{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T20:21:54Z","timestamp":1778185314769,"version":"3.51.4"},"reference-count":60,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T00:00:00Z","timestamp":1667952000000},"content-version":"vor","delay-in-days":312,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010712","name":"Viet Nam National University Ho Chi Minh City","doi-asserted-by":"publisher","award":["B2017-42-01"],"award-info":[{"award-number":["B2017-42-01"]}],"id":[{"id":"10.13039\/501100010712","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006601","name":"Ministero degli Affari Esteri e della Cooperazione Internazionale","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["816313"],"award-info":[{"award-number":["816313"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>\n                    Computing the robustness of a network, i.e., the capacity of a network holding its main functionality when a proportion of its nodes\/edges are damaged, is useful in many real applications. The Monte Carlo numerical simulation is the commonly used method to compute network robustness. However, it has a very high computational cost, especially for large networks. Here, we propose a methodology such that the robustness of large real\u2010world social networks can be predicted using machine learning models, which are pretrained using existing datasets. We demonstrate this approach by simulating two effective node attack strategies, i.e., the recalculated degree (RD) and initial betweenness (IB) node attack strategies, and predicting network robustness by using two machine learning models, multiple linear regression (MLR) and the random forest (RF) algorithm. We use the classic network robustness metric\n                    <jats:italic>R<\/jats:italic>\n                    as a model response and 8 network structural indicators (NSI) as predictor variables and trained over a large dataset of 48 real\u2010world social networks, whose maximum number of nodes is 265,000. We found that the RF model can predict network robustness with a mean squared error (RMSE) of 0.03 and is 30% better than the MLR model. Among the results, we found that the RD strategy has more efficacy than IB for attacking real\u2010world social networks. Furthermore, MLR indicates that the most important factors to predict network robustness are the scale\u2010free exponent\n                    <jats:italic>\u03b1<\/jats:italic>\n                    and the average node degree &lt;\n                    <jats:italic>k<\/jats:italic>\n                    &gt;. On the contrary, the RF indicates that degree assortativity\n                    <jats:italic>a<\/jats:italic>\n                    , the global closeness, and the average node degree &lt;\n                    <jats:italic>k<\/jats:italic>\n                    &gt; are the most important factors. This study shows that machine learning models can be a promising way to infer social network robustness.\n                  <\/jats:p>","DOI":"10.1155\/2022\/3616163","type":"journal-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T11:05:13Z","timestamp":1667991913000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Predicting the Robustness of Large Real\u2010World Social Networks Using a Machine Learning Model"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3542-0518","authenticated-orcid":false,"given":"Ngoc-Kim-Khanh","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-3385","authenticated-orcid":false,"given":"Quang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Hai-Ha","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Thi-Trang","family":"Le","sequence":"additional","affiliation":[]},{"given":"Tuan-Minh","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6072-5255","authenticated-orcid":false,"given":"Davide","family":"Cassi","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Scotognella","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Alfieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5729-1123","authenticated-orcid":false,"given":"Michele","family":"Bellingeri","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_2_12_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77332-2_19"},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.06.079"},{"key":"e_1_2_12_3_2","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00228"},{"key":"e_1_2_12_4_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0059613"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14604"},{"key":"e_1_2_12_6_2","first-page":"553","article-title":"Resilience of stock cross-correlation network to random breakdown and intentional attack","volume":"760","author":"Nguyen K.","year":"2018","journal-title":"Studies in Computational Intelligence"},{"key":"e_1_2_12_7_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-31902-8"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"e_1_2_12_9_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep29748"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.10.001"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.04.028"},{"key":"e_1_2_12_12_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep02522"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2004-10286-2"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.045104"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0022124"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110616"},{"key":"e_1_2_12_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-021-00411-1"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-60298-7"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2021.681343"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1167782"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1801588115"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1206241"},{"key":"e_1_2_12_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2014.01.004"},{"key":"e_1_2_12_24_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2819"},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3002807"},{"key":"e_1_2_12_26_2","doi-asserted-by":"publisher","DOI":"10.1038\/43601"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.4626"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-021-00426-y"},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2017.01.010"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1677445"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"e_1_2_12_32_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_2_12_33_2","doi-asserted-by":"publisher","DOI":"10.1080\/0022250x.2001.9990249"},{"key":"e_1_2_12_34_2","unstructured":"NguyenQ.andTrang LeT. Structure and robustness of Facebook\u2019s pages networks Proceedings of the 2019 the 10th Conference on Network Modeling and Analysis (Marami 2019) November 2019 Dijon France."},{"key":"e_1_2_12_35_2","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"e_1_2_12_36_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"key":"e_1_2_12_37_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep residual learning for image recognition Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) June 2016 NV USA 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_12_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"e_1_2_12_39_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_2_12_40_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"e_1_2_12_41_2","doi-asserted-by":"publisher","DOI":"10.1137\/s003614450342480"},{"key":"e_1_2_12_42_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.5468"},{"key":"e_1_2_12_43_2","volume-title":"Social Network Analysis: A Handbook","author":"Wasserman S.","year":"2000"},{"key":"e_1_2_12_44_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47119-2"},{"key":"e_1_2_12_45_2","article-title":"Classical linear regression","author":"Goldberger A. S.","year":"1964","journal-title":"Econometric Theory"},{"key":"e_1_2_12_46_2","volume-title":"Econometrics","author":"Hayashi F.","year":"2000"},{"key":"e_1_2_12_47_2","volume-title":"Classification and Regression Trees","author":"Breiman L.","year":"1984"},{"key":"e_1_2_12_48_2","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2006"},{"key":"e_1_2_12_49_2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"e_1_2_12_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.03.014"},{"key":"e_1_2_12_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"e_1_2_12_52_2","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.74.47"},{"key":"e_1_2_12_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/0003-2697(84)90458-5"},{"key":"e_1_2_12_54_2","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_2_12_55_2","doi-asserted-by":"publisher","DOI":"10.1121\/1.1906679"},{"key":"e_1_2_12_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.07.020"},{"key":"e_1_2_12_57_2","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.65.056109"},{"key":"e_1_2_12_58_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.89.208701"},{"key":"e_1_2_12_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/bf02289527"},{"key":"e_1_2_12_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2014.01.004"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3616163","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/3616163","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3616163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:28:13Z","timestamp":1769117293000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/3616163"}},"subtitle":[],"editor":[{"given":"Andrea","family":"Murari","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/3616163"],"URL":"https:\/\/doi.org\/10.1155\/2022\/3616163","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2022-06-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3616163"}}