The Algorithmic Phase Transition in Symmetric Correlated Spiked Wigner Model
Li
We study the computational task of detecting and estimating correlated signals in a pair of spiked Wigner matrices. Our model consists of observations
$$
X = \tfracλ{\sqrt{n}} xx^{\top} + W \,, \quad Y = \tfracμ{\sqrt{n}} yy^{\top} + Z \,.
$$
where $x,y \in \mathbb R^n$ are signal vectors with norm $\|x\|,\|y\| \approx\sqrt{n}$ and correlation $\langle x,y \rangle \approx Ï\|x\|\|y\|$, while $W,Z$ are independent Gaussian noise matrices. We propose an efficient algorithm that succeeds whenever $F(λ,μ,Ï)>1$, where
$$
F(λ,μ,Ï)=\max\Big\{ λ,μ, \frac{ λ^2 Ï^2 }{ 1-λ^2+λ^2 Ï^2 } + \frac{ μ^2 Ï^2 }{ 1-μ^2+μ^2 Ï^2 } \Big\} \,.
$$
Our result shows that an algorithm can leverage the correlation between the spikes to detect and estimate the signals even in regimes where efficiently recovering either $x$ from $X$ alone or $y$ from $Y$ alone is believed to be computationally infeasible.
We complement our algorithmic result with evidence for a matching computational lower bound. In particular, we prove that when $F(λ,μ,Ï)<1$, all algorithms based on {\em low-degree polynomials} fails to distinguish $(X,Y)$ with two independent Wigner matrices. This low-degree analysis strongly suggests that $F(λ,μ,Ï)=1$ is the precise computation threshold for this problem.
academic
The Algorithmic Phase Transition in Symmetric Correlated Spiked Wigner Model
This paper investigates the computational problem of detecting and estimating correlated signals from a pair of noisy rank-one matrices. The observation model is:
X=nλxx⊤+W,Y=nμyy⊤+Z
where x,y∈Rn are signal vectors satisfying ∥x∥,∥y∥≈n with correlation ⟨x,y⟩≈ρ∥x∥∥y∥, and W,Z are independent Gaussian Wigner matrices. The authors propose an efficient algorithm that succeeds when F(λ,μ,ρ)>1, where:
F(λ,μ,ρ)=max{λ,μ,1−λ2+λ2ρ2λ2ρ2+1−μ2+μ2ρ2μ2ρ2}
The research demonstrates that the algorithm can leverage signal correlation for detection and estimation even when recovering signals from X or Y alone is computationally intractable. The authors further establish matching computational lower bounds via the low-degree polynomial framework, strongly suggesting that F(λ,μ,ρ)=1 is the exact computational threshold for this problem.
This paper studies signal detection and recovery in the correlated spiked Wigner model, a natural generalization of the classical spiked matrix model to the multi-modal setting.
Theoretical Importance: The spiked matrix model is a classical framework in high-dimensional statistics for studying phase transitions and the statistical-computational gap. While the BBP (Baik-Ben Arous-Péché) phase transition in the single-matrix case has been thoroughly studied, the computational thresholds in multi-matrix correlated scenarios remain unclear.
Practical Relevance: Modern data analysis increasingly involves multiple correlated datasets (e.g., multi-sensor observations, multi-modal learning). Understanding how to effectively leverage inter-data correlations is crucial for practical applications.
Computational Complexity: This problem exemplifies the gap between information-theoretic optimality and computational feasibility, providing important insights into the nature of computational hardness.
Suboptimality of Spectral Methods: Standard spectral methods such as Partial Least Squares (PLS) and Canonical Correlation Analysis (CCA) may be suboptimal under this model.
Incomplete Theoretical Coverage: Existing research KZ25, MZ25+ primarily focuses on the "linear" case where {xk,yk} are orthogonal to {uk,vk}, not covering the symmetric spiked case (uk=xk,vk=yk).
Unknown Computational Threshold: In parameter regimes where signals are correlated and individual detection is difficult, the exact computational threshold remains undetermined.
Exact Computational Threshold Characterization: Proves that F(λ,μ,ρ)=1 is the exact computational threshold for detection and recovery, where algorithms can leverage correlation to succeed at λ<1 and μ<1 (where individual detection is infeasible).
Efficient Decorated Cycle Counting Algorithm: Proposes a polynomial-time algorithm based on decorated cycle counting with carefully designed weighting schemes achieving the optimal threshold:
Detection algorithm based on weighted counting of decorated cycles
Recovery algorithm based on weighted counting of decorated paths
Achieves n2+o(1) time complexity using color coding techniques
Matching Computational Lower Bounds: Establishes via the low-degree polynomial framework that when F(λ,μ,ρ)<1, all low-degree polynomial algorithms fail at strong detection.
Novel Analysis Techniques:
Lindeberg interpolation method for correlated signals
Fine-grained variance analysis controlling complex correlations in decorated subgraph counting
Two-step proof strategy combining Gaussian approximation and moment matching
Statistical Threshold for Rademacher Prior: Proves that for correlated Rademacher priors, the statistical threshold also occurs at F(λ,μ,ρ)=1, eliminating the statistical-computational gap.
Detection Problem (Definition 1.1): Design an algorithm A:Rn×n×Rn×n→{0,1} achieving strong detection, i.e.:
P(A(X,Y)=0)+Q(A(X,Y)=1)→0 as n→∞
where P is the distribution of the signal-containing model and Q is the pure noise distribution.
Recovery Problem (Definition 1.2): Design an algorithm A:Rn×n×Rn×n→(x^,y^) achieving weak recovery, i.e.:
EP[∥x^∥∥x∥∣⟨x^,x⟩∣+∥y^∥∥y∥∣⟨y^,y⟩∣]≥ϵ
for some constant ϵ>0.
Decorated Graph Definition: A decorated graph H=(V(H),E(H);γ(H)) is a graph where each edge is assigned a decoration γ(e)∈{∙,∘}, corresponding to edges from matrices X or Y respectively.
H=H(ℓ) is the set of all decorated cycles of length ℓ
fS(X,Y)=∏(i,j)∈E∙(S)Xi,j∏(i,j)∈E∘(S)Yi,j is the subgraph "signature"
Ξ(H)=λ∣E∙(H)∣μ∣E∘(H)∣ρ∣diff(H)∣ is the decorated weight
βH=∑[H]∈H∣Aut(H)∣Ξ(H)2 is the normalization constant
diff(H) is the set of vertices appearing in both ∙ edges and ∘ edges
Key Design Insights:
Decorated Cycles: By marking each edge of a cycle as coming from X or Y, the number of possible decoration patterns grows exponentially as 2ℓ, far exceeding the count of undecorated cycles.
Fine-Grained Weighting: The weight Ξ(H) is carefully designed according to the combinatorial structure of the decoration, ensuring correct amplification of signal contributions.
Correlation Exploitation: The term ρ∣diff(H)∣ captures the contribution of signal correlation.
Distinction from Single-Graph Methods: Traditional cycle counting operates within a single graph; this work counts in the "product space" of two matrices.
Necessity of Decoration: Decorations cause the number of possible patterns to grow exponentially, which is key to breaking the BBP threshold.
Weighting Scheme: Unlike "unweighted" spectral methods such as PLS/CCA, this work's weighting scheme assigns different weights to different decoration patterns.
Variance Control (Lemma 3.3): For decorated subgraphs S,K, the covariance bound is:
CovP(fS,fK)≤1V(S)∩V(K)=∅⋅n−ℓ+∣E∙(S)∩E∙(K)∣+∣E∘(S)∩E∘(K)∣⋅M(S,K)
where M(S,K) is a complex combinatorial factor. The proof requires:
Fine-grained moment condition analysis (Assumption 2.1)
Case-by-case analysis of different overlap patterns
Exploitation of the structure of diff(S),diff(K)
Key Lemma 2.2: Proves that the normalization constant satisfies:
D−1ℓ−2A+ℓ≤βH≤DA+ℓ
where A+=2λ2+μ2+λ4+μ4−(4ρ4−2)λ2μ2
When F(λ,μ,ρ)>1, we have A+>1+δ, ensuring exponential growth of the signal.
Gaussian Additive Model (Section 5.2): Leverages known results (Proposition 5.6); the low-degree advantage is:
χ≤D2(P^;Q^)=E(x,y),(x′,y′)∼π[exp≤D(2nλ2⟨x,x′⟩2+μ2⟨y,y′⟩2)]
Core Difficulty: ⟨x,x′⟩ and ⟨y,y′⟩ are correlated, making standard analysis fail.
Innovative Solution (Lemma 5.8):
Gaussian Approximation: Proves that (n⟨x,x′⟩,n⟨y,y′⟩) behaves like a standard normal pair (U,V) with correlation ρ2
Lindeberg Interpolation: Constructs an interpolation sequence Ut,Vt (Formulas D.2-D.3), gradually transitioning from (X1,Y1),…,(Xn,Yn) to (ζ1,η1),…,(ζn,ηn)
Moment Matching: Proves that for all low-order moments, the difference is n−1/2+o(1) (Claims D.1-D.2)
Gaussian Bound (Lemma 5.7): Direct computation in the Gaussian case, using F(λ,μ,ρ)<1 to obtain an O(1) bound
Theorem 2.4 (Detection Upper Bound): Under Assumption 2.1 and F(λ,μ,ρ)>1+ϵ, choosing ω(1)=ℓ=o(logn/loglogn), we have:
P(fH(X,Y)≤τ)+Q(fH(X,Y)≥τ)=o(1)
Theorem 2.8 (Recovery Upper Bound): Under the same conditions and (1+δ)ℓ≥n2:
EP[∥x^∥∥x∥∣⟨x^,x⟩∣]≥Ω(1)
Theorem 5.4 (Computational Lower Bound): Under Assumption 5.1 and F(λ,μ,ρ)<1−ϵ, for all D=no(1):
χ≤D2(P^;Q^)=Oλ,μ,ρ,ϵ(1)
Theorem E.1 (Statistical Lower Bound, Rademacher Case): For correlated Rademacher priors, when F(λ,μ,ρ)<1−ϵ, we have χ2(P^;Q^)=O(1), making strong detection statistically impossible.
Single-Matrix BBP Phase TransitionBBP05, FP07, CDMF09, AGZ10: Classical work establishing λ=1 as the spectral method threshold
Statistical-Computational GapLKZ15, KXZ16, BDM+16, BMV+18, EKJ20, LM19: Existence of statistically detectable but computationally hard regions at λ<1 in sparse PCA
Low-Degree Lower BoundsKWB22, MW25: Proving low-degree polynomial failure at λ<1
Exact Threshold: F(λ,μ,ρ)=1 is the exact computational threshold for the symmetric correlated spiked Wigner model (under the low-degree polynomial framework)
Value of Correlation: Algorithms can leverage signal correlation to succeed in regions where individual detection is infeasible (λ,μ<1)
Algorithm Optimality: The decorated subgraph counting algorithm achieves the computational threshold and may outperform standard spectral methods like PLS/CCA
No Gap for Rademacher Case: For correlated Rademacher priors, statistical and computational thresholds coincide
This is a high-quality theoretical paper achieving important breakthroughs in computational complexity research for correlated spiked Wigner models. Main strengths include:
Completeness: Matching upper and lower bounds provide exact threshold characterization
Innovation: Both decorated subgraph counting and low-degree analysis for correlated signals are novel
Theoretical Significance: Reveals fundamental role of signal correlation in computation
Main limitations include:
Practical Utility: High algorithm complexity; lacks numerical verification
Coverage: Only symmetric case; general models unresolved
Framework Dependence: Lower bounds depend on low-degree polynomial conjecture
Recommended For: Researchers in high-dimensional statistics, computational complexity, random matrix theory, or multi-modal learning theory. For practitioners, the paper provides important theoretical guidance, though algorithms may require simplification or modification for practical use.
Academic Value: Expected to become an important reference in the field, likely publishable in top-tier statistics or theoretical computer science venues (e.g., Annals of Statistics, Journal of Machine Learning Research, or theory conferences).