{"id":"https://openalex.org/W7148998456","doi":"https://doi.org/10.1109/tnse.2026.3680460","title":"Topology Linearization for Multi-Agent Systems Security: Mitigating Malicious Propagation via Path Decomposition","display_name":"Topology Linearization for Multi-Agent Systems Security: Mitigating Malicious Propagation via Path Decomposition","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7148998456","doi":"https://doi.org/10.1109/tnse.2026.3680460"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2026.3680460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3680460","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yan Liu","orcid":"https://orcid.org/0009-0007-0162-9168"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Liu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0007-0162-9168","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132858897","display_name":"Sujie Shao","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sujie Shao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3945-0706","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132899766","display_name":"Shaoyong Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaoyong Guo","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2033-8431","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chenyu Wang","orcid":"https://orcid.org/0000-0002-6527-2897"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Wang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6527-2897","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054433699","display_name":"Chao Yang","orcid":"https://orcid.org/0000-0001-7724-0385"},"institutions":[{"id":"https://openalex.org/I4210126065","display_name":"Shanghai Electric (China)","ror":"https://ror.org/0314qy595","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210126065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Yang","raw_affiliation_strings":["State Grid Liaoning Electric Power Company, Ltd. Information and Communication Branch, Shenyang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Liaoning Electric Power Company, Ltd. Information and Communication Branch, Shenyang, China","institution_ids":["https://openalex.org/I4210126065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132849139","display_name":"Zhibin Zang","orcid":null},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibin Zang","raw_affiliation_strings":["State Grid Information and Telecommunication Industry Group Company Ltd., Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Information and Telecommunication Industry Group Company Ltd., Beijing, China","institution_ids":["https://openalex.org/I17442442"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76262934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"8481","last_page":"8498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.2524999976158142,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.2524999976158142,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.09449999779462814,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.06019999831914902,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.6122000217437744},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.505299985408783},{"id":"https://openalex.org/keywords/decomposition","display_name":"Decomposition","score":0.4948999881744385},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.490200012922287},{"id":"https://openalex.org/keywords/linearization","display_name":"Linearization","score":0.4650000035762787},{"id":"https://openalex.org/keywords/controllability","display_name":"Controllability","score":0.42489999532699585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6312999725341797},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.6122000217437744},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.4948999881744385},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.490200012922287},{"id":"https://openalex.org/C11210021","wikidata":"https://www.wikidata.org/wiki/Q1520713","display_name":"Linearization","level":3,"score":0.4650000035762787},{"id":"https://openalex.org/C48209547","wikidata":"https://www.wikidata.org/wiki/Q1331104","display_name":"Controllability","level":2,"score":0.42489999532699585},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.42250001430511475},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2752000093460083},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2615000009536743},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2026.3680460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3680460","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2406220052","display_name":null,"funder_award_id":"62322103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"adoption":[2],"of":[3,24,133,141],"Large":[4],"Language":[5],"Model":[6],"(LLM)-based":[7],"Multi-Agent":[8],"Systems":[9],"(MAS)":[10],"is":[11,107],"hindered":[12],"by":[13,51],"severe":[14],"security":[15],"risks,":[16],"where":[17],"high-connectivity":[18],"topologies":[19],"facilitate":[20],"the":[21,34,68,129,139],"explosive":[22],"propagation":[23],"prompt":[25],"injections":[26],"and":[27,79,136],"hallucinations.":[28],"To":[29],"address":[30],"this,":[31],"we":[32],"propose":[33],"Chain-Type":[35],"Secure":[36],"Path":[37,83],"Reconstruction":[38],"Method":[39],"(C-SPRM),":[40],"a":[41,72,81],"topological":[42,111],"defense":[43],"framework":[44],"that":[45,95,125],"fundamentally":[46],"constrains":[47],"threat":[48],"lateral":[49],"movement":[50],"transforming":[52],"arbitrary":[53],"interaction":[54,155],"graphs":[55],"into":[56],"linearized":[57],"logical":[58],"execution":[59,93],"chains":[60],"based":[61],"on":[62],"path":[63],"decomposition":[64],"theory.":[65],"We":[66],"formulate":[67],"topology":[69,104],"reconstruction":[70],"as":[71],"Spatio-Temporal":[73],"Attack":[74],"Surface":[75],"(STAS)":[76],"minimization":[77],"problem":[78],"develop":[80],"Graph-to-Sequence":[82],"Decomposition":[84],"via":[85],"Reinforcement":[86],"Learning":[87],"(G2S-PDR)":[88],"model":[89],"to":[90,109,153],"generate":[91],"optimized":[92],"sequences":[94],"balance":[96],"concurrency":[97],"risks":[98],"against":[99],"latency.":[100],"Additionally,":[101],"an":[102],"adaptive":[103],"virtualization":[105],"mechanism":[106],"introduced":[108],"resolve":[110],"bottlenecks":[112],"in":[113],"high-degree":[114],"networks":[115],"like":[116],"star":[117],"or":[118],"fully":[119],"connected":[120],"graphs.":[121],"Experimental":[122],"results":[123],"demonstrate":[124],"C-SPRM":[126],"significantly":[127],"reduces":[128],"effective":[130],"blast":[131],"radius":[132],"malicious":[134],"agents":[135],"exponentially":[137],"increases":[138],"difficulty":[140],"attack":[142],"propagation,":[143],"achieving":[144],"superior":[145],"system":[146],"robustness":[147],"with":[148],"controllable":[149],"computational":[150],"overhead":[151],"compared":[152],"traditional":[154],"architectures.":[156]},"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-04-04T00:00:00"}
