Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies

被引:2
|
作者
Hao, Yao-Hui [1 ,2 ]
Song, Jia-Liang [1 ]
Lin, Yi [1 ]
Han, Ji-Hong [1 ]
机构
[1] ZhengZhou Inst Informat Sci & Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
关键词
ANALYZE; MODEL;
D O I
10.1051/itmconf/20160701011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We proposed three approximate longest chain-attack strategies and studied the vulnerability of complex networks under these intentional attack strategies. Experimental results indicate that when random network and small-world network are under any one of the three chain-attacks, the larger the < k > is, the smaller the iterative step T is. However, scale-free network shows different characteristics: the larger the < k > is, the larger the T is. These findings supplement and extend the previous attack results on nodes and edges, and can thus help us better explain the vulnerability of different complex networks.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [41] Attack Vulnerability of Public Transport Networks
    von Ferber, Christian
    Holovatch, Taras
    Holovatch, Yurij
    TRAFFIC AND GRANULAR FLOW '07, 2009, : 721 - +
  • [42] Attack Vulnerability of Online Social networks
    Li, Hui
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 1051 - 1056
  • [43] Vulnerability analysis of interdependent spatially embedded infrastructure networks under localized attack
    Yan, Ke-Sheng
    Rong, Li-Li
    Li, Qun
    MODERN PHYSICS LETTERS B, 2017, 31 (09):
  • [44] Efficiency of attack strategies on complex model and real-world networks
    Bellingeri, Michele
    Cassi, Davide
    Vincenzi, Simone
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 414 : 174 - 180
  • [45] Study on Power Grid Partition and Attack Strategies Based on Complex Networks
    Zou, Yanli
    Li, Haoqian
    FRONTIERS IN PHYSICS, 2022, 9
  • [46] Effect of different attack strategies on controllability robustness of directed complex networks
    Geng, Peng
    Yang, Annan
    Wei, Lai
    Chen, Rui
    Pan, Ziyu
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (05) : 513 - 531
  • [47] Vulnerability of complex networks
    Mishkovski, Igor
    Biey, Mario
    Kocarev, Ljupco
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (01) : 341 - 349
  • [48] Vulnerability of complex networks under path-based attacks
    Pu, Cun-Lai
    Cui, Wei
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2015, 419 : 622 - 629
  • [49] Longest Chain Consensus Under Bandwidth Constraint
    Neu, Joachim
    Sridhar, Srivatsan
    Yang, Lei
    Tse, David
    Alizadeh, Mohammad
    PROCEEDINGS OF THE 2022 4TH ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, AFT 2022, 2022, : 126 - 147
  • [50] Cascading failures in networks with the harmonic closeness under edge attack strategies
    Hao, Yucheng
    Wang, Yanhui
    Jia, Limin
    He, Zhichao
    CHAOS SOLITONS & FRACTALS, 2020, 135