4.7 Article

Random Walks-Based Node Centralities to Attack Complex Networks

期刊

MATHEMATICS
卷 11, 期 23, 页码 -

出版社

MDPI
DOI: 10.3390/math11234827

关键词

real-world networks; node centrality; random walk processes; network robustness; network random walks

向作者/读者索取更多资源

Investigating the network response to node removal and the efficacy of the node removal strategies is fundamental to network science. In this study, we propose four new measures of node centrality based on random walk and compare them with existing strategies for synthesizing and real-world networks. The results indicate that the degree nodes attack is the best strategy overall, and the new node removal strategies based on random walk show the highest efficacy in relation to specific network topology.
Investigating the network response to node removal and the efficacy of the node removal strategies is fundamental to network science. Different research studies have proposed many node centralities based on the network structure for ranking nodes to remove. The random walk (RW) on networks describes a stochastic process in which a walker travels among nodes. RW can be a model of transport, diffusion, and search on networks and is an essential tool for studying the importance of network nodes. In this manuscript, we propose four new measures of node centrality based on RW. Then, we compare the efficacy of the new RW node centralities for network dismantling with effective node removal strategies from the literature, namely betweenness, closeness, degree, and k-shell node removal, for synthetic and real-world networks. We evaluate the dismantling of the network by using the size of the largest connected component (LCC). We find that the degree nodes attack is the best strategy overall, and the new node removal strategies based on RW show the highest efficacy in regard to peculiar network topology. Specifically, RW strategy based on covering time emerges as the most effective strategy for a synthetic lattice network and a real-world road network. Our results may help researchers select the best node attack strategies in a specific network class and build more robust network structures.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据