{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:22Z","timestamp":1750219762087,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T00:00:00Z","timestamp":1689897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,21]]},"DOI":"10.1145\/3611450.3611467","type":"proceedings-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T01:59:46Z","timestamp":1692583186000},"page":"113-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Invulnerability analysis of scale-free network and small-world network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1013-8517","authenticated-orcid":false,"given":"Mengjiao","family":"Chen","sequence":"first","affiliation":[{"name":"Hubei Minzu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4771-8170","authenticated-orcid":false,"given":"Daijun","family":"Wei","sequence":"additional","affiliation":[{"name":"Hubei Minzu University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Explosive percolation in random networks. science 323, 5920","author":"Achlioptas Dimitris","year":"2009","unstructured":"Dimitris Achlioptas , Raissa\u00a0 M D\u2019Souza , and Joel Spencer . 2009. Explosive percolation in random networks. science 323, 5920 ( 2009 ), 1453\u20131455. Dimitris Achlioptas, Raissa\u00a0M D\u2019Souza, and Joel Spencer. 2009. Explosive percolation in random networks. science 323, 5920 (2009), 1453\u20131455."},{"key":"e_1_3_2_1_2_1","volume-title":"Efficiency of attack strategies on complex model and real-world networks. Physica A: Statistical Mechanics and its Applications 414","author":"Bellingeri Michele","year":"2014","unstructured":"Michele Bellingeri , Davide Cassi , and Simone Vincenzi . 2014. Efficiency of attack strategies on complex model and real-world networks. Physica A: Statistical Mechanics and its Applications 414 ( 2014 ), 174\u2013180. Michele Bellingeri, Davide Cassi, and Simone Vincenzi. 2014. Efficiency of attack strategies on complex model and real-world networks. Physica A: Statistical Mechanics and its Applications 414 (2014), 174\u2013180."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4949020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2020.126879"},{"key":"e_1_3_2_1_5_1","volume-title":"Efficiency of scale-free networks: error and attack tolerance. Physica A: Statistical Mechanics and its Applications 320","author":"Crucitti Paolo","year":"2003","unstructured":"Paolo Crucitti , Vito Latora , Massimo Marchiori , and Andrea Rapisarda . 2003. Efficiency of scale-free networks: error and attack tolerance. Physica A: Statistical Mechanics and its Applications 320 ( 2003 ), 622\u2013642. Paolo Crucitti, Vito Latora, Massimo Marchiori, and Andrea Rapisarda. 2003. Efficiency of scale-free networks: error and attack tolerance. Physica A: Statistical Mechanics and its Applications 320 (2003), 622\u2013642."},{"key":"e_1_3_2_1_6_1","volume-title":"Emergence of social conventions in complex networks. Artificial intelligence 141, 1-2","author":"Delgado Jordi","year":"2002","unstructured":"Jordi Delgado . 2002. Emergence of social conventions in complex networks. Artificial intelligence 141, 1-2 ( 2002 ), 171\u2013185. Jordi Delgado. 2002. Emergence of social conventions in complex networks. Artificial intelligence 141, 1-2 (2002), 171\u2013185."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1063\/5.0106793"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace10030225"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991344"},{"key":"e_1_3_2_1_10_1","volume-title":"Metabolic network structure determines key aspects of functionality and regulation. Nature 420, 6912","author":"Stelling J\u00f6rg","year":"2002","unstructured":"J\u00f6rg Stelling , Steffen Klamt , Katja Bettenbrock , Stefan Schuster , and Ernst\u00a0Dieter Gilles . 2002. Metabolic network structure determines key aspects of functionality and regulation. Nature 420, 6912 ( 2002 ), 190\u2013193. J\u00f6rg Stelling, Steffen Klamt, Katja Bettenbrock, Stefan Schuster, and Ernst\u00a0Dieter Gilles. 2002. Metabolic network structure determines key aspects of functionality and regulation. Nature 420, 6912 (2002), 190\u2013193."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"e0276344","DOI":"10.1371\/journal.pone.0276344","article-title":"Correlation analysis of combined layers in multiplex networks based on entropy","volume":"17","author":"Wang Dan","year":"2022","unstructured":"Dan Wang , Feng Tian , and Daijun Wei . 2022 . Correlation analysis of combined layers in multiplex networks based on entropy . Plos one 17 , 10 (2022), e0276344 . Dan Wang, Feng Tian, and Daijun Wei. 2022. Correlation analysis of combined layers in multiplex networks based on entropy. Plos one 17, 10 (2022), e0276344.","journal-title":"Plos one"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2022.101924"},{"key":"e_1_3_2_1_13_1","volume-title":"Complex networks: small-world, scale-free and beyond","author":"Wang Xiao\u00a0Fan","year":"2003","unstructured":"Xiao\u00a0Fan Wang and Guanrong Chen . 2003. Complex networks: small-world, scale-free and beyond . IEEE circuits and systems magazine 3, 1 ( 2003 ), 6\u201320. Xiao\u00a0Fan Wang and Guanrong Chen. 2003. Complex networks: small-world, scale-free and beyond. IEEE circuits and systems magazine 3, 1 (2003), 6\u201320."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2668516"},{"key":"e_1_3_2_1_15_1","volume-title":"Collective dynamics of \u2018small-world\u2019networks. nature 393, 6684","author":"Watts J","year":"1998","unstructured":"Duncan\u00a0 J Watts and Steven\u00a0 H Strogatz . 1998. Collective dynamics of \u2018small-world\u2019networks. nature 393, 6684 ( 1998 ), 440\u2013442. Duncan\u00a0J Watts and Steven\u00a0H Strogatz. 1998. Collective dynamics of \u2018small-world\u2019networks. nature 393, 6684 (1998), 440\u2013442."},{"key":"e_1_3_2_1_16_1","volume-title":"Identifying influential nodes in weighted networks based on evidence theory. Physica A: Statistical Mechanics and its Applications 392, 10","author":"Wei Daijun","year":"2013","unstructured":"Daijun Wei , Xinyang Deng , Xiaoge Zhang , Yong Deng , and Sankaran Mahadevan . 2013. Identifying influential nodes in weighted networks based on evidence theory. Physica A: Statistical Mechanics and its Applications 392, 10 ( 2013 ), 2564\u20132575. Daijun Wei, Xinyang Deng, Xiaoge Zhang, Yong Deng, and Sankaran Mahadevan. 2013. Identifying influential nodes in weighted networks based on evidence theory. Physica A: Statistical Mechanics and its Applications 392, 10 (2013), 2564\u20132575."},{"key":"e_1_3_2_1_17_1","volume-title":"A survey on heterogeneous network representation learning. Pattern recognition 116","author":"Xie Yu","year":"2021","unstructured":"Yu Xie , Bin Yu , Shengze Lv , Chen Zhang , Guodong Wang , and Maoguo Gong . 2021. A survey on heterogeneous network representation learning. Pattern recognition 116 ( 2021 ), 107936. Yu Xie, Bin Yu, Shengze Lv, Chen Zhang, Guodong Wang, and Maoguo Gong. 2021. A survey on heterogeneous network representation learning. Pattern recognition 116 (2021), 107936."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.05.092"},{"key":"e_1_3_2_1_19_1","volume-title":"Structural vulnerability and intervention of high speed railway networks. Physica A: Statistical Mechanics and its Applications 462","author":"Zhang Jianhua","year":"2016","unstructured":"Jianhua Zhang , Funian Hu , Shuliang Wang , Yang Dai , and Yixing Wang . 2016. Structural vulnerability and intervention of high speed railway networks. Physica A: Statistical Mechanics and its Applications 462 ( 2016 ), 743\u2013751. Jianhua Zhang, Funian Hu, Shuliang Wang, Yang Dai, and Yixing Wang. 2016. Structural vulnerability and intervention of high speed railway networks. Physica A: Statistical Mechanics and its Applications 462 (2016), 743\u2013751."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108227"}],"event":{"name":"AI2A '23: 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","acronym":"AI2A '23","location":"Beijing China"},"container-title":["Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611450.3611467","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611450.3611467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:09Z","timestamp":1750178229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611450.3611467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,21]]},"references-count":20,"alternative-id":["10.1145\/3611450.3611467","10.1145\/3611450"],"URL":"https:\/\/doi.org\/10.1145\/3611450.3611467","relation":{},"subject":[],"published":{"date-parts":[[2023,7,21]]},"assertion":[{"value":"2023-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}