Abstract
We study atypical behavior in bootstrap percolation on the Erdős–Rényi random graph. Initially a set S is infected. Other vertices are infected once at least r of their neighbors become infected. Janson et al. (Ann Appl Probab 22(5):1989–2047, 2012) locates the critical size of S, above which it is likely that the infection will spread almost everywhere. Below this threshold, a central limit theorem is proved for the size of the eventually infected set. In this work, we calculate the rate function for the event that a small set S eventually infects an unexpected number of vertices, and identify the least-cost trajectory realizing such a large deviation.
Keywords: Bootstrap percolation, Phase transition, Random graphs, Large deviations, Discrete calculus of variations
Introduction
Bootstrap percolation was originally proposed by physicists [12, 29] to model the phase transition observed in disordered magnets. Since then a large literature has developed, motivated by beautiful results, e.g. [8, 10, 22, 31], and a variety of applications across many fields, see e.g. [1, 2] and references therein.
In this work, we consider the spread of an infection by the r-neighbor bootstrap percolation dynamics on the Erdős–Rényi [15] graph , in which any two vertices in [n] are neighbors independently with probability p. Although we focus on this special case, we think our methods could be useful in studying the large deviations of any Markovian growth or exploration process. For instance, we have more recently used these methods to study the performance of the greedy independent set algorithm on sparse random graphs [26].
In bootstrap percolation, some subset is initially infected. Other vertices are infected once at least r of their neighbors become infected. Most of the literature has focused on the typical behavior. Of particular interest is the critical size at which point a uniformly random initial set is likely to infect most of the graph. Less is known about the atypical behavior, such as when a small set is capable of eventually infecting many more vertices than expected (e.g. influencers or superspreaders in a social network, viral marketing, etc.).
For analytical convenience, we rephrase the dynamics in terms of an exploration process (cf. [23, 30, 32]) in which vertices are infected one at a time. At any given step, vertices are either susceptible, infected or healthy. All susceptible vertices become infected eventually, and then remain infected. When a vertex is infected, some of the currently healthy vertices may become susceptible. The process ends once a stable configuration has been reached in which no vertices are susceptible.
More formally, at each step t, there are sets and of infected and susceptible vertices. Vertices in are currently healthy. Initially, . In step , some vertex is infected. All remaining edges from are revealed. To obtain from , we remove and add all neighbors of with exactly neighbors in . We then add to to obtain . The process ends at step when no further vertices can be infected. For technical convenience, we set for all . Let denote the eventually infected set. Since one vertex is infected in each step , we have and for all such t. In particular, . Clearly, does not depend on the order in which vertices are infected.
Janson et al. [23] (cf. [34]) identifies the critical size of , for all and
| 1 |
in the case that is selected uniformly at random. By the symmetry of , this is the same as for a given set (independent of ) of the same size. More specifically, a sharp threshold is observed. If more than vertices are initially susceptible, then all except o(n) many vertices are eventually infected. Otherwise, the eventually infected set is much smaller, of size .
Theorem 1
([23] Theorem 3.1) Let p be as in (1) and . Put . Suppose that a set (independent of ) of size is initially susceptible. If , then with high probability . If , then with high probability , where uniquely satisfies
| 2 |
The extreme cases and are also addressed in [23], where the model behaves differently. We assume (1) throughout this work.
Moreover, in the subcritical case, a central limit theorem is proved in [23] (see Theorem 3.8). In this work, we study large deviations from the typical behavior in the subcritical case .
Definition 2
For (resp. ), let denote the tail probability that the initial susceptibility of in results in some number (resp. ) of eventually infected vertices.
Informally, is the probability that the number of eventually infected vertices is at least as atypical as .
Theorem 3
Let p be as in (1), and . Suppose that a set (independent of ) of size is initially susceptible. Then
where
| 3 |
For any given , is increasing in , decreasing in (see Appendix A.2), and by (2), in line with Theorem 1. See Fig. 1.
Fig. 1.

For and , the rate function is plotted as a function of
The asymptotically optimal trajectory for is given at (9) below (see also Fig. 2). The rate function is found by substituting this into the associated cost function (8). Detailed heuristics are given in Sect. 1.5 below. See Sect. 2 for the proof of Theorem 3.
Fig. 2.
In both figures, and . The typical, zero-cost trajectory appears as a dotted line. Least-cost, deviating trajectories for appear at left and at right
The point (associated with ) is critical. As such, we simply have that for . The reason for this is that the underlying branching process (the Binomial chain discussed in Sects. 1.4 and 1.5 below) governing the dynamics becomes critical upon surviving to time . Surviving beyond this point, supposing that it has been reached, is no longer exponentially unlikely. In other words, the optimal (asymptotic) trajectory that typically follows in order to survive beyond is equal to on [0, 1] (this has cost ). From then on (), there is a zero-cost path that can follow.
We note here that in [23] (see Theorem 3.1) it is shown that converges to the typical value in probability. By Theorem 3 (and the Borel–Cantelli lemma) it follows that this convergence holds almost surely.
Related Work
Torrisi et al. [33] established a full large deviations principle in the supercritical case, , where typically . As discussed in [33], the main step in this regard is establishing sharp tail estimates (as in our Theorem 3 above). The full large deviations principle then follows by “elementary topological considerations.” Although we have not pursued it, we suspect that a full large deviations principle also holds in the present subcritical setting.
In closing, let us remark that it might be interesting to investigate the nature of , conditioned on the event that a given eventually infects a certain number of vertices, or on the existence of such a set .
Motivation
We came to this problem in studying H-bootstrap percolation on , as introduced by Balogh et al. [11], where all edges in are initially infected and any other edge in an otherwise infected copy of H becomes infected. In the case that , there is a useful connection with the usual r-neighbor bootstrap percolation model when . Theorem 3 (when and ) plays a role (together with [9, 27]) in locating the critical probability , where it becomes likely that all edges in are infected eventually. This solves an open problem in [11].
Contagious Sets
A susceptible set is called contagious if it infects all of eventually (i.e., ). Such sets have been studied for various graphs (e.g. [13, 18, 19, 28]). Recently, Feige et al. [16] considered the case.
By Theorem 1, has contagious sets of size , however, there exist contagious sets that are much smaller. In [16], upper and lower bounds are obtained for the minimal size of a contagious set in . More recently [9], we showed that
| 4 |
is the sharp threshold for contagious sets of the smallest possible size r.
For , Theorem 3 yields lower bounds for that sharpen those in [16] by a linear, multiplicative factor in r. Of course, finding sets of this size (if they exist) is a difficult and interesting problem (cf. the NP-complete problem of target set selection from viral marketing [14, 25]).
Corollary 4
Suppose that, for some ,
Then, with high probability,
This result follows by an easy union bound, applying Theorem 3 in the case that and , see Appendix A.4.
By [9] this lower bound is sharp for p close to , that is, when . The methods in [9] might establish sharpness at least for .
Binomial Chain
As in [23], we study the bootstrap percolation dynamics using the Binomial chain construction based on the work of Scalia-Tomba [30] (cf. Selke [32]). We only state here in this section the properties of this framework that we require, and refer the reader to Sect. 2 of [23] for the details.
Let be the number of vertices that have become susceptible during some time , so that . By revealing edges (incident to infected vertices) on a need-to-know basis, the process can be expressed as the sum of independent and identically distributed processes, each of which is 0 until some time, and then jumps to 1 (and remains at 1 thereafter). Informally, when a vertex is infected, it gives all of its neighbors a “mark.” A vertex, which was not initially susceptible, is susceptible or infected at a given time if it has received at least r marks by this time. In this way (see [23, 30]), it can be shown that is a Markov process, with
| 5 |
where . Moreover, its increments are distributed as
| 6 |
Heuristics
We first briefly recall the heuristic for Theorem 1 given in Sect. 6 of [23]. By the law of large numbers, with high probability . A calculation shows that if then for . On the other hand, if , for some , then we have . To see this, note that for since . Hence (see e.g. Sect. 8 of [23]) we have
and so
| 7 |
Next, we describe a natural heuristic, using the Euler–Lagrange equation, that allows us to anticipate the least-cost, deviating trajectories (the functions in (9) below), which lead to Theorem 3. The proof, given in Sect. 2 below, makes this rigorous by a discrete analogue of the Euler–Lagrange equation. We think this method will be of use in studying the tail behavior of other random processes.
Consider a trajectory from to 0 over . Suppose that has followed this trajectory until step . In the next step t, some vertex is infected. There are approximately a Poisson with mean (this approximation holds by (1) and standard combinatorial estimates) number of vertices that are neighbors with and of the vertices infected in previous steps . Such vertices become susceptible in step t. Therefore, to continue along this trajectory, we require this Poisson random variable to take the value
(The “” accounts for the vertex that is infected in step t, and so removed from the next susceptible set .) As is well-known, this event has approximate log probability , where
is the Legendre–Fenchel transformation of the cumulant-generating function of a mean Poisson. Hence on with approximate log probability
| 8 |
(cf. (13) below). Maximizing this integral is particularly simple, since the integrand depends on , but not y. The Euler–Lagrange equation implies that the least-cost trajectory satisfies
except where possibly the boundary constraint might intervene.
Since, as noted above, for all t, we may assume that . That is, any trajectory y(x) of decreases no faster than . Also note that , and that for any larger the function has no zeros in [0, 1].
As it turns out, the least-cost trajectory from to 0 over is
![]() |
9 |
where . Setting , we recover by (2) the typical, zero-cost trajectory (7). See Fig. 2. Substituting (9) into (8), we obtain after some basic calculus (see Appendix A.1 below).
Proof of Theorem 3
Before turning to the proof, let us recall Theorem 3 and the definitions involved. We fix some and (with as defined at (2)). We assume that as , where is the initially susceptible set. Recall that is the eventually infected set, where is the first time t that (no susceptible vertices). Finally, recall that Theorem 3 identifies the limit of , where is the tail probability that if or if .
Upper bounds for are established in Sect. 2.1 () and Sect. 2.2 () below. The main idea is to use a discrete version of the Euler–Lagrange equation to identify the asymptotically optimal trajectory of the process realizing the associated event ( or depending on ). It turns out that (see (9) above). More specifically, we use the following result, which is a special case of Theorem 5 in Guseinov [20]. See also [3–7, 17, 24] and references therein for earlier related results and background.
Let denote the forward difference operator.
Lemma 5
Fix , a function f(u, v) with continuous partial derivatives and , and evenly spaced points . Then the maximizer of
over trajectories with and , satisfies for some constant c.
The proof of this result amounts to adding a Lagrange multiplier to constrain and then comparing the derivative to 0. A more general version, more closely resembling the regular Euler–Lagrange equation, appears in [20]. This allows for more complicated functions and points that need not be evenly spaced. The proof is analogous to that of its continuous counterpart, using summation by parts instead of integration by parts, for instance.
Finally, in Sect. 2.3, we establish asymptotically equivalent lower bounds for by considering specific trajectories y that are asymptotically equivalent to . This altogether verifies the asymptotic optimality of and the convergence of .
Upper Bounds When
We begin with the simpler case that . The opposite case follows by an elaboration of these arguments (see Sect. 2.2 below). Since , note that is simply the probability that for some , as this occurs if and only if .
To begin, we discretize the unit interval [0, 1] as follows. Let . Consider the points , for . Note that the points are evenly spaced integers. Also note that , since .
Let denote the set of trajectories such that
all ,
,
all , and
for all .
Note that we can assume (3) since, as discussed above, for all t. Since is Markov,
By (3) and (4) it follows that all for any . Hence . Therefore, taking a union bound,
where maximizes the product over . Noting that , we find altogether that
| 10 |
We now turn to the issue of identifying . By (5) it follows that
| 11 |
Hence, using the standard bound and ,
| 12 |
(We have written the upper bound in this way so as to compare with the lower bound at (18) below.)
Before substituting this upper bound into (10), we collect the following technical result. The proof is elementary, though somewhat tedious, see Sect. Appendix A.5 below. Note that by (1), .
Lemma 6
We have that
Altogether, we find that
Since is increasing for and , it follows by (10) that
| 13 |
where
| 14 |
(cf. (8) above) and maximizes the sum in (13).
In order to apply Lemma 5, we lift the restriction that all , and maximize
over with (i) , (ii) and (iii) for all . By Lemma 5, the maximizer satisfies
between any two given points where . Since
this implies that , for some constant b, between any two points where for . On the other hand, if both , then necessarily for . By standard results on the Euler approximation of differential equations (see e.g. Theorems 7.3 and 7.5 in Sect. I.7 of [21]), it follows that, on all segments where , the discrete derivative is within O(1/m) of the function , for some .
Altogether, in the limit, it suffices to consider trajectories that take the form (until they hit 0), for some , since (as discussed in Sect. 1.5) these are the only functions for which (i) , (ii) and (iii) for some . Hence, by the above considerations, and the continuity of f, we find that
| 15 |
To conclude, we observe, by Appendices A.1 and A.2, that the right hand side equates to
Upper bounds When
The case follows by the same method of proof, however, there are two additional technical complications. Specifically, (i) the set of relevant trajectories in this case (defined below) no longer satisfies , and (ii) to obtain an upper bound for , as in (15) above, we need to take a supremum over a more complicated set of trajectories. This latter issue is due in part to the fact that is not a priori clear that the optimal trajectory should hit 0 before (that is, that is one of ). This indeed turns out to be the case, however, even so, is slightly more complicated (defined piecewise) when .
First note that, for , is the probability that for all . Therefore, in this case, we take to be the set of for which
all ,
,
all , and
for all .
We no longer have that . However, for , by (5) and Chernoff’s bound,
Therefore, for A sufficiently large, the log probability that any while is less than . Hence, arguing as the previous section, we find that
| 16 |
where is the set of non-negative trajectories y(x) that start at and take the form , for some , wherever they are positive. However, it suffices to consider a smaller set than . Indeed, observe that the maximizer is non-increasing. This is intuitive, since the process is sub-critical while the total number of infected vertices remains less than . To see this formally, note that (i) the derivative of any trajectory is for any unless , and (ii) we have by (14) that
is decreasing in . Hence, it suffices to consider trajectories which take the form until they hit 0 at some , and then, if , are 0 thereafter until . (Note that, for any , the function has no zeros and, since , is increasing eventually on [0, 1].) Therefore, by Appendix A.1,
By basic calculus (see Appendix A.3) it can be shown that the right hand side is bounded by .
Lower Bounds
The lower bound is much simpler. As discussed above, it essentially suffices to consider any trajectory which contributes to , and show that the scaled log probability that follows this trajectory is asymptotic to .
Once again, there is some asymmetry in the cases and due to the definition of . For , we note that if, for instance, all , where
then . The indicator present here ensures that hits 0 by . On the other hand, if , set
Then if all we have . The indicator in this case ensures that between increments while .
Next, we show that
| 17 |
since then, by Sect. 2.1 and 2.2, it follows that
as stated in Theorem 3.
To this end, note that by (11) and the standard bounds , and , it follows that
| 18 |
(cf. (12)). Therefore, in a similar way as for (13) above (however instead using ), we find that
where f, once again, is as defined at (14). Therefore, by the choice of , it can be seen (using Appendix A.1) that
Acknowledgements
Omer Angel and Brett Kolesnik would both like to acknowledge the support of NSERC of Canada.
Appendix A: Technical Results
This section contains several technical results, all of which follow by elementary methods.
A.1: Rate Function
We show that
where and f are as in (9) and (14) above (that is, the cost of the least-cost trajectory over is ).
First note that, whenever ,
in which case
Hence, if ,
On the other hand, note that
and so
Therefore, if , then we find (after some algebraic simplifications) that
A.2: Shape of
We note here that is increasing in and decreasing in (as in Fig. 1 above). When ,
Therefore, if , by (2) and ,
On the other hand, if , by (2) and ,
Finally, if , note that
A.3: An Inequality Involving
We show that, for any and ,
If the result is immediate, since by Appendix A.2 we have in this case. Hence, assuming that , we show that
If , then
so we may further assume that . As has already been noted above, , and so
Hence by (3) it suffices to show that
is increasing in . Differentiating the above expression with respect to x, we obtain (after some straightforward simplifications)
yielding the claim.
A.4: Lower Bound for
Proof of Theorem 4
For , let . We show that, with high probability, has no contagious sets smaller than . Note that
The expected number of subsets of size which if initially susceptible cause vertices to be infected eventually is at most
where
Since
for all large n, and the result follows.
A.5: Increments of
Proof of Lemma 6
Recall that
When , we have since . By the estimates discussed in Sect. 1.5,
Next, we assume that . Then and, for all ,
| 19 |
For the lower bound, first note that
and so
Hence, using (1) and (19) (and the standard bounds and ) we find
The upper bound requires slightly more attention. Note that, by the choice of m, . Therefore for all large n. Hence, for all large n,
Since , for all large n,
Therefore, by (1), (19) and the choice of m,
Next, by (19), it follows that, for all and large n,
Therefore, by (1) and (19), for all large n,
Altogether, we find that
as claimed.
Footnotes
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Contributor Information
Omer Angel, Email: angel@math.ubc.ca.
Brett Kolesnik, Email: bkolesnik@ucsd.edu.
References
- 1.Adler J. Bootstrap percolation. Physica A. 1991;171:453–470. doi: 10.1016/0378-4371(91)90295-N. [DOI] [Google Scholar]
- 2.Adler J, Lev U. Bootstrap percolation: visualizations and applications. Braz. J. Phys. 2003;33:641–644. doi: 10.1590/S0103-97332003000300031. [DOI] [Google Scholar]
- 3.Agarwal R, Ahlbrandt C, Bohner M, Peterson A. Discrete linear Hamiltonian systems: a survey. Dyn. Syst. Appl. 1999;8(3–4):307–333. [Google Scholar]
- 4.Ahlbrandt, C.D.: Discrete variational inequalities, general inequalities, 6 (Oberwolfach, : Internat. Ser. Numer. Math., vol. 103. Birkhäuser, Basel 1992, 93–107 (1990)
- 5.Ahlbrandt CD. Equivalence of discrete Euler equations and discrete Hamiltonian systems. J. Math. Anal. Appl. 1993;180(2):498–517. doi: 10.1006/jmaa.1993.1413. [DOI] [Google Scholar]
- 6.Ahlbrandt, C.D., Hooker, J.W.: A variational view of nonoscillation theory for linear differential equations. Differential and integral equations (Iowa City, Iowa, 1983/Argonne, Ill., 1984), Univ. Missouri-Rolla, Rolla, MO, pp. 1–21 (1985)
- 7.Ahlbrandt, C.D., Peterson, A.C.: Discrete Hamiltonian systems, Kluwer Texts in the Mathematical Sciences, vol. 16, Kluwer Academic Publishers Group, Dordrecht, Difference equations, continued fractions, and Riccati equations (1996)
- 8.Aizenman M, Lebowitz JL. Metastability effects in bootstrap percolation. J. Phys. A. 1988;21(19):3801–3813. doi: 10.1088/0305-4470/21/19/017. [DOI] [Google Scholar]
- 9.Angel O, Kolesnik B. Sharp thresholds for contagious sets in random graphs. Ann. Appl. Probab. 2018;28(2):1052–1098. doi: 10.1214/17-AAP1325. [DOI] [Google Scholar]
- 10.Balogh J, Bollobás B, Duminil-Copin H, Morris R. The sharp threshold for bootstrap percolation in all dimensions. Trans. Am. Math. Soc. 2012;364(5):2667–2701. doi: 10.1090/S0002-9947-2011-05552-2. [DOI] [Google Scholar]
- 11.Balogh J, Bollobás B, Morris R. Graph bootstrap percolation. Random Struct. Algorithm. 2012;41(4):413–440. doi: 10.1002/rsa.20458. [DOI] [Google Scholar]
- 12.Chalupa J, Leath PL, Reich GR. Bootstrap percolation on a Bethe lattice. J. Phys. C. 1979;21:L31–L35. doi: 10.1088/0022-3719/12/1/008. [DOI] [Google Scholar]
- 13.Coja-Oghlan, A., Feige, U., Krivelevich, M., Reichman, D.: Contagious sets in expanders. In: Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, Philadelphia, PA, pp. 1953–1987 (2015)
- 14.Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA), KDD ’01, Association for Computing Machinery, pp. 57–66 (2001)
- 15.Erdős, P., Rényi, A.: On random graphs. I. Publ. Math. Debrecen 6, 290–297 (1959)
- 16.Feige U, Krivelevich M, Reichman D. Contagious sets in random graphs. Ann. Appl. Probab. 2017;27(5):2675–2697. doi: 10.1214/16-AAP1254. [DOI] [Google Scholar]
- 17.Fort T. Finite Differences and Difference Equations in the Real Domain. Oxford: Clarendon Press; 1948. [Google Scholar]
- 18.Freund D, Poloczek M, Reichman D. Contagious sets in dense graphs. Eur. J. Combin. 2018;68:66–78. doi: 10.1016/j.ejc.2017.07.011. [DOI] [Google Scholar]
- 19.Guggiola A, Semerjian G. Minimal contagious sets in random regular graphs. J. Stat. Phys. 2015;158(2):300–358. doi: 10.1007/s10955-014-1136-2. [DOI] [Google Scholar]
- 20.Guseinov, G.-S.: Discrete calculus of variations, Global analysis and applied mathematics. In: AIP Conf. Proc., vol. 729, Amer. Inst. Phys., Melville, NY, pp. 170–176 (2004)
- 21.Hairer, E., Nørsett, S.P., Wanner, G.: Solving Ordinary Differential Equations. I, 2nd ed., Springer Series in Computational Mathematics, vol. 8. Springer, Berlin, Nonstiff problems (1993)
- 22.Holroyd AE. Sharp metastability threshold for two-dimensional bootstrap percolation. Probab. Theory Relat. Fields. 2003;125(2):195–224. doi: 10.1007/s00440-002-0239-x. [DOI] [Google Scholar]
- 23.Janson S, Łuczak T, Turova T, Vallier T. Bootstrap percolation on the random graph . Ann. Appl. Probab. 2012;22(5):1989–2047. doi: 10.1214/11-AAP822. [DOI] [Google Scholar]
- 24.Kelley, W.G., Peterson, A.C.: Difference Equations, 2nd ed. An Introduction with Applications. Harcourt/Academic Press, San Diego (2001)
- 25.Kempe J, Kleinberg D, Tardos É. Maximizing the spread of influence through a social network. Theory Comput. 2015;11:105–147. doi: 10.4086/toc.2015.v011a004. [DOI] [Google Scholar]
- 26.Kolesnik, B.: Large deviations of the greedy independent set algorithm on sparse random graphs. Random Struct. Algorithms. arXiv:2011.04613
- 27.Kolesnik, B.: The sharp -percolation threshold on the Erdös–Rényi random graph. Electron. J. Probab. arXiv:1705.08882
- 28.Morris, R.: Minimal percolating sets in bootstrap percolation. Electron. J. Combin. 16(1), Research Paper 2, 20 (2009)
- 29.Pollak M, Riess I. Application of percolation theory to 2d–3d Heisenberg ferromagnets. Physica Status Solidi (b) 1975;69(1):K15–K18. doi: 10.1002/pssb.2220690138. [DOI] [Google Scholar]
- 30.Scalia-Tomba G-P. Asymptotic final-size distribution for some chain-binomial processes. Adv. Appl. Probab. 1985;17(3):477–495. doi: 10.2307/1427116. [DOI] [Google Scholar]
- 31.Schonmann RH. On the behavior of some cellular automata related to bootstrap percolation. Ann. Probab. 1992;20(1):174–193. doi: 10.1214/aop/1176989923. [DOI] [Google Scholar]
- 32.Sellke T. On the asymptotic distribution of the size of a stochastic epidemic. J. Appl. Probab. 1983;20(2):390–394. doi: 10.2307/3213811. [DOI] [Google Scholar]
- 33.Torrisi GL, Garetto M, Leonardi E. A large deviation approach to super-critical bootstrap percolation on the random graph . Stoch. Process. Appl. 2019;129(6):1873–1902. doi: 10.1016/j.spa.2018.06.006. [DOI] [Google Scholar]
- 34.Vallier, T.: Random graph models and their applications, Ph.D. thesis, Lund University (2007)


