{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:27:00Z","timestamp":1760171220386,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030708658"},{"type":"electronic","value":"9783030708665"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70866-5_2","type":"book-chapter","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:03:57Z","timestamp":1614701037000},"page":"19-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Using Machine Learning to Quantify the Robustness of Network Controllability"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Dhiman","sequence":"first","affiliation":[]},{"given":"Peng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kooij","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Sun, P., Kooij, R. E., He, Z., Van Mieghem, P.: Quantifying the robustness of network controllability. In 2019 4th International Conference on System Reliability and Safety (ICSRS), pp. 66\u201376. IEEE, November 2019","DOI":"10.1109\/ICSRS48664.2019.8987628"},{"issue":"7346","key":"2_CR2","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1038\/nature10011","volume":"473","author":"YY Liu","year":"2011","unstructured":"Liu, Y.Y., Slotine, J.J., Barab\u00e1si, A.L.: Controllability of complex networks. Nature 473(7346), 167\u2013173 (2011)","journal-title":"Nature"},{"issue":"2","key":"2_CR3","first-page":"152","volume":"1","author":"RE Kalman","year":"1963","unstructured":"Kalman, R.E.: Mathematical description of linear dynamical systems. J. SIAM Ser. A Control 1(2), 152\u2013192 (1963)","journal-title":"J. SIAM Ser. A Control"},{"key":"2_CR4","unstructured":"Dhiman, A.K.: Measuring the robustness of network controllability. M.Sc. Thesis, Delft University of Technology (2020)"},{"issue":"6","key":"2_CR5","doi-asserted-by":"publisher","first-page":"e38398","DOI":"10.1371\/journal.pone.0038398","volume":"7","author":"NJ Cowan","year":"2012","unstructured":"Cowan, N.J., Chastain, E.J., Vilhena, D.A., Freudenberg, J.S., Bergstrom, C.T.: Nodal dynamics, not degree distributions, determine the structural controllability of complex networks. PloS ONE 7(6), e38398 (2012)","journal-title":"PloS ONE"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.comnet.2016.04.016","volume":"103","author":"A Socievole","year":"2016","unstructured":"Socievole, A., De Rango, F., Scoglio, C., Van Mieghem, P.: Assessing network robustness under SIS epidemics: the relationship between epidemic threshold and viral conductance. Comput. Netw. 103, 196\u2013206 (2016)","journal-title":"Comput. Netw."},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1093\/comnet\/cnt004","volume":"1","author":"S Trajanovski","year":"2013","unstructured":"Trajanovski, S., Mart\u00edn-Hern\u00e1ndez, J., Winterbach, W., Van Mieghem, P.: Robustness envelopes of networks. J. Complex Netw. 1(1), 44\u201362 (2013)","journal-title":"J. Complex Netw."},{"issue":"9","key":"2_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1140\/epjb\/e2014-50276-0","volume":"87","author":"X Wang","year":"2014","unstructured":"Wang, X., Pournaras, E., Kooij, R.E., Van Mieghem, P.: Improving robustness of complex networks via the effective graph resistance. Eur. Phys. J. B 87(9), 221 (2014). https:\/\/doi.org\/10.1140\/epjb\/e2014-50276-0","journal-title":"Eur. Phys. J. B"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.physa.2014.01.056","volume":"402","author":"Y Ko\u00e7","year":"2014","unstructured":"Ko\u00e7, Y., Warnier, M., Van Mieghem, P., Kooij, R.E., Brazier, F.M.: The impact of the topology on cascading failures in a power grid model. Phys. A Stat. Mech. Appl. 402, 169\u2013179 (2014)","journal-title":"Phys. A Stat. Mech. Appl."},{"issue":"3","key":"2_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TAC.1974.1100557","volume":"19","author":"CT Lin","year":"1974","unstructured":"Lin, C.T.: Structural controllability. IEEE Trans. Autom. Control 19(3), 201\u2013208 (1974)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1137\/0202019","volume":"2","author":"JE Hopcroft","year":"1973","unstructured":"Hopcroft, J.E., Karp, R.M.: An n$$\\hat{}$$5\/2 algorithm for maximum matchings in bipartite graphs. SIAM J. Comput. 2(4), 225\u2013231 (1973)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"e89066","DOI":"10.1371\/journal.pone.0089066","volume":"9","author":"S Nie","year":"2014","unstructured":"Nie, S., Wang, X., Zhang, H., Li, Q., Wang, B.: Robustness of controllability for networks based on edge-attack. PloS One 9(2), e89066 (2014)","journal-title":"PloS One"},{"issue":"18","key":"2_CR13","doi-asserted-by":"publisher","first-page":"4420","DOI":"10.1016\/j.physa.2012.04.019","volume":"391","author":"CL Pu","year":"2012","unstructured":"Pu, C.L., Pei, W.J., Michaelson, A.: Robustness analysis of network controllability. Physica A Stat. Mech. Appl. 391(18), 4420\u20134425 (2012)","journal-title":"Physica A Stat. Mech. Appl."},{"issue":"9","key":"2_CR14","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/JSAC.2011.111002","volume":"29","author":"S Knight","year":"2011","unstructured":"Knight, S., Nguyen, H.X., Falkner, N., Bowden, R., Roughan, M.: The internet topology zoo. IEEE J. Sel. Areas Commun. 29(9), 1765\u20131775 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"2_CR15","unstructured":"Himsolt, M.: GML: a portable graph file format, p. 35. Technical report 94030, Universitat Passau (1997)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/3-540-45848-4_59","volume-title":"Graph Drawing","author":"U Brandes","year":"2002","unstructured":"Brandes, U., Eiglsperger, M., Herman, I., Himsolt, M., Marshall, M.S.: GraphML progress report structural layer proposal. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 501\u2013512. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45848-4_59"},{"key":"2_CR17","unstructured":"NetworkX. Network analysis in python. https:\/\/networkx.github.io\/"},{"key":"2_CR18","unstructured":"Tirpak, T.M.: Telecommunication network resource management based on social network characteristics. U.S. Patent Application No. 12\/463,445 (2010)"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1137\/1004057","volume":"4","author":"F Harary","year":"1962","unstructured":"Harary, F.: The determinant of the adjacency matrix of a graph. SIAM Rev. 4(3), 202\u2013210 (1962)","journal-title":"SIAM Rev."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1142\/9789813239609_0006","volume":"1","author":"R van der Hofstad","year":"2019","unstructured":"van der Hofstad, R.: Random graphs models for complex networks, and the brain. Complex. Sci. 1, 199\u2013246 (2019)","journal-title":"Complex. Sci."},{"issue":"1","key":"2_CR21","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 5(1), 17\u201360 (1960)","journal-title":"Publ. Math. Inst. Hung. Acad. Sci"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"3\u20134","key":"2_CR23","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S0378-4371(01)00369-7","volume":"299","author":"AL Barab\u00e1si","year":"2001","unstructured":"Barab\u00e1si, A.L., Ravasz, E., Vicsek, T.: Deterministic scale-free networks. Phys. A Stat. Mech. Appl. 299(3\u20134), 559\u2013564 (2001)","journal-title":"Phys. A Stat. Mech. Appl."},{"issue":"21","key":"2_CR24","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","volume":"85","author":"R Cohen","year":"2000","unstructured":"Cohen, R., Erez, K., Ben-Avraham, D., Havlin, S.: Resilience of the internet to random breakdowns. Phys. Rev. Lett. 85(21), 4626 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s41109-018-0089-9","volume":"3","author":"H Cetinay","year":"2018","unstructured":"Cetinay, H., Devriendt, K., Van Mieghem, P.: Nodal vulnerability to targeted attacks in power grids. Appl. Netw. Sci. 3(1), 34 (2018)","journal-title":"Appl. Netw. Sci."},{"issue":"5","key":"2_CR26","doi-asserted-by":"publisher","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5), 056109 (2002)","journal-title":"Phys. Rev. E"},{"issue":"6","key":"2_CR27","doi-asserted-by":"publisher","first-page":"065101","DOI":"10.1103\/PhysRevE.83.065101","volume":"83","author":"X Huang","year":"2011","unstructured":"Huang, X., Gao, J., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Robustness of interdependent networks under targeted attack. Phys. Rev. E 83(6), 065101 (2011)","journal-title":"Phys. Rev. E"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep18145","volume":"5","author":"SA Mengiste","year":"2015","unstructured":"Mengiste, S.A., Aertsen, A., Kumar, A.: Effect of edge pruning on structural controllability and observability of complex networks. Sci. Rep. 5(1), 1\u201314 (2015)","journal-title":"Sci. Rep."},{"key":"2_CR29","unstructured":"Van Mieghem, P., et al.: A framework for computing topological network robustness. Delft University of Technology, Report 20101218 (2010)"},{"key":"2_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCYB.2020.3013251","volume":"2","author":"Y Lou","year":"2020","unstructured":"Lou, Y., He, Y., Wang, L., Chen, G.: Predicting network controllability robustness: a convolutional neural network approach. IEEE Trans. Cybern. 2, 1\u201312 (2020)","journal-title":"IEEE Trans. Cybern."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70866-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:06:50Z","timestamp":1614701210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-70866-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030708658","9783030708665"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70866-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln-2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}