{"id":"https://openalex.org/W7128395908","doi":"https://doi.org/10.48550/arxiv.2602.06436","title":"Impact of seed node position on network robustness under localized attacks","display_name":"Impact of seed node position on network robustness under localized attacks","publication_year":2026,"publication_date":"2026-02-06","ids":{"openalex":"https://openalex.org/W7128395908","doi":"https://doi.org/10.48550/arxiv.2602.06436"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.06436","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091548378","display_name":"Masaki Chujyo","orcid":"https://orcid.org/0000-0003-3439-4020"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chujyo, Masaki","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125419566","display_name":"Shu Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Shu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125378506","display_name":"Fujio Toriumi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Toriumi, Fujio","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091548378"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.913100004196167,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.913100004196167,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.03350000083446503,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8489999771118164},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.8357999920845032},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6229000091552734},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5529000163078308},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5482000112533569},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.5335999727249146},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5212000012397766},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.47620001435279846}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8489999771118164},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.8357999920845032},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6229000091552734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5723000168800354},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5529000163078308},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5482000112533569},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.5335999727249146},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5212000012397766},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.47620001435279846},{"id":"https://openalex.org/C137753397","wikidata":"https://www.wikidata.org/wiki/Q2434424","display_name":"Network science","level":3,"score":0.4246000051498413},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38690000772476196},{"id":"https://openalex.org/C2780600066","wikidata":"https://www.wikidata.org/wiki/Q7239828","display_name":"Preferential attachment","level":3,"score":0.38350000977516174},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34380000829696655},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3089999854564667},{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.30889999866485596},{"id":"https://openalex.org/C123757187","wikidata":"https://www.wikidata.org/wiki/Q9195957","display_name":"Network dynamics","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2888000011444092},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2662999927997589},{"id":"https://openalex.org/C2988224531","wikidata":"https://www.wikidata.org/wiki/Q20830730","display_name":"Network structure","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2547999918460846},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.25130000710487366},{"id":"https://openalex.org/C2780898871","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Performance metric","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.06436","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.06436","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.06436","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.06436","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Localized":[0,64],"attacks":[1],"(LAs),":[2],"where":[3],"damage":[4],"propagates":[5],"from":[6],"a":[7,69,78,82],"single":[8],"seed":[9,38,51],"node":[10,39,52,159],"to":[11,17,142],"its":[12],"neighbors,":[13],"pose":[14],"significant":[15],"threats":[16],"the":[18,46,50,56,63,74,87,104],"robustness":[19,122],"of":[20,49,58,77,90,146,158],"complex":[21],"networks.":[22],"Although":[23],"previous":[24],"studies":[25],"have":[26],"extensively":[27],"analyzed":[28],"network":[29,121],"vulnerability":[30,160],"under":[31,161],"such":[32,128,162],"attacks,":[33],"they":[34],"typically":[35],"assume":[36],"random":[37],"placement":[40],"and":[41,100,111,132,155],"evaluate":[42],"average":[43],"robustness.":[44],"However,":[45],"structural":[47],"position":[48,102],"can":[53],"significantly":[54],"impact":[55,76],"extent":[57],"damage.":[59,106],"This":[60],"study":[61],"proposes":[62],"Attack":[65],"Vulnerability":[66],"Index":[67],"(LAVI),":[68],"node-level":[70],"metric":[71],"that":[72,115,137],"quantifies":[73,86],"potential":[75],"LA":[79],"initiated":[80],"at":[81],"specific":[83],"node.":[84],"LAVI":[85,116,151],"cumulative":[88],"number":[89],"severed":[91],"links":[92],"during":[93],"attack":[94],"progression,":[95],"capturing":[96],"how":[97],"local":[98],"connectivity":[99],"topological":[101],"amplify":[103],"resulting":[105],"Numerical":[107],"experiments":[108],"on":[109],"synthetic":[110],"real-world":[112],"networks":[113],"demonstrate":[114],"correlates":[117],"more":[118],"strongly":[119],"with":[120],"degradation":[123],"than":[124],"standard":[125],"centrality":[126,139],"measures,":[127],"as":[129],"degree,":[130],"closeness,":[131],"betweenness.":[133],"Our":[134],"findings":[135],"highlight":[136],"classical":[138],"metrics":[140],"fail":[141],"capture":[143],"key":[144],"dynamics":[145],"spatially":[147],"localized":[148],"failures,":[149],"while":[150],"provides":[152],"an":[153],"accurate":[154],"generalizable":[156],"indicator":[157],"disruptions.":[163]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-10T00:00:00"}
