{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:05:44Z","timestamp":1774051544514,"version":"3.50.1"},"reference-count":62,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100017610","name":"Shenzhen Science and Technology Innovation Program","doi-asserted-by":"publisher","award":["ZDCY20250901112210012"],"award-info":[{"award-number":["ZDCY20250901112210012"]}],"id":[{"id":"10.13039\/501100017610","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2024A1515010238"],"award-info":[{"award-number":["2024A1515010238"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Swarm and Evolutionary Computation"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.swevo.2026.102329","type":"journal-article","created":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T21:58:09Z","timestamp":1771106289000},"page":"102329","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Balancing cost and influential ability under structural failures via a multi-objective approach"],"prefix":"10.1016","volume":"102","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1796-7280","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9339-2276","authenticated-orcid":false,"given":"Junru","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Bai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.swevo.2026.102329_bib0001","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2019.04.033","article-title":"Identification of influential users in social networks based on users\u2019 interest","volume":"493","author":"Zareie","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.swevo.2026.102329_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107705","article-title":"Cascading failure prediction and recovery in large-scale critical infrastructure networks: a survey","volume":"182","author":"Li","year":"2025","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.swevo.2026.102329_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2023.129478","article-title":"Cascading failure resilience analysis and recovery of automotive manufacturing supply chain networks considering enterprise roles","volume":"634","author":"Fu","year":"2024","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"10.1016\/j.swevo.2026.102329_bib0004","series-title":"Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"137","article-title":"Maximizing the spread of influence through a social network","author":"Kempe","year":"2003"},{"key":"10.1016\/j.swevo.2026.102329_bib0005","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","article-title":"A set of measures of centrality based on betweenness","author":"Freeman","year":"1977","journal-title":"Sociometry"},{"issue":"11","key":"10.1016\/j.swevo.2026.102329_bib0006","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identifying influential spreaders in complex networks","volume":"6","author":"Kitsak","year":"2010","journal-title":"Nat. Phys."},{"issue":"10","key":"10.1016\/j.swevo.2026.102329_bib0007","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","article-title":"Mitigation of malicious attacks on networks","volume":"108","author":"Schneider","year":"2011","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"10.1016\/j.swevo.2026.102329_bib0008","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","article-title":"Robust influence maximization","author":"He","year":"2016"},{"key":"10.1016\/j.swevo.2026.102329_bib0009","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"795","article-title":"Robust influence maximization","author":"Chen","year":"2016"},{"key":"10.1016\/j.swevo.2026.102329_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.106942","article-title":"Efficient parallel computing on the game theory-aware robust influence maximization problem","volume":"220","author":"Gong","year":"2021","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.swevo.2026.102329_bib0011","series-title":"Proceedings of the Companion Conference on Genetic and Evolutionary Computation","first-page":"119","article-title":"A memetic algorithm to solve the robust influence maximization problems against cascading failures","author":"Cai","year":"2023"},{"key":"10.1016\/j.swevo.2026.102329_bib0012","doi-asserted-by":"crossref","unstructured":"J. Yang and J. Liu, \u201cInfluence maximization-cost minimization in social networks based on a multiobjective discrete particle swarm optimization algorithm,\u201d , vol. 6, pp. 2320\u20132329, 2018.","DOI":"10.1109\/ACCESS.2017.2782814"},{"issue":"8","key":"10.1016\/j.swevo.2026.102329_bib0013","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1134\/S0005117924700127","article-title":"A comparative analysis of centrality measures in complex networks","volume":"85","author":"Meshcheryakova","year":"2024","journal-title":"Autom. Remote Control"},{"issue":"21","key":"10.1016\/j.swevo.2026.102329_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e40031","article-title":"Budget-aware local influence iterative algorithm for efficient influence maximization in social networks","volume":"10","author":"Li","year":"2024","journal-title":"Heliyon"},{"key":"10.1016\/j.swevo.2026.102329_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107943","article-title":"Pareto based ant lion optimizer for energy efficient scheduling in cloud environment","volume":"113","author":"Rani","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.swevo.2026.102329_bib0016","series-title":"Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"420","article-title":"Cost-effective outbreak detection in networks","author":"Leskovec","year":"2007"},{"key":"10.1016\/j.swevo.2026.102329_bib0017","series-title":"Proceedings of the 20th International Conference Companion on World Wide Web","first-page":"47","article-title":"Celf++: optimizing the greedy algorithm for influence maximization in social networks","author":"Goyal","year":"2011"},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0018","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TNSE.2017.2742522","article-title":"A multi-objective evolutionary algorithm for promoting the emergence of cooperation and controllable robustness on directed networks","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.swevo.2026.102329_bib0019","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.ins.2016.12.027","article-title":"Clustering coefficients of large networks","volume":"382\u2013383","author":"Li","year":"2017","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.swevo.2026.102329_bib0020","doi-asserted-by":"crossref","DOI":"10.1007\/s13278-024-01388-6","article-title":"Normalized strength-degree centrality: identifying influential spreaders for weighted network","volume":"14","author":"Sadhu","year":"2024","journal-title":"Soc. Netw. Anal. Min."},{"issue":"8","key":"10.1016\/j.swevo.2026.102329_bib0021","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/14\/8\/083030","article-title":"A k-shell decomposition method for weighted networks","volume":"14","author":"Garas","year":"2012","journal-title":"New J. Phys."},{"key":"10.1016\/j.swevo.2026.102329_bib0022","article-title":"An improved influence maximization method for social networks based on genetic algorithm","volume":"586","author":"Lotf","year":"2022","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"10.1016\/j.swevo.2026.102329_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111470","article-title":"A multi-factor evolutionary algorithm for solving the multi-tasking robust optimization problem on networked systems","volume":"156","author":"Chen","year":"2024","journal-title":"Appl. Soft. Comput."},{"key":"10.1016\/j.swevo.2026.102329_bib0024","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1016\/j.ins.2016.07.012","article-title":"Influence maximization in social networks based on discrete particle swarm optimization","volume":"367\u2013368","author":"Gong","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.swevo.2026.102329_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.swevo.2019.100614","article-title":"Identifying influential nodes based on ant colony optimization to maximize profit in social networks","volume":"51","author":"Salavati","year":"2019","journal-title":"Swarm Evol. Comput."},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0026","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCI.2020.2976183","article-title":"Robust structural balance in signed networks using a multiobjective evolutionary algorithm","volume":"15","author":"Wang","year":"2020","journal-title":"IEEE Comput. Intell. Mag."},{"key":"10.1016\/j.swevo.2026.102329_bib0027","series-title":"Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining","first-page":"137","article-title":"Maximizing the spread of influence through a social network","author":"Kempe","year":"2003"},{"key":"10.1016\/j.swevo.2026.102329_bib0028","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"885","article-title":"Robust influence maximization","author":"He","year":"2016"},{"key":"10.1016\/j.swevo.2026.102329_bib0029","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"795","article-title":"Robust influence maximization","author":"Chen","year":"2016"},{"key":"10.1016\/j.swevo.2026.102329_bib0030","first-page":"6271","article-title":"Robust submodular maximization: a non-uniform partitioning approach","volume":"30","author":"Bogunovic","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"7","key":"10.1016\/j.swevo.2026.102329_bib0031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3587100","article-title":"Robust influence maximization under both aleatory and epistemic uncertainty","volume":"17","author":"Biswas","year":"2023","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"10.1016\/j.swevo.2026.102329_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.127704","article-title":"Finding robust and influential nodes from networks under cascading failures using a memetic algorithm","volume":"589","author":"Cai","year":"2024","journal-title":"Neurocomputing."},{"issue":"6","key":"10.1016\/j.swevo.2026.102329_bib0033","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/JSAC.2013.130610","article-title":"On budgeted influence maximization in social networks","volume":"31","author":"Nguyen","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"10.1016\/j.swevo.2026.102329_bib0034","first-page":"817","article-title":"On the optimal solution of budgeted influence maximization problem in social networks","volume":"19","author":"G\u00fcney","year":"2019","journal-title":"Oper. Res."},{"key":"10.1016\/j.swevo.2026.102329_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2019.01.070","article-title":"ComBIM: a community-based solution approach for the budgeted influence maximization problem","volume":"125","author":"Banerjee","year":"2019","journal-title":"Expert. Syst. Appl."},{"issue":"8","key":"10.1016\/j.swevo.2026.102329_bib0036","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1080\/01605682.2018.1489343","article-title":"How to maximize advertising performance in online social networks","volume":"70","author":"Liu","year":"2019","journal-title":"J. Oper. Res. Soc."},{"issue":"9","key":"10.1016\/j.swevo.2026.102329_bib0037","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.14778\/3397230.3397244","article-title":"Efficient algorithms for budgeted influence maximization on massive social networks","volume":"13","author":"Bian","year":"2020","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.swevo.2026.102329_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.114346","article-title":"Earned benefit maximization in social networks under budget constraint","volume":"169","author":"Banerjee","year":"2021","journal-title":"Expert. Syst. Appl."},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0039","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/TNSE.2021.3064828","article-title":"A local-global influence indicator based constrained evolutionary algorithm for budgeted influence maximization in social networks","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.swevo.2026.102329_bib0040","doi-asserted-by":"crossref","first-page":"2320","DOI":"10.1109\/ACCESS.2017.2782814","article-title":"Influence maximization-cost minimization in social networks based on a multiobjective discrete particle swarm optimization algorithm","volume":"6","author":"Yang","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.swevo.2026.102329_bib0041","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.neucom.2019.02.010","article-title":"Post and repost: a holistic view of budgeted influence maximization","volume":"338","author":"Shi","year":"2019","journal-title":"Neurocomputing"},{"key":"10.1016\/j.swevo.2026.102329_bib0042","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.ins.2019.11.029","article-title":"Efficient network seeding under variable node cost and limited budget for social networks","volume":"514","author":"de Souza","year":"2020","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0043","doi-asserted-by":"crossref","first-page":"83","DOI":"10.24846\/v33i2y202408","article-title":"A clustering-based hybrid particle swarm optimization algorithm for solving a multisectoral agent-based model","volume":"33","author":"Akopov","year":"2024","journal-title":"Stud. Inform. Control."},{"key":"10.1016\/j.swevo.2026.102329_bib0044","doi-asserted-by":"crossref","first-page":"167503","DOI":"10.1109\/ACCESS.2021.3134941","article-title":"Multi-objective accelerated particle swarm optimization with dynamic programing technique for resource allocation in Mobile edge computing","volume":"9","author":"Alfakih","year":"2021","journal-title":"IEEE Access"},{"issue":"15","key":"10.1016\/j.swevo.2026.102329_bib0045","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.3390\/math12152300","article-title":"Deep neural network and evolved optimization algorithm for damage assessment in a truss bridge","volume":"12","author":"Nguyen-Ngoc","year":"2024","journal-title":"Mathematics"},{"key":"10.1016\/j.swevo.2026.102329_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.engstruct.2025.120253","article-title":"A two-step failure identification approach using a stochastic optimization-based ensemble learning model for beams without pristine data","volume":"334","author":"Ho","year":"2025","journal-title":"Eng. Struct."},{"key":"10.1016\/j.swevo.2026.102329_bib0047","doi-asserted-by":"crossref","DOI":"10.1016\/j.compstruct.2025.119458","article-title":"Optimization of auxetic honeycomb structures for mechanical performance","volume":"371","author":"Hamid","year":"2025","journal-title":"Compos. Struct."},{"key":"10.1016\/j.swevo.2026.102329_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.advengsoft.2024.103696","article-title":"Blood-sucking leech optimizer","volume":"195","author":"Bai","year":"2024","journal-title":"Adv. Eng. Softw."},{"key":"10.1016\/j.swevo.2026.102329_bib0049","doi-asserted-by":"crossref","DOI":"10.1016\/j.compstruct.2025.118921","article-title":"A multi-objective optimization of porous sandwich functionally graded plates with graphene nanoplatelet reinforcement using blood-sucking leech optimizer","volume":"357","author":"Bai","year":"2025","journal-title":"Compos. Struct."},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0050","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/TNSE.2021.3064828","article-title":"A local-global influence indicator based constrained evolutionary algorithm for budgeted influence maximization in social networks","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"10.1016\/j.swevo.2026.102329_bib0051","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"10.1016\/j.swevo.2026.102329_bib0052","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10489-016-0825-8","article-title":"Multi-objective ant lion optimizer: a multi-objective optimization algorithm for solving engineering problems","volume":"46","author":"Mirjalili","year":"2016","journal-title":"Appl. Intell."},{"key":"10.1016\/j.swevo.2026.102329_bib0053","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113406","article-title":"Pruning-enabled dynamic influence maximization using antlion optimization","volume":"317","author":"Meena","year":"2025","journal-title":"Knowl. Based. Syst."},{"issue":"5439","key":"10.1016\/j.swevo.2026.102329_bib0054","first-page":"509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barab\u00e1si","year":"1999","journal-title":"Science (1979)"},{"key":"10.1016\/j.swevo.2026.102329_bib0055","series-title":"The Structure and Dynamics of Networks","first-page":"38","article-title":"On the evolution of random graphs","author":"Erd\u0151s","year":"2011"},{"issue":"4","key":"10.1016\/j.swevo.2026.102329_bib0056","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/4235.797969","article-title":"Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach","volume":"3","author":"Zitzler","year":"1999","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.swevo.2026.102329_bib0057","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.swevo.2011.08.001","article-title":"A multi-objective artificial bee colony algorithm","volume":"2","author":"Akbari","year":"2012","journal-title":"Swarm. Evol. Comput."},{"issue":"6","key":"10.1016\/j.swevo.2026.102329_bib0058","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","article-title":"MOEA\/D: a multiobjective evolutionary algorithm based on decomposition","volume":"11","author":"Zhang","year":"2007","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.swevo.2026.102329_bib0059","article-title":"TIK-report","volume":"103","author":"Zitzler","year":"2001"},{"key":"10.1016\/j.swevo.2026.102329_bib0060","series-title":"Proceedings of the 2023 International Conference on Green Building, Civil Engineering and Smart City (GBCESC 2023)","article-title":"Identifying key nodes in urban transportation systems using the information diffusion model","volume":"328","author":"He","year":"2024"},{"key":"10.1016\/j.swevo.2026.102329_bib0061","series-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence","article-title":"The network Data repository with interactive graph analytics and visualization","author":"Rossi","year":"2015"},{"key":"10.1016\/j.swevo.2026.102329_bib0062","series-title":"Proceedings of the 26th Annual Conference on Neural Information Processing Systems","article-title":"Learning to discover social circles in ego networks","author":"McAuley","year":"2012"}],"container-title":["Swarm and Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2210650226000490?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2210650226000490?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T23:20:59Z","timestamp":1774048859000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2210650226000490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":62,"alternative-id":["S2210650226000490"],"URL":"https:\/\/doi.org\/10.1016\/j.swevo.2026.102329","relation":{},"ISSN":["2210-6502"],"issn-type":[{"value":"2210-6502","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Balancing cost and influential ability under structural failures via a multi-objective approach","name":"articletitle","label":"Article Title"},{"value":"Swarm and Evolutionary Computation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.swevo.2026.102329","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102329"}}