Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies

被引:2
|
作者
Hao, Yao-Hui [1 ,2 ]
Song, Jia-Liang [1 ]
Lin, Yi [1 ]
Han, Ji-Hong [1 ]
机构
[1] ZhengZhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
ANALYZE; MODEL;
D O I
10.1051/itmconf/20160701011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We proposed three approximate longest chain-attack strategies and studied the vulnerability of complex networks under these intentional attack strategies. Experimental results indicate that when random network and small-world network are under any one of the three chain-attacks, the larger the < k > is, the smaller the iterative step T is. However, scale-free network shows different characteristics: the larger the < k > is, the larger the T is. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different complex networks.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [31] Attack and Defense Strategies in Complex Networks Based on Game Theory
    LI Yapeng
    DENG Ye
    XIAO Yu
    WU Jun
    Journal of Systems Science & Complexity, 2019, 32 (06) : 1630 - 1640
  • [32] Core identification and attack strategies against regenerative complex networks
    Guo, W.
    Lu, X.
    ELECTRONICS LETTERS, 2016, 52 (06) : 450 - 451
  • [33] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Yapeng Li
    Ye Deng
    Yu Xiao
    Jun Wu
    Journal of Systems Science and Complexity, 2019, 32 : 1630 - 1640
  • [34] Node Vulnerability under Finite Perturbations in Complex Networks
    Gutierrez, Ricardo
    del-Pozo, Francisco
    Boccaletti, Stefano
    PLOS ONE, 2011, 6 (06):
  • [35] Oscillations in interconnected complex networks under intentional attack
    Zhang, Wen-Ping
    Xia, Yongxiang
    Tan, Fei
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2016, 27 (06):
  • [36] Dynamical Recovery of Complex Networks under a Localised Attack
    Wang, Fan
    Dong, Gaogao
    Tian, Lixin
    ALGORITHMS, 2021, 14 (09)
  • [37] Attack structural vulnerability of power grids: A hybrid approach based on complex networks
    Chen, Guo
    Dong, Zhao Yang
    Hill, David J.
    Zhang, Guo Hua
    Hua, Ke Qian
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (03) : 595 - 603
  • [38] Repair strategies of scale-free networks under multifold attack strategies
    Hu, Bin
    Li, Fang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2010, 32 (01): : 86 - 89
  • [39] Error and attack vulnerability of temporal networks
    Trajanovski, S.
    Scellato, S.
    Leontiadis, I.
    PHYSICAL REVIEW E, 2012, 85 (06):
  • [40] Assessing Attack Vulnerability in Networks with Uncertainty
    Dinh, Thang N.
    Thai, My T.
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,