2014
DOI: 10.1371/journal.pone.0089066
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of Controllability for Networks Based on Edge-Attack

Abstract: We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(43 citation statements)
references
References 36 publications
0
42
0
1
Order By: Relevance
“…Next, let ρ = [α T 1 , ..., α T N ]. In light of (18), (20) and (22), it can be verified that W T ρ T = 0 with α i (sI n − A) = 0, i = 1, ..., N , and α i B = 0, i ∈ ν. Therefore, by condition (iii), one has α i = 0 for all i = 1, ..., N .…”
Section: Proof (Necessity)mentioning
confidence: 99%
“…Next, let ρ = [α T 1 , ..., α T N ]. In light of (18), (20) and (22), it can be verified that W T ρ T = 0 with α i (sI n − A) = 0, i = 1, ..., N , and α i B = 0, i ∈ ν. Therefore, by condition (iii), one has α i = 0 for all i = 1, ..., N .…”
Section: Proof (Necessity)mentioning
confidence: 99%
“…Both random and intentional edge-removal attacks have also been studied by many. In [43], for example, it shows that the intentional edge-removal attack by removing highly-loaded edges is very effective in reducing the network controllability. It is further observed, in e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Recent advances in studies of complex networks motivated the researches on the features and dynamics of scale-free communication networks. [5][6][7][8][9][10][11] With the increasing demand for transmitting big data, congestion becomes a considerable challenge in many real communication systems. It will be di±cult to recover large systems from congested state to free-°ow state.…”
Section: Introductionmentioning
confidence: 99%