Abstract
Finding a set of nodes in a network, whose removal fragments the network below some target size at minimal cost is called network dismantling problem and it belongs to the NP-hard computational class. In this paper, we explore the (generalized) network dismantling problem by exploring the spectral approximation with the variant of the power-iteration method. In particular, we explore the network dismantling solution landscape by creating the ensemble of possible solutions from different initial conditions and a different number of iterations of the spectral approximation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fiedler, M.: Algebraic connectivity of graphs. Czechoslovak Math. J. 23(2), 298–305 (1973)
Lipton, R., Rose, D., Tarjan, R.: Generalized nested dissection. SIAM J. Numer. Anal. 16, 346–358 (1979)
Pothen, A., Simon, H.D., Liou, K.-P.: Partitioning sparse matrices with eigenvectors of graphs. SIAM J. Matrix Anal. Appl. 11, 430–452 (1990)
Bui, T.N., Jones, C.: Finding good approximate vertex and edge partitions is NP-hard. Inf. Process. Lett. 42, 153–159 (1992)
Guattery, S., Miller, G.L.: On the quality of spectral separators. SIAM J. Matrix Anal. Appl. 19, 701–719 (1998)
Tian, L., Bashan, A., Shi, D.-N., Liu, Y.-Y.: Articulation points in complex networks. Nat. Commun. 8, 14223 (2017)
Ren, X.-L., Gleinig, N., Tolić, D., Antulov-Fantulin, N.: Underestimated cost of targeted attacks on complex networks. Complexity 2018, 1–15 (2018)
Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)
Cohen, R., Erez, K., Ben-Avraham, D., Havlin, S.: Breakdown of the Internet under intentional attack. Phys. Rev. Lett. 86(16), 3682 (2001)
Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S., Herrmann, H.J.: Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. USA 108(10), 3838–3841 (2011)
Gallos, L.K., Cohen, R., Liljeros, F., Argyrakis, P., Bunde, A., Havlin, S.: Attack strategies on complex networks, pp. 1048–1055. Springer, Heidelberg (2006)
Wandelt, S., Sun, X., Zanin, M., Havlin, S.: QRE: quick robustness estimation for large complex networks. Future Gener. Comput. Syst. 83, 413–424 (2018)
Qin, S.-M., Ren, X.-L., Lü, L.-Y.: Efficient network dismantling via node explosive percolation. Commun. Theor. Phys. 71, 764 (2019)
Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Phys. Rev. E 65(3), 36104 (2002)
Pastor-Satorras, R., Castellano, C., Van Mieghem, P., Vespignani, A.: Epidemic processes in complex networks. Rev. Mod. Phys. 87(3), 925–979 (2015)
Antulov-Fantulin, N., Lančić, A., Šmuc, T., Štefančić, H., Šikić, M.: Identification of patient zero in static and temporal networks: robustness and limitations. Phys. Rev. Lett. 114, 248701 (2015)
Lü, L., Chen, D., Ren, X.-L., Zhang, Q.-M., Zhang, Y.-C., Zhou, T.: Vital nodes identification in complex networks. Phys. Rep. 650, 1–63 (2016)
Marx, D.: Parameterized graph separation problems. Theor. Comput. Sci. 351, 394–406 (2006)
Leighton, T., Rao, S.: Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. J. ACM 46, 787–832 (1999)
Arora, S., Rao, S., Vazirani, U.: Expander flows, geometric embeddings and graph partitioning. In: Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing - STOC 2004. ACM Press (2004)
Feige, U., Hajiaghayi, M., Lee, J.R.: Improved approximation algorithms for minimum weight vertex separators. SIAM J. Comput. 38, 629–657 (2008)
Arora, S., Hazan, E., Kale, S.: Fast algorithms for approximate semidefinite programming using the multiplicative weights update method. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005). IEEE (2005)
Ben-Ameur, W., Mohamed-Sidi, M.-A., Neto, J.: The k-separator problem. In: Du, D.-Z., Zhang, G. (eds.) Computing and Combinatorics, pp. 337–348. Springer, Heidelberg (2013)
Janson, S., Thomason, A.: Dismantling sparse random graphs. Comb. Probab. Comput. 17(2), 259–264 (2008)
Deng, Y., Wu, J.: Optimal attack strategy with heterogeneous costs in complex networks. In: 2016 Annual IEEE Systems Conference (SysCon), pp. 1–5, April 2016
Deng, Y., Wu, J., Xiao, Y., Zhang, M., Yu, Y., Zhang, Y.: Optimal disintegration strategy with heterogeneous costs in complex networks. IEEE Trans. Syst. Man Cybern. Syst. 1–9 (2018). https://ieeexplore.ieee.org/document/8358066
Dong, G., Gao, J., Du, R., Tian, L., Stanley, H.E., Havlin, S.: Robustness of network of networks under targeted attack. Phys. Rev. E 87, 052804 (2013)
Braunstein, A., Dall’Asta, L., Semerjian, G., Zdeborová, L.: Network dismantling. Proc. Natl. Acad. Sci. USA 113, 12368–12373 (2016)
Ren, X.-L., Gleinig, N., Helbing, D., Antulov-Fantulin, N.: Generalized network dismantling. Proc. Natl. Acad. Sci. USA 116(14), 6554–6559 (2019)
Dinur, I., Safra, S.: On the hardness of approximating minimum vertex cover. Ann. Math. 162, 2005 (2004)
Becker, S., Zhang, Y., Lee, A.A.: Geometry of energy landscapes and the optimizability of deep neural networks, arXiv preprint arXiv:1808.00408 (2018)
Calatayud, J., Bernardo-Madrid, R., Neuman, M., Rojas, A., Rosvall, M.: Exploring the solution landscape enables more reliable network community detection, arXiv preprint arXiv:1905.11230 (2019)
Good, B.H., de Montjoye, Y.-A., Clauset, A.: Performance of modularity maximization in practical contexts. Phys. Rev. E 81, 046106 (2010)
Mugisha, S., Zhou, H.-J.: Identifying optimal targets of network attack by belief propagation. Phys. Rev. E 94, 012305 (2016)
Zhou, H.-J.: Spin glass approach to the feedback vertex set problem. Eur. Phys. J. B 86, 455 (2013)
Pei, S., Wang, J., Morone, F., Makse, H. A.: Influencer identification in dynamical complex systems, arXiv preprint arXiv:1907.13017 (2019)
Morone, F., Makse, H.A.: Influence maximization in complex networks through optimal percolation. Nature 524(7563), 65 (2015)
Bar-Yehuda, R., Even, S.: A linear-time approximation algorithm for the weighted vertex cover problem. J. Algorithms 2(2), 198–203 (1981)
Fan, C., Sun, Y., Li, Z., Liu, Y.-Y., Chen, M., Liu, Z.: Dismantle large networks through deep reinforcement learning. In: ICLR 2019 (2019)
Chen, Y., Paul, G., Havlin, S., Liljeros, F., Stanley, H.E.: Finding a better immunization strategy. Phys. Rev. Lett. 101, 58701 (2008)
Zdeborová, L., Zhang, P., Zhou, H.-J.: Fast and simple decycling and dismantling of networks. Sci. Rep. 6, 37954 (2016)
Buluç, A., Meyerhenke, H., Safro, I., Sanders, P., Schulz, C.: Recent Advances in Graph Partitioning, pp. 117–158. Springer, Cham (2016)
Wandelt, S., Sun, X., Feng, D., Zanin, M., Havlin, S.: A comparative analysis of approaches to network-dismantling. Sci. Rep. 8(1), 13513 (2018)
Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 8, 3–30 (1998)
Kunegis, J.: The koblenz network collection. In: Proceedings of the International Web Observatory Workshop, pp. 1343–1350 (2013)
Acknowledgements
X.L.R. thanks to the financial support of China Scholarship Council (CSC). N.A.-F. thanks to the financial support from the EU Horizon 2020 project SoBigData under grant agreement No. 654024.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ren, XL., Antulov-Fantulin, N. (2020). Ensemble Approach for Generalized Network Dismantling. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-36687-2_65
Download citation
DOI: https://doi.org/10.1007/978-3-030-36687-2_65
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36686-5
Online ISBN: 978-3-030-36687-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)