{"id":"https://openalex.org/W4394898319","doi":"https://doi.org/10.1145/3650400.3650678","title":"Important Node Identification and Robustness of Complex Networks","display_name":"Important Node Identification and Robustness of Complex Networks","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4394898319","doi":"https://doi.org/10.1145/3650400.3650678"},"language":"en","primary_location":{"id":"doi:10.1145/3650400.3650678","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3650400.3650678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076077777","display_name":"Sichen Wang","orcid":"https://orcid.org/0009-0005-7138-7622"},"institutions":[{"id":"https://openalex.org/I3133134087","display_name":"Lanzhou Jiaotong University","ror":"https://ror.org/03144pv92","country_code":"CN","type":"education","lineage":["https://openalex.org/I3133134087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sichen Wang","raw_affiliation_strings":["Lanzhou Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Lanzhou Jiaotong University, China","institution_ids":["https://openalex.org/I3133134087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102963414","display_name":"Xiaodong Qian","orcid":"https://orcid.org/0000-0001-6425-7559"},"institutions":[{"id":"https://openalex.org/I3133134087","display_name":"Lanzhou Jiaotong University","ror":"https://ror.org/03144pv92","country_code":"CN","type":"education","lineage":["https://openalex.org/I3133134087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Qian","raw_affiliation_strings":["School of Economics &amp; Management, Lanzhou Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Economics &amp; Management, Lanzhou Jiaotong University, China","institution_ids":["https://openalex.org/I3133134087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076077777"],"corresponding_institution_ids":["https://openalex.org/I3133134087"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19828275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1666","last_page":"1671"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.7690365314483643},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7361576557159424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6447523832321167},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.6108119487762451},{"id":"https://openalex.org/keywords/crawling","display_name":"Crawling","score":0.49831604957580566},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.48230671882629395},{"id":"https://openalex.org/keywords/china","display_name":"China","score":0.42542457580566406},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42537304759025574},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4232473373413086},{"id":"https://openalex.org/keywords/network-science","display_name":"Network science","score":0.41790562868118286},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3827511668205261},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34211742877960205},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14832404255867004}],"concepts":[{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.7690365314483643},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7361576557159424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6447523832321167},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.6108119487762451},{"id":"https://openalex.org/C100368936","wikidata":"https://www.wikidata.org/wiki/Q1411725","display_name":"Crawling","level":2,"score":0.49831604957580566},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.48230671882629395},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.42542457580566406},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42537304759025574},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4232473373413086},{"id":"https://openalex.org/C137753397","wikidata":"https://www.wikidata.org/wiki/Q2434424","display_name":"Network science","level":3,"score":0.41790562868118286},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3827511668205261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34211742877960205},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14832404255867004},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105702510","wikidata":"https://www.wikidata.org/wiki/Q514","display_name":"Anatomy","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3650400.3650678","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3650400.3650678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.7699999809265137,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2897721008","https://openalex.org/W2922170858","https://openalex.org/W3113819339","https://openalex.org/W3210699327","https://openalex.org/W3215114157","https://openalex.org/W4385841234"],"related_works":["https://openalex.org/W2950946391","https://openalex.org/W3007491431","https://openalex.org/W4384518057","https://openalex.org/W2999398081","https://openalex.org/W4210291460","https://openalex.org/W3157957316","https://openalex.org/W3121544743","https://openalex.org/W2082867051","https://openalex.org/W2111786937","https://openalex.org/W2069442775"],"abstract_inverted_index":{"Complex":[0],"network":[1,40,64,80,138,178],"theory":[2],"is":[3,16],"used":[4,18,159],"to":[5,32,107,160],"study":[6,132],"various":[7],"complex":[8],"systems":[9],"in":[10,19,41,54,105,165],"the":[11,34,38,47,58,61,69,77,82,86,97,103,109,114,117,121,124,127,133,136,162,166,173,176],"real":[12],"world,":[13],"and":[14,28,91,100,130,144,168],"it":[15],"widely":[17],"many":[20],"important":[21,163],"fields":[22],"such":[23,152],"as":[24,57,153],"computers,":[25],"social,":[26],"biology":[27],"transportation.":[29],"In":[30],"order":[31,106],"ensure":[33],"safety":[35],"performance":[36],"of":[37,51,73,116,123,126,135,175],"logistics":[39,49,63,79,118,128,137,177],"Northwest":[42,55],"China,":[43],"this":[44],"paper":[45],"takes":[46],"postal":[48,70],"activities":[50],"25":[52],"cities":[53,66,83,95],"China":[56],"basis,":[59],"establishes":[60,76],"macro":[62],"between":[65],"by":[67,84],"counting":[68],"material":[71],"flow":[72],"each":[74],"city,":[75],"micro":[78],"within":[81,94],"crawling":[85],"storage":[87],"centers,":[88,90],"distribution":[89],"business":[92],"outlets":[93],"through":[96,139],"Gaode":[98],"map,":[99],"then":[101,131],"combines":[102],"two":[104],"construct":[108],"semi-macro":[110],"Logistics":[111],"network.":[112],"Analyze":[113],"characteristics":[115],"network,":[119,129,167],"determine":[120],"importance":[122],"nodes":[125,164],"robustness":[134],"different":[140],"attack":[141],"strategies.":[142],"Theoretical":[143],"simulation":[145],"analyses":[146],"show":[147],"that":[148,169],"a":[149],"single":[150],"index":[151],"degree":[154],"or":[155],"median":[156],"cannot":[157],"be":[158],"measure":[161],"deliberate":[170],"attacks":[171],"make":[172],"vulnerability":[174],"more":[179],"obvious":[180],"when":[181],"cascading":[182],"failures":[183],"are":[184],"considered.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
