Next Article in Journal
On Global Quantum Communication Networking
Previous Article in Journal
Indistinguishability and Negative Probabilities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Edge Attack Strategy via an OWA Operator-Based Ensemble Design in Real-World Networks

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(8), 830; https://doi.org/10.3390/e22080830
Submission received: 16 June 2020 / Revised: 17 July 2020 / Accepted: 26 July 2020 / Published: 29 July 2020
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Network disintegration has been an important research hotspot in complex networks for a long time. From the perspective of node attack, researchers have devoted to this field and carried out numerous works. In contrast, the research on edge attack strategy is insufficient. This paper comprehensively evaluates the disintegration effect of each structural similarity index when they are applied to the weighted-edge attacks model. Experimental results show that the edge attack strategy based on a single similarity index will appear limited stability and adaptability. Thus, motivated by obtaining a stable disintegration effect, this paper designs an edge attack strategy based on the ordered weighted averaging (OWA) operator. Through final experimental results, we found that the edge attack strategy proposed in this paper not only achieves a more stable disintegration effect on eight real-world networks, but also significantly improves the disintegration effect when applied on a single network in comparison with the original similarity index.

1. Introduction

In our daily life, infrastructure networks such as the power system, aviation and transportation networks play an indispensable role in maintaining the normal operation of human society. For a long time, the academic community has been committed to improving the robustness of infrastructure networks in facing various potential threats. So far, the research on network robustness has achieved rich results [1,2,3,4,5]. Correspondingly, for terrorist networks [6] and disease spreading network [7] that are considered to be harmful, how to effectively destroy these networks has given birth to the study of network disintegration. The ultimate goal of studying the network disintegration is to obtain the optimal attack strategy to the nodes or edges in the network [8]. Unfortunately, the problem of finding the optimal set of key nodes or edges to destroy has been proved to be a non-deterministic polynomial-time (NP) hard problem [9,10]. Obviously, for the consideration of the calculation cost, it is more practical to find an effective attack strategy than the optimal one. An effective attack strategy should have both acceptable computational complexity and disintegration effect. The relative size of giant components is often used to evaluate the disintegration effect during the attack. The faster the size of giant components decreases, the more effective the attack strategy is.
Numerous studies have focused on the node-based attack strategy [11,12,13,14,15], the research on edge attack strategy only attracted a little attention. On the one hand, the edge of the network usually plays the role of transmitting information or load, and maintaining the connectivity of the network. The researchers used the load model of cascading failures to investigate the performance of the small-world network subject to deliberate attacks on node and edge. The results show that the edge attacks can result in larger cascading failures than node attacks [16]. On the other hand, in real-world networks, the node vulnerable to attack are often well protected, while the edge is a relatively easy target for attackers. For example, several representative blackout events are all triggered by line breakdown [17]. Based on the aforementioned two motivations, we believe that the edge attack strategy deserves a careful investigation. Researchers have launched concrete research on edge attack strategy based on edge importance. The importance of an edge can be quantified by the self-topological properties or the information of endpoints [18]. Considering the information such as the degree, the betweenness, and the harmonic closeness of nodes, Hao et al. proposed fourteen edge attack strategies [19]. Yin et al. adopted the edge betweenness as the weight of an edge, and explored the weighted-edge attack strategy with incomplete information [20]. Inspired by the weak tie phenomenon, the bridgeness index considers that the edges between larger cliques play a significant role in maintaining global connectivity [21].
Recently, based on the structural similarity index of link prediction, Qi et al. calculated the dissimilarity between the endpoints, which provided a new idea for finding the key edges [22]. For an NP-hard problem, the similarity index can give a heuristic solution with acceptable time consumption. However, the results of key edges identification vary greatly among networks with different structural characteristics [22], which may limit the stability and adaptability of the edge attack strategy based on the similarity index. As stated in He and Liu [23], ordered weighted averaging (OWA) operator is such a method which can effectively reduce the variance of similarity-based link prediction algorithm and improve the stability of link predictor. In order to select and organize these indices more reasonably, Wu et al. employed a typical metric precision to evaluate the performance of each index and filtered the indices with poor performance [24]. Simulations prove that the integrated learning and fusion algorithm are effective in solving the problem of link prediction, with the satisfactory effect [25]. Nevertheless, there is no relevant research on the combination of the OWA operator and edge attack strategy. Additionally, the effect of attacking the edges with different properties on network reliability is different [26]. Deng et al. have analyzed the nodes’ tendency of the optimal disintegration strategy [27]. Extending to the edge attack strategy, it is necessary to explore the relationship between the order of attacked edges and the disintegration effect.
In this paper, we synthetically evaluate the disintegration effect of 19 structural similarity indices under three representative edge attack sequences, revealing that only a few indices can achieve acceptable edge attack effects which can be divided into two categories according to their behaviors under different attack sequences. We further find that the stability and adaptability of the edge attack strategy based on a single index are very limited. Based on the experiments above, drawing on the idea of integrating similarity indices in link prediction, an edge attack strategy based on ordered weighted averaging (OWA) operator integration is proposed. The results on eight real-world networks suggest that compared with a single index, the edge attack strategy based on OWA operator integration uses the complementarity of different similarity indices to achieve a more stable and comprehensive disintegration effect. Additionally, we are surprised to find that by applying the OWA operator on a single network, the disintegration effect can be significantly better than any single index.
The article is organized as follows. In Section 2, under different attack sequences, we evaluate the disintegration effect of each structural similarity index when they are applied to the weighted-edge attacks model. In Section 3, we adopt the ordered weighted averaging operator to fuse the best performance indices on different networks, and propose an edge attack strategy based on OWA operator. In Section 4, an experimental comparison of the proposed edge attack strategy is conducted, and the reasons for its stability are analyzed. Finally, the conclusions are given in Section 5.

2. Evaluating the Performance of Structural Similarity Index Under Edge Attack Strategy

Before making the strategy of edge attack based on the OWA operator, we need to evaluate the performance of each similarity index in the preparation stage, and select the indices with excellent performance for fusion. There are 19 structural similarity indices that are considered in this paper. When we extend them to the level of edge attack strategy, we need to consider the impact of attack sequence and network structure on the performance of these indices.

2.1. Weighted-Edge Attacks Model Based on Structural Similarity Index

Complex networks can be presented by an undirected graph G V , E , in which V is the set of nodes, and E is the set of edges. Let N = | V | be the number of nodes and W = | E | be the number of edges, respectively. Denote by A G = a i j N × N the adjacency matrix of G, in which a i j = a j i = 1 once v i and v j are connected. Besides, let the diagonal matrix D be the degree matrix of G, where the diagonal elements correspond to the degrees of each vertex.

2.1.1. Weight of Edge

Assume e x y is the edge connecting nodes x and y. According to the above discussion, in order to facilitate the test and selection of indices, we define the scores s x y of structural similarity indices as the weight of edge and record it as w x y .
After the weight of the edge is determined, we will introduce three typical attack sequences based on the edge weight.

2.1.2. Three Typical Weighted-Edge Attacks Sequences

With the decrease of the edge weight, the difference between the endpoints becomes larger. This difference may help to find the key edge in the network, but it also may not be suitable to measure the importance of the edge. Previous studies have shown that under several indices, removing the edges with lower weight may cause more serious damage to the connectivity of the network [22]. However, will they perform better in other attack sequences? Based on this problem, this paper considers the influence of the edge attack sequence. With the help of three different edge attack sequences, we find out the excellent performance indices and the corresponding attack sequence, which provides the basis for the subsequent development of an effective edge attack strategy.
We consider three attack sequences for weighted edges in the network, which are:
i Highest Edge Weight First (HEWF): Edges are eliminated by the descending order of the weight w x y , which means that the edge with larger weight will be removed preferentially.
ii Lowest Edge Weight First (LEWF): Edges are eliminated by the ascending order of the weight w x y , which means that the edge with smaller weight will be removed preferentially.
iii Average Edge Weight First (AEWF): Edges near average weight will be eliminated preferentially. We denote the average weight w . Let w = w 1 , w 2 , w 3 , w W be the weight sequence. Denoted by θ x y = | w x y w | the deviation value of the weight of edge e x y from the average weight. Therefore, edges near average weight will be removed preferentially, which means that edges are removed by the ascending order of θ x y .

2.1.3. Evaluation Metrics

So far, we have defined the edge weight and the weighted-edge attack sequences. In general, if an index is effective, the network will disintegrate much faster when we remove the edges successively in one of the weighted-edge attacks sequences.
To visually observe the impact of removing edges, we can use the relative size of giant components to describe the process of network disintegration.
S = m N ,
where N is the total number of nodes in the network, m is the size of the maximal connected component after removing a fraction of the edges. The more obvious the trend of decaying of the giant components as the edge is removed, the better the effect of using this index to attack the network.
To measure the disintegration effect in detail, we apply the measure R, which evaluates the size of the largest component during a target attack on edges [28]. As the edge deleting fraction f increases, the network will eventually collapse, until the size of the largest component reaches 1 (i.e., all nodes in the network are isolated nodes). The smaller the R is, the more efficient disintegration effect is. The definition of R is as follows:
R = 1 W f = 1 / W 1 S f ,
where W is the total number of edges and S f is the relative size of giant component after removing f W largest edges. The normalization factor 1 / W makes disintegration effect of networks with different sizes comparable.
This measure captures the network response to any fraction of edge remove. Apparently, if a structural similarity index is helpful to enhance edge attack, its R should be relatively small. We remark that some indices have large R no matter in which attack sequence, that is to say, they are invalid.

2.2. Index Performance Evaluation

This subsection describes the numerical simulations performed under three typical edge attack sequences to reveal the effectiveness of 19 structural similarity indices in promoting the network collapse. In these simulations, eight real-world networks are employed to verify the effectiveness of these indices.
See Appendix A for the definition of 19 structural similarity indices.

Experiment on Different Networks

All of the eight real-world networks are undirected and unweighted. For the case of multiple connected components, we only consider the largest one. Including Dolphins (friendship network) [29], Weaver (animal social network) [30], FWFB (food chain network) [31], Jazz (musician network) [32], C.elegans (neural network) [33], USAir (airline network) [34], NS (scientific collaboration network) [35] and Political blogs (hyper links between blogs) [36]. The basic properties of these systems are shown in Table 1.
Figure 1 shows the performance of each structural similarity index under different attack sequences on eight networks. The smaller value of the R, the more destructive the weighted-edge attack strategy based on the structural similarity index is. To facilitate the reader to visually compare the R values of indices under three attack sequences, we use a stacked bar plot to display.
The results indicate that not all similarity indices can significantly improve the effect of edge attack, which answers the question we raised in the previous content—whether all indices can effectively find the key edge in the network? The result is clearly that only a few individual indices have such capabilities.
Moreover, the attack sequence will affect the behavior of the index. It can be found from Figure 2 that these indices can be roughly classified into two categories according to their behaviors. The indices such as Average Commute Time (ACT), Local Path, Katz, Leicht–Holme–Newman (LHN), Resource Allocation (RA) and Preferential Attachment (PA) tend to perform better under LEWF, corresponding to Figure 2a,c–n,p–q, indicating that when we attack the edge with a lower weight, the network connectivity will be more damaged. In some articles, this tendency is thought to be related to the “weak tie phenomenon” in social networks. For Random Walk with Restart (RWR), Local Random Walk (LRW), Superposed Random Walk (SRW) and Matrix Forest Index (MFI), which are classified as the second category, corresponding to Figure 2b,p,r,s, they have more advantages under HEWF. Out of our expectation, there are few indices that tend to choose the AEWF attack sequence, which is shown in Figure 2 that the value of R1 or R2 is always the smallest. The value of R3, which represents the AEWF attack sequence, is usually between R1 and R2.
As shown in Figure 2, LEWF has an absolute advantage on the NS and Weaver networks, which is reflected in that the minimum value of all indices except PA on these two networks is R1 (marked with a blue triangle). We notice that Leicht–Holme–Newman Index (LHNII), MFI, RWR, LRW, SRW exhibit abnormal behavior. Not only is the optimal attack sequence unexpectedly transformed from HEWF to LEWF (the value of the blue dotted line in Figure 2b drops sharply on NS and Weaver networks), but also the disintegration effect is better than ACT which has been performing well under LEWF (e.g., R1 values on NS and Weaver networks in Figure 2b are lower than those in Figure 2a). This transformation and the improvement of the disintegration effect may be related to the network structure properties.
To find out the reasons behind this abnormal behavior, we explore whether there is a certain relationship between the disintegration effect of edge attack strategy based on structural similarity index and network structure. In Table 1, in addition to several common network structure properties, we also consider a measure of network topology heterogeneity called the normalized entropy of the rank distribution. Wu et al. confirmed that this heterogeneity of topology is valuable for the study of invulnerability of complex networks [37]. For example, the heterogeneity leads to scale-free networks are robust against random attacks but fragile to intentional attacks. Therefore, quantitative measurement and analysis of the heterogeneity of network topology are of great significance to the study of the relationship between the disintegration effect and network structure.
The entropy of rank distribution and normalized entropy of rank distribution are defined as follows:
E Q = r = 1 N Q r ln Q r = ln r = 1 N d r r = 1 N d r ln d r r = 1 N d r ,
N E Q = E Q max E Q E Q max E Q min = 1 ln 4 N 1 / 2 E Q ln 4 N 1 / 2 ln N .
Q r and d r are rank distribution and degree-rank function of graphs respectively. Please refer to the original paper for their definitions [37]. Obviously, the maximum value of E Q is E Q max = ln N obtained for d 1 = d 2 = = d N . Note that d r > 0 and the values of d r are all integers, so the minimum value of E Q is E Q min = ln 4 N 1 / 2 and occurs when d 1 = N 1 , d 2 = = d N = 1 .
We use Kendall’s tau correlation coefficient to determine the relationship between the 19 structural similarity indices’ disintegration effect R and the network structure properties. Kendall’s tau is a commonly used coefficient in mathematical statistics, mainly in measuring the statistical value of the correlation between two variables. From the previous analysis, we can see that the disintegration effect under LEWF is most obviously affected by the network structure, so we sort each index in descending order of its R value and get rank A. At the same time, according to rank A, the corresponding network structure properties are recorded in rank B.
For the pair of networks i and j, a i and a j in rank A are the R values of an index on this two networks, b i and b j in rank B are a structural property of this two networks. If both a i > a j and b i > b j , or if both a i < a j and b i < b j , then we think they are concordant, and discordant versa. The formula for Kendall’s tau is:
τ = N 1 N 2 1 2 N N 1 ,
where N 1 is the number of concordant network pairs, N 2 is the number of discordant pairs, and N is the total number of the networks (eight networks are used in this paper). Obviously, the range of Kendall’s tau value is from −1 to 1. If the absolute value of Kendall’s tau between two ranks of a structural similarity index is larger, it means that the positive or negative correlation between the disintegration effect of this index and a network structural property is stronger. When Kendall’s tau = 0, there is no correlation between the two ranks and the disintegration effect of index is independent of the network structural property.
It can be seen from Table 2 that the disintegration effect of LHNII, MFI, RWR, LRW and SRW has a stronger positive correlation with the average degree, while a stronger negative correlation with the average shortest path length. This indicates that the R value of these indices are likely to decrease when the average degree gets smaller, or increase when the average shortest path length gets larger. The connection between the nodes in the network with a large average degree and small average shortest path length is closer, which may be the reason for the poor disintegration effect of these indices. Common Neighbors (CN), Local Path and Katz are defined based on the number of paths between two endpoints. These indices cannot effectively distinguish the key edges in the network when the clustering coefficient is small. Therefore, their disintegration effect is negatively related to the clustering coefficient. As for the ACT index based on average commuting time, unlike the above indices, it is more likely to be affected by the network heterogeneity. To sum up, the disintegration effect of the index largely depends on the network structure. A typical example is that under the LEWF attack sequence, the disintegration effect of ACT on the Dolphins network is much better than RWR, but on the NS network, the performance of RWR suddenly improves and surpasses ACT. In Figure 3, we mark the first 10% of the edges that are removed preferentially under the two indices in red, visualizing the impact of the network structure on the disintegration effect of the two indices.
From Figure 3, we can find that the damage degree of edge attack to network connectivity is related to network structure. ACT tends to remove the edge between external nodes and internal nodes, while RWR tends to remove the edge between internal nodes. For the Dolphins network, there are many redundant paths between the internal nodes. Removing a small number of edges between the internal nodes will not cause serious damage to the network connectivity. On the contrary, the external nodes with a small degree are more vulnerable. If the same proportion of edges are removed, ACT will produce more isolated nodes than RWR, thus causing greater damage to network connectivity. For the NS network, communities in the network are connected by a few edges. RWR can cause serious damage to global connectivity by removing these edges, while ACT ignores the edges between internal nodes. Therefore, the disintegration effect of RWR on NS network is much better than ACT.
In terms of definition, a single structural similarity index is like a detector only sensitive to the edge with a specific structure, so it is easy to find the edge with a similar structure in the network but ignore the edge with other structures. Suppose that the index is sensitive to the edge with structure A and the key edge which plays an important role in maintaining network connectivity has structure B. When A and B are similar, the index can quickly discover the edges with a similar structure to the key edge in the network thus improving the disintegration effect of edge attack. If there is a deviation between A and B, it is difficult to detect the key edge, resulting in a poor disintegration effect. We call the deviation between A and B as the “blind area” of the structural similarity index. If only a single index is used to develop the edge attack strategy, the “blind area” will limit the stability and adaptability of the disintegration effect.

3. Edge Attack Strategy Based on Ordered Weighted Averaging Operator

The goal of this paper is to obtain an edge attack strategy with stable disintegration effect under various network structures. In Section 2, we evaluate the disintegration effect of each structural similarity index when they are applied to the weighted-edge attacks model. The results show that most of the indices achieve the optimal disintegration effect under the edge attack sequence of Lowest Edge Weight First (LEWF). Moreover, we find that there is a “blind area” in the edge attack strategy based on a single index and limits the stability and adaptability of the disintegration effect.
Inspired by the idea of assembling similarity indices, this paper adopts the method of ordered weighted averaging (OWA) operator to fuse the indices with the best performance on different networks and proposes an edge attack strategy based on ordered weighted averaging operator. The underlying idea is to eliminate the influence of “blind area” by comprehensively considering the importance measurement of multiple indices to the edge. The combination of indices will produce more complementarity and a more stable disintegration effect.

3.1. OWA Operator

OWA operator was firstly proposed by Yager as a general information aggregation technology to aggregate multicriteria to form an overall decision function [38]. He et al. designed a link prediction integration algorithm based on OWA operator [23]. This algorithm fuses nine structural similarity indices based on local information, and solves the problem that local information-based algorithm often has poor stability in link prediction for the social network.
Given n individual similarity indices, the OWA operator is a mapping F : R n R with an associated weight vector w = w 1 , w 2 , , w n , which represents the weights of indices. The n-dimensional OWA operator is written as
F a 1 , a 2 , , a n = i = 1 n w i b i ,
where a i denotes the score given by the ith index, b i is the ith value of a 1 , a 2 , , a n according to some ranking criterion, and w i is the ith weight that represents the contribution of the corresponding individual index to a final result.
He et al.’s work demonstrated that O’Hagan’s maximum entropy method (MEM) [39] is an effective method to determine the weight vector of OWA operator. MEM is to solve the constrained nonlinear optimization model as
M a x i m i z e D i s p w = n w i ln w i s . t . o r n e s s w = α = 1 n 1 n n i w i n w i = 1 , w i 0 , 1 , i = 1 , 2 , , n .
where D i s p ( w ) characterizes the extent to which all the indices are equally used in the aggregation process, while o r n e s s ( w ) measures the extent to which the aggregation is like an “or” operation. The weight vector can be adjusted by changing the optimism level factor α .

3.2. Edge Attack Strategy Based on OWA Operator

In order to make the edge attack strategy more effective, we have evaluated the performance of each index on promoting the disintegration effect in Section 2. LEWF is adopted as the edge attack sequence and the best performance indices on eight networks are selected to prepare for fusion, including ACT, Cos+ and Katz.
We need to standardize the structure similarity indices selected for fusion to be able to locate the weight of the edges in the interval [0,1]. Let S N x y A C T , S N x y C o s + , S N x y K a t z be the normalizations of S x y A C T , S x y Cos + and S x y K a t z , the normalized structure similarity indices can be obtained through Equation (8):
S N x y = S x y S x y min S x y max S x y min .
Then, the edge weight of network is calculated by the structure similarity index ensemble method based on OWA operator. We denote the weight of edge connecting nodes x and y as S x y O W A , which is calculated as follows:
S x y O W A = i = 1 3 w i · S N x y i .
S N x y A C T , S N x y C o s + , and S N x y K a t z are arranged in descending order according to performance, and the performance of ACT is better than other two indices. We think it is reasonable that S N x y A C T obtains the higher weight, because in Section 2, the R value of ACT is the smallest in most networks, which shows that ACT is reliable in judging the importance of edge in most cases, so it should get higher weight. For convenience, this approach is named EAS OWA (Edge attack strategy based on OWA operator) in this paper.

4. Experimental Comparison and Analysis

In this section, we test the disintegration effect of edge attack strategy based on OWA operator. The optimal weights of MEM corresponding to 13 different optimal level factors (i.e., α = 0.50, 0.60, 0.70, 0.80, 0.90, 0.91, 0.92, 0.93, 0.94, 0.95, 0.96, 0.97 and 0.98) are solved respectively by using LINGO software. The R value of EAS OWA with different associated weights being evaluated on eight networks. There is no particular reason for the selection of α , which is only used to check the impact of this parameter on the performance of EAS OWA .
The results in Figure 4 show that the selection of parameter α has different effects on the performance of EAS OWA on eight networks. The larger the parameter α is, the more emphasis is placed on the individual index at the top of the ranking. With the increase of α , the R value of EAS OWA in Dolphins and Celegans networks decreased significantly, but it increased in NS and Weaver networks.
In order to verify the effectiveness of EAS OWA , as a comparison, we introduce two commonly used methods to evaluate the importance of edge in maintaining network connectivity.
  • Edge betweenness centrality [40]. Edge-betweenness centrality reflects the ratio of the number of shortest paths between pairs of nodes passing through the edge to the total number of shortest paths between all node pairs, defined as
    C E = s t σ s t E σ s t ,
    where σ s t is the number of shortest paths from node s to node t, and σ s t E is the number of shortest paths from s to t that pass through edge E.
  • Bridgeness [21]. Edges shared by dfferent communities are critical in connecting the network. Accordingly, the Bridgeness is defined as
    B E = S x S y S E ,
    where S x and S y are the clique sizes of nodes x and y, respectively. S E is the clique size of edge E. A fully connected subgraph with k nodes is called a clique of size k.
Note that unlike the LEWF edge attack sequence used in this paper, edges are removed in descending order of the weight under Edge betweenness centrality or Bridgeness. At the same time, the edge attack strategy based on the original structure similarity index is also considered to compare the performance of the OWA index and the original index.
Figure 5 shows the change curve of the relative size of giant components and the R values under six edge attack strategies.
Compared with the traditional methods, the edge attack strategy based on structural similarity index causes more damage to network connectivity. However, there is a serious disadvantage, which has been pointed out in Section 2, the single structural similarity index is limited by the “blind area” and the disintegration effect is instable. For example, the disintegration effect of ACT in Figure 5c–f,i is the best among the three structural similarity indices, but it suddenly becomes the worst in Figure 5b,g. Meanwhile, different “blind area” also bring complementarity between different indices. Cos+ has a very satisfactory disintegration effect in Figure 5b,g, and Katz performs better than ACT in Figure 5a.
Compared with a single index, the edge attack strategy based on OWA operator integration uses the complementarity of different similarity indices to achieve a more stable and comprehensive disintegration effect. Not only in Figure 5g, the disintegration effect of EAS OWA is greatly improved compared with ACT, but also in Figure 5c–f,i, EAS OWA still has the same optimal disintegration effect as ACT.
As a typical example of stabilizing the disintegration effect through complementarity among indices, in Figure 5b, where the disintegration effect of ACT and Cos+ is quite the opposite. The former is limited by “blind area”, which mistakenly judges ordinary edge as key edge, resulting in the maximum value of R. The latter can accurately find the key edge in the network, so the R value is the smallest.
Therefore, we assume that the first 10% of the edges in the LEWF attack sequence of Cos+ are the key edges, represented by pentagram star, and mark the corresponding positions of these edges in the attack sequence of ACT and EAS OWA , as shown in Figure 6a. Similarly, the first 10% of the edges in the LEWF attack sequence of ACT are assumed to be ordinary edges, represented by inverted triangles, and the corresponding positions of these edges in the attack sequence of Cos+ and EAS OWA are marked out, as shown in Figure 6b.
In Figure 6a, the first 10% of the edges in the Cos+ attack sequence are all key edges, 91 in total, which will be removed, preferentially in the edge attack strategy. The result shows that ACT cannot recognize these key edges effectively. Only 25 key edges fall into the first 10% of the ACT attack sequence. With the same fraction f, the number of key edges removed by ACT is far less than Cos+, resulting in a larger R value. After the fusion of the OWA operator, the number of key edges within the first 10% of EAS OWA attack sequence is 45, which is 20 more than ACT. It is obvious from Figure 6a that the positions of key edges in EAS OWA not only move forward as a whole, but also distribute more intensively in the front segment.
In Figure 6b, the first 10% of the edges in the ACT attack sequence are ordinary edges, 91 in total, which are not as important as the key edges in maintaining network connectivity. If the ordinary edges occupy the priority removed position, the attack effect will be reduced. Most of the ordinary edges are assigned higher weights in Cos+, indicating that their structural features are quite different from the key edges. After OWA operator fusion, the number of ordinary edges in the first 10% of EAS OWA attack sequence is 65, which is 26 fewer than ACT. From Figure 6b, the positions of ordinary edges in EAS OWA move backward as a whole and partially move to a position other than 10%.
On the one hand, Cos+ is not limited by the “blind area” of ACT and can accurately identify key edges. On the other hand, Cos+ will correct the wrong judgment that ACT recognizes ordinary edges as key edges. Therefore, compared with ACT, the first 10% attack sequence of EAS OWA increased 20 key edges and reduced 26 ordinary edges, which stabilized the disintegration effect.
In addition to making the disintegration effect more stable, the result in Figure 5e shows that the disintegration effect of EAS OWA is further improved compared with the single index with the best disintegration effect. This unexpected improvement is also confirmed in Figure 5c,d. This phenomenon inspires us to explore whether the disintegration effect will be improved by using OWA operator to fuse the best performance indices on a single network. In fact, each index can be regarded as a classifier to distinguish the key edges from the ordinary edges. Through the combination of multiple effective classifiers, we can get better classification results. By controlling the weight vector of OWA operator, different combinations can be adjusted.
Throughout the paper, we mainly show the results of three representative networks: FWFB, Celegans and NS by figures as examples. The three indices with the minimum R value on each network and their attack sequences are listed as follows.
  • FWFB: ACT (under LEWF), SRW (under HEWF) and RWR (under HEWF).
  • Celegans: ACT (under LEWF), SRW (under HEWF) and RWR (under HEWF).
  • NS: Cos+ (under LEWF), RWR (under LEWF) and Jaccard (under LEWF).
Based on the original OWA operator ensemble model, a new ensemble model is proposed to integrate the indices under different attack sequences.
S x y O W A = i = 1 3 c i · w i · S N x y i c i = 1 , if index i is under LEWF c i = 1 , if index i is under HEWF ,
where the coefficient c i represents the type of attack sequence. After multiplying the attack sequence under HEWF by the coefficient c i , it can be converted into the attack sequence under LEWF.
The results in Figure 7 show that the edge attack strategy based on OWA operator integration can improve the effect of disintegration on a single network. We find that the curves of EAS OWA declines faster than a single similarity index, especially in the two networks of FWFB and NS. The area between two curves in each subgraph demonstrates the improvement of the effect of network disintegration due to the OWA operator.

5. Conclusions

From the perspective of edge attack, this paper systematically studies the performance of 19 structural similarity indices on the real-world network, taking into account the impact of attack sequence and network structure on the disintegration effect of the index. The results show that the stability and generalization ability of edge attack strategy based on a single index are poor. On this basis, we design an edge attack strategy based on ordered weighted average (OWA) operator integration. Experimental results on eight real-world networks validate that our method not only obtains better stability and adaptability, but also can be used to improve the disintegration effect on a single network.
At present, the research on the disintegration strategy of complex networks has been extended to multi-layer networks, heterogeneous networks and interdependent networks. Next, we will study the edge attack strategy on the above networks in our future work.
In addition, the work of our paper is from the perspective of the attacker, without considering potential opponent information. In fact, opponents may adopt corresponding defense strategies. Therefore, in future work, we need to use game theory to provide a suitable framework for modeling the confrontations between the attacker and defender [41,42,43,44,45].

Author Contributions

Y.F., C.Z. and H.L. participated in analysis, interpretation and manuscript preparation. B.R. verified the feasibility of the methods. Y.Y. visualized the experimental results. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation (NNSF) of China under Grant Nos. 61603406 and 61403411.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Appendix A

In this paper, the structural similarity indices we used to define the edge weight w x y are classified into three categories: local similarity indices, global indices and the quasi-local indices.
Local similarity indices:
(1) Common Neighbors (CN). For a node x, let Γ x denote the set of neighbors of x. The similarity of two nodes x and y is defined as the number of neighborhood overlap which can be simply calculated as
S x y C N = | Γ x Γ y |
(2) Salton Index [46]. Let k x denote the degree of node x. The index is defined as
S x y S a l t o n = | Γ x Γ y | k x k y
(3) Jaccard Index [47]. More than 100 years ago, Jaccard proposed this index, which is defined as
S x y J a c c a r d = | Γ x Γ y | | Γ x Γ y |
(4) Sørensen Index [48]. It is mainly applied to ecological data research. The formula is as follows
S x y S r e n s e n = 2 | Γ x Γ y | k x + k y
(5) Hub Promoted Index (HPI) [49]. It is used to quantitatively describe the topological similarity of each pair of reactants in metabolic networks, defined as
S x y H P I = | Γ x Γ y | min k x , k y
(6) Hub Depressed Index (HDI). Similar to the HPI index, except that the denominator takes the maximum degree value of the two endpoints, and is defined as
S x y H D I = | Γ x Γ y | max k x , k y
(7) Leicht–Holme–Newman Index (LHNI) [50]. It is defined as
S x y L H N I = | Γ x Γ y | k x k y
where it assigns higher similarity to node pairs that have more common neighbors.
(8) Preferential Attachment Index (PA). The probability of a new connection between nodes x and y is proportional to the product of k x and k y .
S x y P A = k x k y
(9) Adamic–Adar Index (AA) [51]. The idea of this index is that the contribution of less connected neighbors is greater than more connected neighbors, so the former should be assigned higher weight, and is defined as
S x y A A = z Γ x Γ y 1 log k z
(10) Resource Allocation Index (RA) [52]. This index is inspired by the network resource allocation process [53], which is defined as
S x y R A = z Γ x Γ y 1 k z
Global similarity indices:
(11) Katz Index [54]. This index considers all paths of the network, and the contribution of higher-order paths becomes smaller as the parameter β decreases and is defined as
S x y K a t z = l = 1 β l · | p a t h s x y l | = β A x y + β 2 A 2 x y + β 3 A 3 x y +
(12) Leicht–Holme–Newman Index (LHN-II) [50]. This index is defined as
S x y L H N I I = ϕ A S + ψ I = ψ I ϕ A 1 = ψ I + ϕ A + ϕ 2 A 2 + ,
where ϕ and ψ are adjustable parameters.
(13) Average Commute Time (ACT). This index measures the similarity of each pair of nodes by the average number of steps that random walk particles starting from node x to node y. This index is defined as
S x y A C T = 1 l x x + + l y y + 2 l x y + ,
where l x y + represents the element corresponding to the position of the x-th row and y-th column in the matrix L + . The matrix L + can be obtained in terms of the pseudoinverse of the Laplacian matrix, L L = D A .
(14) Random Walk with Restart (RWR). It assumes that random walk particles return to the initial position with a certain probability at each step. The RWR index is thus defined as
S x y R W R = q x y + q y x ,
where q x y represents the probability this random walker locates at node y in the steady state.
(15) Cosine based on L + (Cos+) [55]. This index is an inner-product-based measure. In the Euclidean space spanned by v x = Λ 1 2 U T e x , where U is an orthonormal matrix made of the eigenvectors of L + ordered in the decreasing order of the corresponding eigenvalue λ x , Λ = diag λ x , e x is an N × 1 vector with the x-th element equal to 1 and others all equal to 0, and T is the matrix transposition, the pseudoinverse of the Laplacian matrix are the inner products of the node vectors, l x y + = v x T v y . Accordingly, the cosine similarity is defined as the cosine of the node vectors.
S x y Cos + = cos x , y + = v x T v y | v x | · | v y | = l x y + l x x + · l y y + .
(16) Matrix Forest Index (MFI) [56]. Based on the matrix forest theory, this index is defined as
S = I + α · L 1 , α > 0 .
Quasi-local indices:
(17) Local Path Index (LP) [52,57]. In order to make the distinction between node pairs more obvious, the LP index further considers the third-order paths on the basis of the Common Neighbors.
S L P = A 2 + α A 3 ,
where α is an adjustable parameter and A is adjacency matrix of the network. Clearly, this index degenerates to CN when α = 0 .
(18) Local Random Walk (LRW) [58]. To measure the similarity between nodes x and y, a random walker is initially put on node x and thus the initial density vector π x 0 = e x . This density vector evolves as π x t + 1 = P T π x t for t 0 . The LRW index at time step t is thus defined as
S x y L R W t = q x π x y t + q y π y x t ,
where q is the initial configuration function.
(19) Superposed Random Walk (SRW) [58]. It is defined as
S x y S R W t = τ = 1 t S x y S R W τ = τ = 1 t q x π x y τ + q y π y x τ .
On the basis of LRW, the value of SRW is obtained by adding the step t and its previous result. This index gives the neighboring nodes more chance to connect to the target node, taking full account of the local characteristics of many real network connections.

References

  1. Shargel, B.; Sayama, H.; Epstein, I.R.; Bar-Yam, Y. Optimization of Robustness and Connectivity in Complex Networks. Phys. Rev. Lett. 2003, 90, 068701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Huang, X.; Gao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Robustness of interdependent networks under targeted attack. Phys. Rev. E 2011, 83, 065101. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Gao, J.; Buldyrev, S.; Havlin, S.; Stanley, H. Robustness of a Network of Networks. Phys. Rev. Lett. 2010, 107, 195701. [Google Scholar] [CrossRef] [PubMed]
  4. Shang, Y. Subgraph Robustness of Complex Networks Under Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 821–832. [Google Scholar] [CrossRef]
  5. Safaei, F.; Yeganloo, H.; Akbar, R. Robustness on topology reconfiguration of complex networks: An entropic approach. Math Comput Simul 2020, 170, 379–409. [Google Scholar] [CrossRef]
  6. Li, G.; Hu, J.; Song, Y.; Yang, Y.; Li, H. Analysis of the Terrorist Organization Alliance Network Based on Complex Network Theory. IEEE Access 2019, 7, 103854–103862. [Google Scholar] [CrossRef]
  7. Xia, C.; Wang, L.; Sun, S.; Wang, J. An SIR model with infection delay and propagation vector in complex networks. Nonlinear Dyn. 2012, 69, 927–934. [Google Scholar] [CrossRef]
  8. Deng, Y.; Wu, J.; Jin Tan, Y. Optimal attack strategy of complex networks based on tabu search. Physica A 2016, 442, 74–81. [Google Scholar] [CrossRef]
  9. Johner, N.; Grimaldi, C.; Maeder, T.; Ryser, P. Optimal percolation of disordered segregated composites. Phys. Rev. E 2009, 79, 020104. [Google Scholar] [CrossRef] [Green Version]
  10. Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef] [Green Version]
  11. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Bellingeri, M.; Cassi, D.; Vincenzi, S. Efficiency of attack strategies on complex model and real-world networks. Physica A 2014, 414, 174–180. [Google Scholar] [CrossRef] [Green Version]
  13. Nie, T.; Guo, Z.; Zhao, K.; Lu, Z.M. New attack strategies for complex networks. Physica A 2015, 424, 248–253. [Google Scholar] [CrossRef]
  14. Li, Q.; Liu, S.Y.; Yang, X.S. Neighborhood information-based probabilistic algorithm for network disintegration. Expert Syst. Appl. 2020, 139, 112853. [Google Scholar] [CrossRef]
  15. Qi, M.; Bai, Y.; Li, X.; Deng, H.; Wang, T. Optimal Disintegration Strategy in Multiplex Networks under Layer Node-Based Attack. Appl. Sci. 2019, 9, 3968. [Google Scholar] [CrossRef]
  16. Bao, Z.; Cao, Y.; Ding, L.; Wang, G. Comparison of cascading failures in small-world and scale-free networks subject to vertex and edge attacks. Physica A 2009, 388, 4491–4498. [Google Scholar] [CrossRef]
  17. Wang, J.W.; Rong, L.L. Robustness of the western United States power grid under edge attack strategies due to cascading failures. Saf. Sci. 2011, 49, 807–812. [Google Scholar] [CrossRef]
  18. Xie, F.; Cheng, S.; Chen, D.; Zhang, G. Cascade-based attack vulnerability in complex networks. J. Tsinghua Univ. Sci. Technol. 2011, 51, 1252–1257. [Google Scholar]
  19. Hao, Y.; Jia, L.; Wang, Y. Edge attack strategies in interdependent scale-free networks. Physica A 2020, 540, 122759. [Google Scholar] [CrossRef]
  20. Yin, Y.; Liu, Q.; Zhang, C.; Zhou, J. Survivability analysis of weighted-edge attacks on complex networks with incomplete information. Physica A 2019, 531, 120957. [Google Scholar] [CrossRef]
  21. Cheng, X.Q.; Ren, F.X.; Shen, H.W.; Zhang, Z.K.; Zhou, T. Bridgeness: A local index on edge significance in maintaining global connectivity. J. Stat. Mech. Theory Exp. 2010, 2010, P10011. [Google Scholar] [CrossRef] [Green Version]
  22. Qi, M.; Tan, S.Y.; Deng, H.; Wu, J. Evaluating link significance in maintaining network connectivity based on link prediction. Chaos 2019, 29, 083120. [Google Scholar] [CrossRef] [PubMed]
  23. He, Y.L.; Liu, J.N.; Hu, Y.X.; Wang, X.Z. OWA operator based link prediction ensemble for social network. Expert Syst. Appl. 2015, 42, 21–50. [Google Scholar] [CrossRef]
  24. Wu, M.; Wu, S.; Zhang, Q.; Xue, C.; Kan, H.; Shao, F. Enhancing link prediction via network reconstruction. Physica A 2019, 534, 122346. [Google Scholar] [CrossRef]
  25. Li, K.; Tu, L.; Chai, L. Ensemble-model-based link prediction of complex networks. Comput. Netw. 2020, 166, 106978. [Google Scholar] [CrossRef]
  26. Wang, J.W.; Rong, L.L. Vulnerability of Effective Attack on Edges in Scale-Free Networks due to Cascading Failures. Int. J. Mod. Phys. C 2009, 20, 1291–1298. [Google Scholar] [CrossRef]
  27. Deng, Y.; Wu, J.; Xiao, Y.; Li, Y. Efficient disintegration strategies with cost constraint in complex networks: The crucial role of nodes near average degree. Chaos 2018, 28, 061101. [Google Scholar] [CrossRef]
  28. Zeng, A.; Liu, W. Enhancing network robustness against malicious attacks. Phys. Rev. E 2012, 85, 066130. [Google Scholar] [CrossRef] [Green Version]
  29. Newman, M.E.J.; Girvan, M. Finding and evaluating community structure in networks. Phys. Rev. E 2004, 69. [Google Scholar] [CrossRef] [Green Version]
  30. Van Dijk, R.E.; Kaden, J.C.; Argüelles-Ticó, A.; Dawson, D.A.; Burke, T.; Hatchwell, B.J. Cooperative investment in public goods is kin directed in communal nests of social birds. Ecol. Lett. 2014, 17, 1141–1148. [Google Scholar] [CrossRef] [Green Version]
  31. Ulanowicz, R.; Bondavalli, C.; Egnotovich, M. Network Analysis of Trophic Dynamics in South Florida Ecosystem, FY 97: The Florida Bay Ecosystem; Ref. No. [UMCES]CBL 97-075; United States Geological Service Biological Resources Division: Coral Gables, FL, USA, 1998; pp. 98–123.
  32. Gleiser, P.; Danon, L. Community Structure in Jazz. Adv. Complex Syst. 2003, 6, 565–573. [Google Scholar] [CrossRef] [Green Version]
  33. Watts, D.J.; Strogatz, H.S. Collective dynamics of ’small world’ networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef] [PubMed]
  34. Lü, L.; Zhou, T. Link prediction in complex networks: A survey. Physica A 2011, 390, 1150–1170. [Google Scholar] [CrossRef] [Green Version]
  35. Newman, M.E.J. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E 2006, 74. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. Adamic, L.A.; Glance, N. The Political Blogosphere and the 2004 U.S. Election: Divided They Blog. In Proceedings of the 3rd International Workshop on Link Discovery (LinkKDD05), Chicago, IL, USA, 21–24 August 2005; Association for Computing Machinery: New York, NY, USA, 2005; pp. 36–43. [Google Scholar] [CrossRef]
  37. Wu, J.; Yue-Jin, T.; Deng, H.Z.; Da-Zhi, Z. Normalized entropy of rank distribution: A novel measure of heterogeneity of complex networks. Chin. Phys. 2007, 16, 1576. [Google Scholar] [CrossRef]
  38. Yager, R. On ordered weighted averaging aggregation operators in multicriteria decisionmaking. IEEE Trans. Syst. Man Cybern. Syst. 1988, 18, 183–190. [Google Scholar] [CrossRef]
  39. O’Hagan, M. Aggregating template or rule antecedents in real-time expert systems with fuzzy set logic. In Proceedings of the Twenty-Second Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 31 October–2 November 1988; Volume 2, pp. 681–689. [Google Scholar]
  40. Freeman, L. A Set of Measures of Centrality Based on Betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  41. Goyal, P.; Batra, S.; Singh, A. A literature review of security attack in mobile ad-hoc networks. Int. J. Comput. Appl. 2010, 9, 11–15. [Google Scholar] [CrossRef]
  42. Dziubiński, M.; Goyal, S. Network design and defence. Games Econ. Behav. 2013, 79, 30–43. [Google Scholar] [CrossRef] [Green Version]
  43. Goyal, S.; Vigier, A. Attack, defence, and contagion in networks. Rev. Econ. Stud. 2014, 81, 1518–1542. [Google Scholar] [CrossRef]
  44. Goyal, S.; Jabbari, S.; Kearns, M.; Khanna, S.; Morgenstern, J. Strategic network formation with attack and immunization. In Proceedings of the 12th International Conference on Web and Internet Economics, Montreal, QC, Canada, 11–14 December 2016; pp. 429–443. [Google Scholar]
  45. Zeng, C.; Ren, B.; Li, M.; Liu, H.; Chen, J. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective. Chaos 2019, 29, 083129. [Google Scholar] [CrossRef] [PubMed]
  46. Salton, G.; McGill, M.J. Introduction to Modern Information Retrieval; McGraw-Hill, Inc.: New York, NY, USA, 1986. [Google Scholar]
  47. Jaccard, P. Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. Soc. Vaud. Sci. Nat. 1901, 37, 547–579. [Google Scholar]
  48. Sørensen, T.; Sørensen, T.; Sørensen, T.; SORENSEN, T.; Sorensen, T.; Sorensen, T.; Biering-Sørensen, T. A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on Danish commons. Biol. Skar. 1948, 5, 1–34. [Google Scholar]
  49. Ravasz, E.; Somera, A.L.; Mongru, D.A.; Oltvai, Z.N.; Barabási, A.L. Hierarchical Organization of Modularity in Metabolic Networks. Science 2002, 297, 1551–1555. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  50. Leicht, E.A.; Holme, P.; Newman, M.E. Vertex similarity in networks. Phys. Rev. E 2006, 73, 026120. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  51. Adamic, L.A.; Adar, E. Friends and neighbors on the web. Soc. Netw. 2003, 25, 211–230. [Google Scholar] [CrossRef] [Green Version]
  52. Zhou, T.; Lü, L.; Zhang, Y.C. Predicting missing links via local information. Eur. Phys. J. B 2009, 71, 623–630. [Google Scholar] [CrossRef] [Green Version]
  53. Ou, Q.; Jin, Y.D.; Zhou, T.; Wang, B.H.; Yin, B.Q. Power-law strength-degree correlation from resource-allocation dynamics on weighted networks. Phys. Rev. E 2007, 75, 021102. [Google Scholar] [CrossRef] [Green Version]
  54. Katz, L. A new status index derived from sociometric analysis. Psychometrika 1953, 18, 39–43. [Google Scholar] [CrossRef]
  55. Fouss, F.; Pirotte, A.; Renders, J.M.; Saerens, M. Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation. IEEE Trans. Knowl. Data Eng. 2007, 19, 355–369. [Google Scholar] [CrossRef]
  56. Chebotarev, P.; Shamis, E. The matrix-forest theorem and measuring relations in small social groups. arXiv 2006, arXiv:math/0602070. [Google Scholar]
  57. Lü, L.; Jin, C.H.; Zhou, T. Similarity index based on local paths for link prediction of complex networks. Phys. Rev. E 2009, 80, 046122. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  58. Liu, W.; Lü, L. Link prediction based on local random walk. EPL 2010, 89, 58007. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Comparison of the disintegration effect of 19 structural similarity indices under three typical attack sequences in eight real-world networks. The eight real-world networks are (a) Dolphins, (b) Weaver, (c) FWFB, (d) Jazz, (e) Celegans, (f) USAir, (g) NS and (h) PB. Three different color bars in the graph represent the R values of three edge attack sequences respectively. Because of R 0 , 1 , the upper bound of R will not exceed 3.
Figure 1. Comparison of the disintegration effect of 19 structural similarity indices under three typical attack sequences in eight real-world networks. The eight real-world networks are (a) Dolphins, (b) Weaver, (c) FWFB, (d) Jazz, (e) Celegans, (f) USAir, (g) NS and (h) PB. Three different color bars in the graph represent the R values of three edge attack sequences respectively. Because of R 0 , 1 , the upper bound of R will not exceed 3.
Entropy 22 00830 g001
Figure 2. The R value of each similarity index under three attack sequences on eight networks. R1, R2 and R3 represent the R value under LEWF, HEWF and AEWF attack sequences respectively. (as) show the results of each similarity index respectively.
Figure 2. The R value of each similarity index under three attack sequences on eight networks. R1, R2 and R3 represent the R value under LEWF, HEWF and AEWF attack sequences respectively. (as) show the results of each similarity index respectively.
Entropy 22 00830 g002
Figure 3. First 10% of the edges removed by edge attack strategy based on Average Commute Time (ACT) and Random Walk with Restart (RWR). (a,c) The edges removed preferentially by edge attack strategy based on ACT. (b,d) The edges removed preferentially by edge attack strategy based on RWR.
Figure 3. First 10% of the edges removed by edge attack strategy based on Average Commute Time (ACT) and Random Walk with Restart (RWR). (a,c) The edges removed preferentially by edge attack strategy based on ACT. (b,d) The edges removed preferentially by edge attack strategy based on RWR.
Entropy 22 00830 g003
Figure 4. The disintegration effect of EAS OWA under different optimism level factor. Orness represents the value of optimistic level factor. The larger the value of Orness is, the larger is the first value of ordered weighted averaging (OWA) weight vector.
Figure 4. The disintegration effect of EAS OWA under different optimism level factor. Orness represents the value of optimistic level factor. The larger the value of Orness is, the larger is the first value of ordered weighted averaging (OWA) weight vector.
Entropy 22 00830 g004
Figure 5. Comparison of the disintegration effects of six edge attack strategies. We choose the EAS OWA with α = 0.91. f is the fraction of removed edges in the network and S is the relative size of giant components. (ah) correspond to the disintegration effects of six edge attack strategies on eight real-world networks, respectively.
Figure 5. Comparison of the disintegration effects of six edge attack strategies. We choose the EAS OWA with α = 0.91. f is the fraction of removed edges in the network and S is the relative size of giant components. (ah) correspond to the disintegration effects of six edge attack strategies on eight real-world networks, respectively.
Entropy 22 00830 g005
Figure 6. The positions of two types edge in Lowest Edge Weight First (LEWF) attack sequence in NS network. We choose the EAS OWA with α = 0.91. f is the fraction of removed edges in the network and LEWF attack sequence is to remove edges in ascending order of edge weight. (a) The positions of the key edges in LEWF attack sequence, represented by pentagram star; (b) the positions of the ordinary edges in LEWF attack sequence, represented by the inverted triangle.
Figure 6. The positions of two types edge in Lowest Edge Weight First (LEWF) attack sequence in NS network. We choose the EAS OWA with α = 0.91. f is the fraction of removed edges in the network and LEWF attack sequence is to remove edges in ascending order of edge weight. (a) The positions of the key edges in LEWF attack sequence, represented by pentagram star; (b) the positions of the ordinary edges in LEWF attack sequence, represented by the inverted triangle.
Entropy 22 00830 g006
Figure 7. The disintegration effect of EAS OWA on three typical networks. To highlight the improvement, the figure adds the disintegration effect of the best similarity index on each network as a comparison. Areas covered in cyan represent the “improved area”. f is the fraction of removed edges in the network and S is the relative size of giant components. (a) The disintegration effect of EAS OWA with α = 0.6 on FWFB network; (b) The disintegration effect of EAS OWA with α = 0.6 on Celegans network; (c) The disintegration effect of EAS OWA with α = 0.5 on NS network.
Figure 7. The disintegration effect of EAS OWA on three typical networks. To highlight the improvement, the figure adds the disintegration effect of the best similarity index on each network as a comparison. Areas covered in cyan represent the “improved area”. f is the fraction of removed edges in the network and S is the relative size of giant components. (a) The disintegration effect of EAS OWA with α = 0.6 on FWFB network; (b) The disintegration effect of EAS OWA with α = 0.6 on Celegans network; (c) The disintegration effect of EAS OWA with α = 0.5 on NS network.
Entropy 22 00830 g007
Table 1. The structure properties and normalized entropy of rank distribution values of eight networks. Structure properties include network size N, edge number E, average degree k , average shortest path length d , assortative coefficient r, clustering coefficient C and normalized entropy of rank distribution  N E Q .
Table 1. The structure properties and normalized entropy of rank distribution values of eight networks. Structure properties include network size N, edge number E, average degree k , average shortest path length d , assortative coefficient r, clustering coefficient C and normalized entropy of rank distribution  N E Q .
NetworkNE k d rC NE Q
Dolphins621595.133.36−0.040.300.1275
Weaver1173045.194.460.060.660.1412
FWFB128207532.421.78−0.110.330.0633
Jazz198274227.702.240.020.630.1041
C.elegans297214814.462.46−0.160.310.1296
USAir332212612.812.74−0.210.750.3528
NS3799144.826.04−0.080.800.1083
PB12221671427.362.74−0.220.360.2418
Table 2. Kendall’s tau correlation coefficient between the disintegration effect of 19 structural similarity indices and network structure properties. The symbol of the number in the table indicates positive and negative correlation, and the value indicates correlation strength. Bold italics represent the disintegration effect of structural similarity index has a strong correlation with the network structure property.
Table 2. Kendall’s tau correlation coefficient between the disintegration effect of 19 structural similarity indices and network structure properties. The symbol of the number in the table indicates positive and negative correlation, and the value indicates correlation strength. Bold italics represent the disintegration effect of structural similarity index has a strong correlation with the network structure property.
ACTRWRKatzLocalPathCNSaltonJaccardSørensonHPI
k 0.38890.88890.50000.50000.44440.61110.61110.61110.7778
d −0.4444−0.8333−0.5556−0.5556−0.5000−0.6667−0.6667−0.6667−0.8333
r0.1111−0.3889−0.1111−0.1111−0.0556−0.2222−0.2222−0.2222−0.1667
C−0.5000−0.2222−0.6111−0.6111−0.6667−0.5000−0.5000−0.5000−0.3333
N E Q −0.6111−0.1111−0.3889−0.3889−0.4444−0.2778−0.2778−0.2778−0.3333
HDILHNAARAPALHNIIMFICos+LRWSRW
k 0.61110.83330.55560.55560.22220.83330.83330.66670.77780.8333
d −0.6667−0.8889−0.6111−0.6111−0.2778−0.7778−0.7778−0.6111−0.7222−0.7778
r−0.2222−0.2222−0.1667−0.1667−0.0556−0.4444−0.4444−0.5000−0.5000−0.4444
C−0.5000−0.2778−0.5556−0.5556−0.3333−0.1667−0.1667−0.3333−0.2222−0.1667
N E Q −0.2778−0.2778−0.3333−0.3333−0.6667−0.0556−0.05560.00000.0000−0.0556

Share and Cite

MDPI and ACS Style

Feng, Y.; Ren, B.; Zeng, C.; Yang, Y.; Liu, H. Enhancing Edge Attack Strategy via an OWA Operator-Based Ensemble Design in Real-World Networks. Entropy 2020, 22, 830. https://doi.org/10.3390/e22080830

AMA Style

Feng Y, Ren B, Zeng C, Yang Y, Liu H. Enhancing Edge Attack Strategy via an OWA Operator-Based Ensemble Design in Real-World Networks. Entropy. 2020; 22(8):830. https://doi.org/10.3390/e22080830

Chicago/Turabian Style

Feng, Yuan, Baoan Ren, Chengyi Zeng, Yuyuan Yang, and Hongfu Liu. 2020. "Enhancing Edge Attack Strategy via an OWA Operator-Based Ensemble Design in Real-World Networks" Entropy 22, no. 8: 830. https://doi.org/10.3390/e22080830

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop