{"id":"https://openalex.org/W4404812722","doi":"https://doi.org/10.1016/j.hcc.2024.100293","title":"Connectivity maintenance against link uncertainty and heterogeneity in adversarial networks","display_name":"Connectivity maintenance against link uncertainty and heterogeneity in adversarial networks","publication_year":2024,"publication_date":"2024-11-28","ids":{"openalex":"https://openalex.org/W4404812722","doi":"https://doi.org/10.1016/j.hcc.2024.100293"},"language":"en","primary_location":{"id":"doi:10.1016/j.hcc.2024.100293","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2024.100293","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.hcc.2024.100293","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025646850","display_name":"Jianzhi Tang","orcid":"https://orcid.org/0000-0003-3206-6912"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianzhi Tang","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, Suzhou 215005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, Suzhou 215005, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048486573","display_name":"Luoyi Fu","orcid":"https://orcid.org/0000-0001-7796-9168"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luoyi Fu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100753313","display_name":"Lei Zhou","orcid":"https://orcid.org/0000-0002-3123-5270"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhou","raw_affiliation_strings":["School of Oceanography, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"School of Oceanography, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034483183","display_name":"Xinbing Wang","orcid":"https://orcid.org/0000-0002-0357-8356"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinbing Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023919188","display_name":"Chenghu Zhou","orcid":"https://orcid.org/0000-0003-3331-2302"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210160793","display_name":"Institute of Geographic Sciences and Natural Resources Research","ror":"https://ror.org/04t1cdb72","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210160793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenghu Zhou","raw_affiliation_strings":["Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing 100101, China"],"affiliations":[{"raw_affiliation_string":"Institute of Geographic Sciences and Natural Resources Research, Chinese Academy of Sciences, Beijing 100101, China","institution_ids":["https://openalex.org/I4210160793","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025646850"],"corresponding_institution_ids":["https://openalex.org/I3923682"],"apc_list":{"value":1500,"currency":"USD","value_usd":1500},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500},"fwci":0.3564,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6423512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"5","issue":"3","first_page":"100293","last_page":"100293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6965752243995667},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.5905898809432983},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4525458514690399},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27499985694885254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2507142424583435}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6965752243995667},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.5905898809432983},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4525458514690399},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27499985694885254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2507142424583435}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.hcc.2024.100293","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2024.100293","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:06eba8d7c3cd45c2bd7ce665912461b5","is_oa":true,"landing_page_url":"https://doaj.org/article/06eba8d7c3cd45c2bd7ce665912461b5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"High-Confidence Computing, Vol 5, Iss 3, Pp 100293- (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.hcc.2024.100293","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.hcc.2024.100293","pdf_url":null,"source":{"id":"https://openalex.org/S4210186527","display_name":"High-Confidence Computing","issn_l":"2667-2952","issn":["2667-2952"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"High-Confidence Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1991536882","https://openalex.org/W2024119396","https://openalex.org/W2108614537","https://openalex.org/W2110896443","https://openalex.org/W2147479436","https://openalex.org/W2155461593","https://openalex.org/W2167689112","https://openalex.org/W2234590065","https://openalex.org/W2539783541","https://openalex.org/W2610267922","https://openalex.org/W2741818905","https://openalex.org/W2809624068","https://openalex.org/W2895829868","https://openalex.org/W2900032756","https://openalex.org/W2962259706","https://openalex.org/W2962814610","https://openalex.org/W2963456718","https://openalex.org/W2964253936","https://openalex.org/W2975800345","https://openalex.org/W3003536453","https://openalex.org/W3013936217","https://openalex.org/W3049091108","https://openalex.org/W3096007442","https://openalex.org/W3139616807","https://openalex.org/W3153783799","https://openalex.org/W3158560939","https://openalex.org/W3170118407","https://openalex.org/W3182350536","https://openalex.org/W3193494823","https://openalex.org/W3198181675","https://openalex.org/W3207634949","https://openalex.org/W4213170134","https://openalex.org/W4232932184","https://openalex.org/W4248385877","https://openalex.org/W4287704525","https://openalex.org/W4300120313","https://openalex.org/W6629787142","https://openalex.org/W6676553512","https://openalex.org/W6684467626","https://openalex.org/W6726546742","https://openalex.org/W6785256374","https://openalex.org/W6794561197","https://openalex.org/W6803363724","https://openalex.org/W6838607669","https://openalex.org/W6847360196","https://openalex.org/W6850108475"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"This":[0],"paper":[1],"delves":[2],"into":[3],"the":[4,14,21,65,74,104,108,113,121,126,134,137,152,187,197],"challenge":[5],"of":[6,16,23,68,107,115,125,136,156],"maintaining":[7],"connectivity":[8],"in":[9],"adversarial":[10,117],"networks,":[11],"focusing":[12],"on":[13,147,208],"preservation":[15],"essential":[17],"links":[18,69],"to":[19,58,97,151,195],"prevent":[20],"disintegration":[22],"network":[24,37,75],"components":[25],"under":[26],"attack.":[27],"Unlike":[28],"previous":[29],"approaches":[30],"that":[31,46,102,165,178],"assume":[32],"a":[33,42,77,99,175],"stable":[34],"and":[35,51,91,139,186,211],"homogeneous":[36],"topology,":[38],"this":[39],"study":[40],"introduces":[41],"more":[43],"realistic":[44],"model":[45,73],"incorporates":[47],"both":[48,209],"link":[49,60,82,180],"uncertainty":[50,54],"heterogeneity.":[52],"Link":[53],"necessitates":[55],"additional":[56],"probing":[57,89,122],"confirm":[59],"existence,":[61],"while":[62,119],"heterogeneity":[63],"reflects":[64],"varying":[66],"resilience":[67],"against":[70],"attacks.":[71],"We":[72,130],"as":[76],"random":[78],"graph":[79],"where":[80],"each":[81],"is":[83,96,174,189],"defined":[84],"by":[85,132],"its":[86],"existence":[87],"probability,":[88],"cost,":[90,123],"resilience.":[92],"The":[93,172],"primary":[94],"objective":[95],"devise":[98],"defensive":[100,144],"strategy":[101,145],"maximizes":[103],"expected":[105],"size":[106],"largest":[109],"connected":[110],"component":[111],"at":[112],"end":[114],"an":[116,142,190],"process":[118],"minimizing":[120],"irrespective":[124],"attack":[127,216],"patterns":[128],"employed.":[129],"begin":[131],"establishing":[133],"NP-hardness":[135],"problem":[138],"then":[140],"introduce":[141],"optimal":[143],"based":[146],"dynamic":[148],"programming.":[149],"Due":[150],"high":[153],"computational":[154],"cost":[155],"achieving":[157],"optimality,":[158],"we":[159],"also":[160],"develop":[161],"two":[162],"approximate":[163],"strategies":[164,219],"offer":[166],"efficient":[167],"solutions":[168],"within":[169],"polynomial":[170],"time.":[171],"first":[173],"heuristic":[176],"method":[177],"assesses":[179],"importance":[181],"across":[182,214],"three":[183],"heterogeneous":[184],"subnetworks,":[185],"second":[188],"adaptive":[191],"minimax":[192],"policy":[193],"designed":[194],"minimize":[196],"defender\u2019s":[198],"potential":[199],"worst-case":[200],"loss,":[201],"with":[202],"guaranteed":[203],"performance.":[204],"Through":[205],"extensive":[206],"testing":[207],"synthetic":[210],"real-world":[212],"datasets":[213],"various":[215],"scenarios,":[217],"our":[218],"demonstrate":[220],"significant":[221],"advantages":[222],"over":[223],"existing":[224],"methods.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
