{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:03Z","timestamp":1750306083654,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106524","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"517-524","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimization of financial network stability by genetic algorithm"],"prefix":"10.1145","author":[{"given":"Juntao","family":"Wang","sequence":"first","affiliation":[{"name":"the Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"given":"Wenshuo","family":"Guo","sequence":"additional","affiliation":[{"name":"the Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"given":"Kwok Yip","family":"Szeto","sequence":"additional","affiliation":[{"name":"the Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Error and attack tolerance of complex networks. nature 406, 6794","author":"Albert R\u00e9ka","year":"2000","unstructured":"R\u00e9ka Albert , Hawoong Jeong , and Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2000. Error and attack tolerance of complex networks. nature 406, 6794 ( 2000 ), 378--382. R\u00e9ka Albert, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2000. Error and attack tolerance of complex networks. nature 406, 6794 (2000), 378--382."},{"key":"e_1_3_2_1_2_1","volume-title":"Seventh International World-Wide Web Conference (WWW","author":"Brin S.","year":"1998","unstructured":"S. Brin and L. Page . 1998. The Anatomy of a Large-Scale Hypertextual Web Search Engine . In Seventh International World-Wide Web Conference (WWW 1998 ). http:\/\/ilpubs.stanford.edu:8090\/361\/ S. Brin and L. Page. 1998. The Anatomy of a Large-Scale Hypertextual Web Search Engine. In Seventh International World-Wide Web Conference (WWW 1998). http:\/\/ilpubs.stanford.edu:8090\/361\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Avalanche outbreaks emerging in cooperative contagions. Nature physics 11, 11","author":"Cai Weiran","year":"2015","unstructured":"Weiran Cai , Li Chen , Fakhteh Ghanbarnejad , and Peter Grassberger . 2015. Avalanche outbreaks emerging in cooperative contagions. Nature physics 11, 11 ( 2015 ), 936--940. Weiran Cai, Li Chen, Fakhteh Ghanbarnejad, and Peter Grassberger. 2015. Avalanche outbreaks emerging in cooperative contagions. Nature physics 11, 11 (2015), 936--940."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.587723"},{"key":"e_1_3_2_1_5_1","volume-title":"Resilience of the internet to random breakdowns. Physical review letters 85, 21","author":"Cohen Reuven","year":"2000","unstructured":"Reuven Cohen , Keren Erez , Daniel Ben-Avraham , and Shlomo Havlin . 2000. Resilience of the internet to random breakdowns. Physical review letters 85, 21 ( 2000 ), 4626. Reuven Cohen, Keren Erez, Daniel Ben-Avraham, and Shlomo Havlin. 2000. Resilience of the internet to random breakdowns. Physical review letters 85, 21 (2000), 4626."},{"key":"e_1_3_2_1_6_1","volume-title":"Characterization of complex networks: A survey of measurements. Advances in physics 56, 1","author":"Costa L","year":"2007","unstructured":"L da F Costa , Francisco A Rodrigues , Gonzalo Travieso , and Paulino Ribeiro Villas Boas . 2007. Characterization of complex networks: A survey of measurements. Advances in physics 56, 1 ( 2007 ), 167--242. L da F Costa, Francisco A Rodrigues, Gonzalo Travieso, and Paulino Ribeiro Villas Boas. 2007. Characterization of complex networks: A survey of measurements. Advances in physics 56, 1 (2007), 167--242."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0803685105"},{"volume-title":"Advanced Dynamic Modeling of Economic and Social Systems","author":"Eboli Mario","key":"e_1_3_2_1_8_1","unstructured":"Mario Eboli . 2013. Financial Applications of Flow Network Theory . In Advanced Dynamic Modeling of Economic and Social Systems . Springer , 21--29. Mario Eboli. 2013. Financial Applications of Flow Network Theory. In Advanced Dynamic Modeling of Economic and Social Systems. Springer, 21--29."},{"volume-title":"Propagation Phenomena in Real World Networks","author":"Eboli Mario","key":"e_1_3_2_1_10_1","unstructured":"Mario Eboli . 2015. Simulations of Financial Contagion in Interbank Networks: Some Methodological Issues . In Propagation Phenomena in Real World Networks . Springer , 311--327. Mario Eboli. 2015. Simulations of Financial Contagion in Interbank Networks: Some Methodological Issues. In Propagation Phenomena in Real World Networks. Springer, 311--327."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.2.236.9835"},{"key":"e_1_3_2_1_12_1","volume-title":"It's a Trap: Emperor Palpatine's Poison Pill. arXiv preprint arXiv:1511.09054","author":"Feinstein Zachary","year":"2015","unstructured":"Zachary Feinstein . 2015. It's a Trap: Emperor Palpatine's Poison Pill. arXiv preprint arXiv:1511.09054 ( 2015 ). Zachary Feinstein. 2015. It's a Trap: Emperor Palpatine's Poison Pill. arXiv preprint arXiv:1511.09054 (2015)."},{"volume-title":"Seminars in cell & developmental biology","author":"Fran\u00e7ois Paul","key":"e_1_3_2_1_13_1","unstructured":"Paul Fran\u00e7ois . 2014. Evolving phenotypic networks in silico . In Seminars in cell & developmental biology , Vol. 35 . Elsevier , 90--97. Paul Fran\u00e7ois. 2014. Evolving phenotypic networks in silico. In Seminars in cell & developmental biology, Vol. 35. Elsevier, 90--97."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2015\/03\/P03017"},{"key":"e_1_3_2_1_15_1","volume-title":"Variabilit\u00e0 e mutabilit\u00e0. Reprinted in Memorie di metodologica statistica","author":"Gini Corrado","year":"1912","unstructured":"Corrado Gini . 1912. Variabilit\u00e0 e mutabilit\u00e0. Reprinted in Memorie di metodologica statistica (Ed. Pizetti E, Salvemini, T). Rome : Libreria Eredi Virgilio Veschi ( 1912 ). {16} C Gini. 1997. Concentration and dependency ratios. Rivista di politica economica 87 (1997), 769--792. Corrado Gini. 1912. Variabilit\u00e0 e mutabilit\u00e0. Reprinted in Memorie di metodologica statistica (Ed. Pizetti E, Salvemini, T). Rome: Libreria Eredi Virgilio Veschi (1912). {16} C Gini. 1997. Concentration and dependency ratios. Rivista di politica economica 87 (1997), 769--792."},{"volume-title":"Advances in Network Analysis and its Applications","author":"Gleeson James P","key":"e_1_3_2_1_16_1","unstructured":"James P Gleeson , TR Hurd , Sergey Melnik , and Adam Hackett . 2012. Systemic risk in banking networks without Monte Carlo simulation . In Advances in Network Analysis and its Applications . Springer , 27--56. James P Gleeson, TR Hurd, Sergey Melnik, and Adam Hackett. 2012. Systemic risk in banking networks without Monte Carlo simulation. In Advances in Network Analysis and its Applications. Springer, 27--56."},{"key":"e_1_3_2_1_17_1","volume-title":"Minimization of Systemic Risk for Directed Network Using Genetic Algorithm. In European Conference on the Applications of Evolutionary Computation. Springer, 3--16","author":"Guo Wenshuo","year":"2017","unstructured":"Wenshuo Guo and Kwok Yip Szeto . 2017 . Minimization of Systemic Risk for Directed Network Using Genetic Algorithm. In European Conference on the Applications of Evolutionary Computation. Springer, 3--16 . Wenshuo Guo and Kwok Yip Szeto. 2017. Minimization of Systemic Risk for Directed Network Using Genetic Algorithm. In European Conference on the Applications of Evolutionary Computation. Springer, 3--16."},{"key":"e_1_3_2_1_18_1","volume-title":"Systemic risk in banking ecosystems. Nature 469, 7330","author":"Haldane Andrew G","year":"2011","unstructured":"Andrew G Haldane and Robert M May . 2011. Systemic risk in banking ecosystems. Nature 469, 7330 ( 2011 ), 351--355. Andrew G Haldane and Robert M May. 2011. Systemic risk in banking ecosystems. Nature 469, 7330 (2011), 351--355."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/82\/68003"},{"key":"e_1_3_2_1_20_1","volume-title":"Computer and Information Science (ICIS), 2016 IEEE\/ACIS 15th International Conference on. IEEE, 1--6.","author":"Wan-Hin Luk Patrick","year":"2016","unstructured":"Patrick Wan-Hin Luk , Ga Ching Lui , and Kwok Yip Szeto . 2016 . Optimization of systemic stability of directed network using genetic algorithm . In Computer and Information Science (ICIS), 2016 IEEE\/ACIS 15th International Conference on. IEEE, 1--6. Patrick Wan-Hin Luk, Ga Ching Lui, and Kwok Yip Szeto. 2016. Optimization of systemic stability of directed network using genetic algorithm. In Computer and Information Science (ICIS), 2016 IEEE\/ACIS 15th International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100510050929"},{"volume-title":"An introduction to genetic algorithms","author":"Mitchell Melanie","key":"e_1_3_2_1_22_1","unstructured":"Melanie Mitchell . 1998. An introduction to genetic algorithms . MIT press . Melanie Mitchell. 1998. An introduction to genetic algorithms. MIT press."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2008-00153-6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2009.10.003"},{"volume-title":"Social network analysis","author":"Scott John","key":"e_1_3_2_1_25_1","unstructured":"John Scott . 2012. Social network analysis . Sage . John Scott. 2012. Social network analysis. Sage."},{"key":"e_1_3_2_1_26_1","volume-title":"On Economic Inequality","author":"Sen Amartya","year":"1982","unstructured":"Amartya Sen . 1997. On Economic Inequality . Oxford University Press . http:\/\/EconPapers.repec.org\/RePEc:oxp:obooks:9780 1982 92975 Amartya Sen. 1997. On Economic Inequality. Oxford University Press. http:\/\/EconPapers.repec.org\/RePEc:oxp:obooks:9780198292975"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.228701"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11666806_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005070400300037"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"location":"Leipzig Germany","acronym":"WI '17"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:13Z","timestamp":1750217413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":28,"alternative-id":["10.1145\/3106426.3106524","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106524","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}