj ∈N i (t−1)\Ri (t−1)
in Definition 6 in hope of showing different limit ratios t ∈ N\{0} (17)
for expressed opinions. However, this would be technically where {aij (t)} are the weights instantiating fi satisfying the
infeasible in the analysis of (14) and (15), and theoretically same three conditions (Af’), (Bf’), and (Cf’) for every t ∈ N;
enigmatic since γi can be regarded as a social psycho- and {bij (t)} are the weights instantiating gi satisfying the same
logical trait associated with each individual, which should three conditions (Ag), (Bg), and (Cg) for every t ∈ N. We
remain the same for both private and expressed opinions again assume λi ∈ (0, 1], and hence there exists a constant
for a particular individual [39]. As a result, the sufficiency λ > 0 satisfying λi ≥ λ > 0 for every vi ∈ N.
parts of Theorem 5 is stronger than what is required in Theorem 6 (Resilient Opinion Separation in Terms of
Definition 6 (see Remark 3). Moreover, results for time- Difference): Suppose that we have a time-invariant network
dependent network G(t) = (V, E(t)) can also be derived characterized by a directed graph G = (V, E), where each nor-
similarly. mal agent updates its private and expressed opinions according
to the opinion separation strategy with parameters {γi }ni=1 , h
and R.
B. Opinion Separation in Terms of Difference 1) In the R-globally bounded model having malicious
agents, resilient opinion separation in terms of difference
In addition to the parameters {γi }ni=1 , let h = (h1 , . . . , hn ) ∈
can be achieved if and only if G is (R + 1, R + 1)-robust.
Rn . We give the following definition for resilient opinion
2) In the R-locally bounded model having malicious agents,
separation in terms of difference.
resilient opinion separation in terms of difference can be
Definition 7 (Opinion Separation in Terms of Difference):
achieved if G is 2R + 1-robust; and G is R + 1-robust if
The normal agents in N are said to achieve resilient opinion
resilient opinion separation in terms of difference in the
separation in terms of difference with respect to (γ1 , . . . , γn )
R-locally bounded model with malicious agents can be
and h in the presence of misbehaving agents in M if
achieved.
limt→∞ γi xi (t)−γj xj (t) = hi −hj and limt→∞ γi x̃i (t)−γj x̃j (t) =
3) In the R-globally bounded model having Byzantine
hi − hj for all vi , vj ∈ N and all initial conditions {xi (0)}ni=1
agents, resilient opinion separation in terms of difference
and {x̃i (0)}ni=1 .
can be achieved if and only if GN is R + 1-robust.
From Definition 7, we see that the opinion separation in
4) In the R-locally bounded model having Byzantine
terms of difference is achieved if there exists vectors ξ, ξ̃ ∈
agents, resilient opinion separation in terms of difference
Rn such that for each vi ∈ N, γi xi (t) tends to hi + ξ and
can be achieved if and only if GN is R + 1-robust.
γi x̃i (t) tends to hi + ξ̃ as time goes to infinity. This ideally
Proof: Denote by ỹij (t) = x̃ji (t) − hj /γj , yj (t) = xj (t) − hj /γj ,
reflects many moderation processes in group decision making
and ỹj (t) = x̃j (t) − hj /γj for vi , vj ∈ V. The update rules (16)
where individuals may have different drifts based upon the
and (17) can be recast as
default opinion in question. We design the following opinion ⎡ ⎤
separation strategy with parameters {γi }ni=1 , h and R. 
The separation algorithm again can be performed in three yi (t + 1) = sgn(γi )⎣aii (t)γi yi (t) + aij (t)γj ỹij (t)⎦
steps, executed synchronously for all agents at each time step vj ∈Ni (t)\Ri (t)
t ∈ N. First, each normal agent vi ∈ N collects the expressed t∈N (18)
opinions {x̃ji (t)} from its neighbors and creates an ordered array
and
for {γj x̃ji (t) − hj }vj ∈Ni from largest to smallest. Second, the
largest R opinions that are strictly greater than γi xi (t) − hi in ỹi (t) = λi yi (t) + (1 − λi )
 γj
the above array are deleted (if there are fewer than R greater × bij (t − 1) ỹij (t − 1), t ∈ N\{0}
opinions than γi xi (t) − hi , all of those opinions are discarded). γi
vj ∈N i (t−1)\Ri (t−1)
The similar sifting process is exerted to the smaller opinions.
(19)
The set of agents that are discarded by agent vi at time t is
signified by Ri (t). Third, each vi ∈ N updates its opinion using respectively, for vi ∈ N.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 11

Fig. 2. Communication network G with six agents for Example 1.

It follows from Theorem 5 that resilient opinion separa-


tion in terms of difference is achieved for {yi (t), ỹi (t)}vi ∈N ,
which is equivalent to have vectors ξ, ξ̃ ∈ Rn such that
limt→∞ γi xi (t) = hi + ξ and limt→∞ γi x̃i (t) = hi + ξ̃ for every (a)
vi ∈ N. The proof is complete.
Theorem 6 deals with the fixed network topology G =
(V, E) and the case for time-varying network G(t) = (V, E(t))
can be derived analogously as in Sections III and IV-A.
Remark 5: As a final remark for the theoretical analysis, we
emphasize that in the above theoretical results (Theorems 1–6),
the upper bound R of the misbehaving nodes is not an
extra limitation. Given any number R, consensus behavior can
be expected if the communication network is appropriately
robust.

V. S IMULATION R ESULTS
In this section, we illustrate the effectiveness of the proposed
resilient consensus and separation strategies via several numer-
ical examples. (b)
Example 1: Suppose we have a network G = (V, E) over
n = 6 agents with V = N ∪ M, where N = {v1 , . . . , v5 } and Fig. 3. Opinion consensus over network G with a misbehaving agent v6
for (a) identical initial conditions for expressed and private opinions and (b)
M = {v6 } as shown in Fig. 2. It is straightforward to check evolution of discrepancy between expressed and private opinions. Inset of (b):
that the digraph G is 3-robust and GN is 2-robust. Throughout opinion divergence under ordinary protocol without sifting procedure [legends
the example, we assume the normal agents have initial private as in panel (a)].
opinions x1 (0) = −7, x2 (0) = −6, x3 (0) = 6, x4 (0) = 1,
and x5 (0) = −3. Agent v6 is a malicious agent who has ini-
tial expressed opinion x̃6 (0) = −5 and updates its expressed the inset of Fig. 3(b), we illustrate the situation when ordinary
opinion following x̃6 (t + 1) = (x̃1 (t) + x̃2 (t) + x̃3 (t) + x̃4 (t) + consensus protocol without sifting is applied. In this case, the
x̃5 (t))/5−0.2t+sin(t). Agent v6 is aware of the entire network interaction between the misbehaving agent v6 and the other
and tries to misguide the group opinion. normal agents diverges the system.
The opinion evolution for the initial configuration where In Fig. 4, we consider a situation where the discrepancy
x̃i (0) = xi (0) for 1 ≤ i ≤ 5 is shown in Fig. 3(a). Here, we between private and expressed opinions exists in the begin-
choose aii (t) = 2/3, aij (t) = (|Ni (t)| − |Ri (t)|)−1 /3 in (3); ning. We assume x̃1 (0) = 3, x̃2 (0) = 2, x̃3 (0) = −2,
λi = 1/4 and bij (t − 1) = (|Ni (t − 1)| + 1 − |Ri (t − 1)|)−1 x̃4 (0) = 4, and x̃5 (0) = −1. From Fig. 4(a) and (b), we
in (4). We observe from Fig. 3(a) that the malicious agent see that the normal agents mange to reach consensus despite
is unable to prevent the collective consensus of the network the large initial discrepancy between their respective private
as the normal agents apply the opinion sifting strategy with and expressed opinions. Remarkably, the speed to consensus
parameter R = 1, which agrees with our theoretic prediction, seems to be only affected negligibly as compared to Fig. 3.
that is, Theorems 2–4. To further illustrate the evolution of Moreover, we observe from the inset of Fig. 4(b) that consen-
discrepancy between private and expressed opinions, we define sus fails when ordinary consensus protocol without sifting is
the quantity in use.
Next, we study the opinion clustering in terms of quo-
i (t) = |xi (t) − x̃i (t)|, t∈N (20)
tient by introducing the parameters γ1 = γ2 = 2, and
for vi ∈ N. It follows from Fig. 3(b) that all i ’s initially equal γ3 = γ4 = γ5 = γ6 = −1. We choose aii (t) = 2|γi |−1 /3 and
zero followed by a growth and ultimately die out after around aij (t) = (|Ni | − |Ri (t)|)−1 |γi |−1 /3 in (14). The trajectories of
t = 20, reaching global consensus over the entire network. In opinions are shown in Fig. 5(a). We observe that the opinions

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
12 IEEE TRANSACTIONS ON CYBERNETICS

(a) (a)

(b) (b)

Fig. 4. Opinion consensus over network G with a misbehaving agent v6 Fig. 5. Opinion separation in terms of quotient over network G with a
for (a) disparate initial conditions for expressed and private opinions and (b) misbehaving agent v6 for (a) identical initial conditions for expressed and
evolution of discrepancy between expressed and private opinions. Inset of (b): private opinions and (b) evolution of discrepancy between expressed and pri-
opinion divergence under ordinary protocol without sifting procedure [legends vate opinions. Inset of (b): opinion separation in terms of difference over the
as in panel (a)]. same network [legends as in panel (a)].

are separated into two clusters such that v1 and v2 converge to


about 0.5 while v3 , v4 , and v5 tend to reach about −1. This ver-
ifies our theoretical result, that is, Theorem 5, and shows that
the opinions approach predetermined ratio using the opinion
separation strategy with given parameters {γi }6i=1 and R = 1.
The discrepancy of private and expressed opinions is shown in
Fig. 5(b) in line with theoretical results. As a comparison, we Fig. 6. Rich-core of the Zachary’s karate club, GKarate , with one misbehaving
plot in the inset of Fig. 5(b), the opinion clustering in terms agent being v9 when t ∈ [0, 10] and switched to v8 when t ≥ 11.
of difference following our separation strategy with γi = 1
for all 1 ≤ i ≤ 6, h1 = h2 = 1, and hi = 0 for 3 ≤ i ≤ 6.
The result shows that v1 and v2 reach the opinion around −2 Zachary’s karate club, referred to as rich-core GKarate , is deter-
while the other normal agents attain the opinion around −3 as mined in [41] (see Fig. 6). It is direct to check that GKarate is an
one would expect from Theorem 6. It is worth mentioning that undirected 3-robust graph. When 0 ≤ t ≤ 10, we assume that
although the misbehaving agent v6 fails to thwart the group’s B = {v9 } is the only misbehaving agent whose expressed opin-
consensus or clustering, it still influences the trajectories and ion follows the dynamics x̃9 (t+1) = (x̃2 (t)+ x̃7 (t)+ x̃8 (t))/3+
the final opinions of the normal agents since it is fully engaged t cos(t). When t ≥ 11, v9 becomes normal and B = {v8 } with
in the interaction among these agents. x̃8 (t + 1) = (x̃5 (t) + x̃6 (t) + x̃7 (t) + x̃9 (t))/4 − 0.1t − sin(t2 ).
Example 2: In this example, we study the Zachary’s karate The initial opinion configuration is taken as x1 (0) = −x̃1 (0) =
club, which characterizes the friendship between members of −3, x2 (0) = −x̃2 (0) = −4, x3 (0) = −x̃3 (0) = 2, x4 (0) =
a university karate club in 1977 [40]. A core subgraph of the −x̃4 (0) = 1, x5 (0) = −x̃5 (0) = −5, x6 (0) = −x̃6 (0) = 3.5,

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
SHANG: RESILIENT CONSENSUS FOR EXPRESSED AND PRIVATE OPINIONS 13

asynchronous opinion sifting strategies for normal agents and


also the analysis of the possible influence of time delays.

R EFERENCES
[1] Y. Dong, M. Zhan, G. Kou, Z. Ding, and H. Liang, “A survey on the
fusion process in opinion dynamics,” Inf. Fusion, vol. 43, pp. 57–65,
Sep. 2018.
[2] A. V. Proskurnikov and R. Tempo, “A tutorial on modeling and analy-
sis of dynamical social networks. Part II,” Annu. Rev. Control, vol. 45,
pp. 166–190, Apr. 2018.
[3] K. Sznajd-Weron and J. Sznajd, “Opinion evolution in closed commu-
nity,” Int. J. Mod. Phys. C, vol. 11, no. 6, pp. 1157–1165, 2000.
[4] P. Clifford and A. Sudbury, “A model for spatial conflict,” Biometrika,
vol. 60, no. 3, pp. 581–588, 1973.
[5] S. Galam, “Minority opinion spreading in random geometry,”
Eur. Phys. J. B, vol. 25, no. 4, pp. 403–406, 2002.
[6] G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch, “Mixing beliefs
among interacting agents,” Adv. Complex Syst., vol. 3, no. 1, pp. 87–98,
2000.
Fig. 7. Opinion consensus over GKarate with one misbehaving agent v9 when [7] R. Hegselmann and U. Krause, “Opinion dynamics and bounded con-
t ∈ [0, 10] and v8 when t ≥ 11. Private opinions (circles) and corresponding fidence: Models, analysis and simulation,” J. Artif. Soc. Soc. Simulat.,
expressed opinions (squares) for each agent have the same color. Hollow vol. 5, no. 3, pp. 1–33, 2002.
symbols are for normal agents, while solid symbols are for misbehaving [8] Y. Shang, “Hybrid consensus for averager–copier–voter networks with
agents. non-rational agents,” Chaos Solitons Fractals, vol. 110, pp. 244–251,
May 2018.
[9] M. Ye, Y. Qin, A. Govaert, B. D. O. Anderson, and M. Cao, “An influ-
ence network model to study discrepancies in expressed and private
x7 (0) = −x̃7 (0) = −1.5, x8 (0) = −x̃8 (0) = 5.5, and opinions,” Automatica, vol. 107, pp. 371–381, Sep. 2019.
x̃9 (0) = 0. [10] T. Kuran, “Sparks and prairie fires: A theory of unanticipated political
revolution,” Public Choice, vol. 61, no. 1, pp. 41–74, 1989.
The parameters in protocols (3) and (4) are taken as aii (t) = [11] J. Goodwin, “Why we were surprised (again) by the Arab spring,” Swiss
0.9, aij (t) = (|Ni (t)| − |Ri (t)|)−1 /10, λi = 0.6, bij (t − 1) = Political Sci. Rev., vol. 17, no. 4, pp. 452–456, 2011.
(|Ni (t − 1)| + 1 − |Ri (t − 1)|)−1 for all i and j. It is interesting [12] C. L. Munsch, J. R. Weaver, J. K. Bosson, and L. T. O’Connor,
“Everybody but me: Pluralistic ignorance and the masculinity contest,”
to see from Fig. 7 that when v9 finally “cleans up its act,” J. Soc. Issues, vol. 74, no. 3, pp. 551–578, 2018.
consensus can still be achieved embracing v9 as one would [13] S. V. Grootel, C. V. Laar, L. Meeussen, T. Schmader, and S. Sczesny,
expect. This again is in line with our main theorems. “Uncovering pluralistic ignorance to change men’s communal self-
descriptions, attitudes, and behavioral intentions,” Front. Psychol.,
Real-world examples of opinion formation during jury vol. 9, p. 1344, Aug. 2018.
deliberation in Los Angeles County Superior Court as well as a [14] S. G. Buzinski, J. Clark, M. Cohen, B. Buck, and S. P. Roberts,
mock jury simulation in Tennessee are provided in the supple- “Insidious assumptions: How pluralistic ignorance of studying behav-
ior relates to exam performance,” Teach. Psychol., vol. 45, no. 4,
mentary material. Building upon real-world data, we illustrate pp. 333–339, 2018.
that the proposed sifting algorithms enable consensus for [15] N. Laleh, B. Carminati, and E. Ferrari, “Risk assessment in
both expressed and private opinions for general interpersonal social networks based on user anomalous behaviors,” IEEE
Trans. Depend. Secure Comput., vol. 15, no. 2, pp. 295–308,
interaction networks confirming the empirical observations. Mar./Apr. 2018.
[16] V. Amelkin, F. Bullo, and A. K. Singh, “Polar opinion dynamics in social
networks,” IEEE Trans. Autom. Control, vol. 62, no. 11, pp. 5650–5665,
Nov. 2017.
VI. C ONCLUSION [17] S. Shehnepoor, M. Salehi, R. Farahbakhsh, and N. Crespi, “NetSpam:
In this article, the problem of resilient opinion consensus A network-based spam detection framework for reviews in online
social media,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 7,
involving both private and expressed opinions with misbehav- pp. 1585–1595, Jul. 2017.
ing agents has been considered. We have proposed a unique [18] Y. Shang, “Resilient consensus of switched multi-agent systems,”
opinion dynamics model accommodating both an individual’s Syst. Control Lett., vol. 122, pp. 12–18, Dec. 2018.
[19] Y. Shang, “Consensus of hybrid multi-agent systems with malicious
private opinion, which is not disclosed to others but evolves nodes,” IEEE Trans. Circuits Syst. II, Exp. Briefs, to be published.
under local influence from the expressed opinions of its neigh- doi: 10.1109/TCSII.2019.2918752.
bors, and its expressed opinion, which evolves under a peer [20] S. Sundaram and C. N. Hadjicostis, “Distributed function calculation
via linear iterative strategies in the presence of malicious agents,” IEEE
pressure to conform to the local environment. Based on the Trans. Autom. Control, vol. 56, no. 7, pp. 1495–1508, Jul. 2011.
introduced resilient opinion sifting strategies, we have estab- [21] F. Pasqualetti, A. Bicchi, and F. Bullo, “Consensus computa-
lished sufficient and necessary graph-theoretical conditions tion in unreliable networks: A system theoretic approach,” IEEE
Trans. Autom. Control, vol. 57, no. 1, pp. 90–104, Jan. 2012.
to guarantee opinion consensus in a variety of adversarial [22] H. Zhang and S. Sundaram, “Robustness of information diffusion algo-
environments involving local and global threats as well as rithms to locally bounded adversaries,” in Proc. Amer. Control Conf.,
malicious and Byzantine agents. As a further extension, two Montreal, QC, Canada, 2012, pp. 5855–5861.
[23] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, “Resilient
types of opinion clustering problems are discussed and corre- asymptotic consensus in robust networks,” IEEE J. Sel. Areas Commun.,
sponding sufficient and necessary conditions are presented to vol. 31, no. 4, pp. 766–781, Apr. 2013.
characterize opinion separation in terms of quotient and differ- [24] R. Moghadam and H. Modares, “Resilient autonomous con-
trol of distributed multiagent systems in contested environments,”
ence. Both directed fixed networks and time-varying networks IEEE Trans. Cybern., vol. 49, no. 11, pp. 3957–3967, Nov. 2019.
have been investigated. Future work includes the design of doi: 10.1109/TCYB.2018.2856089.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.
14 IEEE TRANSACTIONS ON CYBERNETICS

[25] C. Zhao, J. He, and J. Chen, “Resilient consensus with mobile detectors [37] Y. Shang, “Finite-time scaled consensus through parametric linear
against malicious attacks,” IEEE Trans. Signal Inf. Process. Over Netw., iterations,” Int. J. Syst. Sci., vol. 48, no. 10, pp. 2033–2040, 2017.
vol. 4, no. 1, pp. 60–69, Mar. 2018. [38] Y. Shang, “Scaled consensus of switched multi-agent systems,” IMA
[26] S. E. Asch, “Effects of group pressure upon the modifictaion and dis- J. Math. Control Inf., vol. 36, no. 2, pp. 639–657, 2019.
tortion of judgments,” in Groups, Leadership and Men, H. Guetzkow, [39] H. Markus and E. Wurf, “The dynamic self-concept: A social psycho-
Ed. Pittsburgh, PA, USA: Carnegie Univ. Press, 1951, pp. 222–236. logical perspective,” Ann. Rev. Psychol., vol. 38, no. 1, pp. 299–337,
[27] S. Moldovan, E. Muller, Y. Richter, and E. Yom-Tov, “Opinion leader- 1987.
ship in small groups,” Int. J. Res. Market., vol. 34, no. 2, pp. 536–552, [40] W. W. Zachary, “An information flow model for conflict and fission in
2017. small groups,” J. Anthropol. Res., vol. 33, no. 4, pp. 452–473, 1977.
[28] J. Semonsen, C. Griffin, A. Squicciarini, and S. Rajtmajer, “Opinion [41] A. Ma and R. J. Mondragón, “Rich-cores in networks,” PLoS ONE,
dynamics in the presence of increasing agreement pressure,” vol. 10, no. 3, 2015, Art. no. e0119678.
IEEE Trans. Cybern., vol. 49, no. 4, pp. 1270–1278, Apr. 2019.
doi: 10.1109/TCYB.2018.2799858.
[29] C. G. Antonopoulos and Y. Shang, “Opinion formation in multiplex
networks with general initial distributions,” Sci. Rep., vol. 8, p. 2852,
Feb. 2018.
[30] Y. Shang, “On the structural balance dynamics under per-
ceived sentiment,” Bull. Iran. Math. Soc., pp. 1–8, Aug. 2019.
doi: 10.1007/s41980-019-00286-4. Yilun Shang received the B.S. and Ph.D. degrees in
[31] X. Song, W. Shi, Y. Mao, and C. Yang, “Impact of informal networks mathematics from Shanghai Jiao Tong University,
on opinion dynamics in hierarchically formal organization,” Physica A Shanghai, China, in 2005 and 2010, respectively.
Stat. Mech. Appl., vol. 436, pp. 916–924, Oct. 2015. He was a Post-Doctoral Fellow with the
[32] H. Zhang, E. Fata, and S. Sundaram, “A notion of robustness in complex University of Texas at San Antonio, San Antonio,
networks,” IEEE Trans. Control Netw. Syst., vol. 2, no. 3, pp. 310–320, TX, USA; Singapore University of Technology
Sep. 2015. and Design, Singapore; the Hebrew University of
[33] Y. Liu, J. R. Rui, and X. Cui, “Are people willing to share their political Jerusalem, Jerusalem, Israel; from 2010 to 2014.
opinions on Facebook? Exploring roles of self-presentational concerns From 2014 to 2018, he was an Associate Professor
in spiral of silence,” Comput. Human Behav., vol. 75, pp. 294–302, with Tongji University, Shanghai, China. He was an
Nov. 2017. International Visiting Fellow with the University of
[34] Y. Shang, “Deffuant model with general opinion distributions: First Essex, Colchester, U.K., in 2017. He is currently an Associate Professor with
impression and critical confidence bound,” Complexity, vol. 19, no. 2, Northumbria University, Newcastle upon Tyne, U.K. His current research
pp. 38–49, 2013. interests reside in complex networks, complex systems, statistical physics,
[35] K. Hayashi, E. Umehara, and Y. Ogawa, “Analysis of Twitter messages applied probability, combinatorics, and algorithms and data analysis.
about the Osaka metropolis plan in Japan,” in Proc. IEEE Int. Conf. Big Dr. Shang was a recipient of the 2016 Dimitrie Pompeiu Prize. He is on
Data, 2017, pp. 3064–3070. the Editorial Boards of some international journals, including the European
[36] S. Roy, “Scaled consensus,” Automatica, vol. 51, pp. 259–262, Journal of Pure and Applied Mathematics, Scientific Reports (Nature), IEEE
Jan. 2015. ACCESS, and the KSII Transactions on Internet and Information Systems.

Authorized licensed use limited to: HANGZHOU DIANZI UNIVERSITY. Downloaded on July 23,2020 at 02:03:09 UTC from IEEE Xplore. Restrictions apply.

You might also like