2011
DOI: 10.1016/j.physa.2011.06.022
|View full text |Cite
|
Sign up to set email alerts
|

Networked analysis of the Shanghai subway network, in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
61
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 138 publications
(71 citation statements)
references
References 38 publications
2
61
0
Order By: Relevance
“…Previous literature [19,27] used the largest connected cluster (LCC) to evaluate the functional vulnerability of urban rail transit networks, which was defined as the size of the largest sub-network after being attacked. However, this parameter is not suitable to be applied to urban rail transit networks, as trains may still be in operation on each sub-network, even if the network is divided into multiple isolated sub-networks.…”
Section: Functional Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Previous literature [19,27] used the largest connected cluster (LCC) to evaluate the functional vulnerability of urban rail transit networks, which was defined as the size of the largest sub-network after being attacked. However, this parameter is not suitable to be applied to urban rail transit networks, as trains may still be in operation on each sub-network, even if the network is divided into multiple isolated sub-networks.…”
Section: Functional Vulnerabilitymentioning
confidence: 99%
“…Wang [18] constructed the topological model of the Beijing transit network and simulated the network efficiency under various attacks. Zhang et al [19] measured the topological characteristics and functional properties of the Shanghai metro system. Nevertheless, these studies simplified the urban rail transit networks with graph theory and, therefore, lacked consideration of the significant properties of rail transit systems, such as the ability to transfer, etc.…”
Section: Introductionmentioning
confidence: 99%
“…We only highlight two representative statements here; others follow very similar structures: "This scale-free structure has proved to be robust to random failure but vulnerable to targeted attack" [94]. "This study indicates that the subway network is robust against random attacks but fragile for malicious attacks" [79].…”
Section: Common Pitfalls and Misleading Interpretationsmentioning
confidence: 86%
“…Some of the studies [76,77] only evaluate DEG of nodes for designing a targeted attack, e.g., stating that "for the selective attack strategy, we remove some nodes with higher degrees according to their degree order from high to low" [77]. Others compare a set of few static network metrics, but without considering interactive/iterative/dynamic metrics sufficiently for much stronger attacks [26,[78][79][80][81][82] (see Section 4.2 for further discussion). For few studies, the authors do not reveal which kind of targeted attack they use: "We have simulated an attack on every network in our database by blocking travel through targeted stations" [83].…”
Section: Common Pitfalls and Misleading Interpretationsmentioning
confidence: 99%
See 1 more Smart Citation