Next Article in Journal
Combined Gaussian Mixture Model and Pathfinder Algorithm for Data Clustering
Previous Article in Journal
Irreversible Geometrothermodynamics of Open Systems in Modified Gravity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Influence of Removing Leaf Node Neighbors on Network Controllability

1
School of Computer Science, Sichuan Normal University, Chengdu 610068, China
2
Visual Computing and Virtual Reality Key Laboratory of Sichuan, Sichuan Normal University, Chengdu 610068, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(6), 945; https://doi.org/10.3390/e25060945
Submission received: 8 May 2023 / Revised: 13 June 2023 / Accepted: 13 June 2023 / Published: 15 June 2023
(This article belongs to the Topic Complex Systems and Network Science)

Abstract

:
From the perspective of network attackers, finding attack sequences that can cause significant damage to network controllability is an important task, which also helps defenders improve robustness during network constructions. Therefore, developing effective attack strategies is a key aspect of research on network controllability and its robustness. In this paper, we propose a Leaf Node Neighbor-based Attack (LNNA) strategy that can effectively disrupt the controllability of undirected networks. The LNNA strategy targets the neighbors of leaf nodes, and when there are no leaf nodes in the network, the strategy attacks the neighbors of nodes with a higher degree to produce the leaf nodes. Results from simulations on synthetic and real-world networks demonstrate the effectiveness of the proposed method. In particular, our findings suggest that removing neighbors of low-degree nodes (i.e., nodes with degree 1 or 2) can significantly reduce the controllability robustness of networks. Thus, protecting such low-degree nodes and their neighbors during network construction can lead to networks with improved controllability robustness.

1. Introduction

Complex networks have developed rapidly over the past two decades [1]. There are many real-world systems that can be modeled as complex networks, with a large number of nodes and edges. The study of networks can help us understand corresponding complex systems. For example, social networks can help us understand the ways in which humans interact and how information spreads in society; transportation networks can help us study the flow and congestion of traffic in cities. The controllability of a network is a crucial factor, as control networks are designed to serve people [2,3]. In this context, controllability refers to the ability of a dynamical network to be guided by external inputs from any initial state to any desired target state within a finite duration of time under an admissible control input.
Recently, failures and attacks on complex networks have become more frequent and severe [4,5,6,7,8]. When failures and attacks occur, they are removed in the form of node or edge removals. On node removals, the target node and the edges previously connected to the node will be removed, while on edge removals, only the target edges will be disconnected. Network attacks are typically categorized into two types: random and malicious. Random attacks refer to the uniform random selection of attack targets, while malicious attacks choose the most effective targets to attack. Malicious attacks typically have a better effect than random attacks, but they also consume more computation time. During malicious attacks, the most destructive target is selected for attacking; such target choices are usually based on the centrality of nodes. For example, the node with the highest degree is attacked firstly or the edge with the highest betweenness is preferentially removed. Besides degree and betweenness, commonly used measures of node importance include closeness [9], Katz centrality [10], neighborhood similarity [11], branch weighting [12], structural holes [13], and so on. Many malicious attack models have been proposed; the hierarchical structure of a directed network enables a random upstream (or downstream) attack on the network controllability, which results in a more destructive attack strategy than random attacks [14]. In addition, the module-based attack strategy [15,16] aims at attacking the nodes with inter-community edges that are crucial to maintain connectivity among communities.
In addition, nodes can be categorized as critical or non-critical based on their impact on network controllability when removed. Removing critical nodes can significantly reduce network controllability [6], so they should be protected during network construction to enhance controllability robustness. Bridges, a type of edge in networks, can also be targeted for removal to decrease network controllability [17]. Many deep learning and optimization methods can be used to find such hidden patterns and key roles of networks; the proposed Finder framework, which employs reinforcement learning, offers a unified approach for identifying a group of nodes that can destroy network function to the greatest extent after removals [18]. Deep learning models are used to predict network robustness [19,20,21,22]; evolutionary algorithms are utilized for network attacks [23,24].
The research on network attacks aims to enhance the robustness of networks from the perspective of attackers, enabling them to better withstand attacks when constructing networks. One effective approach to improving the controllability robustness of networks is to protect bridges, as they play a critical role in network connectivity. Protecting critical nodes and edges during network construction is also a viable strategy for enhancing controllability robustness [6]. Studies have shown that three-ring and four-ring structures in networks are beneficial for controllability robustness [25], which suggests that networks with random triangle and random quadrilateral structures tend to exhibit good controllability robustnesss.
The structural controllability of the network can be evaluated by identifying the maximum matching of the network to determine the minimum number of external control inputs required as driver nodes [4]. However, this approach is only suitable for directed networks and is challenging to apply to large-scale networks. To address this issue, the exact controllability framework was proposed, which can be utilized for all large-scale sparse networks [26].
Controllability robustness can be measured using two approaches: A priori measure and A posteriori measure. The A priori measure calculates network features in a single calculation, while the A posteriori measure simulates the change in network controllability curve under attack. Although the A posteriori measure is more accurate, it can be computationally expensive, especially for large-scale networks. Recently, deep learning has emerged as a promising approach to measure network robustness accurately and efficiently, providing a less time-consuming alternative to simulation-based methods [19,21,22,27,28].
The selection of literature reviewed in this paper was based on the following criteria: (1) Relevance to the research objective: we screened literature that directly related to our research topic. (2) Credibility and authority: we evaluated the credibility and authority of the literature. We specifically focused on articles published in reputable journals, conference proceedings, and reports from authoritative research organizations. (3) Time range: we limited the articles to recent publications as much as possible to ensure they represented the latest advancements in the field. By employing these criteria, we aimed to ensure the selection of the most relevant, credible, and recent literature to support the research objectives.
Overall, this paper presents an attack strategy for undirected network controllability. The main contributions are:
(1)
A novel attack strategy is proposed, which can effectively disrupt the controllability of undirected networks.
(2)
The impact of removing nodes with degree 1 and 2 on network controllability is analyzed, revealing that nodes with low degree are not beneficial to the robustness of network controllability.
(3)
The findings provide valuable insights for identifying key nodes and designing networks with improved controllability robustness in future research.
The rest of this paper is organized as follows: Section 2 introduces the preliminary concepts of controllability and controllability robustness; Section 3 illustrates in detail the proposed attack model LNNA; Section 4 demonstrates the experimental results on synthetic and real-world networks; and Section 5 concludes this paper.

2. Network Controllability and Controllability Robustness

The robustness of network controllability is mainly concerned with the change in controllability when the network is attacked [29]. Controllability robustness reflects the ability of the network to resist attacks, from the perspective of attackers, which can also be the evaluation index of attack performance, namely, the worse the robustness, the better the attack model. Network controllability is measured by the density of driver nodes n D ,
n D = N D N
where N D represents the number of driver nodes required to maintain network controllability and N represents the total number of network nodes. The minimum value of n D is 1 N , and the maximum value is 1. A smaller value of n D indicates better network controllability, while a larger value of n D indicates worse network controllability. According to the minimum-inputs theorem [4], for directed networks, N D can be obtained by the number of unmatched nodes for a directed network:
N D = max { 1 , N E * }
where | E * | is the size of maximum matching. As for exact controllability [26], N D is calculated by:
N D = max { 1 , N r a n k ( A ) }
where r a n k ( A ) is the rank of the adjacency matrix A. For node-removal attacks, the controllability robustness of the network can be measured by the controllability curve, which is calculated as follows:
n D ( i ) = N D ( i ) N i , i = 0 , 1 , , N 1 ,
where N D ( i ) the number of driver nodes needed to maintain network controllability after removing a total of i nodes, N is the size of the original network, N D is calculated by using the exact controllability framework as Equation (3), which applies to large and sparse undirected networks, n D records the changes in network controllability after each node is removed. The overall measure of controllability robustness can be obtained by averaging controllability curves as follows:
R N = 1 N 1 i = 1 N 1 n D ( i ) ,
where n D ( i ) is the structural controllability of the remaining network after i nodes are removed. The network controllability robustness can be evaluated by R N , a smaller R N indicates better controllability robustness, while a larger R N indicates worse controllability robustness. For an attack model, a better controllability robustness indicates a worse attack performance.

3. Leaf Node Neighbor-Based Attack Strategy

The removal of different nodes in networks has different impacts on the controllability of networks. Leaf nodes, which are the nodes with a degree of 1, are most likely driver nodes in the network. If the only neighbor of a leaf node is removed, the leaf node will become an isolated node and the number of connected components of the network will increase. Furthermore, after the neighbor of a leaf node is attacked, which is connected to many leaf nodes, all the leaf nodes connected to it will become drive nodes. Therefore, the neighbors of a leaf node are important for controllability attacks, and the number of leaf nodes connected by that neighbor node is also an important reference. The above ideas are applied to the following attack strategy design; the following subsections analyze in detail the impacts of removing leaf node neighbors on network controllability.

3.1. Leaf Node Neighbor-Based Attack Strategy

As neighbors of leaf nodes can be removed to reduce the controllability of a network, a leaf node neighbor-based attack (LNNA) strategy is proposed. Before proposing the algorithm, there are two necessary concepts, k-neighbor node and k-neighbor degree, which are pre-defined, where k-neighbor node is a neighbor of a node with degree k, and k-neighbor degree for a node is the number of neighbors with degree k. The proposed LNNA is based on the above concepts and is described in detail in Algorithm 1.
Algorithm 1 Leaf Node Neighbor-based Attack Strategy.
Input: a network G with N nodes
Output: index t of target node to be attacked
  1: d e g r e e s { }
  2: n e i g h b o r s { }
  3: // get node degrees and neighbors
  4: for  i = 1 to N do
  5:    d g e t _ d e g r e e ( n o d e i )
  6:   if  d ! = 0  then
  7:      d e g r e e s [ i ] d
  8:       n e i g h b o r s [ i ] g e t _ n e i g h b o r _ i n d e x e s ( n o d e i )
  9:   end if
10: end for
11: if  d e g r e e s . s i z e ( ) ! = 0  then
12:   // get the nodes and their neighbors with smallest degree k, generally, k equals to 1
13:    k d e g r e e s . m i n i m u m ( )
14:    k _ n o d e s { }
15:    k _ n e i g h b o r s { }
16:   for  j = d e g r e e s . k e y s ( )  do
17:     if  d e g r e e s [ j ] = = k  then
18:         k _ n o d e s . i n s e r t ( j )
19:         k _ n e i g h b o r s . i n s e r t ( n e i g h b o r s [ j ] )
20:     end if
21:   end for
22:    k _ n e i g h b o r _ d e g r e e s A r r a y ( k _ n e i g h b o r s . s i z e ( ) )
23:   for  j = 1 to k _ n e i g h b o r s . s i z e ( )  do
24:     for  n e i g h b o r _ i d = g e t _ n e i g h b o r _ i n d e x e s ( k _ n e i g h b o r s [ j ] )  do
25:        if  n e i g h b o r _ i d in k _ n o d e s  then
26:            k _ n e i g h b o r _ d e g r e e s [ j ] k _ n e i g h b o r _ d e g r e e s [ j ] + 1
27:        end if
28:     end for
29:   end for
30:    t k _ n e i g h b o r s [ a r g m a x ( k _ n e i g h b o r _ d e g r e e s ) ]
31: else
32:    t r a n d o m _ i n t e g e r ( 1 , N )
33: end if
34: return t
As shown in Algorithm 1, LNNA usually starts from the neighboring node of leaf nodes, i.e., 1-neighbors. When attacking the 1-neighbors, the attack target is determined based on the number of leaf nodes connected to these nodes, i.e., the 1-neighbor degree. The node with the highest 1-neighbor degree among the 1-neighbors will be attacked. When there are no leaf nodes in the network, LNNN will choose nodes to attack from the 2-neighbors. Similarly, the node with the highest 2-neighbor degree among the 2-neighbors will be selected as the target. This process continues recursively.
In terms of time complexity, for each attack, finding neighbors of each node is O ( N 2 ) , N is the number of nodes; finding and getting the smallest k-neighbors is O ( N ) ; getting k-neighbor degrees is O ( K N ) , K is the number of k-neighbors, K < N ; thus, the total time complexity is max { O ( N 2 ) , O ( N ) , O ( K N ) } = O ( N 2 ) . For typical malicious attack methods, namely, degree- (DEG), betweenness- (BET), closeness- (CLO) based attacks, the time complexity comparison is listed in Table 1. For degree-based attacks, getting the degree of each node is O ( N 2 ) , similar to finding neighbors of each node; for a betweenness-based attack, getting the betweenness of each node is O ( N 3 ) when using the Floyd–Warshall algorithm; for a closeness-based attack, computing time of closeness is O ( N ( M + N ) ) , and M is the number of edges.

3.2. Influence of Leaf Node Neighbor Failures

An algorithm that targets the neighbors of low-degree nodes (i.e., leaf nodes) with a node attack has been developed in Section 3.1. In this subsection, we also provide a mathematical proof detailing why attacking the neighbors of leaf nodes is effective and leads to an increase in the number of driver nodes.
Theorem 1.
Let A N be the adjacency matrix of a network, and A N 1 be the adjacency matrix after removing a node V r . r a n k ( A N ) = r a n k ( A N 1 ) + 2 , if the following condition holds: V r is the only neighbor of a leaf node V l .
Proof. 
The adjacency matrix A N and A N 1 can be represented as follows:
A N = 0 0 1 0 D a 1 a 0 , A N 1 = 0 0 0 D ,
As the permutation invariance of adjacency matrix, the first row (column) of A N represents V l , the last row (column) of A N represents V r ; it is clear that
r a n k ( D ) = r a n k ( A N 1 ) = r a n k ( A N ) 2
Theorem 2.
Let N D be the number of driver nodes in a network, and N D be the number of driver nodes on the network after removing a leaf node neighbor. N D = N D + 1 , if the following condition holds: r a n k ( A N ) < N .
Proof. 
If r a n k ( A N ) < N , then, r a n k ( A N 1 ) = r a n k ( A N ) 2 < N 2 . Therefore, the following equation holds:
N D = max { 1 , N r a n k ( A N ) } = N r a n k ( A N ) = N r a n k ( A N 1 ) 2 = [ ( N 1 ) r a n k ( A N 1 ) ] 1 = max { 1 , ( N 1 ) r a n k ( A N 1 ) } 1 = N D 1
Theorem 3.
Let N D be the number of driver nodes in a network, and N D be the number of driver nodes on the network after removing a leaf node neighbor. N D = N D = 1 , if the following condition holds: r a n k ( A N ) = N .
Proof. 
If r a n k ( A N ) = N , then N D = m a x { 1 , N r a n k ( A N ) } = 1 , the following equation holds:
r a n k ( A N 1 ) = r a n k ( A N ) 2 = N 2 , N D = m a x { 1 , ( N 1 ) r a n k ( A N 1 ) = 1
According to Theorem 1, 2, and 3, removing the neighbor of a leaf node from the network increases or maintains the total number of driver nodes. From Equations (1) and (4), we can find that the more driver nodes there are, the worse controllability the network has.

4. Experimental Studies

LNNA is applied to three kinds of synthetic networks and real networks. In order to verify its effectiveness, the performance of LNNA was compared with feature-based attacks such as degree-, betweenness-, and closeness-based attacks. The main focus of this paper is to investigate the impact of attacking nodes with the lowest degree, excluding isolated nodes, on network controllability. Specifically, the study explores the effects of removing neighbors of leaf nodes on network controllability.
The three synthetic networks are Erdös-Rényi (ER) random-graph [30], Generic scale-free (SF) network [31], and Newman–Watts small-world (SW) network [32]. The real-world networks are econ-mahindas and soc-wiki-Vote; all networks are undirected. The number of nodes are N = 500 and N = 1000 ; the average degree k = 3 , 5 , and 10, respectively. In order to reduce the influence of randomness, 30 random instances are generated for each network.

4.1. Results on Synthetic Networks for Different Average Degrees

Liu et al. [4] suggested that controlling sparse heterogeneous networks can be challenging and that such networks tend to have poor network controllability and robustness. Conversely, dense homogeneous networks are easier to control and have better network controllability and robustness. Moreover, networks with higher average degrees have more redundant edges, which help maintain the core structure of the network and make it less susceptible to destruction, resulting in better network controllability and robustness.
As shown in Figure 1, for ER and SW networks with an average degree of 3, LNNA can effectively disrupt network controllability from the beginning of attacks. When the average degree is 5, for the degree- (DEG), betweenness- (BET), closeness- (CLO) based attacks on ER networks, the controllability of ER networks begins to decrease significantly after about 20% of nodes are removed, and for the SW networks, the threshold proportion is 40%. However, LNNA can significantly reduce the controllability of networks from the beginning of the attacks. For SF networks, there is no significant difference between different attacks, since the topology of SF networks makes the network robust on controllability, and nodes that can disrupt the network controllability are easy to find. When k = 10 , for ER networks, the three feature-based attacks rapidly reduce the controllability of the network when more than 40% of the nodes are removed. For SW networks, the ratio is around 50%. For SF networks, LNNA is slightly better than other attacks, because with the increase in average degree, the network controllability robustness is improved. Overall, as shown in Table 2, LNNA has the best attack effect on the three synthetic networks with different average degrees.

4.2. Results on Synthetic Networks for Different Network Sizes

The size of a network is typically defined as the number of nodes in the network. Large-scale networks tend to be more complex and may exhibit a variety of structures, and the controllability robustness of networks can vary across different scales. Moreover, in terms of attack strategies, networks with more nodes require higher computational costs relative to smaller networks. As shown in Figure 2, the effect of different attacks on the three synthetic networks is similar when the average degree is 5, regardless of network size (i.e., 500, 1000, or 1500 nodes). However, LNNA shows better attack performance on ER and SW networks compared to other attack methods, while no significant difference is observed in SF networks. Table 3 also shows that when the average degree is 5, LNNA performs the best on the three networks with 500, 1000, and 1500 nodes.

4.3. Results on Real-World Networks

LNNA is applied to two real-world networks, called econ-mahindas and soc-wiki-Vote [33]. The information of networks is shown in Table 4.
As shown in Figure 3, for the econ-mahindas network, the attack effect of LNNA is obviously better than that of other attack strategies. For the soc-wiki-Vote network, the attack effect of LNNA is slightly better than other strategies, but there is no significant difference. These results are consistent with those obtained on synthetic networks. Furthermore, for networks with good controllability robustness, LNNA is more destructive to the network controllability.

4.4. Attack Process Discussion

Figure 4 illustrates types of the selected nodes during the LNNA. When approximately 70% of the nodes are removed, only isolated nodes remain in the network.
Figure 5 illustrates the proportion of different nodes removed by different networks under LNNA. It can be observed that the proportion of nodes decreases as the k of k-neighbor increases. Apart from isolated nodes, the largest proportion represents 1-neighbor nodes, which refers to the neighbor of a leaf node. When a k-neighbor node is attacked, a ( k 1 )-neighbor node is generated. In the case of ER and SW networks, 1-neighbor nodes account for approximately 30% and 25%, respectively, and the damage to network controllability is significant. For the SF network, it can be seen that the attacked nodes are 1-neighbor nodes, accounting for about 40%. Subsequently, only isolated nodes remain in the network, indicating that the SF network is vulnerable to attack.

5. Conclusions

In order to investigate the controllability robustness of networks from the perspective of attacks, this paper mainly examines the destructive impact of the neighbor nodes of a node with low degree on network controllability. We proposed an attack strategy targeted on leaf node neighbors, named LNNA, and introduced the defined concepts of k-neighbor nodes and k-neighbor degrees. First, we investigated the role of neighboring nodes of leaf nodes in network controllability and the changes that occur in network controllability when these nodes are removed. Then, we defined the concepts of k-neighbor nodes and k-neighbor degrees, which denote the neighboring nodes of a node with degree k, and the degree of k-neighbor node itself. Based on the exploration, we proposed an attack strategy targeting these nodes to achieve maximum disruption of network controllability; the attack strategy prioritizes attacking the neighbor node of a node with the lowest degree, except for isolated nodes. In a network, if the k-neighbor nodes are attacked, the ( k 1 )-neighbor nodes will be generated, and this process continues until 1-neighbor nodes appear, which will then be attacked. Simulated experiments on synthetic and real-world networks demonstrate that the proposed LNNA performs better than degree-, betweenness-, and closeness-based attacks. This suggests that the presence of low-degree nodes in networks is not conducive to network controllability robustness. In the future, when designing networks with good controllability robustness, it is advisable to make the network more homogeneous to avoid the presence of a large number of low-degree neighbor nodes, such as 1-neighbor nodes and 2-neighbor nodes.

Author Contributions

Conceptualization, software, investigation, methodology, writing–—original draft preparation, C.W. and Z.Y.; formal analysis, visualization, S.X.; investigation, project administration and supervision, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China (number 62002249) and in part by the Open Project Program of the State Key Lab of CADCG (A2112), Zhejiang University.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This research was supported in part by the National Natural Science Foundation of China (number 62002249) and in part by the Open Project Program of the State Key Lab of CADCG (A2112), Zhejiang University. The author would like to acknowledge the tutor and students for their valuable feedback on the draft to improve the flow and quality of the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, G.; Wang, X.; Li, X. Fundamentals of Complex Networks: Models, Structures and Dynamics, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2014. [Google Scholar]
  2. Menichetti, G.; Dall’Asta, L.; Bianconi, G. Network Controllability Is Determined by the Density of Low In-Degree and Out-Degree Nodes. Phys. Rev. Lett. 2014, 113, 078701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Zhang, Y.; Zhou, T. Controllability Analysis for a Networked Dynamic System with Autonomous Subsystems. IEEE Trans. Autom. Control 2017, 62, 3408–3415. [Google Scholar] [CrossRef]
  4. Liu, Y.Y.; Slotine, J.J.; Barabási, A.L. Controllability of Complex Networks. Nature 2011, 473, 167–173. [Google Scholar] [CrossRef] [PubMed]
  5. Xiao, Y.D.; Lao, S.Y.; Hou, L.L.; Bai, L. Optimization of robustness of network controllability against malicious attacks. Chin. Phys. B 2014, 23, 118902. [Google Scholar] [CrossRef]
  6. Lou, Y.; Wang, L.; Chen, G. A Framework of Hierarchical Attacks to Network Controllability. Commun. Nonlinear Sci. Numer. Simul. 2021, 98, 105780. [Google Scholar] [CrossRef]
  7. Wandelt, S.; Lin, W.; Sun, X.; Zanin, M. From random failures to targeted attacks in network dismantling. Reliab. Eng. Syst. Saf. 2022, 218, 108146. [Google Scholar] [CrossRef]
  8. Li, S.; Liu, W.; Wu, R.; Li, J. An adaptive attack model to network controllability. Reliab. Eng. Syst. Saf. 2023, 235, 109252. [Google Scholar] [CrossRef]
  9. Borgatti, S.P. Centrality and network flow. Soc. Netw. 2005, 27, 55–71. [Google Scholar] [CrossRef]
  10. Katz, L. A new status index derived from sociometric analysis. Psychometrika 1953, 18, 39–43. [Google Scholar] [CrossRef]
  11. Ruan, Y.-R.; Yang, L.S.; Wang, J.-D.; Bai, L.; Chen, L.D. Node importance measurement based on neighborhood similarity in complex network. Acta Phys. Sin. 2017, 66, 038902. [Google Scholar] [CrossRef]
  12. Šimon, M.; Luptáková, I.D.; Huraj, L.; Hosťovecký, M.; Pospíchal, J. Combined Heuristic Attack Strategy on Complex Networks. Math. Probl. Eng. 2017, 2017, 6108563. [Google Scholar] [CrossRef] [Green Version]
  13. Yang, H.; An, S. Critical Nodes Identification in Complex Networks. Symmetry 2020, 12, 123. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, Y.Y.; Slotine, J.J.; Barabási, A.L. Control Centrality and Hierarchical Structure in Complex Networks. PLoS ONE 2012, 7, e44459. [Google Scholar] [CrossRef] [Green Version]
  15. da Cunha, B.R.; González-Avella, J.C.; Gonçalves, S. Fast Fragmentation of Networks Using Module-Based Attacks. PLoS ONE 2015, 10, e0142824. [Google Scholar] [CrossRef] [Green Version]
  16. Shai, S.; Kenett, D.Y.; Kenett, Y.N.; Faust, M.; Dobson, S.; Havlin, S. Critical tipping point distinguishing two types of transitions in modular network structures. Phys. Rev. E 2015, 92, 062805. [Google Scholar] [CrossRef] [Green Version]
  17. Wang, L.; Zhao, G.; Kong, Z.; Zhao, Y. Controllability and Optimization of Complex Networks Based on Bridges. Complexity 2020, 2020, 6695026. [Google Scholar] [CrossRef]
  18. Fan, C.; Zeng, L.; Sun, Y.; Liu, Y.Y. Finding key players in complex networks through deep reinforcement learning. Nat. Mach. Intell. 2020, 2, 317–324. [Google Scholar] [CrossRef]
  19. Lou, Y.; He, Y.; Wang, L.; Tsang, K.F.; Chen, G. Knowledge-Based Prediction of Network Controllability Robustness. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 5739–5750. [Google Scholar] [CrossRef]
  20. Wu, C.; Lou, Y.; Wu, R.; Liu, W.; Li, J. CNN-based Prediction of Network Robustness With Missing Edges. In Proceedings of the 2022 International Joint Conference on Neural Networks (IJCNN), Padua, Italy, 18–23 July 2022; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar] [CrossRef]
  21. Lou, Y.; He, Y.; Wang, L.; Chen, G. Predicting Network Controllability Robustness: A Convolutional Neural Network Approach. IEEE Trans. Cybern. 2022, 52, 4052–4063. [Google Scholar] [CrossRef]
  22. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Li, X.; Chen, G. A Learning Convolutional Neural Network Approach for Network Robustness Prediction. IEEE Trans. Cybern. 2022, 1–14. [Google Scholar] [CrossRef]
  23. Deng, Y.; Wu, J.; Qi, M.; Tan, Y. Optimal disintegration strategy in spatial networks with disintegration circle model. Chaos Interdiscip. J. Nonlinear Sci. 2019, 29, 061102. [Google Scholar] [CrossRef] [PubMed]
  24. Ventresca, M. Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Comput. Oper. Res. 2012, 39, 2763–2775. [Google Scholar] [CrossRef]
  25. Lou, Y.; Wang, L.; Chen, G. Toward Stronger Robustness of Network Controllability: A Snapback Network Model. IEEE Trans. Circuits Syst. I Regul. Pap. 2018, 65, 2983–2991. [Google Scholar] [CrossRef]
  26. Yuan, Z.Z.; Zhao, C.; Di, Z.R.; Wang, W.X.; Lai, Y.C. Exact Controllability of Complex Networks. Nat. Commun. 2013, 4, 2447. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Chen, G. A Convolutional Neural Network Approach to Predicting Network Connectedness Robustness. IEEE Trans. Netw. Sci. Eng. 2021, 8, 3209–3219. [Google Scholar] [CrossRef]
  28. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Tang, C.B.; Chen, G. Classification-based prediction of network connectivity robustness. Neural Netw. 2023, 157, 136–146. [Google Scholar] [CrossRef]
  29. Freitas, S.; Yang, D.; Kumar, S.; Tong, H.; Chau, D.H. Graph Vulnerability and Robustness: A Survey. IEEE Trans. Knowl. Data Eng. 2023, 35, 5915–5934. [Google Scholar] [CrossRef]
  30. Erdös, P.; Rényi, A. On the Strength of Connectedness of a Random Graph. Acta Math. Hung. 1964, 12, 261–267. [Google Scholar] [CrossRef]
  31. Goh, K.I.; Kahng, B.; Kim, D. Universal Behavior of Load Distribution in Scale-free Networks. Phys. Rev. Lett. 2001, 87, 278701. [Google Scholar] [CrossRef] [Green Version]
  32. Newman, M.E.; Watts, D.J. Renormalization Group Analysis of the Small-world Network Model. Phys. Lett. A 1999, 263, 341–346. [Google Scholar] [CrossRef] [Green Version]
  33. Rossi, R.; Ahmed, N. The Network Data Repository with Interactive Graph Analytics and Visualization. Proc. AAAI Conf. Artif. Intell. 2015, 29, 9277. [Google Scholar] [CrossRef]
Figure 1. Controllability robustness of networks with N = 1000 .
Figure 1. Controllability robustness of networks with N = 1000 .
Entropy 25 00945 g001
Figure 2. Controllability robustness of networks with k = 5 .
Figure 2. Controllability robustness of networks with k = 5 .
Entropy 25 00945 g002
Figure 3. Controllability robustness of real-world networks.
Figure 3. Controllability robustness of real-world networks.
Entropy 25 00945 g003
Figure 4. Visualization of targeted nodes in the attack process of LNNA.
Figure 4. Visualization of targeted nodes in the attack process of LNNA.
Entropy 25 00945 g004
Figure 5. The proportion of attacked node types in the three networks under LNNA, N = 1000 and k = 5 .
Figure 5. The proportion of attacked node types in the three networks under LNNA, N = 1000 and k = 5 .
Entropy 25 00945 g005
Table 1. Time complexity of attack methods.
Table 1. Time complexity of attack methods.
MethodLNNADEGBETCLO
Time complexity O ( N 2 ) O ( N 2 ) O ( N 3 ) O ( N ( M + N ) )
Table 2. Robustness of network controllability with different average degrees; the values are calculated by Equation (5).
Table 2. Robustness of network controllability with different average degrees; the values are calculated by Equation (5).
Networks k LNNADEGBETCLO
ER30.58930.52580.42740.4921
50.47590.39420.31390.3619
70.33820.25370.20120.2299
SF30.88360.88080.82590.8759
50.80850.80270.73220.7938
70.66360.64210.56830.6273
SW30.49610.3820.16120.3656
50.43240.33540.18020.3073
70.32360.23750.1660.2173
Table 3. Robustness of network controllability with different network sizes; the values are calculated by Equation (5).
Table 3. Robustness of network controllability with different network sizes; the values are calculated by Equation (5).
NetworkNLNNADEGBETCLO
ER5000.47590.39420.31390.3619
10000.48030.39630.3180.3654
15000.48150.39660.32110.3676
SF5000.80850.80270.73220.7938
10000.83570.83120.7650.8242
15000.85190.8480.7870.8422
SW5000.43240.33540.18020.3073
10000.43470.33680.17880.3066
15000.12380.0720.05820.061
Table 4. Information of real-world networks.
Table 4. Information of real-world networks.
NetworkNM
econ-mahindas12587682
soc-wiki-Vote8892914
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, C.; Xu, S.; Yu, Z.; Li, J. Influence of Removing Leaf Node Neighbors on Network Controllability. Entropy 2023, 25, 945. https://doi.org/10.3390/e25060945

AMA Style

Wu C, Xu S, Yu Z, Li J. Influence of Removing Leaf Node Neighbors on Network Controllability. Entropy. 2023; 25(6):945. https://doi.org/10.3390/e25060945

Chicago/Turabian Style

Wu, Chengpei, Siyi Xu, Zhuoran Yu, and Junli Li. 2023. "Influence of Removing Leaf Node Neighbors on Network Controllability" Entropy 25, no. 6: 945. https://doi.org/10.3390/e25060945

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop