{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:04:55Z","timestamp":1777982695192,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:00:00Z","timestamp":1772496000000},"content-version":"vor","delay-in-days":5,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule Mittweida, University of Applied Sciences"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-026-00776-5","type":"journal-article","created":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:05:25Z","timestamp":1772118325000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network reliability analysis by means of generalized matrix learning vector quantization"],"prefix":"10.1007","volume":"11","author":[{"given":"Klaus","family":"Dohmen","sequence":"first","affiliation":[]},{"given":"Mandy","family":"Lange-Geisler","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Villmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,26]]},"reference":[{"key":"776_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b12095","volume-title":"Reliability and maintenance: networks and systems","author":"F Beichelt","year":"2012","unstructured":"Beichelt F, Tittmann P (2012) Reliability and maintenance: networks and systems. CRC Press, Boca Raton"},{"issue":"2","key":"776_CR2","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1002\/wcs.1378","volume":"7","author":"M Biehl","year":"2016","unstructured":"Biehl M, Hammer B, Villmann T (2016) Prototype-based models in machine learning. Wiley Interdiscip Rev Cogn Sci 7(2):92\u2013111. https:\/\/doi.org\/10.1002\/wcs.1378","journal-title":"Wiley Interdiscip Rev Cogn Sci"},{"key":"776_CR3","doi-asserted-by":"publisher","unstructured":"Biehl M, Pavlov D, Sitch A et al (2024) Interpretable machine learning in endocrinology: a diagnostic tool in primary aldosteronism. In: Villmann T, Kaden M, Geweniger T et al (eds) Advances in self-organizing maps, learning vector quantization, interpretable machine learning, and beyond. Springer Nature, Cham, Lecture Notes in Networks and Systems, pp 96\u2013105. https:\/\/doi.org\/10.1007\/978-3-031-67159-3_11","DOI":"10.1007\/978-3-031-67159-3_11"},{"key":"776_CR4","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1002\/1520-6750(198912)36:6<807::AID-NAV3220360606>3.0.CO;2-I","volume":"36","author":"PJ Boland","year":"1989","unstructured":"Boland PJ, Proschan F, Tong YL (1989) Optimal arrangement of components via pairwise rearrangements. Nav Res Logist 36:807\u2013815","journal-title":"Nav Res Logist"},{"issue":"1","key":"776_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.neunet.2011.10.001","volume":"26","author":"K Bunte","year":"2012","unstructured":"Bunte K, Schneider P, Hammer B et al (2012) Limited rank matrix learning, discriminative dimension reduction and visualization. Neural Netw 26(1):159\u2013173. https:\/\/doi.org\/10.1016\/j.neunet.2011.10.001","journal-title":"Neural Netw"},{"key":"776_CR6","doi-asserted-by":"publisher","unstructured":"Chervonenkis AY (2013) Early history of support vector machines. In: Sch\u00f6lkopf B, Luo Z, Vovk V (eds) Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik. Springer, Berlin, Heidelberg, pp 13\u201320. https:\/\/doi.org\/10.1007\/978-3-642-41136-6_3","DOI":"10.1007\/978-3-642-41136-6_3"},{"key":"776_CR7","unstructured":"Crammer K, Gilad-Bachrach R, Navot A et al (2002) Margin analysis of the LVQ algorithm. In: Becker S, Thrun S, Obermayer K (eds) Advances in neural information processing systems, vol 15. MIT Press. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2002\/file\/bbaa9d6a1445eac881750bea6053f564-Paper.pdf"},{"key":"776_CR8","unstructured":"Dod M (2015) Domination in graphs with application to network reliability. PhD thesis, Faculty of Mathematics and Computer Science, Technical University of Freiberg, Freiberg"},{"issue":"1","key":"776_CR9","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1137\/S0895480101392630","volume":"16","author":"K Dohmen","year":"2003","unstructured":"Dohmen K (2003) Improved inclusion-exclusion identities and Bonferroni inequalities with reliability applications. SIAM J Discret Math 16(1):156\u2013171. https:\/\/doi.org\/10.1137\/S0895480101392630","journal-title":"SIAM J Discret Math"},{"key":"776_CR10","doi-asserted-by":"publisher","unstructured":"Dohmen K, Tittmann P (2012) Domination reliability. Electron J Comb 19:P15. https:\/\/doi.org\/10.37236\/1166","DOI":"10.37236\/1166"},{"key":"776_CR11","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/00401706.1963.10490075","volume":"5","author":"J Esary","year":"1963","unstructured":"Esary J, Proschan F (1963) Coherent structures of non-identical components. Technometrics 5:191\u2013209. https:\/\/doi.org\/10.1080\/00401706.1963.10490075","journal-title":"Technometrics"},{"issue":"11","key":"776_CR12","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"TMJ Fruchterman","year":"1991","unstructured":"Fruchterman TMJ, Reingold EM (1991) Graph drawing by force-directed placement. Softw Pract Exp 21(11):1129\u20131164. https:\/\/doi.org\/10.1002\/spe.4380211102","journal-title":"Softw Pract Exp"},{"key":"776_CR13","volume-title":"Bonferroni-type inequalities with applications","author":"J Galambos","year":"1996","unstructured":"Galambos J, Simonelli I (1996) Bonferroni-type inequalities with applications. Springer, Berlin, Heidelberg"},{"issue":"1","key":"776_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.strusafe.2005.12.002","volume":"29","author":"JE Hurtado","year":"2007","unstructured":"Hurtado JE (2007) Filtered importance sampling with support vector margin: a powerful method for structural reliability analysis. Struct Saf 29(1):2\u201315. https:\/\/doi.org\/10.1016\/j.strusafe.2005.12.002","journal-title":"Struct Saf"},{"issue":"1","key":"776_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/S00521-021-06018-2","volume":"34","author":"M Kaden","year":"2022","unstructured":"Kaden M, Bohnsack KS, Weber M et al (2022) Learning vector quantization as an interpretable classifier for the detection of SARS-CoV-2 types based on their RNA sequences. Neural Comput Appl 34(1):67\u201378. https:\/\/doi.org\/10.1007\/S00521-021-06018-2","journal-title":"Neural Comput Appl"},{"key":"776_CR16","doi-asserted-by":"publisher","unstructured":"Kohonen T (2001) Self-organizing maps, 3rd edn., Springer, Berlin, Heidelberg, Chap Learning Vector Quantization. https:\/\/doi.org\/10.1007\/978-3-642-56927-2","DOI":"10.1007\/978-3-642-56927-2"},{"key":"776_CR17","doi-asserted-by":"publisher","unstructured":"Kontoleon J (1980) Reliability determination of a $$r$$-successive-out-of-$$n$$:$$f$$ system. IEEE Trans Reliab 29:437. https:\/\/doi.org\/10.1109\/TR.1980.5220921","DOI":"10.1109\/TR.1980.5220921"},{"key":"776_CR18","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.neucom.2023.02.040","volume":"535","author":"P Lisboa","year":"2023","unstructured":"Lisboa P, Saralajew S, Vellido A et al (2023) The coming of age of interpretable and explainable machine learning models. Neurocomputing 535:25\u201339. https:\/\/doi.org\/10.1016\/j.neucom.2023.02.040","journal-title":"Neurocomputing"},{"key":"776_CR19","doi-asserted-by":"publisher","unstructured":"Papastavridis S, Koutras M (1993) Consecutive $$k$$-out-of-$$n$$ systems. In: Misra KB (ed) New trends in system reliability evaluation. Elsevier Science, Oxford, pp 228\u2013248. https:\/\/doi.org\/10.1016\/B978-0-444-81660-3.50015-0","DOI":"10.1016\/B978-0-444-81660-3.50015-0"},{"key":"776_CR20","unstructured":"Saralajew S, Holdijk L, Villmann T (2020) Fast adversarial robustness certification of nearest prototype classifiers for arbitrary seminorms. In: Larochelle H, Ranzato M, Hadsell R et al (eds) Advances in neural information processing systems, vol 33. Curran Associates, Inc., pp 13635\u201313650. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/9da187a7a191431db943a9a5a6fec6f4-Paper.pdf"},{"key":"776_CR21","unstructured":"Sato A, Yamada K (1995) Generalized learning vector quantization. In: Touretzky D, Mozer M, Hasselmo M (eds) Advances in neural information processing systems, vol 8. MIT Press. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/1995\/file\/9c3b1830513cc3b8fc4b76635d32e692-Paper.pdf"},{"key":"776_CR22","doi-asserted-by":"publisher","first-page":"3532","DOI":"10.1162\/neco.2009.11-08-908","volume":"21","author":"P Schneider","year":"2009","unstructured":"Schneider P, Biehl M, Hammer B (2009) Adaptive relevance matrices in learning vector quantization. Neural Comput 21:3532\u20133561. https:\/\/doi.org\/10.1162\/neco.2009.11-08-908","journal-title":"Neural Comput"},{"issue":"5","key":"776_CR23","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TNN.2009.2038645","volume":"21","author":"P Schneider","year":"2010","unstructured":"Schneider P, Bunte K, Stiekema H et al (2010) Regularization in matrix relevance learning. IEEE Trans Neural Netw 21(5):831\u2013840. https:\/\/doi.org\/10.1109\/TNN.2009.2038645","journal-title":"IEEE Trans Neural Netw"},{"key":"776_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109806","author":"Y Shi","year":"2024","unstructured":"Shi Y, Behrensdorf J, Zhou J et al (2024) Network reliability analysis through survival signature and machine learning techniques. Reliab Eng Syst Saf. https:\/\/doi.org\/10.1016\/j.ress.2023.109806","journal-title":"Reliab Eng Syst Saf"},{"key":"776_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2020.105708","volume":"197","author":"R van Veen","year":"2020","unstructured":"van Veen R, Gurvits V, Kogan RV et al (2020) An application of generalized matrix learning vector quantization in neuroimaging. Comput Methods Programs Biomed 197:105708. https:\/\/doi.org\/10.1016\/j.cmpb.2020.105708","journal-title":"Comput Methods Programs Biomed"},{"key":"776_CR26","unstructured":"Vor\u00e1\u010dek V, Hein M (2022) Provably adversarially robust nearest prototype classifiers. In: Proceedings of the 39th international conference on machine learning, pp 22361\u20132238. https:\/\/proceedings.mlr.press\/v162\/voracek22a.html"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-026-00776-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-026-00776-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-026-00776-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:31:16Z","timestamp":1772548276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41109-026-00776-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,26]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["776"],"URL":"https:\/\/doi.org\/10.1007\/s41109-026-00776-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7014031\/v1","asserted-by":"object"}]},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,26]]},"assertion":[{"value":"30 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"23"}}