{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:25:09Z","timestamp":1761171909225,"version":"build-2065373602"},"reference-count":74,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China under Grant","award":["62366010","62366009"],"award-info":[{"award-number":["62366010","62366009"]}]},{"name":"Guangxi Natural Science Foundation under Grant","award":["2022GXNSFBA035658","2024GXNSFAA010374"],"award-info":[{"award-number":["2022GXNSFBA035658","2024GXNSFAA010374"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Network robustness optimization is crucial for enhancing the resilience of industrial networks and social systems against malicious attacks. Existing studies typically evaluate the robustness by simulating the sequential removal of nodes or edges and recording the residual connectivity at each step. However, the attack simulation is computationally expensive and becomes impractical for large-scale networks. Therefore, this paper proposes a multiobjective evolutionary algorithm assisted by a graph isomorphism network (GIN)-based surrogate model to efficiently optimize network robustness. First, the robustness optimization task is formulated as a multiobjective problem that simultaneously considers network robustness against attacks and the structural modification cost. Then, a GIN-based surrogate model is constructed to approximate the robustness, replacing the expensive simulation assessments. Finally, the multiobjective evolutionary algorithm is employed to explore promising network structures guided by the surrogate model, which is continuously updated via online learning to improve both prediction accuracy and optimization performance. Experimental results in various synthetic and real-world networks demonstrate that the proposed algorithm reduces the computational cost of the robustness evaluation by about 65% while achieving comparable or even superior robustness optimization performance compared with those of baseline algorithms. These results indicate that the proposed method is practical and scalable and can be applied to enhance the robustness of industrial and social networks.<\/jats:p>","DOI":"10.3390\/a18100666","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T13:54:41Z","timestamp":1760968481000},"page":"666","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A GIN-Guided Multiobjective Evolutionary Algorithm for Robustness Optimization of Complex Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1658-9297","authenticated-orcid":false,"given":"Guangpeng","family":"Li","sequence":"first","affiliation":[{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China"}]},{"given":"Guoyong","family":"Cai","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MCAS.2023.3236659","article-title":"Structural Robustness of Complex Networks: A Survey of A Posteriori Measures [Feature]","volume":"23","author":"Lou","year":"2023","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"5190","DOI":"10.1038\/s41467-021-25485-8","article-title":"Machine learning dismantling and early-warning signals of disintegration in complex systems","volume":"12","author":"Grassia","year":"2021","journal-title":"Nat. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"121913","DOI":"10.1016\/j.ins.2025.121913","article-title":"Multifactorial evolutionary deep reinforcement learning for multitask node combinatorial optimization in complex networks","volume":"702","author":"Ma","year":"2025","journal-title":"Inf. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"125540","DOI":"10.1016\/j.physa.2020.125540","article-title":"Power network robustness analysis based on electrical engineering and complex network theory","volume":"564","author":"Zhou","year":"2021","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1109\/TAC.2023.3343593","article-title":"Optimal Tracking of Networked Control Systems over the Fading Channel with Packet Loss","volume":"69","author":"Jiang","year":"2023","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"Newman","year":"2002","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.physa.2018.02.133","article-title":"A link clustering based memetic algorithm for overlapping community detection","volume":"503","author":"Li","year":"2018","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.socnet.2007.11.001","article-title":"On variants of shortest-path betweenness centrality and their generic computation","volume":"30","author":"Ulrik","year":"2008","journal-title":"Soc. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Malliaros, F.D., Megalooikonomou, V., and Faloutsos, C. (2012, January 26\u201328). Fast robustness estimation in large social graphs: Communities and anomaly detection. Proceedings of the 12th SIAM International Conference on Data Mining, SDM 2012, Anaheim, CA, USA.","DOI":"10.1137\/1.9781611972825.81"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1007\/s10618-015-0447-5","article-title":"Optimizing network robustness by edge rewiring: A general framework","volume":"30","author":"Chan","year":"2016","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103775","DOI":"10.1016\/j.ipm.2024.103775","article-title":"Identifying influential nodes in complex networks via Transformer","volume":"61","author":"Chen","year":"2024","journal-title":"Inf. Process. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"110177","DOI":"10.1016\/j.engappai.2025.110177","article-title":"A novel semi-local centrality to identify influential nodes in complex networks by integrating multidimensional factors","volume":"145","author":"Zhang","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.neucom.2021.10.031","article-title":"Scalable graph neural network-based framework for identifying critical nodes and links in complex networks","volume":"468","author":"Munikoti","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/TEVC.2019.2950935","article-title":"Surrogate-Assisted Robust Optimization of Large-Scale Networks Based on Graph Embedding","volume":"24","author":"Wang","year":"2020","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/TEVC.2020.3048174","article-title":"A Computationally Efficient Evolutionary Algorithm for Multiobjective Network Robustness Optimization","volume":"25","author":"Wang","year":"2021","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"129296","DOI":"10.1016\/j.neucom.2024.129296","article-title":"Adaptive population sizing for multi-population based constrained multi-objective optimization","volume":"621","author":"Tian","year":"2025","journal-title":"Neurocomputing"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/JAS.2023.123687","article-title":"Constrained Multi-Objective Optimization with Deep Reinforcement Learning Assisted Operator Selection","volume":"11","author":"Ming","year":"2024","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"066130","DOI":"10.1103\/PhysRevE.85.066130","article-title":"Enhancing network robustness against malicious attacks","volume":"85","author":"Zeng","year":"2012","journal-title":"Phys. Rev. E-Stat. Nonlinear, Soft Matter Phys."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","article-title":"Mitigation of malicious attacks on networks","volume":"108","author":"Schneider","year":"2011","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TEVC.2022.3155533","article-title":"A Survey on Evolutionary Constrained Multiobjective Optimization","volume":"27","author":"Liang","year":"2023","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.physa.2014.05.002","article-title":"A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks","volume":"410","author":"Zhou","year":"2014","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"38005","DOI":"10.1209\/0295-5075\/111\/38005","article-title":"Enhancing network robustness against targeted and random attacks using a memetic algorithm","volume":"111","author":"Tang","year":"2015","journal-title":"Europhys. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Tang, X., Liu, J., and Hao, X. (2016). Mitigate Cascading Failures on Networks using a Memetic Algorithm. Sci. Rep., 6.","DOI":"10.1038\/srep38713"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"126908","DOI":"10.1016\/j.eswa.2025.126908","article-title":"A knowledge driven two-stage co-evolutionary algorithm for constrained multi-objective optimization","volume":"274","author":"Zhang","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"121812","DOI":"10.1016\/j.ins.2024.121812","article-title":"Utilizing feasible non-dominated solution information for constrained multi-objective optimization","volume":"699","author":"Wang","year":"2025","journal-title":"Inf. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"121774","DOI":"10.1016\/j.ins.2024.121774","article-title":"Growing neural gas network based environment selection strategy for constrained multi-objective optimization","volume":"698","author":"Bai","year":"2025","journal-title":"Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"126073","DOI":"10.1016\/j.eswa.2024.126073","article-title":"Constrained multi-objective state transition algorithm via adaptive bidirectional coevolution","volume":"266","author":"Sun","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"101784","DOI":"10.1016\/j.swevo.2024.101784","article-title":"Two-stage bidirectional coevolutionary algorithm for constrained multi-objective optimization","volume":"92","author":"Zhao","year":"2025","journal-title":"Swarm Evol. Comput."},{"key":"ref_29","first-page":"539","article-title":"A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks","volume":"47","author":"Zhou","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.ins.2018.11.005","article-title":"Designing comprehensively robust networks against intentional attacks and cascading failures","volume":"478","author":"Wang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TNSE.2017.2742522","article-title":"A Multi-Objective Evolutionary Algorithm for Promoting the Emergence of Cooperation and Controllable Robustness on Directed Networks","volume":"5","author":"Wang","year":"2018","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wu, H., Chen, Q., Chen, J., Jin, Y., Ding, J., Zhang, X., and Chai, T. (IEEE Trans. Evol. Comput., 2024). A Multi-Stage Expensive Constrained Multi-Objective Optimization Algorithm Based on Ensemble Infill Criterion, IEEE Trans. Evol. Comput., early access.","DOI":"10.1109\/TEVC.2024.3400832"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1109\/TETCI.2024.3359517","article-title":"A Surrogate-Assisted Expensive Constrained Multi-Objective Optimization Algorithm Based on Adaptive Switching of Acquisition Functions","volume":"8","author":"Wu","year":"2024","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2956","DOI":"10.1109\/TNNLS.2023.3297624","article-title":"Multigranularity Surrogate Modeling for Evolutionary Multiobjective Optimization with Expensive Constraints","volume":"35","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s12293-022-00363-y","article-title":"Constrained Multi-Objective Optimization with a Limited Budget of Function Evaluations","volume":"14","author":"Bronkhorst","year":"2022","journal-title":"Memetic Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"110874","DOI":"10.1016\/j.asoc.2023.110874","article-title":"Multi-objective constrained black-box optimization algorithm based on feasible region localization and performance-improvement exploration","volume":"148","author":"Li","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10898-020-00903-1","article-title":"Development of an adaptive infill criterion for constrained multi-objective asynchronous surrogate-based optimization","volume":"78","author":"Wauters","year":"2020","journal-title":"J. Glob. Optim."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10898-015-0370-8","article-title":"Kriging-based infill sampling criterion for constraint handling in multi-objective optimization","volume":"64","year":"2016","journal-title":"J. Glob. Optim."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"7791","DOI":"10.1109\/TCYB.2021.3051021","article-title":"Graph Neural Network Encoding for Community Detection in Attribute Networks","volume":"52","author":"Sun","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1109\/TCYB.2020.3013251","article-title":"Predicting Network Controllability Robustness: A Convolutional Neural Network Approach","volume":"52","author":"Lou","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5739","DOI":"10.1109\/TNNLS.2021.3071367","article-title":"Knowledge-Based Prediction of Network Controllability Robustness","volume":"33","author":"Lou","year":"2022","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","article-title":"A Comprehensive Survey on Graph Neural Networks","volume":"32","author":"Zonghan","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1992","DOI":"10.1109\/TCSI.2024.3355091","article-title":"A Graph Transformer-Driven Approach for Network Robustness Learning","volume":"71","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_44","first-page":"14","article-title":"Attack vulnerability of complex networks","volume":"65","author":"Holme","year":"2002","journal-title":"Phys. Rev. E-Stat. Physics, Plasmas, Fluids, Relat. Interdiscip. Top."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex networks","volume":"406","author":"Albert","year":"2000","journal-title":"Nature"},{"key":"ref_46","first-page":"349","article-title":"Emergence of scaling in random networks","volume":"Volume 9781400841356","author":"Albert","year":"2011","journal-title":"The Structure and Dynamics of Networks"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"035803","DOI":"10.1088\/0031-8949\/85\/03\/035803","article-title":"A new way to improve the robustness of complex communication networks by allocating redundancy links","volume":"85","author":"Shi","year":"2012","journal-title":"Phys. Scr."},{"key":"ref_48","first-page":"303","article-title":"Performance Comparison of Surrogate-Assisted Evolutionary Algorithms on Computational Fluid Dynamics Problems","volume":"Volume 15149","year":"2024","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Homberg, T., Mostaghim, S., Hiwa, S., and Hiroyasu, T. (July, January 30). Optimized Drug Design using Multi-Objective Evolutionary Algorithms with SELFIES. Proceedings of the 2024 IEEE Congress on Evolutionary Computation, CEC 2024, Yokohama, Japan.","DOI":"10.1109\/CEC60901.2024.10611870"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"6630","DOI":"10.1109\/TCYB.2024.3422430","article-title":"A Multitask Network Robustness Analysis System Based on the Graph Isomorphism Network","volume":"54","author":"Wu","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"111704","DOI":"10.1115\/1.4050749","article-title":"Multi-Objective Optimization for High-Dimensional Expensively Constrained Black-Box Problems","volume":"143","author":"Cheng","year":"2021","journal-title":"J. Mech. Des."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"119016","DOI":"10.1016\/j.ins.2023.119016","article-title":"Surrogate-assisted MOEA\/D for expensive constrained multi-objective optimization","volume":"639","author":"Yang","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_53","unstructured":"Xu, K., Jegelka, S., Hu, W., and Leskovec, J. How powerful are graph neural networks? In Proceedings of the 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, 6\u20139 May 2019."},{"key":"ref_54","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume":"2017","author":"Hamilton","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_55","unstructured":"Veli\u010dkovi\u2019veli\u010dkovi\u2019c, P., Cucurull, G., Casanova, A., Romero, A., L\u00ec, P., Bengio, Y., Veli\u010dkovi\u0107, P., Casanova, A., Li\u00f2, P., and Cucurull, G. (May, January 30). Graph attention networks. Proceedings of the 6th International Conference on Learning Representations, ICLR 2018\u2014Conference Track Proceedings, Vancouver, BC, Canada."},{"key":"ref_56","unstructured":"Xu, K., Li, C., Tian, Y., Sonobe, T., Kawarabayashi, K.I., and Jegelka, S. (2018, January 10\u201315). Representation learning on graphs with jumping knowledge networks. Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholm, Sweden."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Zhang, M., Cui, Z., Neumann, M., and Chen, Y. (2018, January 2\u20137). An end-to-end deep learning architecture for graph classification. Proceedings of the 32nd AAAI Conference on Artificial Intelligence, AAAI 2018, New Orleans, LA, USA.","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/j.neucom.2021.12.069","article-title":"On self-adaptive stochastic ranking in decomposition many-objective evolutionary optimization","volume":"489","author":"Li","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF02066689","article-title":"On the strength of connectedness of a random graph","volume":"12","author":"Erdos","year":"1961","journal-title":"Acta Math. Hung."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u00ef\u00bf\u0153small-world\u00ef\u00bf\u0153 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"126318","DOI":"10.1016\/j.neucom.2023.126318","article-title":"A multi-objective memetic algorithm for automatic adversarial attack optimization design","volume":"547","author":"Sun","year":"2023","journal-title":"Neurocomputing"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/TAI.2022.3168038","article-title":"Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm","volume":"4","author":"Tian","year":"2023","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Reis, M.J.C.S. (2025). Symmetry-Guided Surrogate-Assisted NSGA-II for Multi-Objective Optimization of Renewable Energy Systems. Symmetry, 17.","DOI":"10.3390\/sym17081367"},{"key":"ref_65","first-page":"840","article-title":"Integrating NSGA-II and Q-learning for Solving the Multi-objective Electric Vehicle Routing Problem with Battery Swapping Stations","volume":"23","author":"Haddad","year":"2025","journal-title":"Int. J. Intell. Transp. Syst. Res."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"102709","DOI":"10.1016\/j.mtcomm.2021.102709","article-title":"Multi-objective optimization for materials design with improved NSGA-II","volume":"28","author":"Zhang","year":"2021","journal-title":"Mater. Today Commun."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.cor.2015.04.009","article-title":"A decomposition based memetic algorithm for multi-objective vehicle routing problem with time windows","volume":"62","author":"Qi","year":"2015","journal-title":"Comput. Oper. Res."},{"key":"ref_68","first-page":"3530","article-title":"Efficient adaptive robustness optimization algorithm for complex networks","volume":"44","author":"Huang","year":"2024","journal-title":"J. Comput. Appl."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1162\/EVCO_a_00009","article-title":"HypE: An Algorithm for Fast Hypervolume-Based Many-Objective Optimization","volume":"19","author":"Bader","year":"2011","journal-title":"Evol. Comput."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1016\/j.cor.2003.08.017","article-title":"Three new metrics to measure the convergence of metaheuristics towards the Pareto frontier and the aesthetic of a set of solutions in biobjective optimization","volume":"32","author":"Collette","year":"2005","journal-title":"Comput. Oper. Res."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Lu, X., Liu, Z., Fan, Y., and Zhou, J. (2023, January 20\u201322). A Graph Convolutional Network Approach for Predicting Network Controllability Robustness. Proceedings of the 2023 35th Chinese Control and Decision Conference (CCDC), Yichang, China.","DOI":"10.1109\/CCDC58219.2023.10327102"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"4531","DOI":"10.1109\/TCYB.2022.3207878","article-title":"A Learning Convolutional Neural Network Approach for Network Robustness Prediction","volume":"53","author":"Lou","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"3209","DOI":"10.1109\/TNSE.2021.3107186","article-title":"A Convolutional Neural Network Approach to Predicting Network Connectedness Robustness","volume":"8","author":"Lou","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., and Ahmed, N.K. (2015, January 25\u201330). The network data repository with interactive graph analytics and visualization. Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, AAAI\u201915, Austin, TX, USA.","DOI":"10.1609\/aaai.v29i1.9277"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/10\/666\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T04:16:22Z","timestamp":1761106582000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/10\/666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"references-count":74,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["a18100666"],"URL":"https:\/\/doi.org\/10.3390\/a18100666","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2025,10,20]]}}}