2020
DOI: 10.1155/2020/7348281
|View full text |Cite
|
Sign up to set email alerts
|

Linkboost: A Link Prediction Algorithm to Solve the Problem of Network Vulnerability in Cases Involving Incomplete Information

Abstract: e vulnerability of network information systems has attracted considerable research attention in various domains including financial networks, transportation networks, and infrastructure systems. To comprehensively investigate the network vulnerability, well-designed attack strategies are necessary. However, it is difficult to formulate a global attack strategy as the complete information of the network is usually unavailable. To overcome this limitation, this paper proposes a novel prediction algorithm named L… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…In this section, we present the results obtained in our experiments conducted on real-world short-text data collections in order to demonstrate the effectiveness of our proposed method. We consider four typical algorithms as our benchmark methods, namely, CPM [9], COPRA [18], LFM [19], and GCE [20]. We also introduce the collection of the dataset, experimental setup, analysis, the baseline approach, and the model evaluation.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we present the results obtained in our experiments conducted on real-world short-text data collections in order to demonstrate the effectiveness of our proposed method. We consider four typical algorithms as our benchmark methods, namely, CPM [9], COPRA [18], LFM [19], and GCE [20]. We also introduce the collection of the dataset, experimental setup, analysis, the baseline approach, and the model evaluation.…”
Section: Methodsmentioning
confidence: 99%
“…It is worthy of note that most of the interconnected things can be abstracted as social networks. Typical networks, such as the cooperative network between scientists in the academic field, and the network structure of protein molecules in the biological field [18][19][20] resemble the topology of social networks. The ultimate purpose of studying the topological structure and properties of different types of networks is to understand the evolution principle of social networks, predict the future evolution direction and trend of social networks, estimate links [21] to better cope with the sudden changes in social networks, and apply this 2…”
Section: Related Workmentioning
confidence: 99%
“…The incompleteness or partial observability of complex network structure will make the theory and engineering research of real network be confronted with challenges. In order to make up for the missing link in a real data set, the link prediction based on topology structure is introduced into various real networks (Jia, Ma, Liu, Zhang, & Han, 2020). Searching the factors of link prediction in complex network topology is the premise of studying the evolution mechanism of complex network reconstruction.…”
Section: Link Prediction Based On the Predicting Nodesmentioning
confidence: 99%
“…However, the development of the Internet has coexisted with opportunities and threats, and governments, enterprises, and people are enjoying the convenience of the Internet while suffering from the increasing threat of attacks on the Internet [14][15][16]. With the wide application of smart products and information platforms, the number of vulnerabilities and cyber-attacks has increased dramatically [17][18]. The security of the network is facing great challenges, which seriously affects the security of people's information and property, so effectively enhancing the security of network systems has become an important goal at present [19][20][21].…”
Section: Introductionmentioning
confidence: 99%