{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T14:38:23Z","timestamp":1777473503320,"version":"3.51.4"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T00:00:00Z","timestamp":1520294400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["Grant No. 61671384"],"award-info":[{"award-number":["Grant No. 61671384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["Program No. 2016JM6018"],"award-info":[{"award-number":["Program No. 2016JM6018"]}]},{"name":"Aviation Science Foundation","award":["Program No. 20165553036"],"award-info":[{"award-number":["Program No. 20165553036"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Fuzzy Syst."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s40815-018-0457-8","type":"journal-article","created":{"date-parts":[[2018,3,6]],"date-time":"2018-03-06T02:49:37Z","timestamp":1520304577000},"page":"1956-1967","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Evaluating Topological Vulnerability Based on Fuzzy Fractal Dimension"],"prefix":"10.1007","volume":"20","author":[{"given":"Tao","family":"Wen","sequence":"first","affiliation":[]},{"given":"Moxian","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,6]]},"reference":[{"key":"457_CR2","doi-asserted-by":"publisher","unstructured":"Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the north american power grid. Phys. Rev. E 69(2) (2004). \n                    https:\/\/doi.org\/10.1103\/PhysRevE.69.025103","DOI":"10.1103\/PhysRevE.69.025103"},{"issue":"1","key":"457_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barabasi, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47\u201397 (2002). \n                    https:\/\/doi.org\/10.1103\/RevModPhys.74.47","journal-title":"Rev. Mod. Phys."},{"issue":"5","key":"457_CR4","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/s10845-013-0794-2","volume":"26","author":"MB Ayhan","year":"2015","unstructured":"Ayhan, M.B., Aydin, M.E., Oztemel, E.: A multi-agent based approach for change management in manufacturing enterprises. J. Intell. Manuf. 26(5), 975\u2013988 (2015). \n                    https:\/\/doi.org\/10.1007\/s10845-013-0794-2","journal-title":"J. Intell. Manuf."},{"key":"457_CR5","doi-asserted-by":"publisher","unstructured":"Bian, T., Zheng, H., Yin, L., Deng, Y.: Failure mode and effects analysis based on Dnumbers and topsis. Qual. Reliab. Eng. Int. Article ID: QRE2268 (2018). \n                    https:\/\/doi.org\/10.1002\/qre.2268","DOI":"10.1002\/qre.2268"},{"key":"457_CR6","doi-asserted-by":"publisher","unstructured":"Boccaletti, S., Buldu, J., Criado, R., Flores, J., Latora, V., Pello, J., Romance, M.: Multiscale vulnerability of complex networks. Chaos 17(4) (2007). \n                    https:\/\/doi.org\/10.1063\/1.2801687","DOI":"10.1063\/1.2801687"},{"key":"457_CR1","unstructured":"Bureau of transportation statistics. \n                    http:\/\/www.transtats.bts.gov\/DL_SelectFields.asp?Table_ID=292"},{"issue":"8","key":"457_CR7","doi-asserted-by":"publisher","first-page":"3439","DOI":"10.1016\/j.asoc.2013.04.011","volume":"13","author":"CJ Carmona","year":"2013","unstructured":"Carmona, C.J., Chrysostomou, C., Seker, H., del Jesus, M.J.: Fuzzy rules for describing subgroups from influenza a virus using a multi-objective evolutionary algorithm. Appl. Soft Comput. 13(8), 3439\u20133448 (2013). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2013.04.011","journal-title":"Appl. Soft Comput."},{"key":"457_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ins.2014.09.040","volume":"294","author":"O Castillo","year":"2015","unstructured":"Castillo, O., Lizarraga, E., Soria, J., Melin, P., Valdez, F.: New approach using ant colony optimization with ant set partition for fuzzy control design applied to the ball and beam system. Inf. Sci. 294, 203\u2013215 (2015). \n                    https:\/\/doi.org\/10.1016\/j.ins.2014.09.040","journal-title":"Inf. Sci."},{"issue":"1","key":"457_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0921-8890(99)00026-3","volume":"28","author":"O Castillo","year":"1999","unstructured":"Castillo, O., Melin, P.: Automated mathematical modelling, simulation and behavior identification of robotic dynamic systems using a new fuzzy-fractal-genetic approach. Robot. Auton. Syst. 28(1), 19\u201330 (1999). \n                    https:\/\/doi.org\/10.1016\/s0921-8890(99)00026-3","journal-title":"Robot. Auton. Syst."},{"issue":"6","key":"457_CR10","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/TNN.2002.804316","volume":"13","author":"O Castillo","year":"2002","unstructured":"Castillo, O., Melin, P.: Hybrid intelligent systems for time series prediction using neural networks, fuzzy logic, and fractal theory. IEEE Trans. Neural Netw. 13(6), 1395\u20131408 (2002). \n                    https:\/\/doi.org\/10.1109\/tnn.2002.804316","journal-title":"IEEE Trans. Neural Netw."},{"key":"457_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2012.04.003","volume":"205","author":"O Castillo","year":"2012","unstructured":"Castillo, O., Melin, P.: Optimization of type-2 fuzzy systems based on bio-inspired methods: a concise review. Inf. Sci. 205, 1\u201319 (2012). \n                    https:\/\/doi.org\/10.1016\/j.ins.2012.04.003","journal-title":"Inf. Sci."},{"issue":"8","key":"457_CR12","doi-asserted-by":"publisher","first-page":"5590","DOI":"10.1016\/j.asoc.2011.04.005","volume":"11","author":"O Castillo","year":"2011","unstructured":"Castillo, O., Melin, P., Pedrycz, W.: Design of interval type-2 fuzzy models through optimal granularity allocation. Appl. Soft Comput. 11(8), 5590\u20135601 (2011). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2011.04.005","journal-title":"Appl. Soft Comput."},{"key":"457_CR13","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.asoc.2014.12.002","volume":"28","author":"O Castillo","year":"2015","unstructured":"Castillo, O., Neyoy, H., Soria, J., Melin, P., Valdez, F.: A new approach for dynamic fuzzy logic parameter tuning in ant colony optimization and its application in fuzzy control of a mobile robot. Appl. Soft Comput. 28, 150\u2013159 (2015). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2014.12.002","journal-title":"Appl. Soft Comput."},{"issue":"3","key":"457_CR14","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TFUZZ.2016.2566812","volume":"25","author":"KY Chan","year":"2017","unstructured":"Chan, K.Y., Engelke, U.: Varying spread fuzzy regression for affective quality estimation. IEEE Trans. Fuzzy Syst. 25(3), 594\u2013613 (2017). \n                    https:\/\/doi.org\/10.1109\/tfuzz.2016.2566812","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"5","key":"457_CR15","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/TFUZZ.2014.2375911","volume":"23","author":"KY Chan","year":"2015","unstructured":"Chan, K.Y., Lam, H.K., Dillon, T.S., Ling, S.H.: A stepwise-based fuzzy regression procedure for developing customer preference models in new product development. IEEE Trans. Fuzzy Syst. 23(5), 1728\u20131745 (2015). \n                    https:\/\/doi.org\/10.1109\/tfuzz.2014.2375911","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"457_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.asoc.2016.01.008","volume":"41","author":"CH Chen","year":"2016","unstructured":"Chen, C.H., Lan, G.C., Hong, T.P., Lin, S.B.: Mining fuzzy temporal association rules by item lifespans. Appl. Soft Comput. 41, 265\u2013274 (2016). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2015.01.008","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"457_CR17","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.3233\/IFS-151838","volume":"30","author":"CC Chou","year":"2016","unstructured":"Chou, C.C.: A generalized similarity measure for fuzzy numbers. J. Intell. Fuzzy Syst. 30(2), 1147\u20131155 (2016)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"457_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.physa.2015.12.053","volume":"448","author":"JR Clough","year":"2016","unstructured":"Clough, J.R., Evans, T.S.: What is the dimension of citation space? Phys. Stat. Mech. Appl. 448, 235\u2013247 (2016). \n                    https:\/\/doi.org\/10.1016\/j.physa.2015.12.053","journal-title":"Phys. Stat. Mech. Appl."},{"issue":"1","key":"457_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10115-016-0938-8","volume":"50","author":"GC Crisan","year":"2017","unstructured":"Crisan, G.C., Pintea, C.M., Palade, V.: Emergency management using geographic information systems: application to the first romanian traveling salesman problem instance. Knowl. Inf. Syst. 50(1), 265\u2013285 (2017). \n                    https:\/\/doi.org\/10.1007\/s10115-016-0938-8","journal-title":"Knowl. Inf. Syst."},{"key":"457_CR20","doi-asserted-by":"publisher","unstructured":"Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69(4) (2004). \n                    https:\/\/doi.org\/10.1103\/PhysRevE.69.045104","DOI":"10.1103\/PhysRevE.69.045104"},{"key":"457_CR21","doi-asserted-by":"publisher","unstructured":"Deng, X., Deng, Y.: D-AHP method with different credibility of information. Soft Comput. pp. Published online, \n                    https:\/\/doi.org\/10.1007\/s00500-017-2993-9\n                    \n                  (2018)","DOI":"10.1007\/s00500-017-2993-9"},{"issue":"9","key":"457_CR22","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1109\/TCYB.2015.2462352","volume":"46","author":"X Deng","year":"2016","unstructured":"Deng, X., Han, D., Dezert, J., Deng, Y., Shyr, Y.: Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 46(9), 2070\u20132082 (2016)","journal-title":"IEEE Trans. Cybern."},{"issue":"1","key":"457_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/int.21929","volume":"33","author":"X Deng","year":"2018","unstructured":"Deng, X., Jiang, W.: An evidential axiomatic design approach for decision making using the evaluation of belief structure satisfaction to uncertain target values. Int. J. Intell. Syst. 33(1), 15\u201332 (2018). \n                    https:\/\/doi.org\/10.1002\/int.21929","journal-title":"Int. J. Intell. Syst."},{"key":"457_CR24","doi-asserted-by":"publisher","unstructured":"Du, W.J., Zhang, J.G., An, X.L., Qin, S., Yu, J.N.: Outer synchronization between two coupled complex networks and its application in public traffic supernetwork. Discrete Dyn. Nat. Soc. p. 8 (2016). \n                    https:\/\/doi.org\/10.1155\/2016\/8920764","DOI":"10.1155\/2016\/8920764"},{"key":"457_CR25","doi-asserted-by":"publisher","unstructured":"Du, W.J., Zhang, J.G., Li, Y.Z., Qin, S.: Synchronization between different networks with time-varying delay and its application in bilayer coupled public traffic network. Math. Probl. Eng. p. 11 (2016). \n                    https:\/\/doi.org\/10.1155\/2016\/6498316","DOI":"10.1155\/2016\/6498316"},{"key":"457_CR26","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.neucom.2016.03.033","volume":"199","author":"U Ekong","year":"2016","unstructured":"Ekong, U., Lam, H.K., Xiao, B., Ouyang, G.X., Liu, H.B., Chan, K.Y., Ling, S.H.: Classification of epilepsy seizure phase using interval type-2 fuzzy support vector machines. Neurocomputing 199, 66\u201376 (2016). \n                    https:\/\/doi.org\/10.1016\/j.neucom.2016.03.033","journal-title":"Neurocomputing"},{"issue":"8","key":"457_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1371\/journal.pone.0136704","volume":"10","author":"LK Gallos","year":"2015","unstructured":"Gallos, L.K., Fefferman, N.H.: The effect of disease-induced mortality on structural network properties. Plos One 10(8), 17 (2015). \n                    https:\/\/doi.org\/10.1371\/journal.pone.0136704","journal-title":"Plos One"},{"key":"457_CR28","doi-asserted-by":"publisher","unstructured":"Gallos, L.K., Fefferman, N.H.: Simple and efficient self-healing strategy for damaged complex networks. Phys. Rev. E 92(5) (2015). \n                    https:\/\/doi.org\/10.1103\/PhysRevE.92.052806","DOI":"10.1103\/PhysRevE.92.052806"},{"issue":"8","key":"457_CR29","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1073\/pnas.1106612109","volume":"109","author":"LK Gallos","year":"2012","unstructured":"Gallos, L.K., Makse, H.A., Sigman, M.: A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks. Proc. Natl. Acad. Sci. U. S. A. 109(8), 2825\u20132830 (2012). \n                    https:\/\/doi.org\/10.1073\/pnas.1106612109","journal-title":"Proc. Natl. Acad. Sci. U. S. A."},{"issue":"6","key":"457_CR30","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1371\/journal.pone.0066443","volume":"8","author":"LK Gallos","year":"2013","unstructured":"Gallos, L.K., Potiguar, F.Q., Andrade, J.S., Makse, H.A.: Imdb network revisited: Unveiling fractal and modular properties from a typical small-world network. Plos One 8(6), 8 (2013). \n                    https:\/\/doi.org\/10.1371\/journal.pone.0066443","journal-title":"Plos One"},{"issue":"7590","key":"457_CR31","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1038\/nature16948","volume":"530","author":"JX Gao","year":"2016","unstructured":"Gao, J.X., Barzel, B., Barabasi, A.L.: Universal resilience patterns in complex networks. Nature 530(7590), 307\u2013312 (2016). \n                    https:\/\/doi.org\/10.1038\/nature16948","journal-title":"Nature"},{"key":"457_CR32","doi-asserted-by":"publisher","unstructured":"Gou, L., Wei, B., Sadiq, R., Sadiq, Y., Deng, Y.: Topological vulnerability evaluation model based on fractal dimension of complex networks. Plos One 11(1) (2016). \n                    https:\/\/doi.org\/10.1371\/journal.pone.0146896","DOI":"10.1371\/journal.pone.0146896"},{"key":"457_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s12859-016-0933-9","volume":"17","author":"K Hahn","year":"2016","unstructured":"Hahn, K., Massopust, P.R., Prigarin, S.: A new method to measure complexity in binary or weighted networks and applications to functional connectivity in the human brain. Bmc Bioinform. 17, 18 (2016). \n                    https:\/\/doi.org\/10.1186\/s12859-016-0933-9","journal-title":"Bmc Bioinform."},{"key":"457_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/BF01457179","volume":"79","author":"F Hausdorff","year":"1919","unstructured":"Hausdorff, F.: Dimension and outer dimension. Mathematische Annalen 79, 157\u2013179 (1919)","journal-title":"Mathematische Annalen"},{"key":"457_CR35","doi-asserted-by":"publisher","unstructured":"Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5) (2002). \n                    https:\/\/doi.org\/10.1103\/PhysRevE.65.056109","DOI":"10.1103\/PhysRevE.65.056109"},{"issue":"4","key":"457_CR36","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1111\/j.1539-6924.2006.00791.x","volume":"26","author":"AJ Holmgren","year":"2006","unstructured":"Holmgren, A.J.: Using graph models to analyze the vulnerability of electric power networks. Risk Anal. 26(4), 955\u2013969 (2006). \n                    https:\/\/doi.org\/10.1111\/j.1539-6924.2006.00791.x","journal-title":"Risk Anal."},{"issue":"2","key":"457_CR37","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.eswa.2013.07.090","volume":"41","author":"TP Hong","year":"2014","unstructured":"Hong, T.P., Lee, Y.C., Wu, M.T.: An effective parallel approach for genetic-fuzzy data mining. Expert Syst. Appl. 41(2), 655\u2013662 (2014). \n                    https:\/\/doi.org\/10.1016\/j.eswa.2013.07.090","journal-title":"Expert Syst. Appl."},{"key":"457_CR38","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1038\/s41598-017-00052-8","volume":"7","author":"DW Huang","year":"2017","unstructured":"Huang, D.W., Yu, Z.G.: Dynamic-sensitive centrality of nodes in temporal networks. Sci. Rep. 7, 11 (2017). \n                    https:\/\/doi.org\/10.1038\/srep41454","journal-title":"Sci. Rep."},{"issue":"5","key":"457_CR39","doi-asserted-by":"publisher","first-page":"631","DOI":"10.15837\/ijccc.2017.5.2950","volume":"12","author":"W Jiang","year":"2017","unstructured":"Jiang, W., Wang, S.: An uncertainty measure for interval-valued evidences. Int. J. Comput. Commun. Control 12(5), 631\u2013644 (2017)","journal-title":"Int. J. Comput. Commun. Control"},{"key":"457_CR40","doi-asserted-by":"publisher","unstructured":"Jiang, W., Wei, B., Liu, X., Li, X., Zheng, H.: Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making. Int. J. Syst. Sci. Published on line. \n                    https:\/\/doi.org\/10.1002\/int.21939\n                    \n                  (2018)","DOI":"10.1002\/int.21939"},{"issue":"1","key":"457_CR41","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1002\/int.21939","volume":"33","author":"W Jiang","year":"2018","unstructured":"Jiang, W., Wei, B., Liu, X., Li, X., Zheng, H.: Intuitionistic fuzzy power aggregation operator based on entropy and its application in decision making. Int. J. Intell. Syst. 33(1), 49\u201367 (2018). \n                    https:\/\/doi.org\/10.1002\/int.21939","journal-title":"Int. J. Intell. Syst."},{"key":"457_CR42","doi-asserted-by":"publisher","unstructured":"Kang, B., Chhipi-Shrestha, G., Deng, Y., Hewage, K., Sadiq, R.: Stable strategies analysis based on the utility of z-number in the evolutionary games. Appl. Mathe. Comput. (2017). \n                    https:\/\/doi.org\/10.1016\/j.amc.2017.12.006","DOI":"10.1016\/j.amc.2017.12.006"},{"key":"457_CR43","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.asoc.2015.01.055","volume":"30","author":"GC Lan","year":"2015","unstructured":"Lan, G.C., Hong, T.P., Lin, Y.H., Wang, S.L.: Fuzzy utility mining with upper-bound measure. Appl. Soft Comput. 30, 767\u2013777 (2015). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2015.01.055","journal-title":"Appl. Soft Comput."},{"key":"457_CR44","doi-asserted-by":"publisher","unstructured":"Liu, T., Deng, Y., Chan, F.: Evidential supplier selection based on DEMATEL and game theory. Int. J. Fuzzy Syst. \n                    https:\/\/doi.org\/10.1007\/s40815-017-0400-4\n                    \n                  (2017)","DOI":"10.1007\/s40815-017-0400-4"},{"issue":"7","key":"457_CR45","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1016\/j.ins.2006.07.022","volume":"177","author":"P Melin","year":"2007","unstructured":"Melin, P., Castillo, O.: An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory. Inf. Sci. 177(7), 1543\u20131557 (2007). \n                    https:\/\/doi.org\/10.1016\/j.ins.2006.07.022","journal-title":"Inf. Sci."},{"issue":"1","key":"457_CR46","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.cnsns.2010.03.018","volume":"16","author":"I Mishkovski","year":"2011","unstructured":"Mishkovski, I., Biey, M., Kocarev, L.: Vulnerability of complex networks. Commun. Nonlinear Sci. Numer. Simul. 16(1), 341\u2013349 (2011). \n                    https:\/\/doi.org\/10.1016\/j.cnsns.2010.03.018","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7563","key":"457_CR47","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone, F., Makse, H.A.: Influence maximization in complex networks through optimal percolation. Nature 524(7563), 65\u2013U122 (2015). \n                    https:\/\/doi.org\/10.1038\/nature14604","journal-title":"Nature"},{"issue":"2","key":"457_CR48","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman, M.E.J.: The structure and function of complex networks. Siam Rev. 45(2), 167\u2013256 (2003). \n                    https:\/\/doi.org\/10.1137\/s003614450342480","journal-title":"Siam Rev."},{"issue":"2","key":"457_CR49","first-page":"326","volume":"53","author":"VA Paun","year":"2016","unstructured":"Paun, V.A., Paun, V.P.: Fracture surface evaluation of zircaloy-4. Mater. Plast. 53(2), 326\u2013331 (2016)","journal-title":"Mater. Plast."},{"key":"457_CR50","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.fss.2014.04.017","volume":"274","author":"W Pedrycz","year":"2015","unstructured":"Pedrycz, W.: From fuzzy data analysis and fuzzy regression to granular fuzzy data analysis. Fuzzy Sets Syst. 274, 12\u201317 (2015). \n                    https:\/\/doi.org\/10.1016\/j.fss.2014.04.017","journal-title":"Fuzzy Sets Syst."},{"key":"457_CR51","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/18756891.2016.1180818","volume":"9","author":"W Pedrycz","year":"2016","unstructured":"Pedrycz, W.: From fuzzy models to granular fuzzy models. Int. J. Comput. Intell. Syst. 9, 35\u201342 (2016). \n                    https:\/\/doi.org\/10.1080\/18756891.2016.1180818","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"457_CR52","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0020-0255(03)00075-6","volume":"153","author":"W Pedrycz","year":"2003","unstructured":"Pedrycz, W., Bargiela, A.: Fuzzy fractal dimensions and fuzzy modeling. Inf. Sci. 153, 199\u2013216 (2003). \n                    https:\/\/doi.org\/10.1016\/s0020-0255(03)00075-6","journal-title":"Inf. Sci."},{"issue":"1","key":"457_CR53","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TFUZZ.2015.2428717","volume":"24","author":"W Pedrycz","year":"2016","unstructured":"Pedrycz, W., Jastrzebska, A., Homenda, W.: Design of fuzzy cognitive maps for modeling time series. IEEE Trans. Fuzzy Syst. 24(1), 120\u2013130 (2016). \n                    https:\/\/doi.org\/10.1109\/tfuzz.2015.2428717","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"6196","key":"457_CR54","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1126\/science.1240064","volume":"345","author":"M Schich","year":"2014","unstructured":"Schich, M., Song, C.M., Ahn, Y.Y., Mirsky, A., Martino, M., Barabasi, A.L., Helbing, D.: A network framework of cultural history. Science 345(6196), 558\u2013562 (2014). \n                    https:\/\/doi.org\/10.1126\/science.1240064","journal-title":"Science"},{"issue":"6","key":"457_CR55","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1142\/S0217984907012773","volume":"21","author":"O Shanker","year":"2007","unstructured":"Shanker, O.: Defining dimension of a complex network. Mod. Phys. Lett. B 21(6), 321\u2013326 (2007). \n                    https:\/\/doi.org\/10.1142\/s0217984907012773","journal-title":"Mod. Phys. Lett. B"},{"key":"457_CR56","doi-asserted-by":"publisher","unstructured":"Song, C.M., Gallos, L.K., Havlin, S., Makse, H.A.: How to calculate the fractal dimension of a complex network: the box covering algorithm. J. Stat. Mech-Theory Exp. p.\u00a016 (2007). \n                    https:\/\/doi.org\/10.1088\/1742-5468\/2007\/03\/p03006","DOI":"10.1088\/1742-5468\/2007\/03\/p03006"},{"issue":"4","key":"457_CR57","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1038\/nphys266","volume":"2","author":"CM Song","year":"2006","unstructured":"Song, C.M., Havlin, S., Makse, H.A.: Origins of fractality in the growth of complex networks. Nat. Phys. 2(4), 275\u2013281 (2006). \n                    https:\/\/doi.org\/10.1038\/nphys266","journal-title":"Nat. Phys."},{"key":"457_CR58","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.asoc.2016.01.024","volume":"43","author":"V Uslan","year":"2016","unstructured":"Uslan, V., Seker, H.: Quantitative prediction of peptide binding affinity by using hybrid fuzzy support vector regression. Appl. Comput. 43, 210\u2013221 (2016). \n                    https:\/\/doi.org\/10.1016\/j.asoc.2016.01.024","journal-title":"Appl. Comput."},{"key":"457_CR59","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ssci.2012.09.011","volume":"53","author":"J Wang","year":"2013","unstructured":"Wang, J.: Robustness of complex networks with the local protection strategy against cascading failures. Saf. Sci. 53, 219\u2013225 (2013). \n                    https:\/\/doi.org\/10.1016\/j.ssci.2012.09.011","journal-title":"Saf. Sci."},{"issue":"10","key":"457_CR60","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1016\/j.ssci.2009.02.002","volume":"47","author":"JW Wang","year":"2009","unstructured":"Wang, J.W., Rong, L.L.: Cascade-based attack vulnerability on the us power grid. Saf. Sci. 47(10), 1332\u20131336 (2009). \n                    https:\/\/doi.org\/10.1016\/j.ssci.2009.02.002","journal-title":"Saf. Sci."},{"key":"457_CR61","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1038\/srep03055","volume":"3","author":"Z Wang","year":"2013","unstructured":"Wang, Z., Xia, C.Y., Meloni, S., Zhou, C.S., Moreno, Y.: Impact of social punishment on cooperative behavior in complex networks. Sci. Rep. 3, 7 (2013). \n                    https:\/\/doi.org\/10.1038\/srep03055","journal-title":"Sci. Rep."},{"key":"457_CR62","doi-asserted-by":"publisher","unstructured":"Xu, H., Deng, Y.: Dependent evidence combination based on shearman coefficient and pearson coefficient. IEEE Access \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2783320\n                    \n                   (2018)","DOI":"10.1109\/ACCESS.2017.2783320"},{"key":"457_CR63","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.apm.2017.07.032","volume":"55","author":"S Xu","year":"2018","unstructured":"Xu, S., Jiang, W., Deng, X., Shou, Y.: A modified physarum-inspired model for the user equilibrium traffic assignment problem. Appl. Math. Model. 55, 340\u2013353 (2018). \n                    https:\/\/doi.org\/10.1016\/j.apm.2017.07.032","journal-title":"Appl. Math. Model."},{"key":"457_CR64","doi-asserted-by":"publisher","unstructured":"Yin, L., Deng, Y.: Measuring transferring similarity via local information. Phys. A: Stat. Mech. Appl. (2018). \n                    https:\/\/doi.org\/10.1016\/j.physa.2017.12.144","DOI":"10.1016\/j.physa.2017.12.144"},{"issue":"3","key":"457_CR65","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L Zadeh","year":"1965","unstructured":"Zadeh, L.: Fuzzy sets. Inf. Control evaluation Method Based 8(3), 338\u2013353 (1965). \n                    https:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","journal-title":"Inf. Control evaluation Method Based"},{"issue":"4","key":"457_CR66","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s11634-017-0300-3","volume":"11","author":"R Zhang","year":"2018","unstructured":"Zhang, R., Ashuri, B., Deng, Y.: A novel method for forecasting time series based on fuzzy logic and visibility graph. Adv. Data Anal. Classif. 11(4), 759\u2013783 (2018). \n                    https:\/\/doi.org\/10.1007\/s11634-017-0300-3","journal-title":"Adv. Data Anal. Classif."},{"issue":"1","key":"457_CR67","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1209\/0295-5075\/116\/18001","volume":"116","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Feng, L., Berman, Y., Hu, N., Stanley, H.E.: Exacerbated vulnerability of coupled socio-economic risk in complex networks. Epl 116(1), 6 (2016). \n                    https:\/\/doi.org\/10.1209\/0295-5075\/116\/18001","journal-title":"Epl"},{"issue":"2","key":"457_CR68","doi-asserted-by":"publisher","first-page":"173","DOI":"10.2174\/1574893611666160125221326","volume":"11","author":"ZQ Zhao","year":"2016","unstructured":"Zhao, Z.Q., Yu, Z.G., Anh, V., Wu, J.Y., Han, G.S.: Protein folding kinetic order prediction from amino acid sequence based on horizontal visibility network. Curr. Bioinf. 11(2), 173\u2013185 (2016). \n                    https:\/\/doi.org\/10.2174\/1574893611666160125221326","journal-title":"Curr. Bioinf."},{"key":"457_CR69","doi-asserted-by":"publisher","unstructured":"Zheng, H., Deng, Y.: Evaluation method based on fuzzy relations between Dempster-Shafer belief structure. Int. J. Intell. Syst. (2017). \n                    https:\/\/doi.org\/10.1002\/int.21956","DOI":"10.1002\/int.21956"},{"key":"457_CR70","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.anucene.2017.10.045","volume":"112","author":"X Zheng","year":"2018","unstructured":"Zheng, X., Deng, Y.: Dependence assessment in human reliability analysis based on evidence credibility decay model and iowa operator. Ann. Nucl. Energy 112, 673\u2013684 (2018)","journal-title":"Ann. Nucl. Energy"}],"container-title":["International Journal of Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40815-018-0457-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-018-0457-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-018-0457-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T22:17:18Z","timestamp":1551824238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40815-018-0457-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,6]]},"references-count":70,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["457"],"URL":"https:\/\/doi.org\/10.1007\/s40815-018-0457-8","relation":{},"ISSN":["1562-2479","2199-3211"],"issn-type":[{"value":"1562-2479","type":"print"},{"value":"2199-3211","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,6]]},"assertion":[{"value":"25 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}