Proceedings of the 30th ACM International Conference on Information &Amp; Knowledge Management 2021
DOI: 10.1145/3459637.3482002
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Graph Vulnerability and Robustness using TIGER

Abstract: The study of network robustness is a critical tool in the characterization and sense making of complex interconnected systems such as infrastructure, communication and social networks. While significant research has been conducted in all of these areas, gaps in the surveying literature still exist. Answers to key questions are currently scattered across multiple scientific fields and numerous papers. In this survey, we distill key findings across numerous domains and provide researchers crucial access to impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 70 publications
0
9
0
Order By: Relevance
“…The network robustness analysis was carried out using the NetSwan package [ 41 ] in RStudio [ 38 ] (File S1). Additionally, a node addition analysis was performed in RStudio [ 38 ], following the method described by Freitas et al (2020) [ 29 ]. In this analysis, new nodes were randomly added to the existing network.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The network robustness analysis was carried out using the NetSwan package [ 41 ] in RStudio [ 38 ] (File S1). Additionally, a node addition analysis was performed in RStudio [ 38 ], following the method described by Freitas et al (2020) [ 29 ]. In this analysis, new nodes were randomly added to the existing network.…”
Section: Methodsmentioning
confidence: 99%
“…In addition to network analysis, we employed network robustness analysis using node removal and node addition methods to further elucidate the role of colonization resistance in the context of breast cancer and the gut microbiome. To test colonization resistance using network robustness, one approach is to simulate the removal [ 9 , 28 ] or addition of nodes (microbes) [ 29 ] in the network and observe the impact on the overall stability and functionality of the community. If the resident microbial network exhibits high robustness, it suggests that the community is more resistant to the colonization or invasion by pathogens.…”
Section: Introductionmentioning
confidence: 99%
“…Attack simulations were performed using modified scripts from the python package tiger (Freitas, Yang et al 2021). Briefly, each network was passed to tiger, where nodes were ranked by degree, the number of other nodes a node is connected to directly by an edge, and then removed in descending order.…”
Section: Methodsmentioning
confidence: 99%
“…Later, adversarial attacks were introduced in the field of network science [5]. In [24], the authors show how structural properties of networks can collapse as a result of attacks. The authors further provide a framework for simulating attacks and defenses on networks.…”
Section: Related Workmentioning
confidence: 99%
“…These attacks are significantly more computationally efficient that optimization attacks, where an optimization problem must be solved to identify the most damaging changes to the network. Additionally, heuristic-based attacks provide more interpretable results in terms of the edges being targeted and have also been shown to effectively lead to structural collapse in networks [24]. Further, we focus our evaluation on the important global attack scenario, where changes can be performed anywhere on the graph structure provided a fixed attack budget.…”
Section: Introductionmentioning
confidence: 99%