{"id":"https://openalex.org/W4283217275","doi":"https://doi.org/10.1109/infocom48880.2022.9796966","title":"Connectivity Maintenance in Uncertain Networks under Adversarial Attack","display_name":"Connectivity Maintenance in Uncertain Networks under Adversarial Attack","publication_year":2022,"publication_date":"2022-05-02","ids":{"openalex":"https://openalex.org/W4283217275","doi":"https://doi.org/10.1109/infocom48880.2022.9796966"},"language":"en","primary_location":{"id":"doi:10.1109/infocom48880.2022.9796966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796966","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025646850","display_name":"Jianzhi Tang","orcid":"https://orcid.org/0000-0003-3206-6912"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianzhi Tang","raw_affiliation_strings":["Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048486573","display_name":"Luoyi Fu","orcid":"https://orcid.org/0000-0001-7796-9168"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luoyi Fu","raw_affiliation_strings":["Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080158271","display_name":"Jiaxin Ding","orcid":"https://orcid.org/0000-0002-0009-9237"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxin Ding","raw_affiliation_strings":["Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034483183","display_name":"Xinbing Wang","orcid":"https://orcid.org/0000-0002-0357-8356"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinbing Wang","raw_affiliation_strings":["Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100428808","display_name":"Guihai Chen","orcid":"https://orcid.org/0000-0002-6934-1685"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guihai Chen","raw_affiliation_strings":["Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Dept. of Electronic Engineering, Computer Science,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Dept. of Electronic Engineering, Computer Science, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025646850"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.2843,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87596899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1399","last_page":"1408"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11303","display_name":"Bayesian Modeling and Causal Inference","score":0.9405999779701233,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/minimax","display_name":"Minimax","score":0.6559210419654846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.604445219039917},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.5939241647720337},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.49454542994499207},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.46484747529029846},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.42709192633628845},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25844132900238037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22858843207359314}],"concepts":[{"id":"https://openalex.org/C149728462","wikidata":"https://www.wikidata.org/wiki/Q751319","display_name":"Minimax","level":2,"score":0.6559210419654846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.604445219039917},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.5939241647720337},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.49454542994499207},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.46484747529029846},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.42709192633628845},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25844132900238037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22858843207359314},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom48880.2022.9796966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom48880.2022.9796966","pdf_url":null,"source":{"id":"https://openalex.org/S4363607980","display_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316083","display_name":"Tencent","ror":"https://ror.org/00hhjss72"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1500141786","https://openalex.org/W1991536882","https://openalex.org/W2024119396","https://openalex.org/W2042307930","https://openalex.org/W2082931591","https://openalex.org/W2092311864","https://openalex.org/W2108614537","https://openalex.org/W2110896443","https://openalex.org/W2126969025","https://openalex.org/W2136618432","https://openalex.org/W2155461593","https://openalex.org/W2167689112","https://openalex.org/W2234590065","https://openalex.org/W2339499519","https://openalex.org/W2493109494","https://openalex.org/W2761598111","https://openalex.org/W2809820716","https://openalex.org/W2899380713","https://openalex.org/W2952323957","https://openalex.org/W2962814610","https://openalex.org/W2963456718","https://openalex.org/W2999885064","https://openalex.org/W3005170244","https://openalex.org/W3096007442","https://openalex.org/W3120455462","https://openalex.org/W3139616807","https://openalex.org/W3178913901","https://openalex.org/W3182350536","https://openalex.org/W4232932184","https://openalex.org/W4236158019","https://openalex.org/W4300120313","https://openalex.org/W6676553512","https://openalex.org/W6684467626","https://openalex.org/W6785256374"],"related_works":["https://openalex.org/W4229078645","https://openalex.org/W1977345676","https://openalex.org/W4282032776","https://openalex.org/W2047552823","https://openalex.org/W4321606905","https://openalex.org/W3130445735","https://openalex.org/W2105110616","https://openalex.org/W2747930654","https://openalex.org/W2739658809","https://openalex.org/W3182145356"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,16,84,88,100,106,113,126,157,174,203,210,217,237,245,250,258,283,286],"problem":[4,116],"of":[5,87,105,112,143,167,177,265,285],"connectivity":[6,32,114,221],"maintenance":[7,33,115],"in":[8,34,213,223,252],"adversarial":[9],"uncertain":[10,36,54,144,162,224],"networks,":[11],"where":[12],"a":[13,52,57,69,77,140,198,253],"defender":[14,251],"prevents":[15],"largest":[17,89],"connected":[18,91],"component":[19,92],"from":[20,209,240],"being":[21],"decomposed":[22],"by":[23,50,119,201,249,257],"an":[24,35,65,135,178,207,232,262],"attacker.":[25],"In":[26],"contrast":[27],"with":[28,60,64,93,146,192],"its":[29,121],"deterministic":[30,214],"counterpart,":[31],"network":[37,55,276],"involves":[38],"additional":[39],"testing":[40,70,96,148],"on":[41,129,271],"edges":[42],"to":[43,75,82,155,173,188,216],"determine":[44],"their":[45],"existence.":[46],"To":[47,123],"this":[48],"end,":[49],"modeling":[51],"general":[53,78,161],"as":[56],"random":[58],"graph":[59],"each":[61],"edge":[62,204],"associated":[63],"existence":[66],"probability":[67,218],"and":[68,170,220,260,274],"cost,":[71],"our":[72],"goal":[73],"is":[74,117,153],"design":[76],"adaptive":[79,233],"defensive":[80,137,183],"strategy":[81,101,138,159],"maximize":[83],"expected":[85,95],"size":[86,169],"remaining":[90],"minimum":[94],"cost":[97],"and,":[98],"moreover,":[99],"should":[102],"be":[103],"independent":[104],"attacking":[107,280],"patterns.":[108],"The":[109],"computational":[110],"complexity":[111],"unraveled":[118],"proving":[120],"NP-hardness.":[122],"accurately":[124],"tackle":[125],"problem,":[127],"based":[128],"dynamic":[130],"programming":[131],"we":[132,229],"first":[133,196],"propose":[134],"optimal":[136,158,179],"for":[139,160],"specific":[141],"class":[142],"networks":[145,163,215],"uniform":[147],"costs.":[149],"Thereafter":[150],"multi-objective":[151],"optimization":[152],"adopted":[154],"generalize":[156],"through":[164,206],"weighted":[165],"sum":[166],"normalized":[168],"cost.":[171],"Due":[172],"prohibitive":[175],"price":[176],"strategy,":[180],"two":[181],"approximate":[182],"strategies":[184,288],"are":[185],"further":[186],"designed":[187],"pursue":[189],"decent":[190],"performance":[191,227],"quasilinear":[193],"complexity.":[194],"We":[195],"derive":[197],"heuristic":[199],"approach":[200],"quantifying":[202],"vulnerability":[205],"analogy":[208],"degree":[211,219],"centrality":[212],"weight":[222],"networks.":[225],"For":[226],"guarantee,":[228],"then":[230],"devise":[231],"greedy":[234],"policy":[235],"incorporating":[236],"minimax":[238],"rule":[239],"game":[241],"theory,":[242],"which":[243],"minimizes":[244],"possible":[246],"loss":[247],"suffered":[248],"worst-case":[254],"scenario":[255],"caused":[256],"attacker":[259],"has":[261],"approximation":[263],"ratio":[264],"(1":[266],"\u2212":[267],"1/e).":[268],"Extensive":[269],"experiments":[270],"both":[272],"synthetic":[273],"real-world":[275],"datasets":[277],"under":[278],"diverse":[279],"patterns":[281],"demonstrate":[282],"superiority":[284],"proposed":[287],"over":[289],"baselines.":[290]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
