Estimating Network Structure from Incomplete Event Data

2018·Arxiv

Abstract

Abstract

Multivariate Bernoulli autoregressive (BAR) processes model time series of events in which the likelihood of current events is determined by the times and locations of past events. These processes can be used to model nonlinear dynamical systems corresponding to criminal activity, responses of patients to different medical treatment plans, opinion dynamics across social networks, epidemic spread, and more. Past work examines this problem under the assumption that the event data is complete, but in many cases only a fraction of events are observed. Incomplete observations pose a significant challenge in this setting because the unobserved events still govern the underlying dynamical system. In this work, we develop a novel approach to estimating the parameters of a BAR process in the presence of unobserved events via an unbiased estimator of the complete data log-likelihood function. We propose a computationally efficient estimation algorithm which approximates this estimator via Taylor series truncation and establish theoretical results for both the statistical error and optimization error of our algorithm. We further justify our approach by testing our method on both simulated data and a real data set consisting of crimes recorded by the city of Chicago.

1 Introduction

Discrete event data arises in a variety of forms including crimes, health events, neural firings, and social media posts. Frequently each event can be associated with a node in a network, and practitioners aim to learn the relationships between the nodes in the network from the event data. For example, one might observe a sequence of crimes associated with different gangs and seek to learn which crimes are most likely to spark retaliatory violence from rival gangs.

Such problems have attracted widespread interest in recent decades and a variety of point process models have been proposed to model such data. The Hawkes process ([13]) is a popular continuous time framework which has been applied in a number of different contexts (e.g., [34, 33, 8, 31]). In addition, other works works have used a discrete time framework to model time series event data (e.g., [17, 10, 3]).

A central assumption of many of these works is that all the events are observed. However, in many cases we may observe only a subset of the events at random. For example, while point process models have been widely used to model crime incidence ([23, 24, 18]), frequently one only has access to reported crime data. For many crimes the true number of incidents can be substantially higher. The gap between the reported and true crime rates is referred to as “the dark figure of crime” by researchers in Sociology and Criminology who have studied this issue extensively ([6, 15]). Unobserved events also pose a challenge in inference from Electronic Health Record (EHR) data which can be incomplete for a number of different reasons ([30, 29]).

The unobserved events still play a role in the dynamical system governing the time series, making network estimation with incomplete data particularly challenging. In this paper, we contribute to the growing literature on modeling in the presence of unobserved events by proposing a novel method for estimating networks when we only observe a subset of the true events.

1.1 Problem Formulation

Many point process models of time series of discrete events are temporally discretized either because event times were discretized during the data collection process or for computational reasons. In such contexts, the temporal discretization is typically such that either one or zero events are observed in each discrete time block for each network node. With this in mind, we model the true but unobserved observations using a Bernoulli autoregressive process:

Here is a vector indicating whether events occurred in each of the M nodes during time period t. The vector is a constant bias term, and the matrix is the weighted adjacency matrix associated with the network we wish to estimate. We assume that each row a of lies in the ball of radius r, which we denote . We generally consider a case where a is sparse and the magnitude of all its entries are bounded, so that r is a universal constant which is independent of M.

We observe , a corrupted version of (1.1) where only a fraction of

events are observed as follows:

Here denotes the Hadamard product and is a vector where each entry is independently drawn to be one with probability p and zero with probability

Our analysis of (1.1) and (1.2) can be naturally extended to several more complex variants. Instead of assuming each is observed with probability p, we can assume events from each node i are observed with a unique probability . We consider only a first order AR(1) process but our framework can be extended to incorporate more sophisticated types of memory as in [22]. We omit discussion of these extensions in the interest of clarity.

2 Related Work

Corrupted or missing data in high-dimensional data sets is a problem which appears in a number of different domains and has attracted widespread interest over the past few decades (see [11] for an application-focused overview). Our focus is on a particular type of corrupted data: partially observed sequences of discrete events. In recent years researchers have started to focus on this problem ([32, 28, 16]). The prior works of which we are aware use a Hawkes process framework and assume knowledge of the time periods when the data is corrupted. In the context of (1.2) this amounts to knowledge of . Our method can operate in a setting where the researcher cannot differentiate between periods when no event actually occurred, and when events potentially occurred but were not recorded. Moreover, because we use a discrete-time framework, we are able to derive sample complexity bounds for the estimation procedure proposed in Section 3. Our theoretical results complement the empirical nature of much of the past work in this area.

This paper is also related a variety of works on regularized estimation in high-dimensional statistics, including [5, 27, 4] and [14]. Many of these works have derived sample complexity guarantees using linear models, and some of these results have been extended to autoregressive generalized linear models ([25, 12]). Another line of research ([20, 1, 21, 19, 25]) has formalized a notion of Restricted Strong Convexity (RSC) which we leverage in Section 4.2. While many loss functions of interest in high-dimensional statistics are not strongly convex, these works have shown that they frequently satisfy an RSC condition which is sufficient to provide statistical and optimization error guarantees. The main technical challenges in our setting lie in establishing results similar to these RSC conditions.

2.1 Missing Data in a High-Dimensional Linear Model

[20] straddles the missing data literature and high-dimensional statistics literature. The

authors consider a missing data linear model

where and one observes pairs and aims to estimate . The authors propose minimizing a loss function of the observed data Z which satisfies the property

for any

denotes the classical Lasso loss function with the unobserved data X and regularization parameter . In other words, the missing data loss function is an unbiased estimator for the full data Lasso loss function we would ideally like to minimize. This idea motivates our construction of a loss function for the observed process (1.2).

Our problem can be viewed as an extension of [20] to autoregressive GLM models without knowledge of W.1 In particular, we cannot distinguish events that were missed () from correctly observed periods with no events (able prove sample complexity bounds as well as optimization bounds which are consistent with the high-dimensional statistical literature in that they scale with rather than the dimension of . We are able to prove analogous bounds for our estimator in Section 4.

2.2 Contributions

This paper makes the following contributions.

• We propose a novel method for estimating a network when only a subset of the true events are observed. In contrast to previous work, our methods do not rely on knowledge of when the data is potentially missing. Our procedure uses Taylor series approximations to an unbiased loss function, and we show that these approximations have controlled bias and lead to accurate and efficient estimators.

• We prove bounds on both the statistical error and optimization error of our proposed estimation method. The results hinge on showing that our loss function satisfies a restricted strong convexity (RSC) condition. Past work on linear inverse problems with corrupted designs also establish RSC conditions, but these conditions do not carry over to the autoregressive GLM setting.

• We demonstrate the effectiveness of our methodology on both simulated data and real crime data.

3 Proposed Estimation Procedure

Given the full data , the negative log-likelihood function is decomposable in the M rows of A. In other words, if

then where is the mth row of A and denote the loss function restricted to a specific row. Throughout the paper we slightly abuse notation and let refer to the entire loss function when A is a matrix, and let refer to the loss function for a specific row when is a row vector. The loss function for the mth row takes the form

where f(x) = log(1 + exp(x)) is the partition function for the Bernoulli GLM.

We do not have access to X and instead we aim to estimate A using the corrupted data . As discussed in Section 2.1, our strategy will be to construct a loss function of Z which is an unbiased estimator for . In other words, we want to find some function such that for any

In contrast to the Gaussian case discussed in Section 2.1, the Bernoulli partition function f(x) = log(1 + exp(x)) is not a polynomial and constructing a function satisfying (3.1) directly is challenging. We adopt a strategy of computing unbiased approximations to truncated Taylor series expansions of and arriving at as a limit of such approximations.

To do this, we first rewrite f using its Taylor series expansion around zero

The constant factor log(2) does not effect estimation in any way so we ignore it for the remainder of our discussion in the interest of simplicity. We let denote the degree q Taylor truncation to . The are binary vectors and we assume each row is sparse, so will not be too far from zero. Thus it is reasonable to hope that for small is a good approximation for whenever . We bound the approximation error in Lemma B.3 in the supplement.

We now consider the problem of constructing a function

Key question we need to address with this approach include (a) can we (approximately) solve this optimization problem efficiently? (b) will the solution to this optimization problem be robust to initialization? (c) will it be a strong estimate of the ground truth?

3.1 Definition of L(2)Z,p

We first derive an unbiased estimator of the degree-two Taylor series expansion

Note that there are straightforward unbiased estimates of the first two terms:

For the third term, , note that

Thus we must estimate the monomials with repeat terms (i = j) differently from the monomials with all distinct terms (). Using Equations (3.3) and (3.4) we can define the degree two unbiased estimator:

3.2 Higher-Order Expansions

The construction of in the previous section suggests a general strategy for constructing satisfying (3.2). Take any monomial

depending on the counts in nodes during time period t. Wherever this monomial appears in , our unbiased loss function will have a term

scaled by where k denotes the number of unique terms in the monomial. For example, in Equation (3.3) each degree two monomial was unique so we scaled everything by . However, in (3.5) some of the degree two monomials had repeated terms and so they were scaled by . In order to formalize these ideas and generalize our estimator to q > 2, we first need to introduce additional notation.

3.2.1 Notation

Let denote the set of all monomials of degree d. We represent an element as a list containing d elements. An element in the list corresponds to the index of a term in the monomial. For an example, the monomial can be represented as the list (1, 1, 3).

For a polynomial function h we let denote the coefficient of the monomial U in h. Finally we define the order of a list to denote the number of unique elements in the list, so |(1, 2)| = 2 whereas |(1, 1)| = 1.

Example Consider the function . We can decompose h as

where with corresponding coefficients and Using this notation we can write

3.2.2 Definition of L(q)Z,p

The degree q likelihood is constructed as follows

Recall that |U| denotes the number of unique terms in the monomial U. In other words, in we adjust by scaling each monomial according the the number of unique terms rather than the number of overall terms. This definition clearly satisfies (3.2). We show in the supplement that if r = 1 and then converges uniformly on to a function we denote as . Extending this loss function on individual rows to an entire matrix, we can define . An additional technical discussion in the supplement guarantees that actually satisfies the desired property in Equation (3.1).

3.3 Proposed Optimization

In practice we can only compute . To estimate we consider the following constrained optimization:

where is an estimate of the missingness parameter p and

In general, is not a convex function. However, we show in Section 4.2 that under certain assumptions all stationary points of (3.6) must lie near . Thus we can approximately solve (3.6) via a simple projected gradient descent algorithm.

In order to apply our algorithm it is necessary to have an estimate of the frequency of missed data. In many cases one may have prior knowledge available. For example, social scientists have attempted to quantify the frequency of unreported crimes ([15, 26]). Moreover, a simulation study in Section 5 suggests our strategy is robust to misspecification of p.

4 Learning Rates

In this section we answer several questions which naturally arise with our proposed estimation procedure in Equation (3.6). In particular, we’d like to know:

• If we can find a solution to Equation (3.6), will it be a good approximation to

• The loss function is not convex. Is it possible to actually find a minimizer to (3.6), or an approximation to it?

In Theorem 4.1 we answer the first question affirmatively. In Theorem 4.2 we show that all stationary points of (3.6) are near one another, so that simple gradient-based methods will give us a good solution.

Throughout this section we assume . All results in the section apply for the loss functions for . In the case we recover the idealized loss function

We use to mean and to mean a = Cb where C is a universal constant. Define

4.1 Statistical Error

The following theorem controls the statistical error of our proposed estimator.

Theorem 4.1 (Accuracy of

where

for with probability at least

The two terms in the upper bound of Theorem 4.2 have a natural interpretation. The first represents the error for the idealized estimator , while the second represents the error due to the Taylor series truncation. Our error scales as which is reasonable in the context of our algorithm because is only well-defined when (see Remark 2 in the supplement). An interesting open question which arises from Theorem 4.1 is whether the process described in (1.1) and (1.2) is unidentifiable for or something specific to our methodology fails for p below this threshold.

The proof of Theorem 4.1 uses ideas from the analysis of high-dimensional GLMs ([12, 22]) as well as ideas from the analysis of missing data in the linear model [20] and Gaussian linear autoregressive processes [14]. The key technical challenge in the proof lies in controlling the gradient of the error term . This is done in Lemmas B.2-B.6 in the supplement.

4.2 Optimization Error

We next focus on the optimization aspects of Equation (3.6). Our loss function is non-convex, so at first glance it may appear to be a poor proxy loss function to optimize. However, a body of research (see [1, 21, 20, 19]) has studied loss functions satisfying a properties known as restricted strong convexity (RSC) and restricted smoothness (RSM). These works have shown that under certain conditions, the optimization of non-convex loss functions may be tractable. The formal definitions of the RSC and RSM conditions we use are as follows.

Definition 1 (Restricted Strong Convexity). Let denote the first order Taylor approximation to a loss function L centered at w. A loss function L satisfies the RSC condition with parameters

for all

Definition 2 (Restricted Smoothness). A loss function L satisfies the RSM condition with parameters

for all

We are able to show these conditions are satisfied for

This in turn gives the following result. As in Theorem 4.1 we assume

Theorem 4.2. Suppose and for at least rows of where C is a universal constant. Let be any stationary point of where

with probability at least

As in Theorem 4.1 the first term in our bound can be interpreted as the error for the idealized estimator while the second term can be thought of as the error due to the Taylor series truncation. The assumption that for at least rows of says that at least a constant fraction of nodes are influenced by other nodes in the network. This assumption allows us to state Theorem 4.2 in terms of s - the support of . In extreme cases where almost all nodes in the network fire independently of the other nodes it is possible for the optimization error to have a slower scaling than s.

The RSC and RSM conditions are closely related to ideas used in our statistical error bounds in Theorem 4.1. Lemma D.2 shows that the conditions are satisfied for on the order of which leads to an overall optimization error bound of the same order. This is a slower convergence rate than in the linear case; whether stronger rates can be obtained in the autoregressive GLM setting is an open question.

The proof of Theorem 4.2 proceeds as follows. We first establish that the RSC/RSM conditions hold for reasonable constants in Lemma D.2. This proofs relies on the technical machinery built up in Lemmas B.2-B.6. We can then combine our RSC/RSM results with Theorem 2 in [1] to conclude that all stationary points of lie in a small neighborhood of with high probability.

5 Simulations

In this section we evaluate the proposed method on synthetic data. We generate with s = 50 nonzero entries with locations chosen at random. Each nonzero entry is chosen uniformly in and . We then generate a “true" data set X and an “observed”

Figure 1: MSE vs T for p = .6 (top) and p = .75 (bottom). The blue line uses regularized MLE on full data – i.e. data unavailable in our setup – and represents a kind of oracle estimator. The red line uses incomplete data with (our proposed method). The yellow lines corresponds to minimizing the full data likelihood over the incomplete data – that is, this estimator naively ignores the issue of missing data. Median of 50 trials is shown and error bars denote sample standard deviations.

data set Z according (1.1) and (1.2) with . We perform projected gradient descent with a random initialization and show a median of 50 trials.

Figure 1 shows mean squared error (MSE) vs T for p = .6 (top) and p = .75 (bottom). Our method is shown in red. It uses the loss function on the partially observed data Z. Our method is compared to the loss function using both the full data X (i.e., an oracle estimator with access to the missing data) and the partially observed data Z (i.e. a naive estimator that ignores the possibility of missing data). As expected, with access to the complete data one can get a more accurate estimate of than either method using the partially observed data. However, our method outperforms the full data likelihood when given the partially observed data. In particular, note that the accuracy for the full data likelihood stalls after some time due to the inherent bias in using the corrupted data on the true data likelihood. In contrast our unbiased method continues to converge to the solution, as suggested by the results in Section 4. Finally, observe that for large T there is little variation between trials when using even though each trial was initialized randomly. This agrees Theorem 4.2 which states that all stationary points of lie near one another.

In practical applications one may have strong reason to believe some events are unobserved, but pinning down a precise estimate of the missingness parameter p might be unrealistic. Therefore it is important to see how our algorithm performs as a function of the misspecification . We examine this in Figure 2. We generate data as in the previous section but with p = .7. We then apply our algorithm with the loss function and varying values of

Figure 2 shows that our method is highly robust to small misspecification of the missingness parameter p. Interestingly, underestimating p by more than 10% leads to poor results but our method is still robust to overestimation of over 10%. This suggests there is value in applying our techniques with a conservative estimate of the amount of missed data, even when one has only a rough estimate of the frequency of missed events.

Figure 2: Robustness to missestimation of p using a true value of p = .7. Median of 50 trials is shown and errorbars denote sample standard deviations.

As final experiment we measure how MSE varies as a function of the Taylor series truncation level q. Calculating takes a significant amount of time for high-dimensional problems, so we randomly generate nonzero entries compared to 50 in the previous simulations and run 30 trials. We set

In Figure 3 we show MSE as a function of T for the full data loss function at three different truncation levels: and . Recall that and has no odd degree terms other than 1, so and . We see that the second and fourth degree truncations perform essentially the same as the full data likelihood. We also plot MSE as a function of T for the truncated missing data loss functions . As expected, using the full data gives stronger results than the partially observed data. We again see that the second and fourth order truncations perform nearly the same. The sample standard deviations are also similar - e.g. when T = 2000 the standard deviations of are .184, .178 and .186 respectively while the standard deviations for and are .322 and .311. The similarity between the second and fourth order truncation levels suggests that choosing one of these truncation levels will give us a strong approximation to . Since takes significantly longer to compute, we use the second order approximation in the first two experiments.

6 Chicago Crime Data

This section studies a data set consisting of crimes committed in Chicago between January 2001 and July 2018 ([9]). Point process models have been applied to this data set in the past ([18]). In a missing data setting, in order to validate our model it is important to have a “ground truth” data set. For this reason we limit our study to homicides within the data set. For other crimes recorded data is known to be incomplete ([15, 6]), but we assume that nearly every murder is observed. This allows us to create an incomplete data set by removing murders randomly while still maintaining a ground truth data set for validation.

Figure 3: MSE vs T using different loss functions in (3.6). use the full data X while use the missing data Z. Plots suggest that Taylor series truncations produce nearly identical results to complete loss functions.

The city is divided into 77 community areas and the community area where each murder occurred is recorded. The majority of these community areas experience few murders so we focus on the nine areas with the most murders since 2001. These areas form two clusters: one on the west side of the city and another on the south side. We discretize the events using one week bins, so if a murder occurred in community area i during week t and otherwise. This gives a data matrix which we divide into a train set containing the first 600 weeks in the period, and a test set containing the final 318 weeks. We then create an incomplete data set contains independent realizations of a Bernoulli random variable with mean p = .75.

We learn parameters and using the training set and the full data likelihood . We also learn parameters and using the incomplete train data and the missing data likelihood for various values of

We compare the log-likelihood of these parameters on the test set . The results are shown in Figure 4. The missing data estimates perform nearly as well as the full data estimate when is close to the true value of .75. Note that closely approximates the full data likelihood and the hold out likelihood is substantially worse for compared to for close to .75. In other words, ignoring the missing data entirely gives a weaker estimate than applying the techniques this paper introduces, even when is not a perfect estimate of p. Finally, observe that is more robust to misspecification when compared to when . This is a trend which also appears in Figure 2 and suggests there is value in using conservative estimates of the amount of missed data in practical applications.

Given estimates of A and p we can use density propagation to predict the likelihood of homicides during week n based on observed homicides up to week . We do this for learned from the incomplete data with as well as learned from but with , which corresponds to assuming there is no missing data. We use

Figure 4: Test performance on Chicago crime data. Log-likelihood of events on hold out set using full data with (yellow) and partial data with for various values of For , the proposed estimator performs nearly as well as an oracle estimator with full access to the missing data, and significantly better than a naive method that ignores the possibility of missing data.

particle filtering to construct estimates

These probabilities correspond to the likelihood of homicides during the nth week based on the observations over the first weeks. We construct such estimates for each week in the 318 week test set. As expected assigns higher likelihoods of homicides, with 960 expected homicides in total compared to . As a naive method of correcting for missing data, we divide by a constant scaling factor of 0.75 and report these likelihoods below; by doing this, we ensure that both predictions yield similar average numbers of homicides, so differences in performance between the proposed and naive estimator are not due to a simple difference in averages, but rather because the proposed method is capturing the underlying dynamics of the system.

Figure 5 displays these likelihoods for Community Area 25 (Austin) which has the largest number of homicides recorded during the test period. We use Gaussian smoothing to help visualize the trends. The top panel shows the predicted probability of events using (in red) and the scaled predicted probability of events using (in blue). The bottom panel shows the actual and incompletely observed events during the test period. The true events generally peak at times in which the predicted events for peak. For example, both the predicted event and true event charts have peaks around weeks 60 and 210. In contrast, the predicted events for are nearly constant over time. Since it does not account for the missing data (except via a uniform scaling factor), the network is not able to capture the dynamics of the process and so it cannot predict events with as much precision as

Figure 5: Result of density propagation on Chicago crime data for Community Area 25 (Austin). After a training period used to estimate (proposed estimator) and (naive estimator that doesn’t account for missing data), density propagation is run in subsequent test weeks to predict the likelihood of each community area having a homicide at time n based on observations up to time . The top panel shows the predicted likelihood of a homicide occurring in the Austin community area of Chicago. The network total homicides in the nine community areas during the test period, compared to . The actual number of homicides was 1035. The bottom panel shows the true events as well as the partially observed events (after Gaussian smoothing used for visualization).

7 Conclusion

We propose a novel estimator for Bernoulli autoregressive models which accounts for partially-observed event data. This model can be used in a variety of contexts in which observed discrete event data exhibits autoregressive structure. We provide mean squared error bounds which suggest that our method can accurately capture a network’s structure in the presence of missing events. Simulations and a real data experiment show that our method yields significant improvement compared with ignoring the missed events and that our method is robust to misspecification of the proportion of missed events. The framework described in this paper suggests a strategy for addressing regression problems with corrupted data in other GLMs, although further work is needed to extend our theoretical analysis beyond binary observations.

References

[1] A Agarwal, S Negahban, and M. Wainwright. Fast global convergence of gradient methods for high-dimensional statistical recovery. The Annals of Statistics, 40(5):2452– 2482, 2012.

[2] H. Alzer. Sharp bounds for the bernoulli numbers. Archiv der Mathematik, 74(3):207– 211, 2000.

[3] Y. Bao, C. Kwong, P. Peissig, D. Page, and R. Willett. Point process modeling of adverse drug reactions with longitudinal observational data. In Proc. Machine Learning and Healthcare, 2017.

[4] S. Basu and G. Michailidis. Regularized estimation in sparse high-dimensional time series models. Annals of Statistics, 43(4):1535–1567, 2015.

[5] P. Bickel, Y. Ritov, and A. Tsybakov. Simultaneous analysis of Lasso and Dantzig selector. Annals of Statistics, 37(4):1705–1732, 2009.

[6] A. Biderman. Understanding Crime Incidence Statistics. Springer-Verlag, New York, first edition, 1991.

[7] L. Carlitz. Eulerian numbers and polynomials. Mathematics Magazine, 32(5):247–260, 1959.

[8] S. Chen, A. Shojaie, E. Shea-Brown, and D. Witten. The multivariate Hawkes process in high dimensions: Beyond mutual excitation. arXiv preprint arXiv:1707.04928, 2017.

[9] City of Chicago. Crimes - 2001 to present, 2018. https://data.cityofchicago.org.

[10] A. Fletcher and S. Rangan. Scalable inference for neuronal connectivity from calcium imaging. In NIPS, 2014. arXiv:1409.0289.

[11] J. Graham. Missing data analysis: Making it work in the real world. Annual Review of Psychology, 60:549–576, 2009.

[12] E. C. Hall, G. Raskutti, and R. Willett. Inference of high-dimensional autoregressive generalized linear models. arXiv preprint arXiv:1605.02693, 2016.

[13] A. G. Hawkes. Point spectra of some self-exciting and mutually-exciting point processes. Journal of the Royal Statistical Society. Series B (Methodological), 58:83–90, 1971.

[14] A. Jalali and R. Willett. Missing data in sparse transition matrix estimation for subgaussian vector autoregressive processes. In American Control Conference, 2018. arXiv:1802.09511.

[15] L. Langton, M. Berzofsky, C. Kerbs, and H. Smiley-McDonald. Victimizations not reported to the police, 2006-2010. Technical report, Bureau of Justice Statistics, 2012.

[16] T. Le. A multivariate Hawkes process with gaps in observations. IEEE Transactions on Information Theory, 63(3):1800–1811, 2018.

[17] S. Linderman, R. Adams, and J. Pillow. Bayesian latent structure discovery from multi-neuron recordings. In Advances in neural information processing systems, 2016.

[18] S. W. Linderman and R. P. Adams. Discovering latent network structure in point process data. In ICML, 2014. arXiv:1402.0914.

[19] Po-Ling Loh. Statistical consistency and asymptotic normality for high-dimensional robust M-estimators. Annals of Statistics, 42(5):866–896, 2017.

[20] Po-Ling Loh and Martin J Wainwright. High-dimensional regression with noisy and missing data: Provable guarantees with non-convexity. The Annals of Statistics, 40:1637–1664, 2012.

[21] Po-Ling Loh and Martin J Wainwright. Regularized m-estimators with nonconvexity: Statistical and algorithmic theory for local optima. Journal of Machine Learning Research, 16:559–616, 2015.

[22] B. Mark, G. Raskutti, and R. Willett. Network estimation from point process data. arXiv preprint arXiv:1802.09511, 2018.

[23] G. Mohler. Marked point process hotspot maps for homicide and gun crime prediction in chicago. International Journal of Forecasting, 30(3):491–497, 2014.

[24] G Mohler, M Short, Sean Malinowski, Mark Johnson, G Tita, Andrea Bertozzi, and P. Brantingham. Randomized controlled field trials of predictive policing. Journal of the American Statistical Association, 110(512):1399–1411, 2016.

[25] Sahand Negahban, Pradeep Ravikumar, Martin Wainwright, and Bin Yu. A unified framework for high-dimensional analysis of M-estimators with decomposable regularizers. Statistical Science, 27(4):538–557, 2010.

[26] T. Palermo, J. Bleck, and A. Peterman. Tip of the iceberg: Reporting and gender-based violence in developing countries. American Journal of Epidemiology, 179(5):602–612, 2014.

[27] G. Raskutti, M. J. Wainwright, and B. Yu. Restricted eigenvalue conditions for correlated Gaussian designs. Journal of Machine Learning Research, 11:2241–2259, 2010.

[28] C. Shelton, Z. Qin, and C. Shetty. Hawkes process inference with missing data. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018.

[29] NG. Weiskopf and Weng C. Methods and dimensions of electronic health record data quality assessment: Enabling reuse for clinical research. Journal of the American Medical Informatics Association, 20(1):144–151, 2013.

[30] B. Wells, K. Chagin, A. Nowacki, and M. Kattan. Strategies for handling missing data in electronic health record derived data. EGEMS, 1(3):1035, 2013.

[31] H. Xu, D. Luo, X. Chen, and L. Carin. Benefits from superposed Hawkes processes. In Proceedings of the 16th International Conference on Artificial Intelligence and Statistics (AISTATS), 2018.

[32] H. Xu, D. Luo, and H. Zha. Learning Hawkes processes from short doubly-censored event sequences. In ICML, 2017. arXiv:1702.07013.

[33] Y. Yang, J. Etesami, N. He, and N. Kiyavash. Online learning for multivariate Hawkes processes. In NIPS, 2017.

[34] K. Zhou, H. Zha, and L. Song. Learning social infectivity in sparse low-rank networks using multi-dimensional Hawkes processes. In Proceedings of the 16th International Conference on Artificial Intelligence and Statistics (AISTATS), 2013.

Supplementary Material

The supplementary material is organized as follows. In Section A we recall all the notation needed for the proofs. In Section B we restate the main statistical results from the paper and in Section C we provide proofs of these results. In Section D we state the optimization results and give proofs in Section E.

A Notation and Preliminary Remarks

• negative log likelihood of complete data

• Taylor series approximation of

• negative log likelihood of missing data . Loss function is unbiased in the sense that

• Taylor series approximation of

• R

•

• p: fraction of data which is observed

•

Finally, we introduce additional notation which will be helpful in the proofs of Lemmas B.4 and B.5. First let denote the set of all monomials of degree d. We represent an element as a list containing d elements. An element in the list corresponds to the index of a term in the monomial (the list can potentially have repeated elements). For an example, the monomial can be represented as the list (1, 1, 3).

For a polynomial function h we let denote the coefficient of the monomial U in h. Finally we define the order of a list to denote the number of unique elements in the list, so |(1, 2)| = 2 whereas |(1, 1)| = 1.

Example Consider the function . Using all the notation above, we can decompose h as

where with corresponding coefficients and

Remark 1. We next make several observations by applying the notation above to functions which appear in the likelihoods and . First, for a fixed t, m we decompose the following function as a sum of monomials:

and note that

We also have

and we similarly note that

Next consider the function g which appears in the missing data likelihood

where . This observation will be important for our analysis because it allows us to leverage Equation A.1. Similarly we have

where allowing us to use Equation A.2.

Remark 2. Using an identical argument to Lemma B.4 one can show that for . This implies that converges uni- formly on so that is well defined on this ball. Moreover, it implies that converges and so

and satisfies (3.1)

B Statistical Results

We assume

Theorem B.1 (Accuracy of

for with probability at least

The proof of Theorem B.1 relies on the following supplementary lemmas.

Lemma B.2. Let

Lemma B.3 (Truncation error of

Lemma B.4 (Truncation Error of

Lemma B.5.

with probability at least

Lemma B.6.

with probability at least

Lemma B.7. Let

we have

and

with probability at least

C Proofs of Statistical Results

C.1 Proof of Theorem B.1

so by Lemma B.6

Part 2: Setting Up the Standard Equations The next several steps follow standard techniques for regularization in GLMs. Expanding and using the substitution

gives

Rearranging terms yields

Since f(x) = log(1 + exp(x)) is -strongly convex on with we can lower bound Equation (C.1) by . Also note

Using Theorem 2.2 in [12],with probability at least ing these observations to Equation (C.1) gives

and so

Restriction of It remains to lower bound in terms of In order to do this we will rely heavily on the fact that is not an arbitrary vector. Instead we show that must lie in a cone with important properties. In particular, returning to Equation (C.2) and observing that it follows that

Restricted Eigenvalue Condition As mentioned in the previous section, our goal is to lower bound . This is commonly referred to as a restricted eigenvalue condition in the literature, and it is closely related to the restricted strong convexity condition proved in Lemma D.2. In particular, Lemma B.7 guarantees that there exist universal constants

For arbitrary vectors this lower bound can be negative; however, by Equation (C.4)

for a universal constant c. Plugging this in to Equation (C.3) gives that

with probability

C.2 Proof of Lemma B.2

A computation shows that

where the A(q, m) are the Eulerian numbers. The alternating sum of the Eulerian numbers for fixed q can be given as

where th Bernoulli number (see the derivation of Equation 4.8 in [7]). Thus

C.3 Proof of Lemma B.3

For any j we have

where the last two lines use Lemma B.2 along with the fact that

C.4 Proof of Lemma B.4

Differentiating with respect to

We first bound

which is the degree term of . All the terms other than the in are always non-negative and

We conclude that

. This is the sum of the degree d terms of for all . In other words,

as claimed.

C.5 Proof of Lemma B.5

We begin by bounding individual monomials of. We then extend these individual bounds to bounds on the entire expression.

Bounding Individual Monomials Following the notation introduced in Section A a degree monomial of with index U is of the form

Meanwhile, the degree monomial of with index U is of the form

The difference of these monomials is given by

and

We apply Hoeffding’s inequality to conclude that

Thus

with probability at least

Extension to Entire Expression We need to take a union bound so that this holds for all monomials of degree at most log(T). However, since and are binary random variables

whenever

Suppose we have shown that Equation (C.5) holds for all monomials of degree < d. Now to show it holds for all monomials of degree d we only need to show that (C.5) holds for all monomials of degree d that have d distinct terms. The remaining concentrations are already covered by the degree monomials. There aremonomials of degree d with d distinct terms. Hence we need to take a union bound over at most

monomials of degree

We condition on this event and recall that denotes the set of all monomials of degree . Using Equation (C.6), the difference between the degree and can be bounded by

Using Lemma B.2 and Equation A.2 along with the fact that

where the final inequality uses Lemma B.2. Thus we have the bound

with probability at least

C.6 Proof of Lemma B.6

By Lemmas B.3 and B.4 the first two terms can be bounded by

while by Lemma B.5 the final term can be bounded is

with probability at least . We conclude that

with probability at least as claimed.

C.7 Proof of Lemma B.7

We have

By Theorem 2.1 in [12],

Now we define the matrix as follows:

Note that each entry of G is a martingale and

Applying the Azuma-Hoeffding inequality we conclude that for any

Overall we have concluded

with probability at least . Combining Equations (C.7),(C.8) and (C.9) give the desired result.

D Optimization Results

The main result of this section is the following Theorem.

Theorem D.1. Suppose and for at least rows of where C is a universal constant. Let be any stationary point of where

with probability at least

In order to prove Theorem D.1 we need to introduce notions of Restricted Strong Convexity (RSC) and Restricted Smoothness (RSM) from [1]. To do this we first define the first order Taylor expansion to a function L:

Definition 3 (Restricted Strong Convexity). A loss function L satisfies the RSC condition with parameters

for all

Definition 4 (Restricted Smoothness). A loss function L satisfies the RSM condition with parameters

for all

Lemma D.2. The RSC and RSM conditions are satisfied for with constants

and τ

universal constants.

Combining Lemma D.2 with Theorem 2 in [1] gives the following corollary.

Corollary D.3. Under the conditions of Theorem B.1, let denote the s’th iteration of projected gradient descent using the loss function . There exists some S such that for all s > S we have

E Proofs of Optimization Results

E.1 Proof of Lemma D.2

We begin by computing the first order Taylor approximation:

T

We first handle term (1), which is the first order Taylor error for . A computation shows that this is equal to

where again f(x) = log(1 + exp(x)). Since f is -strongly convex on with we can lower bound term (1):

It remains to handle term (2) which is . By the mean value theorem there exists some such that . Thus we can bound term (2) by

By Lemma B.6

with probability . Combining this with our bounds on term 1 in Equations (E.1) and (E.2) gives the final result.

E.2 Proof of Theorem D.1

Since is a stationary point it satisfies

Using this, along with the fact that we get that

Using the RSC condition from Lemma D.2 we conclude

Finally we apply the statistical error bound on from Theorem B.1 along with the triangle inequality to conclude that

Summing over all m and assuming for at least values of m allows us to conclude that

To get the final form of the result, we recall that th iteration of projected gradient descent run with an arbitrary initialization within . In particular, if we initialize at a stationary point then which gives the final form of the Theorem.

designed for accessibility and to further open science