Heterogeneous node copying from hidden network structure

Node copying is an important mechanism for network formation, yet most models assume uniform copying rules. Motivated by observations of heterogeneous triadic closure in real networks, we introduce the concept of a hidden network model—a generative two-layer model in which an observed network evolves according to the structure of an underlying hidden layer—and apply the framework to a model of heterogeneous copying. Framed in a social context, these two layers represent a node’s inner social circle, and wider social circle, such that the model can bias copying probabilities towards, or against, a node’s inner circle of friends. Comparing the case of extreme inner circle bias to an equivalent model with uniform copying, we find that heterogeneous copying suppresses the power-law degree distributions commonly seen in copying models, and results in networks with much higher clustering than even the most optimum scenario for uniform copying. Similarly large clustering values are found in real collaboration networks, lending empirical support to the mechanism. Node duplication is an established model of network formation, whereby an existing node is duplicated, and edges are formed with uniform probability to the neighbours of the duplicated node. Here, the author proposes a copying model where links are copied depending on hidden interactions between nodes, and shows analytically and numerically that this leads to higher network clustering than in the uniform copying case, a property that is also found in real collaboration networks.

Despite this range of applications, most node copying models assume uniform, or homogeneous copying, i.e., that the probability of copying any given neighbour of a node is equal.The exact formulation varies widely, but examples include "links are attached to neighbours of [node] j with probability p" [5], or "one node [is duplicated]... edges emanating from the newly generated [node] are removed with probability δ" [11].Many other models use similar uniform copying rules [2, 3, 6-8, 10, 12, 15-26].
Homogeneous copying is a sensible base assumption, often aiding a model's analytical tractability.However, especially in a social context, there is good reasons to believe that node copying may be heterogeneous.As an example, consider the social brain hypothesis, a theory which suggests that the average human has around 150 friends (Dunbar's number), encapsulating progressively smaller sub-groups of increasing social importance [27,28].In contrast, large social networks often have an average degree far exceeding Dunbar's number [29], implying that most of these observed friends are only distant acquaintances.In this context, if individual A introduces individual B to one their friends, C, (i.e., B is copying A's friend C), we may reasonably expect that C is more likely to be chosen from A's inner social circle, than A's wider social circle.This is directly related to the principle of strong triadic closure: "If a node A has edges to nodes B and C, then the B-C edge is especially likely to form if A's edges to B and C are both strong ties" [30].In weighted networks where tie strength can be equated to edge weight, empirical evidence for the strong triadic closure principle can be inferred by measuring the neighbourhood overlap between two nodes as a function of tie strength [30]; for example using mobile communication networks [31], or using face to face proximity networks [32].
Unfortunately, for many networks tie strength data is unavailable or unknown.In these cases, evidence for asymmetric triadic closure may be inferred through proxy means.For instance, in academic collaboration networks it has been shown that the ratio of triadic closure varies strongly with the number of shared collaborators between nodes [33].Although the average triadic closure ratio is small (typically < 10%), the ratio rapidly increases with the number of shared collaborators.However, these aggregate measures are highly coarse grained and likely only approximate real closure dynamics.
This motivates the study of simple heterogeneous copying models [4,5,9,34,35].Typically these models fall into a small number of distinct categories.In the first, heterogeneity is introduced as a node intrinsic property (e.g., node fitness) in the absence of structural considerations [5].In the second, heterogeneity is introduced via group homophily where the probability of triadic closure between nodes A and B is dependent on whether nodes A and B are in the same group or different groups (e.g., researchers from the same academic discipline, as opposed to different disciplines) [9,35].However, intragroup copying is typically modelled uniformly.Finally, some models consider heterogeneous copying driven by the network structure around nodes A and B, without introducing node homophily [4].
Bhat et al. [4] define a threshold model where node A introduces node B to one of their friends C.An edge then forms between B and C if the fraction of neighbours common to B and C exceeds some threshold F .The model demonstrates a transition from a state where networks are almost complete for small F , to a state where networks are sparse but highly clustered as F increases past a critical threshold.However, the model is limited in its tractability and has peculiarities such as the observation that fringe communities are almost always complete.
In this paper, our aim is to extend these ideas and introduce a more general framework for heterogeneous node copying based on the concept of hidden strong ties.To do so, we introduce the hidden network model, a framework based on multilayer networks [36] where layers have identical node structure but different edge structure.The framework lets us build models where local heterogeneity in the rules of network growth is a property of the hidden network structure and not arbitrarily encoded using node intrinsic properties or group homophily.The concept is closely related to other multilayer paradigms including the use of replica nodes to model heterogeneity [37], interdependent networks [38], and multilayer copying [21].
In the remainder of this paper, we define and analytically study the case of extreme heterogeneous copying, the correlated copying model (CCM).The CCM is an adaptation of the uniform copying model introduced by Lambiotte et al. [3].Relaxing the extreme copying case, we numerically investigate a generalised form of the correlated copying model (GCCM) which interpolates between the UCM and CCM.
The GCCM generates a diverse spectrum of network structures spanning both ergodic sparse and non-ergodic dense networks, with degree distributions ranging from exponential decay, through stretched-exponentials and power-laws, to extremely fat tailed distributions with anomalous fluctuations.These networks exhibit a broad clustering spectrum from sparse networks with significantly higher clustering than their uniform equivalents, to the unusual case where networks are almost complete, but with near zero clustering.We comment on a selection of real collaboration networks, which, in line with the CCM, exhibit higher clustering than can be explained by uniform copying.This suggests that heterogeneous copying may be an important explanatory mechanism for social network formation.

A. Uniform Copying Model.
The uniform copying model (UCM) was introduced by Lambiotte et al. [2,3], see Fig. 1(a).At time t α , a single node, α, is added to the network, and connects to one target node, β, which is chosen uniformly at random.The formation of an edge between the new node and the target node puts the UCM in the class of corded copying models; Steinbock et al. [16] refer to the UCM as the corded node duplication model.We label each neighbour of β with the index γ j where j ∈ {1, • • • , k β }, and k β is the degree of node β.For each neighbour γ j , the copied edge (α, γ j ) is added to the network independently with probability p.Following the convention of previous copying models, the nodes α and β are sometimes referred to as the daughter and mother nodes respectively.The net-work is initialised at t = 1 with a single node.If p = 0, no edges are copied resulting in a random recursive tree.If p = 1, the UCM generates a complete graph.

A. Hidden Network Models
We define a hidden network model as the pair of single layer graphs G = (G O , G H ), comprising an observed network G O = (V, E O ) and a hidden network G H = (V, E H ), where V is the set of nodes for both networks and E O and E H are the set of edges for each network.The set V represent the same entities in both G O and G H , with differences lying exclusively in the edge structure between nodes.The key feature of a hidden network model is that the evolution of G O is dependent on G H (or vice versa).Mathematically, this is closely related to interdependent networks [39].

B. Correlated Copying Model
In the correlated copying model (CCM), see Fig. 1(b), the observed and hidden networks are initialised with a single node at t = 1.At t = t α , node α is added to both networks and a single target node, β, is chosen uniformly at random.We label the k β O neighbours of β in G O with the index γ j .Then, in the observed network only, the copied edge (α, γ j ) is formed with p hid = 1 if the edge (β, γ j ) ∈ E H , p obs = 0 otherwise.The general case with intermediate copying probabilities is discussed in section II C. No copied edges are added to the hidden network G H .The direct edge (α, β) is added to both G O and G H .The CCM therefore also falls into the class of corded node duplication models.Using the convention of referring to β as the mother node and α as the daughter node, we note that the hidden network consists exclusively of first-order relations (mother-daughter), whereas edges found only in the observed network correspond to second-order relations (sister-sister, or grandmothergranddaughter).
G H evolves as a random recursive tree.Unlike the UCM, all copying in G O is deterministic, with the only probabilistic element emerging in the choice of the target node β.For comparative purposes, we define the effective copying probability in the CCM as p eff = k β H /k β O , i.e., the fraction of the observed neighbours of node β which are copied by node α.
Framed in a social context, we might think of G O as an observed social network where individuals have many friends, but the quality of those friendships is unknown, with most ties being weak.In contrast, underlying every social network is a hidden structure representing the inner social circle of individuals, where a node is only connected to their closest friends [28].Copying in the CCM is biased to this inner circle.

Basic topological properties
The total number of edges in G H scales as E H (t) ∼ t, with the average degree given by k H = 2. Using the degree distribution of G H , see below, k 2 H = 6.In the observed network, each time step a single edge is added by direct attachment, and one copied edge is added for each neighbour of the target node in G H , k β H .The average change in the number of edges is therefore As an alternative, note that the observed degree of node α can be written as where the index α, β labels the (k H ) α unique neighbours of α in G H . Averaging both sides of Eq. ( 1) over all nodes we find, where n is the number of times that the degree of node appears in the expanded sum.For any tree graph, node will appear exactly once in Eq. ( 2) for each of its (k H ) neighbours.Hence, n = (k H ) and k O = k 2 H .In supplementary note 1, Eq. ( 1) is used to derive k 2 O ≈ 62.We may naively expect that the effective copying probability is We have not found a route to calculating this exactly, but simulations suggest p eff ≈ 0.374.

Degree Distribution
The hidden network evolves as a random recursive tree which has a limiting degree distribution given by ( In supplementary note 2, we show that the degree distribution for the observed network can be written as the recurrence where the final term is the probability that at time t the newly added node has initial degree k O and with k H | k O as the average degree of nodes in the hidden network with observed degree k O .Here, the 1 corresponds to edges that are gained from direct attachment, whereas k H | k O corresponds to edges gained from copying.Although we have not found an exact expression for k H | k O , we can make progress by considering the evolution of individual nodes.Consider node α added to the network at t α .The initial conditions for node α are where the final term is the average hidden degree of the target node β.In G H , node α gains edges from direct attachment only.Hence, at t > t α , where H n is the n th harmonic number.In G O , either node α is targeted via direct attachment, or a copied edge is formed from the new node to node α via any of the (k H (t)) α neighbours of node α.Hence, where we have subbed in Eq. ( 7) and Evaluating this sum, see supplementary note 2, we find where is the n th generalised Harmonic number of order m.For t → ∞, H (2) t → π 2 /6.Hence, for large t we can drop the final two terms and substitute in Eq. ( 7) to give Noting, that Eq. ( 10) is a monotonically increasing function of k H for k H > 1, we assume that we can drop the index α and the time dependence giving the average observed degree of nodes with specific hidden degree as where kO | k O denotes the average initial observed degree of nodes with current degree k O .Finally, we make the approximation that where the exponent denotes the inverse function.This gives We can now rewrite Eq. (4) as (14) Although computing this recurrence shows good agreement with simulations, see Fig. 2, we have not found a closed form solution to Eq. ( 14).As an approximation, we return to Eq. ( 9) and note that H t−1 − H tα−1 ≈ ln(t/t α ).Substituting this into Eq.( 9) and dropping small terms which inverted gives We have dropped the expectation value and define t α as the time a node was created such that its degree at time t is approximately k O .Exponentiating each side and taking the reciprocal, Finally, by substituting this approximation into the cumulative degree distribution we find which corresponds to a Weibull (stretched exponential) distribution, suppressing the power-law scaling observed in the UCM, see Fig. 2. The approximation for the cumulative degree distribution stems from the observation that, on average, nodes with k O > k O were added to the network at t < t α , whereas nodes with k O < k O were added to the network at t > t α .Both Eq. ( 16) and Eq. ( 18) are close to the scaling expected from sub-linear preferential attachment [40] with an exponent 1/2.

Clique Distribution
In a simple undirected graph, a clique of size n is a subgraph of n nodes which is complete.A clique of size n = 2 is an edge, whereas n = 3 is a triangle.Here we calculate the exact scaling for the number of n cliques, Let us first consider the case of triangles.At t = t α , there are two mechanisms by which a new triangle forms: 1. Direct triangles.The new node, α, forms a direct edge to the target node, β, and forms copied edges to each of the k β H neighbours of node β, labelled with the index γ j .The combination of the direct edge (α, β), the copied edge (α, γ j ), and the existing edge (β, γ j ) creates one triangle, (α, β, γ j ), for each of the k β H neighbours.
2. Induced triangles.If node α forms copied edges to both node γ j , and to node γ j , j = j , the triangle (α, Combining these mechanisms, the change in the number of triangles can be written as where the first and second terms on the right correspond to direct and induced triangles respectively.One new direct triangle is formed for each of the k β H neighbours of node β, ∆Q D 3 = k β H .For induced triangles, the copied edge (α, γ j ) is only formed if (β, γ j ) ∈ E H . Additionally, all pairs of nodes which are next-nearest neighbours in G H must be nearest neighbours in G O .Hence, the edge (γ j , γ j ) must exist in the observed network if both γ j and γ j are copied.As a result, one induced triangle is formed for each pair of copied edges (α, γ j ) and (α, γ j ) such that A visual example of the combinatorics for k β H = 3 is shown in Fig. 3.
Extending the triangle argument to general n we can write where direct cliques are those which include the edge (α, β).For a clique of size n, the number of direct cliques is given by the number of ways in which n − 2 nodes can be chosen from k β H nodes, whereas the number of induced cliques is given by the number of ways in which n − 1 nodes can be chosen, As t → ∞, the average change in clique number is where p H (k H ) is the probability that the randomly chosen target node k β H = k H .To avoid ill-defined binomials, we rewrite Eq. ( 24) as where we have combined the two terms into a single binomial.After subbing in p H (k H ) and solving the sum, Consequently, for large t we find the curious result that the number of n cliques scales as independent of the clique size.In practice this result only applies for t → ∞.To see this, note that the largest clique in G O at time t is always directly related to the largest degree node in G H , with the largest hidden degree at time t scaling as approximately We can invert this and ask how large the network is if we observe that the largest observed clique is n.This gives Hence, the scaling relation in Eq. ( 27), is only valid for cliques of size n when t t n .In supplementary note 3, we plot the number of cliques in simulations of the CCM as a function of t.For small clique sizes, the scaling in Eq. ( 27) is clearly apparent early in the evolution of the CCM.However, for moderate and large cliques, the standard deviation in the number of cliques is significantly larger than the average number of cliques, obscuring a clear trend.

Clustering
Transitivity is a global clustering measure defined as where a twig is any three nodes connected by two edges.
The number of twigs is equivalent to the number of star graphs of size 2, S 2 , where a star graph of size n is a subgraph with 1 central node and n connected neighbours.
The number of subgraphs of size 2 is related to the degree distribution by where we have used the property that p O (k < 2) = 0. Recalling that k O = 6 and k 2 O ≈ 62, the number of twigs scales as S 2 ∼ 28t, such that The observed network can be recovered from the hidden network by converting every wedge in G H into a triangle.This can be thought of as complete triadic closure where every possible triangle which can be closed, from the addition of a single edge to the hidden network, is closed.This implies that the CCM has the largest possible transitivity from a single iteration of triadic closure on a random recursive tree.
The local clustering coefficient, cc(α), is defined as the number of edges between the (k O ) α neighbours of α, normalised by the the number of edges in a complete subgraph of size (k O ) α .For the CCM, where the first term corresponds to the complete subgraph of the (k H ) α neighbours of α in G H , and the sum contributes the edges from one complete subgraph formed by node α, β and its (k H ) α,β − 1 neighbours, excluding α.The global clustering coefficient, CC(G O ), is defined as the average of Eq. ( 34) over all nodes in the network.In simulations, CC(G O ) ≈ 0.771 for large t.

Path Lengths
Steinbock et al. [16] calculate the distribution of shortest path lengths for the UCM (referred to in their paper as the corded node duplication model).Specifically, the authors calculate the probability that two randomly chosen nodes, i and j, will be separated by a shortest path of length , denoted as P(L = ; t), at time t.
The UCM with p = 0 corresponds to a random recursive tree and is therefore equivalent to the G H . Hence, for the hidden network, we can lift the path length distribution, P H (L H = ; t), and the mean shortest path, L H (t) , from Steinbock et al. [16].We can then exploit a convenient mapping to calculate the distribution of shortest path lengths in G O from G H . Consider two randomly chosen nodes i and j.In G H , there is a unique path (due to its tree structure) from i to j of length ( H ) ij .In G O , the enforced triadic closure process means that for every two steps on the path from i to j in G H , an observed edge exists in G O which acts as a shortcut, reducing the path length by one.Hence, if the path length ( H ) ij is even, the path length in G O is given by O = H /2; if the path length is odd O = ( H + 1)/2.Using this mapping, we can write If we assume that, for large t, there are an approximately equal number of odd and even shortest paths in G H , the average shortest path length in G O is where the 1/4 term accounts for the discrepancy in the mapping for odd and even paths.From Steinbock et al. [16], we note that the mean shortest path length for G H scales as which indicates that the hidden network exhibits the small-world property [41].We have omitted constants which are negligible at large t.Hence, applying the mapping in Eq. ( 36) and omitting the 1/4 term for simplicity, the mean shortest path length for G O is given by L O (t) ∼ ln(t), (38) indicating that the observed network also exhibits the small-world phenomenon.This mapping is confirmed by simulations.
For interest, we note that for 0 < p < 1, the shortest paths for the UCM are in general not unique; there may be multiple paths between nodes i and j which are equally short.Unusually for a non-tree network, all shortest paths are unique in the CCM.

C. General Correlated Copying Model
The general correlated copying model (GCCM), is defined analogously to the CCM, starting with observed and hidden networks initialised at t = 1.Like the UCM and CCM, the GCCM is a corded node duplication model.For practical reasons, we initialise the graph with three nodes which form a complete graph in G O , and a wedge in G H .This ensures that the initial graph contains some edges found in G H , and some edges found only in G O .
At t = t α , node α is added to both networks and a single target node, β, is chosen uniformly at random.We label the k β O neighbours of β in G O with the index γ j .In the observed network, the copied edge (α, γ j ) is formed with probability p hid if the edge (β, γ j ) ∈ E H (inner circle copying), and probability p obs otherwise (outer circle copying).The direct edge (α, β) is added to both G O and G H .
The GCCM encapsulates a wide spectrum of heterogeneous copying.Setting p hid = 1 and p obs = 0 reduces the GCCM to the CCM, whereas setting p hid = p obs = p reduces the GCCM to the UCM.We have discussed the social motivation for the case where p hid > p obs , representing a copying bias towards the inner social circle of a node.However, the GCCM can also be tuned to the reverse case where p hid < p obs , resulting in a bias against inner circle nodes.We are not aware of a clear physical motivation for this latter case.However, the structural diversity of these anti-correlated networks warrants their discussion here.
Figure 4 shows numerical results for (a) the effective copying probability, (b) the densification exponent, (c) the average local clustering coefficient, and (d) the transitivity, for the GCCM with 10 4 nodes.
The effective copying probability corresponds to the fraction of target node neighbours which appear to be copied in the observed network.Formally, we can write the average effective copying probability at time t as where β is the index of the target node at time t, the first term represents edges copied from node β's inner circle, and the second term represents edges copied from the outer circle.The dashed contour in Fig. 4(b) corresponds to an effective copying probability of 0.5, calculated numerically by averaging over the preceding 10 4 time steps.We note that p eff = 0 if p hid = p obs = 0 (random tree), p eff = 1 if p hid = p obs = 1 (complete graph), and p eff = p if p hid = p obs = p (UCM).In general, the rise in p eff is faster with increasing p obs than increasing p hid , although for p hid = 0 we find very small p eff , even for large p obs .However, this observation is somewhat deceptive since, if the GCCM is in the dense regime and p hid = p obs , p eff is not stationary.Calculated over longer time frames, we note that the effective copying probability appears to slowly converge to the outer copying probability, p eff → p obs , since for t → ∞, the ratio of the number of edges in the hidden network to the number of edges in the observed network tends to zero.This suggests that the dashed p eff = 0.5 contour will converge to the p obs = 0.5 line as t → ∞.
We test whether the GCCM is in the sparse or dense regime explicitly by tracking the growth in the number of edges in the observed network.Let us define the densification exponent, δ, 0 ≤ δ ≤ 1, using E O (t) ∝ t 1+δ , which relates the number of edges in the observed network to the number of nodes t.If δ ≈ 0, the GCCM is sparse.If δ = 1, the GCCM grows as a complete graph.For intermediate values, the GCCM undergoes densification.For the UCM, the transition from the sparse to dense regime is known to take place at p = 0.5 [3].We have not analytically calculated the transition for the GCCM, but may intuitively expect the transition at p obs = 0.5 since the hidden network is a random tree.This seems to be supported by the numerical values of δ in Fig. 4(b), although the transition from zero to non-zero δ is shifted to slightly larger p obs for p hid = 0, and to smaller p obs for p hid = 1; this shift is likely to disappear as t → ∞.
Figures 4(c) and (d) show the average local clustering coefficient, CC(G O ), and transitivity (global clustering), τ G O , for the GCCM.Patterns are similar between the two figures, although local clustering generally exceeds global clustering in the sparse regime.For the UCM it is known that, in the dense regime, τ G O slowly converges to zero as t → ∞, unless p = 1 [2].In contrast, the local clustering appears to remain non-zero.
As expected, clustering is minimised at p hid = p obs = 0 (random tree) and maximised for a complete graph, p hid = p obs = 1.However, in the sparse regime we find that the maximum clustering is found at p hid = 1, p obs = 0 which corresponds to the CCM.Bhat et al. [2] note that local and global clustering for the UCM is not a monotonically increasing function of the copying probability p, with a local maxima in the sparse regime at non-zero p.This bimodal clustering is also present in the GCCM.In the anti-correlated regime where p hid ≈ 0, we find near zero clustering values.In particular if p hid = 0 and p obs = 1, we observe the unusual property that δ ≈ 1, such that the network scales as (but is not) a complete graph, yet both the local and global clustering are approximately zero.
Extracting the degree distributions for the GCCM for various p hid and p obs shows similarly diverse behaviour, see Fig. 5.Each distribution is averaged over 100 instances, but points are left deliberately unbinned to illustrate the significant fluctuations observed in the dense regime.For p hid = p obs = 0 (bottom left) the GCCM reduces to a random recursive tree, see Eq. ( 3).The CCM case with p hid = 1, p obs = 0 (top left) follows Eq. ( 14), where the tail can be approximated as a stretched exponential.This distribution is also shown in Fig. 2. Along the diagonal where p hid = p obs (UCM), the degree distribution has a power-law tail in the sparse regime, and exhibits anomalous scaling in the dense regime (p ≥ 0.5).For p hid = p obs = 1, the GCCM reduces to a complete graph and all nodes have degree t − 1.
For p obs = 0, the power-law scaling observed in the UCM is completely suppressed, with a gradual transition from exponential decay to a stretched exponential tail as p hid is increased from 0 to 1.In the sparse regime with p obs = 0, all degree distributions appear fat tailed with only small deviations from the power-laws observed for the UCM.However, unusual scaling is observed for p hid = 0, p obs = 0, where the distributions exhibit initial exponential decay at small k O , attributable to the hidden network, before a second fat-tailed regime starting at intermediate k O .
In the dense regime, all degree distributions exhibit anomalous scaling, such that individual instances are not self-averaging.For p obs = 0.75, the tail of the degree distributions is largely consistent across all p hid .However, the probability of finding nodes with small degree is large for p hid = 0, and is gradually suppressed as p hid → 1.These effects are most pronounced for p obs = 1 where the modal degree is 1 for p hid = 0, and t−1 for p hid = 1, with a gradual transition in between.Throughout this transition the degree distribution appears almost uniform at p hid = 0.25, where the probability of finding nodes with any given degree is approximately constant up until the large k O limit.However, this effect is only observed when averaging over many instances, with a much smaller degree range observed in individual networks.
It is possible to extend the GCCM further by adding copied edges from G O to the hidden network, G H , with probability q. Results are shown in supplementary note 4 for q > 0 where clustering is enhanced if p hid > p obs and suppressed if p hid < p obs , relative to the UCM.In the limiting case of q = 1, the GCCM is independent of p obs and equivalent to the UCM with p = p hid .The p hid = p obs line (UCM) is invariant under changes in q.One potential application of the q = 0 case is for generating random simplicial complexes [42] by combining the hidden and observed networks into a single structure.Such a construction may be interesting since it explicitly distinguishes between cliques of strong ties, where all nodes are within each other's inner circle, and cliques of weak ties, see supplementary note 5.

D. Comparing Copying Models
We have introduced a simple model of heterogeneous node copying, motivated by arguments that triadic closure may not be structurally homogeneous in real networks.
Comparing the CCM, for which we have analytical results, to the UCM with the equivalent effective copying probability (p = p eff = 0.374) we find significant differences in network structure.Both the average local clustering coefficient, CC(G O ), and the transitivity, τ G O , are significantly larger in the CCM than the UCM.The CCM suppresses the power-law tail observed in the UCM for the sparse regime, and consequently, the degree variance observed in the CCM is smaller than for the UCM.CCM: The CCM also has the unusual property, not found in the UCM, that the growth in the number of cliques of size n scales indepen- In the dense regime (p obs > 0.5), network growth is non-ergodic leading to anomalous scaling and noisy degree distributions.The distribution at p hid = p obs = 0 corresponds to a random recursive tree, see Eq. 3 (exponential decay).The distribution at p hid = p obs = 1 corresponds to a complete graph.The distribution at p hid = 1, p obs = 0 corresponds to the CCM, see Fig. 2.
If p hid = p obs , the GCCM is equivalent to the uniform copying model.
dently of n as t → ∞.For both the UCM and CCM, the mean shortest path lengths scale as ∼ ln(t) indicative of the small-world property.
The above comparison uses a single effective copying probability, but key differences are robust for variable p in the sparse regime.Specifically, the UCM degree distribution always exhibits a power-law tail, and the largest measured clustering coefficients fall below the values seen for the CCM, see Tab.I. Relaxing the CCM to the GCCM, we note that for large p hid and small p obs , the measured clustering values regularly exceed those observed in the UCM, with the UCM only reaching similar values far into the dense regime.Given the continuing debate about the ubiquity of power-laws in real networks [43], the observation that power-laws are suppressed in the GCCM as soon as the UCM symmetry is broken sup-ports the view that power-law network scaling is an idealised case which in practice is rarely observed for real networks.
Whether such extreme bias is plausible in real networks is uncertain.However, observations in academic collaboration networks suggest that extreme bias may be possible [33].For instance, Kim and Diesner [33] show that the ratio of triadic closure between two nodes is approximately zero if the number of shared collaborators is zero, rises rapidly as the number of shared collaborators increases, and plateaus at a ratio of one.
A second clue towards heterogeneous copying is the observation of very large clustering values in real networks.A selection of these networks and their clustering coefficients is shown in Tab.II.Stressing that both the UCM and GCCM are toy models of node copying, the

E. Discussion
The UCM, CCM and GCCM are all examples of corded copying models where an edge forms between a newly added node and the target node which is duplicated.This is in contrast to uncorded duplication models where a new node is formed by copying an existing target node and its neighbours, but an edge is not formed between the new node and the duplicated target node.Corded models are more common in the context of social phenomena and triadic closure, whereas uncorded models are typically more relevant to duplication-divergence processes in protein interaction networks.In the current work we have focused exclusively on corded models; considering heterogeneous copying in uncorded models [13,14,23,24] would be an appropriate future extension.Heterogeneous copying could also be studied by extending directed models [25,26].
The GCCM and CCM are examples of hidden network models.From a mathematical standpoint, hidden network models can be thought of as a variant of interdependent networks where nodes in one layer have dependencies of nodes in another layer [38,39].However, at a conceptual level, hidden network models puts an emphasis on how the evolution of network structure can depend on asymmetries not observed in our data.
In this paper we have focused on copying in social networks, but the ideas naturally extend to other contexts.In economics, our framework may be applied to shareholder networks [45], where nodes are connected if they both own a common asset.Here, the hidden network represents the full set of co-owned assets, whereas the observed network includes publicly disclosed assets.Similarly, the idea can be applied to co-bidding networks in public procurement, where an edge indicates that two companies both placed bids on the same contract.In many jurisdictions, only winning bids (of which there may be multiple) are publicly revealed.Therefore, the observed network may represent the network of winning bids, whereas the hidden network includes all bids.Hidden network models may be a valuable representation in these cases if there are structural reasons for why some data is observed and some data is hidden.For instance, fraudulent behaviour in public procurement has been associated with anomalous structural features in the cobidding network [46].
Other examples may be found in ecology, where multilayer networks have been used to represent different interactions between a common set of species [47,48].Kéfi et al. [47] find that the structure of interactions in one layer has significant cross-dependencies to the structure of other layers.This mirrors how interlayer dependencies in the CCM are used to break symmetries in the evolution of the observed network.Finally, hidden networks may find general relevance to other fields where interdependent networks have been influential.This may include studies on energy demand management for power grids [49], and the emergence of synchronisation in multilayer neuronal models [50].
A more unsual application of the hidden network concept is for decomposing complex single layer networks into simpler two-layer structures.One such example is second-neighbour preferential attachment; an implementation of the Barabási-Albert model where nodes attach proportionally to the number of nodes within two steps of a target node [51].Using our framework, the model is decomposed into an observed network, and a hidden network (in this case referred to as the influence network) where nodes are connected to all nodes which are two or fewer steps away, representing the node's sphere of in-fluence.Here, second-neighbour preferential attachment is equivalent to conventional first-neighbour preferential attachment followed by a local copying step.Structural heterogeneity that is intrinsic in such a model has profound consequences for the time dependence of network growth [51].

III. CONCLUSION
We have introduced a general model of heterogeneous copying, implemented using a hidden network model.In the case of extreme copying bias, we have derived analytical results and have demonstrated significant differences to similar models with uniform copying rules.In particular, power-law degree distributions observed in uniform copying can be suppressed under heterogeneous copying, and networks are significantly more clustered if copying is biased towards a node's inner circle.Although a systematic study of copying in real networks is necessary, evidence suggests that heterogeneous copying may be relevant in a social context.
The heterogeneous copying model is just one simple application of a hidden network model.In general, the framework allows us to deconstruct network growth heterogeneities in a non-arbitrary way, focusing on structural rather than node heterogeneity, and poses questions concerning the role of hidden information in network growth.Exploring these questions is a key aim in upcoming work.
V. DATA AVAILABILITY.
All data can be generated using the Python code provided.

FIG. 4 .
FIG. 4. Properties of the observed network, GO, in the general correlated copying model (GCCM).Numerical results for 10 4 nodes as a function of the hidden copying probability, p hid , and the outer copying probability, p obs .(a) The effective copying probability.(b) The densification exponent.(c) The average local clustering coefficient, CC(GO).(d) The transitivity, τG O .Black dashed contour: effective copying probability of 0.5 at t = 10 4 , calculated numerically.Values have been smoothed for clarity.

FIG. 5 .
FIG.5.The observed degree distributions for the general correlated copying model (GCCM).The degree probability, pO(kO), is plotted as a function of the observed degree, kO, for various values of the outer copying probability, p obs (left to right), and the hidden copying probability, p hid (bottom to top).For p obs ∈ {0, 0.25, 0.5}, each network contains 10 6 nodes.For p obs = 0.75, each network contains 10 5 nodes.For p obs = 1, each network contains 10 4 nodes.Distributions are averaged over 100 instances.In the dense regime (p obs > 0.5), network growth is non-ergodic leading to anomalous scaling and noisy degree distributions.The distribution at p hid = p obs = 0 corresponds to a random recursive tree, see Eq. 3 (exponential decay).The distribution at p hid = p obs = 1 corresponds to a complete graph.The distribution at p hid = 1, p obs = 0 corresponds to the CCM, see Fig.2.If p hid = p obs , the GCCM is equivalent to the uniform copying model.
FIG.3.A schematic illustrating the number of triangles formed in a single time step of the correlated copying model.GO: the observed network, GH : the hidden network.The new node, α, forms a direct edge (blue) to a node β which has three existing hidden neighbours (γ1, γ2, γ3).The copying process forms three new edges (green) in GO.The copying process results in three new direct triangles (outlined in blue), involving the edge {α, β}, and three new induced triangles (outlined in green), excluding the edge {α, β}.Triangles are formed in the observed network only; the hidden network remains a random tree.

TABLE I .
p eff CC(G O ) τ G O Degree Dist.A comparison between the correlated copying model (CCM) and the uniform copying model (UCM).UCM is simulated twice, once with an effective copying probability, p eff , that results in the network with the highest average local clustering coefficient (in the sparse regime), CC(GO), and once with the effective copying probability that gives the largest transitivity, τG O .Values averages over 50 simulations where each network contains 10 5 nodes.Standard deviations are negligible.All values for the observed network, GO. networks in Tab.II exhibit average local and/ or global clustering far exceeding even the most optimistic values for the UCM.In contrast, the listed clustering values are relatively similar to what may plausibly emerge from heterogeneous copying, although even the clustering observed for the extreme CCM case falls below some of the values shown in Tab.II.Future work should go beyond this qualitative analysis and should attempt to measure the degree to which copying symmetry is broken for real networks where these mechanisms are relevant.