{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T05:05:30Z","timestamp":1776056730559,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61877046"],"award-info":[{"award-number":["61877046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10489-024-05289-1","type":"journal-article","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T09:02:07Z","timestamp":1706950927000},"page":"2767-2782","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cost-constrained network dismantling using quadratic evolutionary algorithm for interdependent networks"],"prefix":"10.1007","volume":"54","author":[{"given":"Yong-hui","family":"Li","sequence":"first","affiliation":[]},{"given":"San-yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yi-guang","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,3]]},"reference":[{"key":"5289_CR1","unstructured":"McInnes BIA, McBride JS, Evans NJ, Lambert DD, Andrew AS (1999) Emergence of scaling in random networks"},{"key":"5289_CR2","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393:440\u2013442","journal-title":"Nature"},{"key":"5289_CR3","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1007\/s10489-021-02403-5","volume":"52","author":"S Kumar","year":"2021","unstructured":"Kumar S, Panda AK (2021) Identifying influential nodes in weighted complex networks using an improved wvoterank approach. Appl Intell 52:1838\u20131852","journal-title":"Appl Intell"},{"key":"5289_CR4","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1007\/s10489-021-02287-5","volume":"52","author":"CW Li","year":"2021","unstructured":"Li CW, Chen HM, Li TR, Yang XL (2021) A stable community detection approach for complex network based on density peak clustering and label propagation. Appl Intell 52:1188\u20131208","journal-title":"Appl Intell"},{"key":"5289_CR5","doi-asserted-by":"crossref","unstructured":"Li XY, Zhang HK (2020) A multi-agent complex network algorithm for multi-objective optimization. Appl Intell 1\u201328","DOI":"10.1007\/s10489-020-01666-8"},{"key":"5289_CR6","first-page":"115","volume":"65","author":"ZH Chen","year":"2018","unstructured":"Chen ZH, Wu JJ, Xia YX, Zhang X (2018) Robustness of interdependent power grids and communication networks: A complex network perspective. IEEE Trans Circuits Syst II: Express Briefs 65:115\u2013119","journal-title":"IEEE Trans Circuits Syst II: Express Briefs"},{"key":"5289_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.107059","volume":"101","author":"I Majumder","year":"2021","unstructured":"Majumder I, Dash PK, Dhar S (2021) Real-time energy management for pv-battery-wind based microgrid using on-line sequential kernel based robust random vector functional link network. Appl Soft Comput 101:107059","journal-title":"Appl Soft Comput"},{"key":"5289_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.neunet.2022.07.015","volume":"154","author":"QX Liu","year":"2022","unstructured":"Liu QX, Wang B (2022) Neural extraction of multiscale essential structure for network dismantling. Neural Netw\u202f: Official J Int Neural Netw Soc 154:99\u2013108","journal-title":"Neural Netw : Official J Int Neural Netw Soc"},{"key":"5289_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106457","volume":"94","author":"YJ Liang","year":"2020","unstructured":"Liang YJ, Gao ZY, Gao JM, Wang RX, Liu QQ, Cheng YH (2020) A new method for multivariable nonlinear coupling relations analysis in complex electromechanical system. Appl Soft Comput 94:106457","journal-title":"Appl Soft Comput"},{"key":"5289_CR10","doi-asserted-by":"crossref","unstructured":"Liu Q, Ding N, Li J, Yi XH (2022) Identification of critical nodes and accident chains of power systems under the effect of geomagnetic storms. Math Problems Eng","DOI":"10.1155\/2022\/2804781"},{"key":"5289_CR11","doi-asserted-by":"crossref","unstructured":"Mosetlhe TC, Hamam Y, Shengzhi D, Monacelli \u00c9 (2022) Identification of critical nodes in water distribution networks. IOP Conference Series: Earth and Environmental Science 987","DOI":"10.1088\/1755-1315\/987\/1\/012004"},{"issue":"3","key":"5289_CR12","doi-asserted-by":"publisher","DOI":"10.1063\/1.5081098","volume":"29","author":"T Br\u00f6hl","year":"2019","unstructured":"Br\u00f6hl T, Lehnertz K (2019) Centrality-based identification of important edges in complex networks. Chaos 29(3):033115","journal-title":"Chaos"},{"key":"5289_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.126170","volume":"580","author":"LJ Wang","year":"2021","unstructured":"Wang LJ, Zheng SH, Wang YG, Wang LF (2021) Identification of critical nodes in multimodal transportation network. Phys A-statistical Mech Its Appl 580:126170","journal-title":"Phys A-statistical Mech Its Appl"},{"key":"5289_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.cor.2019.02.006","volume":"106","author":"D Purevsuren","year":"2019","unstructured":"Purevsuren D, Cui G (2019) Efficient heuristic algorithm for identifying critical nodes in planar networks. Comput Oper Res 106:143\u2013153","journal-title":"Comput Oper Res"},{"key":"5289_CR15","doi-asserted-by":"crossref","unstructured":"Summa MD, Faruk SMO (2022) Critical node\/edge detection problems on trees. 4OR 21:439\u2013455","DOI":"10.1007\/s10288-022-00518-0"},{"key":"5289_CR16","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1007\/s12083-019-00756-w","volume":"12","author":"J Ma","year":"2019","unstructured":"Ma J, Ju Z (2019) Cascading failure model of scale-free networks for avoiding edge failure. Peer-to-Peer Netw Appl 12:1627\u20131637","journal-title":"Peer-to-Peer Netw Appl"},{"key":"5289_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2020.125540","volume":"564","author":"DY Zhou","year":"2021","unstructured":"Zhou DY, Hu FN, Wang SL, Chen J (2021) Power network robustness analysis based on electrical engineering and complex network theory. Phys A-statistical Mech Its Appl 564:125540","journal-title":"Phys A-statistical Mech Its Appl"},{"key":"5289_CR18","unstructured":"Musciotto F, Miccich\u2019e S (2022) Exploring the landscape of community-based dismantling strategies"},{"key":"5289_CR19","doi-asserted-by":"crossref","unstructured":"Li Q, Liu SY, Yang XS (2020) Neighborhood information-based probabilistic algorithm for network disintegration. arXiv:2003.04713","DOI":"10.1016\/j.eswa.2019.112853"},{"key":"5289_CR20","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/JSYST.2021.3123904","volume":"16","author":"S Paul","year":"2022","unstructured":"Paul S, Ding F, Utkarsh K, Liu W, O\u2019Malley MJ, Barnett J (2022) On vulnerability and resilience of cyber-physical power systems: A review. IEEE Syst J 16:2367\u20132378","journal-title":"IEEE Syst J"},{"key":"5289_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3214285","volume":"71","author":"KD Lu","year":"2022","unstructured":"Lu KD, Wu ZY (2022) Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems. IEEE Trans Instrument Measure 71:1\u201310","journal-title":"IEEE Trans Instrument Measure"},{"key":"5289_CR22","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TNSE.2022.3225459","volume":"10","author":"X Li","year":"2023","unstructured":"Li X, Pan TY, Pan K (2023) Identification of key components after unintentional failures for cascading failure protection. IEEE Trans Netw Sci Eng 10:1003\u20131014","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"5289_CR23","doi-asserted-by":"crossref","unstructured":"Feng XY, Shen T, Zhang HJ, Yang HP, Zhang L (2023) Multi-objective optimization of critical node detection based on both cascading and non-cascading scenarios in complex networks. In: 2023 IEEE Congress on evolutionary computation (CEC), pp 1\u20139","DOI":"10.1109\/CEC53210.2023.10254009"},{"key":"5289_CR24","doi-asserted-by":"crossref","unstructured":"Li P, Wang SL, Chen GW, Bao CQ, Yan GH (2022) Identifying key nodes in complex networks based on local structural entropy and clustering coefficient. Math Problems Eng","DOI":"10.1155\/2022\/8928765"},{"key":"5289_CR25","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1080\/15325008.2021.1970288","volume":"49","author":"Y Zhao","year":"2021","unstructured":"Zhao Y, Yang CJ, Sun YH, Ren H, Cheng XY, Xie KG (2021) Reliability evaluation of cyber-physical power systems considering random failures in measurement and remote control. Electric Power Components Syst 49:532\u2013546","journal-title":"Electric Power Components Syst"},{"issue":"3","key":"5289_CR26","doi-asserted-by":"publisher","DOI":"10.1063\/5.0046564","volume":"31","author":"GG Dong","year":"2021","unstructured":"Dong GG, Yao QY, Wang F, Du RJ, Vilela ALM, Stanley HE (2021) Percolation on coupled networks with multiple effective dependency links. Chaos 31(3):033152","journal-title":"Chaos"},{"key":"5289_CR27","doi-asserted-by":"crossref","unstructured":"Zhang HY, Peng MF, Guerrero JM, Gao XL, Liu YC (2019) Modelling and vulnerability analysis of cyber-physical power systems based on interdependent networks. Energies","DOI":"10.3390\/en12183439"},{"key":"5289_CR28","first-page":"1722","volume":"69","author":"Y Bai","year":"2021","unstructured":"Bai Y, Gong Y, Li Q, Song W, Aljmiai A, Liu S (2021) Nsksd: Interdependent network dismantling via nonlinear-metric. IEEE Trans Circuits Syst II: Express Briefs 69:1722\u20131726","journal-title":"IEEE Trans Circuits Syst II: Express Briefs"},{"key":"5289_CR29","doi-asserted-by":"crossref","unstructured":"Chen L, Gorbachev S, Yue D, Dou C-x, Li S, Ge H, Cheng Z (2022) Protection strategies of active defense in cyber-physical power systems. Europhys Lett 136","DOI":"10.1209\/0295-5075\/ac4eca"},{"key":"5289_CR30","doi-asserted-by":"crossref","unstructured":"Chen L, Gorbachev S, Yue D, Dou CX, Li SQ, Ge H, Cheng ZH (2021) Protection strategies of active defense in cyber-physical power systems. Europhys Lett 136","DOI":"10.1209\/0295-5075\/ac4eca"},{"key":"5289_CR31","doi-asserted-by":"crossref","unstructured":"Liu J (2020) Improving robustness of complex networks by a new capacity allocation strategy. Chinese Phys B 30","DOI":"10.1088\/1674-1056\/abb3f1"},{"key":"5289_CR32","doi-asserted-by":"crossref","unstructured":"Zhang XK, Wu J, Wang H, Xiong J, Yang KW (2016) Optimization of disintegration strategy for multi-edges complex networks. In: 2016 IEEE Congress on evolutionary computation (CEC), pp 522\u2013528","DOI":"10.1109\/CEC.2016.7743838"},{"key":"5289_CR33","doi-asserted-by":"crossref","unstructured":"Patron A, Cohen R, Li D, Havlin S (2017) Optimal cost for strengthening or destroying a given network. Phys Rev E 95(5\u20131):052305","DOI":"10.1103\/PhysRevE.95.052305"},{"issue":"5 Pt 2","key":"5289_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim BJ, Yoon C, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E, Stat, Nonlinear, Soft Matter Phys 65(5 Pt 2):056109","journal-title":"Phys Rev E, Stat, Nonlinear, Soft Matter Phys"},{"issue":"25","key":"5289_CR35","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","volume":"85","author":"DS Callaway","year":"2000","unstructured":"Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Network robustness and fragility: percolation on random graphs. Phys Rev Lett 85(25):5468\u201371","journal-title":"Phys Rev Lett"},{"key":"5289_CR36","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 524:65\u201368","journal-title":"Nature"},{"key":"5289_CR37","doi-asserted-by":"crossref","unstructured":"Wang JE, Liu SY, Aljmiai A, Bai YG (2021) Detection of influential nodes with multi-scale information. Chinese Phys B 30","DOI":"10.1088\/1674-1056\/abff2d"},{"issue":"6","key":"5289_CR38","doi-asserted-by":"publisher","DOI":"10.1063\/1.5029984","volume":"28","author":"Y Deng","year":"2018","unstructured":"Deng Y, Wu J, Xiao Y, Li YP (2018) Efficient disintegration strategies with cost constraint in complex networks: The crucial role of nodes near average degree. Chaos 28(6):061101","journal-title":"Chaos"},{"key":"5289_CR39","doi-asserted-by":"crossref","unstructured":"Felbermayr G, Groeschl J, Heiland I (2022) Complex europe: Quantifying the cost of disintegration. CEPR: International Trade & Regional Economics (Topic)","DOI":"10.1016\/j.jinteco.2022.103647"},{"key":"5289_CR40","doi-asserted-by":"crossref","unstructured":"Cohen R, Erez K, ben-Avraham D, Havlin S (2001) Breakdown of the internet under intentional attack. Phys Rev Lett 86(16):3682\u20135","DOI":"10.1103\/PhysRevLett.86.3682"},{"issue":"5439","key":"5289_CR41","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A (1999) Emergence of scaling in random networks. Science 286(5439):509\u201312","journal-title":"Science"},{"key":"5289_CR42","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1126\/science.1173299","volume":"325","author":"AL Barabasi","year":"2009","unstructured":"Barabasi AL (2009) Scale-free networks: A decade and beyond. Science 325:412\u2013413","journal-title":"Science"},{"key":"5289_CR43","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1090\/S0002-9947-1984-0756039-5","volume":"286","author":"PL Erdos","year":"1984","unstructured":"Erdos PL, R\u00e9nyi A (1984) On the evolution of random graphs. Trans Am Math Soc 286:257\u2013257","journal-title":"Trans Am Math Soc"},{"key":"5289_CR44","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comcom.2016.04.014","volume":"95","author":"F Asgari","year":"2016","unstructured":"Asgari F, Sultan A, Xiong H, Gauthier V, El-Yacoubi MA (2016) Ct-mapper: Mapping sparse multimodal cellular trajectories using a multilayer transportation network. Comput Commun 95:69\u201381","journal-title":"Comput Commun"},{"key":"5289_CR45","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TPWRS.2017.2695963","volume":"33","author":"I Pe\u00f1a","year":"2018","unstructured":"Pe\u00f1a I, Mart\u00ednez-Anido CB, Hodge B-MS (2018) An extended ieee 118-bus test system with high renewable penetration. IEEE Trans Power Syst 33:281\u2013289","journal-title":"IEEE Trans Power Syst"},{"key":"5289_CR46","unstructured":"Y\u0131lmaz BG, Y\u0131maz \u00d6F (2022) Lot streaming in hybrid flowshop scheduling problem by considering equal and consistent sublots under machine capability and limited waiting time constraint. Comput Indust Eng"},{"key":"5289_CR47","unstructured":"Y\u0131lmaz \u00d6F, Durmusoglu MB (2019) A multi-objective scheduling of hybrid manufacturing systems with walking workers. Int J Indust Eng-theory Appl Practice 26"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05289-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05289-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05289-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T17:07:32Z","timestamp":1710608852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05289-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["5289"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05289-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"19 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"No participation of humans takes place in this implementation process. Human and animal rights No violation of Human and Animal Rights is involved.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}