Interdependency and Vulnerability of Multipartite Networks under Target Node Attacks

被引:10
|
作者
Cai, Qing [1 ]
Pratama, Mahardhika [1 ]
Alam, Sameer [2 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Mech & Aerosp Engn, Singapore, Singapore
关键词
SCALE-FREE NETWORKS; COMPLEX NETWORKS; ECOLOGICAL NETWORKS; COMMUNITY DETECTION; ROBUSTNESS; PERCOLATION; IDENTIFICATION; TRANSITION; EMERGENCE; ALGORITHM;
D O I
10.1155/2019/2680972
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Complex networks in reality may suffer from target attacks which can trigger the breakdown of the entire network. It is therefore pivotal to evaluate the extent to which a network could withstand perturbations. The research on network robustness has proven as a potent instrument towards that purpose. The last two decades have witnessed the enthusiasm on the studies of network robustness. However, existing studies on network robustness mainly focus on multilayer networks while little attention is paid to multipartite networks which are an indispensable part of complex networks. In this study, we investigate the robustness of multipartite networks under intentional node attacks. We develop two network models based on the largest connected component theory to depict the cascading failures on multipartite networks under target attacks. We then investigate the robustness of computer-generated multipartite networks with respect to eight node centrality metrics. We discover that the robustness of multipartite networks could display either discontinuous or continuous phase transitions. Interestingly, we discover that larger number of partite sets of a multipartite network could increase its robustness which is opposite to the phenomenon observed on multilayer networks. Our findings shed new lights on the robust structure design of complex systems. We finally present useful discussions on the applications of existing percolation theories that are well studied for network robustness analysis to multipartite networks. We show that existing percolation theories are not amenable to multipartite networks. Percolation on multipartite networks still deserves in-depth efforts.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] On the Robustness of Diffusion in a Network Under Node Attacks
    Logins, Alvis
    Li, Yuchen
    Karras, Panagiotis
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (12) : 5884 - 5895
  • [22] Two-Target Tracking Over Heterogenous Sensor Networks Under Deception Attacks
    Xiao, Shunyuan
    Ge, Xiaohua
    Han, Qing-Long
    Cao, Zhenwei
    2019 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2019, : 303 - 308
  • [23] On the Robustness of Cascade Diffusion under Node Attacks
    Logins, Alvis
    Li, Yuchen
    Karras, Panagiotis
    WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 2711 - 2717
  • [24] The vulnerability of distributed state estimator under stealthy attacks
    Sui, Tianju
    Sun, Xi-Ming
    AUTOMATICA, 2021, 133
  • [25] Distributed detection of node replication attacks in sensor networks
    Parno, B
    Perrig, A
    Gligor, V
    2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 49 - 63
  • [26] Modeling Node Capture Attacks in Wireless Sensor Networks
    Tague, Patrick
    Poovendran, Radha
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1221 - 1224
  • [27] Deterministic Detection of Node Replication Attacks in Sensor Networks
    Ho, Yu-Shen
    Ma, Ruay-Lien
    Sung, Cheng-En
    Tsai, I-Chen
    Kang, Li-Wei
    Yu, Chia-Mu
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 468 - 469
  • [28] A vibrational approach to node centrality and vulnerability in complex networks
    Estrada, Ernesto
    Hatano, Naomichi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (17) : 3648 - 3660
  • [29] A NODE-BASED MULTISCALE VULNERABILITY OF COMPLEX NETWORKS
    Criado, R.
    Pello, J.
    Romance, M.
    Vela-Perez, M.
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2009, 19 (02): : 703 - 710
  • [30] A survey on the vulnerability of deep neural networks against adversarial attacks
    Andy Michel
    Sumit Kumar Jha
    Rickard Ewetz
    Progress in Artificial Intelligence, 2022, 11 : 131 - 141