An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem
Abstract
1. Introduction
- (i)
- We propose a novel multi-objective optimization problem named MO-SPCIP. Different from most previous studies that focus on the attacker’s perspective, the proposed problem addresses the practical needs of network defense. By shifting the analytical focus to the defender’s perspective, the proposed problem simultaneously aims to minimize the post-attack shortest path length, reduce the consumption of defense resources, and maximize the attacker’s resource expenditure. Further, we present the mathematical model of MO-SPCIP.
- (ii)
- We develop an enhanced MOEA named the IPLSEA. Problem-specific components, including a tailored initial solution generation method, a customized solution representation, and specialized genetic operators, as well as an IPLS, are reasonably incorporated into the multi-objective evolutionary algorithm framework. In particular, different from the traditional Pareto Local Search (PLS) that exhaustively explores all individuals on the Pareto front, we propose an adaptive mechanism and three neighborhood search operations to make the Pareto Local Search more selective and effective.
- (iii)
- We conduct comprehensive experiments to evaluate the performance of the IPLSEA. The results demonstrate that the IPLSEA outperforms state-of-the-art algorithms in terms of its convergence quality, solution diversity, and approximation to the true Pareto front. Furthermore, the algorithm enables more effective backup planning strategies and significantly enhances network resilience in the face of attacks.
2. Related Works
3. Problem Definition and Formulation
- (i)
- All problem data are fully known to both the attacker and the defender.
- (ii)
- The attacker acts first, selecting which links to interdict. Afterward, the defender applies the backup strategy.
- (iii)
- The interaction is modeled as a zero-sum game between attacker and defender.
- (iv)
- The game is played in a single round with no repetitions or learning.
4. Solution Approach
4.1. Framework of IPLSEA
Algorithm 1: Framework of IPLSEA |
Input: Network , population size , generations , crossover rate , mutation rate . Output: Pareto front solutions . 1: InitializeInitialize Population Nondominated sorting 0 2: 1 3: do 4: Genetic operation 5: ← ∪ 6: Nondominated sorting 7: ← ← 1 8: while + do 9: if = 1 then 10: ← Update 11: if then 12: ← IPLS 13: ← 14: Crowding distance 15: ← ∪ 16: ← 17: Sort 18: ← ∪ 19: ← , + 1/ |
4.2. Initial Solution Generation
4.3. Nondominated Sorting
Algorithm 2: Nondominated sorting |
Input: Population . Output: Set of Pareto fronts sorted by nondomination level. 1: for each in do 2: 3: 0 4: for each pair with do 5: if then 6: 7: 8: else if then 9: 10: 11: ← 12: for each in do 13: if = 0 then 14: 15: ← 1 16: while do 17: ← 18: for each do 19: for each do 20: 21: = 0 then 22: 23: ← 24: 25: return |
4.4. Genetic Operations
- (i)
- CrossoverThe algorithm will randomly select two parent individuals from the current population and perform the crossover operation based on these two parents. A preset crossover probability () is used to decide whether to perform the crossover operation. If the execution condition is satisfied, a uniform crossover is performed on the parent individuals. Otherwise, the two parent individuals will be directly copied as offspring individuals. An example of the crossover operation is in Figure 6. For each bit of the individual’s genes (i.e., the selection state of each link), the values of the corresponding bits are exchanged between Parent 1 and Parent 2 with a probability of 0.5 to construct two child individuals.
- (ii)
- MutationTo further increase the diversity of the population, we propose three kinds of mutation operations, including add_backup, remove_backup, and random_flip. The algorithm will randomly select one of the mutation operations each time during offspring generation. The illustrations of the three mutation operations are shown in Figure 7.
- add_backup
This operation randomly selects a link that is not currently backed up and attempts to add a backup to the current solution, while ensuring that the total resource constraint is not violated. Specifically, the operation traverses the set of non-backed-up links and filters out those candidate links that would still satisfy the resource constraints if included. A link from the filtered set is then randomly selected and added as a backup. This mutation operation could enhance the solution diversity and introduce local perturbations without violating the feasibility.- b.
- remove_backup
This operation randomly selects a currently backed-up link and reverses its status, removing the backup designation. It is a deterministic and computationally efficient operation. By recovering potentially over-allocated resources, it helps maintain solution feasibility and creates more space for subsequent optimization. This operator is particularly useful for escaping local optima by freeing up resources for more promising backup configurations.- c.
- random_flip
This operation creates a neighborhood solution by randomly selecting a link index in the solution structure and flipping its binary state (e.g., changing a 0 to 1 or a 1 to 0). Unlike the other two operations, this one does not check resource constraints, which allows it to introduce greater diversity into the population. It is especially effective during the early stages of the algorithm, when global exploration is critical for covering a diverse regions of the search space.
4.5. Improved Pareto Local Search
- heuristic_addThe heuristic_add operation leverages network topology information to guide the selection of backup links. It will add a key link that satisfies resource constraints to the current solution each time. To determine a reasonable key link, we define a scoring metric, as shown in Equation (13), where and are node degrees of the two nodes and is the resource cost of a feasible and non-backed-up key link. The degree of a node indicates the number of other nodes it is connected to (i.e., its connectivity). The key link with a higher degree will be preferred. The rationale behind this metric is that high-degree nodes often serve as critical network hubs intersecting multiple shortest paths, making their connecting links highly valuable for structural resilience. By accounting for both structural significance and resource efficiency, this operation aims to maximize the structural benefit per unit of resource, thereby improving the efficiency of the backup configuration.
- greedy_removeThe operation employs a greedy strategy to remove an existing backup link that contributes least to the network performance from a solution. Particularly, this operation will evaluate the impact of removing each existing backup link, where the impact is measured by the resulting increase in the shortest path length. Then, the link with minimal negative impact will be removed. This operation allows for the recovery of redundant resources while preserving the overall quality of the solution, creating space for further optimization.
- swap_backupThe swap_backup operation performs a state exchange by randomly selecting one backed-up link and one non-backed-up link, and swapping their backup statuses. This operation does not perform feasibility verification, but it ensures that total resource consumption remains constant. By exploring different resource configurations under a fixed resource budget, this operator enables the search to uncover better-performing solutions while preserving the underlying structure of the solution space, thereby introducing diversity without violating feasibility constraints.The framework of the IPLS is displayed in Algorithm 3. The inputs of the algorithm include Pareto front solutions , maximum iterations , and three specific neighborhood search operators . The output is an improved Pareto front . Initially, the algorithm will identify the solutions new to . Following the initialization, the search process iterates until reaching the maximum iteration count or no new solutions (lines 3–19). In each iteration, the algorithm performs the search operator in one by one on each new solution in (lines 4–6). If the obtained new solution is not dominated by any solutions in , it will be considered to be a potential and added to and for the next iteration. Meanwhile, the solutions in dominated by the new solution will be eliminated.
Algorithm 3: IPLS |
Input: Pareto front solutions , maximum iterations , neighborhood operators Output: Improved Pareto front . 1: Initialize: ← 1, ← Find solutions new to 2: while and do 3: ← 4: for each in do 5: for each do 6: ← 7: ← 8: for each do 9: if dominates (, ) then 10: ← 11: break 12: if then 13: for each do 14: if dominates (, ) then 15: 16: ← 17: 18: 19: ← 1 20: return |
5. Computational Experiments
5.1. Experimental Design
- (i)
- InstancesThis study employs four characteristic undirected network topologies as experimental scenarios, as shown in Table 2.
- Erdős–Rényi Random Network (ER)
The Erdős–Rényi (ER) network [43] is generated by connecting each pair of nodes with a uniform probability, resulting in a random graph where the degree distribution approximately follows a Poisson distribution. In this study, two ER network instances are constructed. The first instance, ER1, consists of 8 nodes with a connection probability of 0.5. The second instance, ER2, contains 20 nodes, also with a connection probability of 0.5. These random topologies provide a baseline for testing the algorithm performance in uniformly connected environments.- b.
- Barabási–Albert Scale-Free Network (BA)
The Barabási–Albert (BA) network [44] is built using a preferential attachment mechanism, where new nodes are more likely to connect to existing nodes with higher degrees. This results in a scale-free topology characterized by a power-law degree distribution. Two test instances are created for this study. In BA1, the network begins with a 3-node star, and 5 nodes are added sequentially, each forming 3 connections ( = 3). In BA2, the network starts with a 5-node star (node 0 as the hub), and 12 nodes are added with 2 to 4 connections per node ( ≈ 3 on average). These networks model real-world systems where hubs naturally emerge.- c.
- Watts–Strogatz Small-World Network (WS)
The Watts–Strogatz (WS) network [45] is constructed from a regular ring lattice, where each node is connected to its nearest neighbors, and a fraction of the links is randomly rewired with probability . This results in a small-world topology that combines high clustering with short average path lengths. Two instances are used. WS1 is a 7-node torus where each node connects to 4 neighbors ( = 4) with a rewiring probability of 0.3. WS2 is a 20-node torus with = 8 and = 0.3. These instances are used to evaluate the algorithm performance in networks with both local and global connectivity features.- d.
- Real-World Network
The real-world networks used in this study are derived from the standard Sioux Falls transportation network dataset and a highway subnetwork extracted from the entire Eastern Massachusetts network dataset (EMS) [46]. These networks preserve the original node–link structure and realistic link weights. They serve as practical benchmarks to evaluate the algorithm’s effectiveness under real-world topological and operational constraints, offering valuable insights into its applicability beyond synthetic network models.The initial and backup link weights of all networks are uniformly set to random integers between 1 and 12. In terms of the resource allocation, the interdicting resources and backup resources are configured in proportion according to the link weight at a ratio of 5:12 units. The incremental length after a link is interdicted is set to a random value between 1 and 5. For each instance, the total amount of backup resources is set to 30. - (ii)
- Performance MetricsTwo principal metrics are employed to evaluate the algorithm performance from complementary perspectives: the inverted generational distance (IGD) [47] for convergence assessment and hypervolume (HV) [48] for diversity measurement.
- IGD
The IGD quantifies the average minimum Euclidean distance between points on the true Pareto front () and solutions in the obtained set ():- b.
- HV
The HV measures the volume of the objective space dominated by the solution set with respect to a reference point : - (iii)
- Comparison Algorithms and Parameter SettingsThe comparison algorithms used in this study include three classical multi-objective evolutionary algorithms, i.e., NSGA-II [41], NSGA-III [49], and SPEA2 [50], and two state-of-the-art algorithms, i.e., the Hybrid Multi-Objective Modified-NSGA-II Variable Neighborhood Search (MO-NSGA-VNS) [14] and Dual-Population-based Constrained MOEAs (DPCPRA) [51].
5.2. Comparison Experiments
5.3. Ablation Experiments
5.4. Parameter Sensitivity Analysis
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
SPIP | Shortest-Path Network Interdiction Problem |
MO-SPCIP | Multi-Objective Shortest-Path Counter-Interdiction Problem |
MOEAs | Multi-Objective Evolutionary Algorithms |
IPLS | Improved Pareto Local Search |
IPLSEA | Improved Pareto Local Search-based Evolutionary Algorithm |
EMS | Eastern Massachusetts network dataset |
MO-NSGA-VNS | Hybrid Multi-Objective Modified-NSGA-II Variable Neighborhood Search |
DPCPRA | Dual-Population-based Constrained MOEAs |
References
- Smith, J.C.; Song, Y. A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 2020, 283, 797–811. [Google Scholar] [CrossRef]
- Israeli, E.; Wood, R.K. Shortest-path network interdiction. Netw. Int. J. 2002, 40, 97–111. [Google Scholar] [CrossRef]
- López-Lezama, J.M.; Galeano, J.C.C.; Trujillo, E.R. Assessment of the electric grid interdiction problem considering different network models. J. Appl. Sci. Eng. 2020, 20, 175–183. [Google Scholar]
- Sundar, K.; Mastin, A.; Garcia, M.; Bent, R.; Watson, J.-P. Exact and Heuristic Approaches for the Stochastic Nk Interdiction in Power Grids. In Proceedings of the 2024 18th International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), Auckland, New Zealand, 24–26 June 2024; pp. 1–6. [Google Scholar]
- Brown, G.G.; Carlyle, W.M.; Harney, R.C.; Skroch, E.M.; Wood, R.K. Interdicting a nuclear-weapons project. Oper. Res. 2009, 57, 866–877. [Google Scholar] [CrossRef]
- Michalopoulos, D.P.; Morton, D.P.; Barnes, J.W. Prioritizing network interdiction of nuclear smuggling. In Stochastic Programming: Applications in Finance, Energy, Planning and Logistics; World Scientific: Singapore, 2013; pp. 313–346. [Google Scholar]
- Xu, S.; Xia, Y.; Ouyang, M. Effect of resource allocation to the recovery of scale-free networks during cascading failures. Phys. A Stat. Mech. Its Appl. 2020, 540, 123157. [Google Scholar] [CrossRef]
- Johnston, M.; Lee, H.-W.; Modiano, E. A robust optimization approach to backup network design with random failures. IEEE/ACM Trans. Netw. 2014, 23, 1216–1228. [Google Scholar] [CrossRef]
- He, F.; Oki, E. Backup allocation model with probabilistic protection for virtual networks against multiple facility node failures. IEEE Trans. Netw. Serv. Manag. 2021, 18, 2943–2959. [Google Scholar] [CrossRef]
- Banner, R.; Orda, A. Designing Low-Capacity Backup Networks for Fast Restoration; IEEE: Piscataway, NJ, USA, 2010. [Google Scholar]
- Moshiri, M.; Safaei, F.; Samei, Z. A novel recovery strategy based on link prediction and hyperbolic geometry of complex networks. J. Complex Netw. 2021, 9, cnab007. [Google Scholar] [CrossRef]
- Caramia, M.; Dell’Olmo, P.; Caramia, M.; Dell’Olmo, P. Multi-objective optimization. In Multi-Objective Management in Freight Logistics: Increasing Capacity, Service Level, Sustainability, and Safety with Optimization Algorithms; Springer: Cham, Switzerland, 2020; pp. 21–51. [Google Scholar]
- Cheshmehgaz, H.R.; Haron, H.; Sharifi, A. The review of multiple evolutionary searches and multi-objective evolutionary algorithms. Artif. Intell. Rev. 2015, 43, 311–343. [Google Scholar] [CrossRef]
- Granata, D.; Sgalambro, A. A hybrid modified-NSGA-II VNS algorithm for the multi-objective critical disruption Path Problem. Comput. Oper. Res. 2023, 160, 106363. [Google Scholar] [CrossRef]
- Gao, X.; He, F.; Zhang, S.; Luo, J.; Fan, B. A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. J. Supercomput. 2024, 80, 1426–1463. [Google Scholar] [CrossRef]
- Bailey, M.D.; Shechter, S.M.; Schaefer, A.J. SPAR: Stochastic programming with adversarial recourse. Oper. Res. Lett. 2006, 34, 307–315. [Google Scholar] [CrossRef]
- Habboush, Y.; Yarrarapu, S.N.S.; Guzman, N. Infection control. In StatPearls [Internet]; StatPearls Publishing: Treasure Island, FL, USA, 2018. [Google Scholar]
- Zhang, J.; Zhuang, J.; Behlendorf, B. Stochastic shortest path network interdiction with a case study of Arizona–Mexico border. Reliab. Eng. Syst. Saf. 2018, 179, 62–73. [Google Scholar] [CrossRef]
- Kheirkhah, A.; Navidi, H.; Messi Bidgoli, M. A bi-level network interdiction model for solving the hazmat routing problem. Int. J. Prod. Res. 2016, 54, 459–471. [Google Scholar] [CrossRef]
- Wein, L.M.; Liu, Y. Analyzing a bioterror attack on the food supply: The case of botulinum toxin in milk. Proc. Natl. Acad. Sci. USA 2005, 102, 9984–9989. [Google Scholar] [CrossRef]
- Ghaffarinasab, N.; Atayi, R. An implicit enumeration algorithm for the hub interdiction median problem with fortification. Eur. J. Oper. Res. 2018, 267, 23–39. [Google Scholar] [CrossRef]
- Borrero, J.S.; Sauré, D.; Trigo, N. Optimal sequential stochastic shortest path interdiction. Eur. J. Oper. Res. 2025, 326, 641–655. [Google Scholar] [CrossRef]
- Bentoumi, I.; Furini, F.; Mahjoub, A.R.; Martin, S. Integer linear programming formulations for the maximum flow blocker problem. Eur. J. Oper. Res. 2025, 324, 742–758. [Google Scholar] [CrossRef]
- Scaparra, M.P.; Church, R.L. A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 2008, 35, 1905–1923. [Google Scholar] [CrossRef]
- Holzmann, T.; Smith, J.C. The shortest path interdiction problem with randomized interdiction strategies: Complexity and algorithms. Oper. Res. 2021, 69, 82–99. [Google Scholar] [CrossRef]
- Yang, J.; Borrero, J.S.; Prokopyev, O.A.; Sauré, D. Sequential shortest path interdiction with incomplete information and limited feedback. Decis. Anal. 2021, 18, 218–244. [Google Scholar] [CrossRef]
- Bochkarev, A.A.; Smith, J.C. Monte Carlo tree search for dynamic shortest-path interdiction. Networks 2024, 84, 398–419. [Google Scholar] [CrossRef]
- Ho, Y.; Carbajal, A.; Escamilla, L.; Pinar, A. Neuromorphic Monte Carlo Tree Search Methods for Shortest Path Interdiction. In Proceedings of the 2024 International Conference on Neuromorphic Systems (ICONS), Arlington, VA, USA, 30 July–2 August 2024; pp. 307–311. [Google Scholar]
- Huang, D.; Mao, Z.; Fang, K.; Chen, L. Solving the shortest path interdiction problem via reinforcement learning. Int. J. Prod. Res. 2023, 61, 31–48. [Google Scholar] [CrossRef]
- Ma, C.; Zuo, T.; Zhang, H.-F. Network shortest path interdiction problem based on generalized set coverage. IEEE Trans. Netw. Sci. Eng. 2023, 11, 2191–2203. [Google Scholar] [CrossRef]
- Royset, J.O.; Wood, R.K. Solving the bi-objective maximum-flow network-interdiction problem. Inf. J. Comput. 2007, 19, 175–184. [Google Scholar] [CrossRef]
- Ramirez-Marquez, J.E. Bi and tri-objective optimization in the deterministic network interdiction problem. Reliab. Eng. Syst. Saf. 2010, 95, 887–896. [Google Scholar] [CrossRef]
- Kolaee, M.H.; Al-e-Hashem, S.M.J.M.; Jabbarzadeh, A. A local search-based non-dominated sorting genetic algorithm for solving a multi-objective medical tourism trip design problem considering the attractiveness of trips. Eng. Appl. Artif. Intell. 2023, 124, 106630. [Google Scholar] [CrossRef]
- Lv, L.; Shen, W. An improved NSGA-II with local search for multi-objective integrated production and inventory scheduling problem. J. Manuf. Syst. 2023, 68, 99–116. [Google Scholar] [CrossRef]
- Luo, Q.; Wu, G.; Ji, B.; Wang, L.; Suganthan, P.N. Hybrid multi-objective optimization approach with Pareto local search for collaborative truck-drone routing problems considering flexible time windows. IEEE Trans. Intell. Transp. Syst. 2021, 23, 13011–13025. [Google Scholar] [CrossRef]
- Li, F.; Gao, L.; Shen, W. Surrogate-assisted multi-objective evolutionary optimization with Pareto front model-based local search method. IEEE Trans. Cybern. 2022, 54, 173–186. [Google Scholar] [CrossRef]
- Agrawal, A.; Ghune, N.; Prakash, S.; Ramteke, M. Evolutionary algorithm hybridized with local search and intelligent seeding for solving multi-objective Euclidian TSP. Expert Syst. Appl. 2021, 181, 115192. [Google Scholar] [CrossRef]
- Shan, X.G.; Zhuang, J. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliab. Eng. Syst. Saf. 2020, 195, 106683. [Google Scholar] [CrossRef]
- Chen, L.; Wang, Z.; Li, F.; Guo, Y.; Geng, K. A stackelberg security game for adversarial outbreak detection in the internet of things. Sensors 2020, 20, 804. [Google Scholar] [CrossRef] [PubMed]
- Liao, Z.; Shi, J.; Zhang, Y.; Wang, S.; Sun, Z. A survey of resilient coordination for cyber-physical systems against malicious attacks. arXiv 2024, arXiv:2402.10505. [Google Scholar] [CrossRef]
- Doerr, B.; Ivan, T.; Krejca, M.S. Speeding up the NSGA-II with a simple tie-breaking rule. In Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, PA, USA, 25 February–4 March 2025; pp. 26964–26972. [Google Scholar]
- Lust, T.; Teghem, J. Two-phase Pareto local search for the biobjective traveling salesman problem. J. Heuristics 2010, 16, 475–510. [Google Scholar] [CrossRef]
- Mohandas, K.; Suchecki, K.; Hołyst, J.A. Paradise-disorder transition in structural balance dynamics on Erdös-Rényi graphs. Phys. Rev. E 2025, 111, 024310. [Google Scholar] [CrossRef]
- Xie, F.; Zhao, Z.; Yang, P. Higher Order Preference on the Evolution of Cooperation on Barabási–Albert Scale-Free Network. In Proceedings of the International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, Guiyang, China, 24–26 July 2021; pp. 137–149. [Google Scholar]
- Alimohammadi, Y.; Işık, S.; Saberi, A. Local Limits of Small World Networks. arXiv 2025, arXiv:2501.11226. [Google Scholar]
- Transportation Networks for Research. Available online: https://github.com/bstabler/TransportationNetworks (accessed on 12 August 2024).
- Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
- Lopes, G.; Klamroth, K.; Paquete, L. A greedy Hypervolume Polychotomic Scheme for multiobjective combinatorial optimization. Comput. Oper. Res. 2025, 183, 107140. [Google Scholar] [CrossRef]
- Deb, K.; Jain, H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints. IEEE Trans. Evol. Comput. 2013, 18, 577–601. [Google Scholar] [CrossRef]
- Zitzler, E.; Laumanns, M.; Thiele, L. SPEA2: Improving the strength Pareto evolutionary algorithm. TIK Rep. 2001, 103. [Google Scholar] [CrossRef]
- Qiao, K.; Chen, Z.; Qu, B.; Yu, K.; Yue, C.; Chen, K.; Liang, J. A dual-population evolutionary algorithm based on dynamic constraint processing and resources allocation for constrained multi-objective optimization problems. Expert Syst. Appl. 2024, 238, 121707. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
Initial network without backup and attack | |
Set of nodes in | |
Set of links in | |
Set of all links constituted by the nodes in | |
Set of backup links, | |
Cost required to interdict link , | |
Delay of passing through link , | |
Increased delay of passing through link after it is interdicted, | |
Resources required to backup link , | |
Forward set of node , | |
Backward set of node , | |
Total affordable cost of interdiction | |
Total available amount of backup resources | |
Source node of the shortest path | |
Target node of the shortest path | |
if link is interdicted by the attacker, 0 otherwise | |
if link is chosen by the defender, 0 otherwise | |
if link is backed up, 0 otherwise |
Network | Number of Nodes | Number of Original Links | Number of Backupable Links |
---|---|---|---|
ER1 | 8 | 12 | 16 |
ER2 | 20 | 152 | 38 |
BA1 | 8 | 12 | 16 |
BA2 | 20 | 30 | 160 |
WS1 | 8 | 21 | 7 |
WS2 | 20 | 80 | 110 |
Sioux Falls | 23 | 38 | 215 |
Eastern Massachusetts | 74 | 129 | 2572 |
Algorithm | ||||
---|---|---|---|---|
NSGA-II | / | / | 0.8 | 0.3 |
NSGA-III | / | / | 0.8 | 0.3 |
SPEA2 | / | / | 0.8 | 0.3 |
DPCPRA | / | / | 0.8 | 0.3 |
MO-NSGA-VNS | / | / | 0.8 | 0.3 |
IPLSEA | 0.1 | 3 | 0.8 | 0.3 |
Network | NSGA-II | NSGA-III | SPEA2 | DPCPRA | MO-NSGA-VNS | IPLSEA | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | |
ER1 | 0.0178 | 0.0145 | 0.0059 | 0.0061 | 0.0013 | 0.0049 | 0.0012 | 0.0039 | 0.0000 | 0.0000 | 0.0000 | 0.0000 |
ER2 | 0.0811 | 0.0482 | 0.0711 | 0.0700 | 0.1236 | 0.0558 | 0.0760 | 0.0646 | 0.0575 | 0.0546 | 0.0350 | 0.0414 |
BA2 | 0.0898 | 0.0274 | 0.1341 | 0.0257 | 0.081 | 0.0243 | 0.079 | 0.0232 | 0.074 | 0.0163 | 0.0249 | 0.002 |
WS1 | 0.0172 | 0.0243 | 0.0256 | 0.0582 | 0.0384 | 0.0677 | 0.0222 | 0.0581 | 0.0000 | 0.0000 | 0.0000 | 0.0000 |
WS2 | 0.1542 | 0.0152 | 0.1212 | 0.0226 | 0.1097 | 0.0416 | 0.1021 | 0.0384 | 0.0874 | 0.0187 | 0.0725 | 0.0075 |
Sioux Falls | 0.1200 | 0.0133 | 0.1401 | 0.0037 | 0.1209 | 0.0540 | 0.0853 | 0.0527 | 0.0507 | 0.0104 | 0.0337 | 0.0160 |
EMS | 0.1978 | 0.0362 | 0.2055 | 0.0069 | 0.1492 | 0.0190 | 0.1607 | 0.0331 | 0.1378 | 0.0042 | 0.1321 | 0.0187 |
Network | NSGA-II | NSGA-III | SPEA2 | DPCPRA | MO-NSGA-VNS | IPLSEA | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | |
ER1 | 0.7385 | 0.0052 | 0.7411 | 0.0030 | 0.7445 | 0.0019 | 0.7447 | 0.0014 | 0.7450 | 0.0000 | 0.7450 | 0.0000 |
ER2 | 0.3136 | 0.0137 | 0.3047 | 0.0152 | 0.2936 | 0.0290 | 0.3042 | 0.0240 | 0.3070 | 0.0204 | 0.3152 | 0.0131 |
BA1 | 0.0756 | 0.0267 | 0.0746 | 0.0262 | 0.0795 | 0.0247 | 0.0814 | 0.0233 | 0.0931 | 0.0000 | 0.0931 | 0.0000 |
BA2 | 0.6820 | 0.0155 | 0.6738 | 0.0174 | 0.6928 | 0.0140 | 0.6934 | 0.0120 | 0.7000 | 0.0054 | 0.7244 | 0.0012 |
WS1 | 0.2553 | 0.0047 | 0.2516 | 0.0189 | 0.2480 | 0.0224 | 0.2522 | 0.0190 | 0.2587 | 0.0000 | 0.2587 | 0.0000 |
WS2 | 0.6803 | 0.0331 | 0.7230 | 0.0227 | 0.6911 | 0.0270 | 0.7135 | 0.0358 | 0.7484 | 0.0096 | 0.7569 | 0.0046 |
Sioux Falls | 0.7643 | 0.0099 | 0.7270 | 0.0046 | 0.7669 | 0.0643 | 0.8054 | 0.0610 | 0.8429 | 0.0197 | 0.8705 | 0.0112 |
EMS | 0.2423 | 0.0520 | 0.2358 | 0.0142 | 0.2669 | 0.0327 | 0.2706 | 0.0034 | 0.3154 | 0.0206 | 0.2967 | 0.0261 |
No. | Node to Node | Length | Cost | d | No. | Node to Node | Length | Cost | d |
---|---|---|---|---|---|---|---|---|---|
1 | 0, 1 | 11 | 5 | 1 | 16 | 4, 14 | 15 | 9 | 4 |
2 | 0, 2 | 8 | 8 | 1 | 17 | 5, 15 | 8 | 10 | 1 |
3 | 0, 3 | 11 | 9 | 1 | 18 | 6, 16 | 10 | 7 | 4 |
4 | 0, 4 | 13 | 5 | 4 | 19 | 7, 16 | 4 | 11 | 4 |
5 | 0, 5 | 6 | 6 | 2 | 20 | 8, 16 | 7 | 5 | 1 |
6 | 1, 6 | 8 | 7 | 3 | 21 | 9, 17 | 10 | 5 | 4 |
7 | 1, 7 | 4 | 8 | 4 | 22 | 10, 17 | 11 | 10 | 3 |
8 | 1, 8 | 9 | 8 | 3 | 23 | 11, 17 | 13 | 5 | 2 |
9 | 2, 8 | 13 | 10 | 3 | 24 | 12, 19 | 13 | 10 | 3 |
10 | 2, 9 | 7 | 6 | 1 | 25 | 13, 18 | 13 | 7 | 4 |
11 | 2, 10 | 6 | 6 | 4 | 26 | 14, 18 | 4 | 8 | 4 |
12 | 3, 10 | 5 | 11 | 4 | 27 | 15, 18 | 9 | 9 | 4 |
13 | 3, 11 | 12 | 9 | 4 | 28 | 16, 19 | 15 | 9 | 1 |
14 | 3, 12 | 7 | 5 | 4 | 29 | 17, 19 | 11 | 10 | 4 |
15 | 4, 13 | 8 | 9 | 3 | 30 | 18, 19 | 14 | 10 | 1 |
Algorithm | Mean | Std | Min | Max |
---|---|---|---|---|
NSGA-II | 0.0898 | 0.0274 | 0.0527 | 0.1451 |
NSGA-III | 0.1341 | 0.0257 | 0.0933 | 0.1896 |
SPEA2 | 0.0810 | 0.0232 | 0.0441 | 0.1181 |
DPCPRA | 0.0790 | 0.0243 | 0.0441 | 0.1451 |
MO-NSGA-VNS | 0.0740 | 0.0163 | 0.0573 | 0.1068 |
IPLSEA | 0.0249 | 0.0020 | 0.0230 | 0.0276 |
Algorithm | Mean | Std | Min | Max |
---|---|---|---|---|
NSGA-II | 0.6820 | 0.0155 | 0.6438 | 0.7056 |
NSGA-III | 0.6738 | 0.0174 | 0.6355 | 0.6960 |
SPEA2 | 0.6928 | 0.0120 | 0.6744 | 0.7114 |
DPCPRA | 0.6934 | 0.0140 | 0.6438 | 0.7114 |
MO-NSGA-VNS | 0.7000 | 0.0054 | 0.6908 | 0.7053 |
IPLSEA | 0.7244 | 0.0012 | 0.7228 | 0.7262 |
Average IGD Value | ||||
---|---|---|---|---|
0.1 | 1 | 0.8 | 0.3 | 0.0566 |
0.1 | 3 | 0.6 | 0.3 | 0.0570 |
0.1 | 3 | 0.8 | 0.1 | 0.0359 |
0.1 | 3 | 0.8 | 0.3 | 0.0255 |
0.1 | 3 | 0.8 | 0.5 | 0.0341 |
0.1 | 3 | 0.9 | 0.3 | 0.0277 |
0.1 | 5 | 0.8 | 0.3 | 0.0236 |
0.2 | 3 | 0.8 | 0.3 | 0.0368 |
0.3 | 3 | 0.8 | 0.3 | 0.0398 |
0.05 | 3 | 0.8 | 0.3 | 0.0297 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mao, C.; Gao, R.; Luo, Q.; Wu, G. An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics 2025, 13, 2683. https://doi.org/10.3390/math13162683
Mao C, Gao R, Luo Q, Wu G. An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics. 2025; 13(16):2683. https://doi.org/10.3390/math13162683
Chicago/Turabian StyleMao, Chenghui, Ronghuan Gao, Qizhang Luo, and Guohua Wu. 2025. "An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem" Mathematics 13, no. 16: 2683. https://doi.org/10.3390/math13162683
APA StyleMao, C., Gao, R., Luo, Q., & Wu, G. (2025). An Improved Pareto Local Search-Based Evolutionary Algorithm for Multi-Objective Shortest-Path Network Counter-Interdiction Problem. Mathematics, 13(16), 2683. https://doi.org/10.3390/math13162683