一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于優(yōu)化理論的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略

孫昱 姚佩陽 張杰勇 付凱

孫昱, 姚佩陽, 張杰勇, 付凱. 基于優(yōu)化理論的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略[J]. 電子與信息學(xué)報, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396
引用本文: 孫昱, 姚佩陽, 張杰勇, 付凱. 基于優(yōu)化理論的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略[J]. 電子與信息學(xué)報, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396
SUN Yu, YAO Peiyang, ZHANG Jieyong, FU Kai. Node Attack Strategy of Complex Networks Based on Optimization Theory[J]. Journal of Electronics & Information Technology, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396
Citation: SUN Yu, YAO Peiyang, ZHANG Jieyong, FU Kai. Node Attack Strategy of Complex Networks Based on Optimization Theory[J]. Journal of Electronics & Information Technology, 2017, 39(3): 518-524. doi: 10.11999/JEIT160396

基于優(yōu)化理論的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略

doi: 10.11999/JEIT160396
基金項(xiàng)目: 

國家自然科學(xué)基金(61573017)

Node Attack Strategy of Complex Networks Based on Optimization Theory

Funds: 

The National Natural Science Foundation of China (61573017)

  • 摘要: 該文在分析傳統(tǒng)復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略不足的基礎(chǔ)上提出一種新的攻擊策略,該策略的思路是將節(jié)點(diǎn)攻擊序列的構(gòu)造問題視為一個優(yōu)化問題而非傳統(tǒng)的評估問題。為了實(shí)現(xiàn)該策略,設(shè)計了復(fù)雜網(wǎng)絡(luò)抗毀性測度用以衡量節(jié)點(diǎn)攻擊序列的攻擊效果,建立了以最大化攻擊效果為目標(biāo)的節(jié)點(diǎn)攻擊序列構(gòu)造模型,提出了基于禁忌搜索的模型求解算法。在真實(shí)網(wǎng)絡(luò)和模擬網(wǎng)絡(luò)上的實(shí)驗(yàn)結(jié)果表明,新策略比其它復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)攻擊策略更為有效和優(yōu)越。
  • JIANG Y and WANG Y B. Analysis of attack and defense strategies on complex networks[C]. Proceedings of International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 2013: 58-62.
    ALBERT R, JEONG H, and BARABASI A L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406: 378-382. doi: 10.1038/35019019.
    HOLME P, KIM B J, YOON C N, et al. Attack vulnerability of complex networks[J]. Physical Review E, 2002, 65(5): 056109. doi: 10.1103/PhysRevE.65.056109.
    BELLINGERI M, CASSI D, and VINCENZI S. Efficiency of attack strategies on complex model and real-world networks [J]. Physica A, 2014, 414: 174-180. doi: 10.1016/j.physa.2014. 06.079.
    NIE T Y, GUO Z, ZHAO K, et al. New attack strategies for complex networks[J]. Physica A, 2015, 424: 248-253. doi: 10.1016/j.physa.2015.01.004.
    聶廷遠(yuǎn), 郭征, 李坤龍. 復(fù)雜網(wǎng)絡(luò)的攻擊策略研究[J]. 計算機(jī)仿真, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006-9348. 2015.07.063.
    NIE Tingyuan, GUO Zheng, and LI Kunlong. A study of attack strategies for complex networks[J]. Computer Simulation, 2015, 32(7): 286-289. doi: 10.3969/j.issn.1006- 9348.2015.07.063.
    XIAO S and XIAO G. On intentional attacks and protections in complex communication networks[C]. Proceedings of IEEE Global Telecommunications Conference, San Francisco, CA, USA, 2006: 1-5.
    李濤, 裴文江. 針對重疊社團(tuán)結(jié)構(gòu)的復(fù)雜網(wǎng)絡(luò)多靶向攻擊策略[J]. 北京郵電大學(xué)學(xué)報, 2010, 33(3): 34-39. doi: 10.3969/ j.issn.1007-5321.2010.03.007.
    LI Tao and PEI Wenjiang. Multi-targets attack strategy based on the overlapping community structure of complex networks[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(3): 34-39. doi: 10.3969/j.issn. 1007-5321.2010.03.007.
    WANG H, HUANG J Y, XU X M, et al. Damage attack on complex networks[J]. Physica A, 2014, 408: 134-148. doi: 10. 1016/j.physa.2014.04.001.
    ANURAG S, RAHUL K, and YATINDRA N S. Impact of structural centrality based attacks in complex networks[J]. Acta Physica Polonica B, 2015, 46(2): 305-324. doi: 10.5506/ APhysPolB.46.305.
    DENG Y, WU J, and TAN Y J. Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74-81. doi: 10.1016/j.physa.2015.08.043.
    HERRNANN H J, SCHNEIDER C M, MOREIRA A A, et al. Onion-like network topology enhances robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 1: P01027. doi: 10.1088/1742-5468/ 2011/01/P01027.
    SCHNEIDER C M, MOREIRA A A, ANDRADE J S, et al. Mitigation of malicious attacks on networks[J]. Proceedings of the National Academy of Sciences, of the United States of America 2011, 108(10): 3838-3841. doi: 10.1073/pnas. 1009440108.
    LOUZADA V H P, DAOLIO F, HERRMANN H J, et al. Smart rewiring for network robustness[J]. Journal of Complex Networks, 2013, 1(2): 150-159. doi: 10.1093/comnet/xxx000.
    BURKE E K and KENDALL G. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques[M]. New York: Springer, 2005: 165.
    LATORA V and MARCHIORI M. Efficient behavior of small-world networks[J]. Physical Review Letters, 2001, 87(19): 198701. doi: 10.1103/PhysRevLett.87.198701.
    陳勇, 胡愛群, 胡嘯. 通信網(wǎng)中節(jié)點(diǎn)重要性的評價方法[J].通信學(xué)報, 2004, 25(8): 129-135. doi: 10.3321/ j.issn:1000-436X. 2004.08.018.
    CHEN Yong, HU Aiqun, and HU Xiao. Evaluation method for node importance in communication networks[J]. Journal on Communications, 2004, 25(8): 129-135. doi: 10.3321/j.issn: 1000-436X.2004.08.018.
    于會, 劉尊, 李勇軍. 基于多屬性決策的復(fù)雜網(wǎng)絡(luò)節(jié)點(diǎn)重要性綜合評價方法[J]. 物理學(xué)報, 2013, 62(2): 1-9. doi: 10.7498/ aps.62.020204.
    YU Hui, LIU Zun, and LI Yongjun. Key nodes in complex networks identified by multi-attribute decision-making method[J]. Acta Physica Sinica, 2013, 62(2): 1-9. doi: 10.7498 /aps.62.020204.
    秦李, 楊子龍, 黃曙光. 復(fù)雜網(wǎng)絡(luò)的節(jié)點(diǎn)重要性綜合評價[J]. 計算機(jī)科學(xué), 2015, 42(2): 60-64. doi: 10. 11896/j.issn.1002- 137X.2015.2.013.
    QIN Li, YANG Zilong, and HUANG Shuguang. Synthesis evaluation method for node importance in complex networks [J]. Computer Science, 2015, 42(2): 60-64. doi: 10.11896/ j.issn.1002-137X.2015.2.013.
    PAGE L and PERRY J. Reliability polynomials and links importance in networks[J]. IEEE Transactions on Reliability, 1994, 43(1): 51-58. doi: QK.IEL.1994.0000024.0007056. 00285108.
  • 加載中
計量
  • 文章訪問數(shù):  1939
  • HTML全文瀏覽量:  262
  • PDF下載量:  580
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-04-22
  • 修回日期:  2016-10-31
  • 刊出日期:  2017-03-19

目錄

    /

    返回文章
    返回