{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T08:33:17Z","timestamp":1768638797633,"version":"3.49.0"},"reference-count":52,"publisher":"Oxford University Press (OUP)","issue":"6","license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Scale-free networks, which play an important role in modelling human activities, are always suffering from intentional attacks which have serious consequences on their functionality. Degree distribution and community structure are two distinguishing characteristics of these networks considered in optimizing network robustness process recently. Since community structure is known as functional modules in some networks, modifying them during the improving network robustness process may affect network performance. We propose a preferential rewiring method to improve network robustness which not only keeps degree distribution unchanged but also preserves community structure and decreases the number of rewired edges at the same time. At first, the robustness of each community is improved by applying a smart rewiring method based on the neighbourhood of nodes. Then, relations between communities are gotten more robust with a preferential rewiring based on degree and betweenness hybrid centrality of nodes. This method was applied to several types of networks including Dolphins, WU-PowerGrid and US-Airline as real-world networks and Lancichinetti\u2013Fortunato\u2013Radicchi benchmark model as an artificial network with the scale-free property. The results show that the proposed method enhances the robustness of all networks against degree centrality attacks between 50% and 80% and betweenness centrality attacks between 30% and 70%. Whereas, in all cases, community structure preserved more than 50%. In comparison with previous studies, the proposed method can improve network robustness more significantly and decrease the number of rewires. It also is not dependent on the attack strategy.<\/jats:p>","DOI":"10.1093\/comnet\/cnz009","type":"journal-article","created":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T20:10:43Z","timestamp":1552162243000},"page":"838-864","source":"Crossref","is-referenced-by-count":14,"title":["Improving the robustness of scale-free networks by maintaining community structure"],"prefix":"10.1093","volume":"7","author":[{"given":"Marzieh","family":"Mozafari","sequence":"first","affiliation":[{"name":"Faculty of New Sciences and Technologies, University of Tehran, Amir Abad, North Kargar Street, 14395-1374 Tehran, Iran"}]},{"given":"Mohammad","family":"Khansari","sequence":"additional","affiliation":[{"name":"Faculty of New Sciences and Technologies, University of Tehran, Amir Abad, North Kargar Street, 14395-1374 Tehran, Iran"}]}],"member":"286","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"key":"2019121010372481200_B1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","article-title":"Statistical mechanics of complex networks","volume":"74","author":"Albert,","year":"2002","journal-title":"Rev. Modern Phys."},{"key":"2019121010372481200_B2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","article-title":"Complex networks: structure and dynamics","volume":"424","author":"Boccaletti,","year":"2006","journal-title":"Phys. Rep"},{"key":"2019121010372481200_B3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511780356","volume-title":"Complex Networks: Structure, Robustness and Function","author":"Cohen,","year":"2010"},{"key":"2019121010372481200_B4","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"Newman,","year":"2003","journal-title":"SIAM Rev."},{"key":"2019121010372481200_B5","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1038\/35065725","article-title":"Exploring complex networks","volume":"410","author":"Strogatz,","year":"2001","journal-title":"Nature"},{"key":"2019121010372481200_B6","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of small-world networks","volume":"393","author":"Watts,","year":"1998","journal-title":"Nature"},{"key":"2019121010372481200_B7","volume-title":"Evolution of Networks: From Biological Nets to the Internet and WWW","author":"Dorogovtsev,","year":"2013"},{"key":"2019121010372481200_B8","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.physa.2004.04.031","article-title":"Error and attack tolerance of complex networks","volume":"340","author":"Crucitti,","year":"2004","journal-title":"Phys. A"},{"key":"2019121010372481200_B9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1103\/PhysRevE.65.056109","article-title":"Attack vulnerability of complex networks","volume":"65","author":"Holme,","year":"2002","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B10","article-title":"Graph measures and network robustness","volume":"abs\/1311.5064","author":"Wendy,","year":"2013","journal-title":"CoRR"},{"key":"2019121010372481200_B11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/00018730601170527","article-title":"Characterization of complex networks: a survey of measurements","volume":"56","author":"Costa,","year":"2007","journal-title":"Adv. Phys."},{"key":"2019121010372481200_B12","doi-asserted-by":"crossref","first-page":"2491","DOI":"10.1016\/j.laa.2011.02.024","article-title":"Effective graph resistance","volume":"435","author":"Ellens,","year":"2011","journal-title":"Linear Algebra Appl."},{"key":"2019121010372481200_B13","first-page":"1","volume-title":"Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Sytems, BIONETICS \u201808","author":"Wang,","year":"2008"},{"key":"2019121010372481200_B14","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TSMCA.2011.2116117","article-title":"Spectral measure of structural robustness in complex networks","volume":"41","author":"Wu,","year":"2011","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"key":"2019121010372481200_B15","doi-asserted-by":"crossref","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","article-title":"Network robustness and fragility: percolation on random graphs","volume":"85","author":"Callaway,","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B16","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1088\/1367-2630\/17\/2\/023049","article-title":"Percolation of localized attack on complex networks","volume":"17","author":"Shao,","year":"2015","journal-title":"New J. Phys."},{"key":"2019121010372481200_B17","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.physa.2015.12.045","article-title":"A comparative analysis of network robustness against different link attacks","volume":"448","author":"Duan,","year":"2016","journal-title":"Phys. A"},{"key":"2019121010372481200_B18","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1142\/S0129183111016841","article-title":"Enhancing network performance by edge addition","volume":"22","author":"Jiang,","year":"2011","journal-title":"Int. J. Mod. Phys. C"},{"key":"2019121010372481200_B19","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barab\u00e1si,","year":"1999","journal-title":"Science"},{"key":"2019121010372481200_B20","doi-asserted-by":"crossref","first-page":"058701","DOI":"10.1103\/PhysRevLett.90.058701","article-title":"Scale-free networks are ultrasmall","volume":"90","author":"Cohen,","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B21","doi-asserted-by":"crossref","first-page":"026107","DOI":"10.1103\/PhysRevE.65.026107","article-title":"Growing scale-free networks with tunable clustering","volume":"65","author":"Holme,","year":"2002","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B22","doi-asserted-by":"crossref","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","article-title":"Assortative mixing in networks","volume":"89","author":"Newman,","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B23","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/ASONAM.2016.7752258","volume-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"Afshar,","year":"2016"},{"key":"2019121010372481200_B24","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","article-title":"Community detection in graphs","volume":"486","author":"Fortunato,","year":"2010","journal-title":"Phys. Rep."},{"key":"2019121010372481200_B25","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"Girvan,","year":"2002","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2019121010372481200_B26","doi-asserted-by":"crossref","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","article-title":"Finding and evaluating community structure in networks","volume":"69","author":"Newman,","year":"2004","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B27","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1103\/PhysRevLett.85.4626","article-title":"Resilience of the Internet to random breakdowns","volume":"85","author":"Cohen,","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B28","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","article-title":"Breakdown of the Internet under intentional attack","volume":"86","author":"Cohen,","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B29","doi-asserted-by":"crossref","first-page":"38002","DOI":"10.1209\/0295-5075\/89\/38002","article-title":"Robustness of scale-free networks under rewiring operations","volume":"89","author":"Xiao,","year":"2010","journal-title":"Europhys. Lett."},{"key":"2019121010372481200_B30","first-page":"1","article-title":"Improving the robustness of complex networks with preserving community structure","volume":"10","author":"Yang,","year":"2015","journal-title":"PLoS One"},{"key":"2019121010372481200_B31","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1016\/j.physa.2005.03.040","article-title":"Improving network robustness by edge modification","volume":"357","author":"Beygelzimer,","year":"2005","journal-title":"Phys. A"},{"key":"2019121010372481200_B32","doi-asserted-by":"crossref","first-page":"018701","DOI":"10.1103\/PhysRevLett.102.018701","article-title":"How to make a fragile network robust and vice versa","volume":"102","author":"Moreira,","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"2019121010372481200_B33","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1140\/epjb\/e2004-00112-3","article-title":"Optimization of robustness of complex networks","volume":"38","author":"Paul,","year":"2005","journal-title":"Eur. Phys. J. B"},{"key":"2019121010372481200_B34","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","article-title":"Mitigation of malicious attacks on networks","volume":"108","author":"Schneider,","year":"2011","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2019121010372481200_B35","first-page":"5465","article-title":"Optimizing algebraic connectivity by edge rewiring","volume":"219","author":"Sydney,","year":"2013","journal-title":"Appl. Math. Comput."},{"key":"2019121010372481200_B36","doi-asserted-by":"crossref","first-page":"066130","DOI":"10.1103\/PhysRevE.85.066130","article-title":"Enhancing network robustness against malicious attacks","volume":"85","author":"Zeng,","year":"2012","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B37","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1093\/comnet\/cnt010","article-title":"Smart rewiring for network robustness","volume":"1","author":"Louzada,","year":"2013","journal-title":"J. Complex Netw."},{"key":"2019121010372481200_B38","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2011\/01\/P01027","article-title":"Onion-like network topology enhances robustness against malicious attacks","volume":"2011","author":"Herrmann,","year":"2011","journal-title":"J. Stat. Mech."},{"key":"2019121010372481200_B39","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-642-20267-4_18","article-title":"Optimizing the robustness of scale-free networks with simulated annealing","volume-title":"Adaptive and Natural Computing Algorithms Lecture Notes in Computer Science","author":"Buesser,","year":"2011"},{"key":"2019121010372481200_B40","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.physa.2014.05.002","article-title":"A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks","volume":"410","author":"Zhou,","year":"2014","journal-title":"Phys. A"},{"key":"2019121010372481200_B41","article-title":"Using community structure information to improve complex networks robustness","volume-title":"The Fifth International Conference on Performance, Safety and Robustness in Complex Systems","author":"Ghedini,","year":"2015"},{"key":"2019121010372481200_B42","doi-asserted-by":"crossref","first-page":"022810","DOI":"10.1103\/PhysRevE.88.022810","article-title":"Enhancing community integrity of networks against multilevel targeted attacks","volume":"88","author":"Ma,","year":"2013","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B43","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.anbehav.2015.12.007","article-title":"Measuring the robustness of network community structure using assortativity","volume":"112","author":"Shizuka,","year":"2016","journal-title":"Anim. Behav."},{"key":"2019121010372481200_B44","first-page":"043405","article-title":"Mitigation of attacks and errors on community structure in complex networks","volume":"2017","author":"Wang,","year":"2017","journal-title":"J. Stat."},{"key":"2019121010372481200_B45","doi-asserted-by":"crossref","first-page":"046110","DOI":"10.1103\/PhysRevE.78.046110","article-title":"Benchmark graphs for testing community detection algorithms","volume":"78","author":"Lancichinetti,","year":"2008","journal-title":"Phys. Rev. E"},{"key":"2019121010372481200_B46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0059613","article-title":"Attack robustness and centrality of complex networks","volume":"8","author":"Iyer,","year":"2013","journal-title":"PLoS One"},{"key":"2019121010372481200_B47","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.tpb.2015.10.007","article-title":"On the impact of epidemic severity on network immunization algorithms","volume":"106","author":"Shams,","year":"2015","journal-title":"Theor. Popul. Biol."},{"key":"2019121010372481200_B48","doi-asserted-by":"crossref","first-page":"P09008","DOI":"10.1088\/1742-5468\/2005\/09\/P09008","article-title":"Comparing community structure identification","volume":"2005","author":"Danon,","year":"2005","journal-title":"J. Stat. Mech."},{"key":"2019121010372481200_B49","doi-asserted-by":"crossref","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","article-title":"Fast unfolding of communities in large networks","volume":"2008","author":"Blondel,","year":"2008","journal-title":"J. Stat. Mech."},{"key":"2019121010372481200_B50","first-page":"1","volume-title":"Hybrid Centrality Measures for Binary and Weighted Networks.","author":"Abbasi,","year":"2013"},{"key":"2019121010372481200_B51","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1109\/TPWRS.2005.854741","article-title":"Approximate model of European interconnected system as a benchmark system to study effects of cross-border trades","volume":"20","author":"Zhou,","year":"2005","journal-title":"IEEE Trans. Power Syst."},{"key":"2019121010372481200_B52","article-title":"Pajek Datasets","author":"BATAGELJ,","year":"2006"}],"container-title":["Journal of Complex Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comnet\/article-pdf\/7\/6\/838\/31484361\/cnz009.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comnet\/article-pdf\/7\/6\/838\/31484361\/cnz009.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T15:38:22Z","timestamp":1575992302000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comnet\/article\/7\/6\/838\/5385584"}},"subtitle":[],"editor":[{"given":"Matjaz","family":"Perc","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":52,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2019,3,18]]},"published-print":{"date-parts":[[2019,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comnet\/cnz009","relation":{},"ISSN":["2051-1329"],"issn-type":[{"value":"2051-1329","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019,12]]},"published":{"date-parts":[[2019,3,18]]}}}