2018
DOI: 10.1038/s41598-018-31902-8
|View full text |Cite
|
Sign up to set email alerts
|

A comparative analysis of approaches to network-dismantling

Abstract: Estimating, understanding, and improving the robustness of networks has many application areas such as bioinformatics, transportation, or computational linguistics. Accordingly, with the rise of network science for modeling complex systems, many methods for robustness estimation and network dismantling have been developed and applied to real-world problems. The state-of-the-art in this field is quite fuzzy, as results are published in various domain-specific venues and using different datasets. In this study, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
118
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 126 publications
(140 citation statements)
references
References 62 publications
2
118
0
2
Order By: Relevance
“…When comparing valence band spectra of nominally hematite phases from the last decades quite drastic differences can be noticed . The features of the valence bands are different from one study to the other.…”
Section: Introductionmentioning
confidence: 95%
“…When comparing valence band spectra of nominally hematite phases from the last decades quite drastic differences can be noticed . The features of the valence bands are different from one study to the other.…”
Section: Introductionmentioning
confidence: 95%
“…Interestingly, the recalculated betweenness attack is particularly effective being comparable to the most effective methods to dismantle networks [15,23,24]. Also, the critical exponents of the percolation process associated with this attack are nontrivial, as they depart from the mean-field values observed in random attacks to ER networks and the other attacks evaluated in this work.…”
Section: Discussionmentioning
confidence: 77%
“…The most efficient algorithm so far known was proposed by Brandes, et al in [29] and runs like O(N M ), where N and M are the number of nodes and links in the network, respectively. The main reason for considering this measure is that it has been reported as the most efficient attack strategy for many networks, including both synthetic and real-world networks [14,15].…”
Section: A Attack Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Clearly, Fe 2p 3/2 peaks around 711 eV, Fe 2p 1/2 peaks around 724 eV, and satellite peaks of Fe 3+ around 719 eV are identified for both samples. These values have been reported as typical binding energies for Fe 2 O 3 . However, a satellite peak of Fe 2+ around 716 eV that is typically attributed to oxygen vacancies could not be found.…”
Section: Resultsmentioning
confidence: 99%