Next Article in Journal
Semantic Representation of Robot Manipulation with Knowledge Graph
Next Article in Special Issue
Centrality Learning: Auralization and Route Fitting
Previous Article in Journal
Frequency Seismic Response for EEWS Testing on Uniaxial Shaking Table
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robustness of Network Controllability with Respect to Node Removals Based on In-Degree and Out-Degree

by
Fenghua Wang
1,*,† and
Robert E. Kooij
1,2,†
1
Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands
2
Unit ICT, Strategy and Policy, Netherlands Organisation for Applied Scientific Research (TNO), 2595 DA Den Haag, The Netherlands
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2023, 25(4), 656; https://doi.org/10.3390/e25040656
Submission received: 28 February 2023 / Revised: 4 April 2023 / Accepted: 11 April 2023 / Published: 14 April 2023

Abstract

:
Network controllability and its robustness have been widely studied. However, analytical methods to calculate network controllability with respect to node in- and out-degree targeted removals are currently lacking. This paper develops methods, based on generating functions for the in- and out-degree distributions, to approximate the minimum number of driver nodes needed to control directed networks, during node in- and out-degree targeted removals. By validating the proposed methods on synthetic and real-world networks, we show that our methods work reasonably well. Moreover, when the fraction of the removed nodes is below 10% the analytical results of random removals can also be used to predict the results of targeted node removals.

1. Introduction

Network controllability is a crucial area of research that has been explored in various types of networks, including biological networks [1], transportation networks [2], and corruption networks [3]. The controllability of a network refers to the ability to steer the states of its nodes to any desired state in a finite time by manipulating the input to a subset of its nodes. Nodes whose inputs are imposed are named driver nodes. In linear time-invariant systems, Kalman’s controllability rank condition [4] is the classic method of assessing controllability. However, the method has limitations such as computation complexity and the lack of information about the system’s interaction matrix and input matrix. To overcome these limitations, the concept of structural controllability was proposed [5]. Structural controllability is a property of structural linear time-invariant systems with independently free parameters or fixed zero elements in their interaction and input matrices that satisfy the controllability rank condition. Directed networks are structural systems. Liu et al. [6] developed the algorithm and analytical methods to obtain the minimum number of driver nodes in directed networks with the assumption that the directed network has no self-links and a node’s internal state can only be modified upon interaction with neighboring nodes [7]. Throughout this paper, we will adhere to this assumption. Besides structural controllability, Yuan et al. introduced an exact controllability paradigm to determine the minimum number of driver nodes for undirected networks with arbitrary weights by using the maximum multiplicity [8].
In recent years, network structural controllability has gained increasing attention as a tool to measure and enhance network robustness. Robustness is commonly assessed by measuring network performance under various perturbations [9]. One approach is to randomly remove nodes or links and observe the resulting changes in network performance, while another approach involves targeted attack strategies exploiting specific features of network topology such as betweenness, degree, and closeness. Several studies have investigated the effectiveness of different targeted attack strategies on network controllability. For example, degree-based attacks have been found to be more harmful to network controllability than random attacks [10], while betweenness-based attacks are more damaging in most real-world networks [11]. Additionally, attacking bridge links, which results in a disconnected network, has been shown to be an effective way to destroy network controllability [12]. Another approach to targeted attack strategies involves identifying critical nodes and links whose removal increases the number of driver nodes [6]. Protecting critical links can make random link attacks less efficient [13]. Some studies have found that hierarchical attack strategies targeting critical nodes and links first are more efficient than metric-based attack strategies, such as betweenness- or degree-based strategies in interdependent networks [14]. In addition to assessing the robustness of network controllability under perturbations, some studies have focused on enhancing it. For example, increasing the density of nodes with an in-degree and out-degree equal to one or two has been shown to improve network controllability [15]. Adding links to low-degree nodes and creating multi-loop structures have also been found to increase the robustness of network controllability [16]. Furthermore, different redundant design strategies of interdependent networks, such as betweenness-based and degree-based strategies for node backup and high degree first strategy for edge backup, have been investigated to optimize the robustness of network controllability [17].
In addition to qualitative research, quantitative studies have been carried out to explore the robustness of network controllability under different types of perturbations. Lu et al. [11] developed numerical approximations of random and targeted node attacks based on the degree on Erdös-Rényi (ER) networks, which fit well when the fraction of nodes is below 20%. Sun et al. [13] derived closed-form approximations of the minimum number of driver nodes under various types of attacks, including random link attacks, targeted attacks, and random attacks with protection. Chen et al. [18] developed analytical approximations for the minimum number of driver nodes during random link removal using generating functions. Wang et al. [19] later conducted analytical methods based on generating functions to approximate the network controllability during random and targeted node removal based on the total degree of different kinds of networks. In addition to analytical methods, machine learning has been employed to predict network controllability robustness. Dhiman et al. [20] used machine-learning-based approximations to quantify the minimum fraction of driver nodes under random and targeted link attacks, which performed better than the closed-form approximation proposed by Sun et al. [13]. Meanwhile, by utilizing deep learning techniques, Lou et al. have developed a series of works that employ different convolutional neural network (CNN) frameworks, treating the adjacency matrix as a visual representation, to predict network controllability under random node or link attacks, degree-based targeted node or link attacks, and betweenness-based targeted node and link attacks [21,22,23]. Through the use of these models, they have achieved increasingly precise controllability predictions and demonstrated improved scalability. The quantitative studies provide valuable insights into the robustness of network controllability.
As the analytical approximations for targeted node removals based on node in-degree and out-degree are still lacking, in this paper, we aim to utilize the structural controllability framework for directed networks proposed by Liu et al. [6] to make the analytical approximation for those two kinds of targeted node removals. We validate our proposed methods by applying them to three types of synthetic networks and four real-world communication networks.
The remainder of the paper is structured as follows. In Section 2, we introduce the networks used in our study. Section 3 presents the analytical results of network controllability under the two classes of targeted attacks. Finally, we conclude and discuss the implications of our findings in Section 4.

2. Network Data

To validate the theoretical results presented in the following sections, we will utilize three categories of synthetic networks as well as several real-world networks. In this section, we provide specific information regarding the utilized networks.

2.1. Directed Synthetic Networks

We choose three types of synthetic networks: Erdös-Rényi (ER) networks, Swarm Signaling networks (SSNs) and Scale-free networks (SFs).
We generate a directed ER network with N nodes, whereby a directed link is placed between every pair of nodes with a given probability of p E R . The average number of links is governed by the equation, L = N ( N 1 ) p E R . This study has employed two kinds of ER networks with N = 50 and N = 100 , and p E R = 0.07 and p E R = 0.04 , respectively.
The topology of Swarm Signaling Networks (SSNs), proposed in [24], is characterized by a regular out-degree and an in-degree distribution that follows a Poisson distribution. Two parameters must be specified to generate SSNs: the number of nodes, N, and the out-degree value, k. Each node in the network randomly creates k outgoing links to other nodes. Two kinds of SSNs are chosen, with N = 10 4 and average out-degree values of k = 2 and k = 5 , respectively.
Scale-free networks (SFs) are a class of complex networks whose both in-degree and out-degree distributions exhibit a power-law distribution. In this paper, we generate two SFs using the Barabási–Albert model, which is a preferential attachment mechanism that generates networks with a power-law degree distribution with an exponent γ = 3 [25]. Specifically, we generate SFs in two stages. In the first stage, we generate a Barabási–Albert graph with N nodes, where the initial state is a star with m + 1 nodes. At each step, a node with m edges is preferentially attached to existing nodes with high degrees until the total number of nodes reaches N. In the second stage, we randomly assign directions to each link in the generated graph. The resulting SFs have in-degree and out-degree distributions that follow a power-law distribution with an exponent γ = 3 . We set m = 5 and m = 10 for both SFs with N = 10 5 nodes, resulting in minimum in-degree and out-degree values a of 5 and 10, respectively, which are approximated by the integers that make the ceiling of the average value of the power-law distribution equal to m.

2.2. Real-World Networks

In this study, we employed real-world communication networks obtained from the Topology Zoo dataset [26]. To convert these networks from undirected to directed, we utilized the source and targeted node attributes [13]. Table 1 demonstrates the basic properties of the networks used in this study, including the number of nodes N, the number of links L, and the average total degree < k > . The total degree of a node is the sum of its in-degree and out-degree. Since the average in-degree equals the average out-degree, the average total degree is twice the average in-degree (and out-degree).

3. Network Controllability

Consider a linear, time-invariant networked system of N nodes, where each node’s state is governed by x ˙ ( t ) = A x ( t ) + B u ( t ) , with x ( t ) = ( x 1 ( t ) , x 2 ( t ) , , x n ( t ) ) T being the N × 1 state vector. The N × N matrix A represents the interactions among the network components, and the N × M matrix B specifies which nodes are under the direct control of the M × 1 control input vector u ( t ) = ( u 1 ( t ) , u 2 ( t ) , , u m ( t ) ) T .
A linear, time-invariant networked system is controllable if it can reach any desired state within a finite time by applying external inputs. The Kalman rank criterion requires that the rank of the controllability matrix [ B , A B , A 2 B , , A n 1 B ] equals N for the system to be fully controllable. Liu et al. introduced the maximum matching method and the minimum inputs theorem to determine the minimum number of driver nodes required to ensure network structural controllability [6]. The number of driver nodes, N D , can be obtained by mapping a directed network into a bipartite network [13], obtaining a maximum matching edge set using the maximum matching algorithm [27], and then calculating N D = min { 1 , N N m } , where N m is the number of directed edges in the maximum matching set without sharing the same source or end nodes.

4. In-Degree and Out-Degree Node Attacks

Centrality analysis is an essential research area in studying network robustness [28]. Nodes with a high degree are known to have a substantial impact on network functioning and are more susceptible to targeted attacks. In this study, our objective is to investigate an analytical approximation of network controllability during targeted node removal based on two types of degrees: in-degree and out-degree.
Assuming that the probability of node attack is proportional to some power of its in-degree and out-degree, we can express the probability of removing node i based on its in-degree k i n _ i as p i n _ i and based on its out-degree k o u t _ i as p o u t _ i . The formula for calculating these probabilities is given as follows:
p i n _ i = k i n _ i α j N k i n _ j α , p o u t _ i = k o u t _ i α j N k o u t _ j α .
In the node removal process, after some nodes are removed, we recalculate the removal probabilities for the remaining nodes using Equation (1). We then select nodes to remove based on the recalculated probabilities until all nodes are removed.
When α = 0 , the aforementioned equations become
p i n _ i = 1 N , p o u t _ i = 1 N ,
which indicates that each node has an equal probability of being removed, resulting in a random removal strategy. On the other hand, for α > 0 , nodes with higher degrees have a greater likelihood of being removed, while for α < 0 , nodes with lower degrees are more likely to be removed.
In this study, we investigate the impact of degree-based node removal strategies on network robustness. To this end, we focus on α > 0 , as higher-degree nodes are commonly targeted for attack in real-world scenarios. Specifically, we consider two values of α , namely α = 1 and α = 10 , to evaluate the impact of removing nodes proportional to their degree and removing high-degree nodes more aggressively, respectively. By using Equation (1), we obtain the probabilities of the node being removed based on in-degree and out-degree when α = 1 as follows:
p i n _ i = k i n _ i j N k i n _ j , p o u t _ i = k o u t _ i j N k o u t _ j .
Analogously, the node removal probabilities based on in-degree or out-degree with α = 10 can be calculated by
p i n _ i = k i n _ i 10 j N k i n _ j 10 , p o u t _ i = k o u t _ i 10 j N k o u t _ j 10 .
Our results show that, for α = 10 , the removal of high-degree nodes does not lead to a significant reduction in network robustness in the beginning stage. For several networks, there are no significant differences between the results with α = 1 and α = 100 . Interestingly, we observe that increasing the value of α to 100 does not result in further performance gains, as the performance of attacks with α = 100 is similar to that of attacks with α = 10 . Additional details on these findings can be found in Appendix A. Furthermore, we find that when α = 1 , the removal strategies based on in-degree or out-degree can be more detrimental to certain networks than node removal based on the total degree. However, for some other networks, the harmful effects of these strategies are comparable. The results are presented in Appendix B.

5. Minimum Fraction of the Number of Driver Nodes under Targeted Node Attacks

5.1. Analytical Approximation

The analytical approximation for targeted node removal based on in- and out-degrees with different α is derived from the analytical approximation of random node removal. As such, we begin by introducing the methodology for approximating the minimum fraction of driver nodes under random removal, and then introduce the analytical methods of the cases: α = 1 and α = 10 .

5.1.1. Case: α = 0

To predict the minimum fraction of driver nodes under random removal, α = 0 , by using the analytical method based on generating function of degrees, we first employ the framework proposed by Liu et al. [6]. Given a directed network G ( N , L ) with N nodes and L links, we can determine the minimum fraction of driver nodes using the generating function of the in- and out-degree distributions, denoted by G i n ( x ) and G o u t ( x ) , respectively, as well as the excess in- and out-degree distributions, denoted by H i n ( x ) and H o u t ( x ) , respectively. These generating functions can be defined as follows:
G i n ( x ) = k = 0 P i n ( k i n ) x k i n , G o u t ( x ) = k = 0 P o u t ( k o u t ) x k o u t , H i n ( x ) = k = 1 k i n P i n ( k i n ) x k i n 1 < k i n > = G i n ( x ) G i n ( 1 ) , H o u t ( x ) = k = 1 k o u t P o u t ( k o u t ) x k o u t 1 < k o u t > = G o u t ( x ) G o u t ( 1 ) ,
where k i n and k o u t represent in-degree and out-degree, respectively, while P i n ( . ) and P o u t ( . ) are in- and out-degree probability distributions, respectively. Then, the minimum fraction of driver nodes can be obtained by
n d = 1 2 { G i n ( ω 2 ) + G i n ( 1 ω 1 ) 2 + G o u t ( ω 2 ^ ) + G o u t ( 1 ω 1 ^ ) + k [ ω 1 ^ ( 1 ω 2 ) + ω 1 ( 1 ω 2 ^ ) ] } ,
where ω 1 , ω 2 , ω ^ 1 and ω ^ 2 satisfy
ω 1 = H o u t ( ω ^ 2 ) , ω 2 = 1 H o u t ( 1 ω ^ 1 ) , ω ^ 1 = H i n ( ω 2 ) , ω ^ 2 = 1 H i n ( 1 ω 1 ) ,
and k denotes half of the average degree equal to the average in-degree and the average out-degree, k = 1 2 < k > = < k i n > = < k o u t > . We aim to determine the minimum fraction of driver nodes n D needed to control the remaining part of the network after removing a fraction p of nodes. To this end, we partition the network into two sets: a set containing N D driver nodes that can control the rest of the network and a set of N r removed nodes. We assume that each removed node requires the control of an individual driver node. Then, we define the fraction of driver nodes n D as n D = N D + N r N . After removing a fraction p of nodes from the network, we can obtain the following expression for the minimum fraction of driver nodes n D ,
n D = n d ( 1 p ) N + p N N = n d ( 1 p ) + p .
We adopt the method proposed by Shao et al. [29] to adjust the generating functions of in- and out-degree and the excess in- and out-degree after randomly removing a fraction p of nodes from the network. According to this method, the generating function after random removal can be obtained by applying an adjusted augmentation x ¯ = p + ( 1 p ) x to the original generating functions. Hence, the generating functions of the in- and out-degree and the excess the in- and out-degree after removing a fraction p of nodes can be expressed as follows:
G ¯ i n ( x ) = G i n ( p + ( 1 p ) x ) , G ¯ o u t ( x ) = G o u t ( p + ( 1 p ) x ) , H ¯ i n ( x ) = G ¯ i n ( x ) G ¯ i n ( 1 ) , H ¯ o u t ( x ) = G ¯ o u t ( x ) G ¯ o u t ( 1 ) .
Next, we use Equations (6) and (8) to obtain the fraction of the minimum number of nodes n D after removing a fraction p of nodes,
n D = 1 2 ( 1 p ) { G ¯ i n ( ω 2 ) + G ¯ i n ( 1 ω 1 ) 2 + G ¯ o u t ( ω 2 ^ ) + G ¯ o u t ( 1 ω 1 ^ ) + k ( 1 p ) [ ω 1 ^ ( 1 ω 2 ) + ω 1 ( 1 ω 2 ^ ) ] } + p ,
where ω 1 , ω 2 , ω ^ 1 and ω ^ 2 satisfy
ω 1 = H ¯ o u t ( ω ^ 2 ) , ω 2 = 1 H ¯ o u t ( 1 ω ^ 1 ) , ω ^ 1 = H ¯ i n ( ω 2 ) , ω ^ 2 = 1 H ¯ i n ( 1 ω 1 ) .

5.1.2. Case: α = 1

In-degree: 
In undirected networks, after a fraction p of nodes have been removed based on their degree; specifically, the probability of a node removal is proportional to some power of its degree, see Equation (1); the generating function of the degree distribution, G ( x ) , transforms into function G ¯ ( x ) , which is as follows [28]:
G ¯ ( x ) = 1 1 p k = 0 p k f k α ( 1 + f G α ( f ) < k > ( x 1 ) ) k ,
where f G α 1 ( 1 p ) , G α ( x ) k p k x k α and < k > is the average degree of the initial network.
We investigate the extension of prior conclusions to directed networks while removing nodes based on their in-degree. We assume that a node’s in-degree and out-degree are independent and uncorrelated, such that removing a fraction p of nodes based on their in-degree results in the generating function of the in-degree distribution described by Equation (12). Furthermore, the generating function of the out-degree distribution is given by G ¯ o u t ( x ) = G o u t ( p + ( 1 p ) x ) following the equation of random node removals. So, if we remove nodes based on in-degree, function G ¯ i n ( x ) and function G ¯ i n ( x ) satisfy
G ¯ i n ( x ) = 1 1 p k i n = 0 p k i n f k i n ( 1 + f G 1 ( f ) < k i n > ( x 1 ) ) k i n , G ¯ o u t ( x ) = G o u t ( p + ( 1 p ) x ) .
Then, we can obtain the analytical approximation of the minimum fraction of driver nodes under node removals based on in-degree using Equation (10).
Out-degree: 
Analogously, if we remove a fraction p of nodes based on their out-degree, we maintain the assumption that the generating function of the out-degree distribution is described by Equation (12). Additionally, the generating function of the in-degree distribution can be expressed as G ¯ i n ( x ) = G i n ( p + ( 1 p ) x ) . Therefore, we have function G ¯ i n ( x ) and function G ¯ i n ( x ) as follows:
G ¯ i n ( x ) = G i n ( p + ( 1 p ) x ) , G ¯ o u t ( x ) = 1 1 p k o u t = 0 p k o u t f k o u t ( 1 + f G 1 ( f ) < k o u t > ( x 1 ) ) k o u t .
Furthermore, utilizing Equation (10), we can derive an analytical approximation of the minimum fraction of driver nodes when nodes are removed based on out-degree.

5.1.3. Case: α = 10

When α = 10 , we encounter difficulties in obtaining a numerical solution for f G α 1 ( 1 p ) , where G α ( x ) k p k x k α . Consequently, it becomes challenging to determine the evolution of the generating functions for in-degree and out-degree distributions during the node removal process. To address this challenge, we propose a heuristic approach whereby we map the targeted node removal process based on in-degree or out-degree into a random node attack process.
Specifically, for node removals based on in-degree with α = 10 , where a fraction of p nodes are to be removed, we map this process to the removal of p ¯ nodes in the in-degree distribution, while maintaining the fraction of nodes in the out-degree distribution at p. Similarly, for node removals based on out-degree with α = 10 , we map the process to the random removal of a fraction of p ¯ nodes in the out-degree distribution, as well as a fraction of p nodes in the in-degree distribution.
In-degree: 
In order to estimate the corresponding p ¯ of a given fraction p under node removals based on in-degree with α = 10 , we adopt the assumption that nodes are removed in descending order of in-degree. Specifically, we first sort the nodes according to their in-degree and then remove nodes starting from the node with the highest in-degree until the targeted fraction p is reached.
Next, we calculate the total in-degree of all the removed nodes by utilizing the original in-degree distribution and the targeted removal fraction p. The effective fraction p ¯ is then obtained by normalizing the total in-degree of all removed nodes with respect to the total in-degree of all nodes in the initial network. This can be calculated as follows:
p ¯ i n = k i n = k i n m a x k i n = k ¯ i n p k i n N k i n N < k i n > = k i n = k i n m a x k i n = k ¯ i n p k i n k i n < k i n > ,
where the largest in-degree value is denoted as k i n m a x , the probability of removed nodes with degree k i n is denoted as p k i n and degree k ¯ i n satisfies k i n = k i n m a x k i n = k ¯ i n p k i n = p . It is worth mentioning that except for removed probability p k ¯ i n , other probability p k i n is equal to probability P i n ( k i n ) in the generating function. Then, we can use effective proportion p ¯ i n for the approximation of the minimum fraction of driver nodes as follows:
G ¯ i n ( x ) = G i n ( p ¯ i n + ( 1 p ¯ i n ) x ) , G ¯ o u t ( x ) = G o u t ( p + ( 1 p ) x ) , n D = 1 2 { G ¯ i n ( ω 2 ) + G ¯ i n ( 1 ω 1 ) 2 + G ¯ o u t ( ω 2 ^ ) + G ¯ o u t ( 1 ω 1 ^ ) + k ( 1 p + p ¯ i n 2 ) [ ω 1 ^ ( 1 ω 2 ) + ω 1 ( 1 ω 2 ^ ) ] } ( 1 p + p ¯ i n 2 ) + p + p ¯ i n 2 ,
where ω 1 , ω 2 , ω 1 ¯ and ω 2 ¯ satisfy Equation (11).
Out-degree: 
Analogously, for targeted node removal based on out-degree with α = 10 , the calculation of fraction p ¯ o u t follows the same assumption: nodes are removed from the node with the highest out-degree to the node with the lowest out-degree until the removed fraction of nodes reaches p. The effective fraction p ¯ o u t is the total out-degree of removed nodes normalized by the total out-degree in the original network, which can be calculated by
p ¯ o u t = k o u t = k o u t m a x k o u t = k ¯ o u t p k o u t N k o u t N < k o u t > = k o u t = k o u t m a x k o u t = k ¯ o u t p k o u t k o u t < k o u t > ,
where the largest degree value is denoted as k o u t m a x , and the probability of removed nodes with out-degree k o u t as p k o u t . To achieve the targeted removal fraction p, we find the minimum out-degree value k ¯ o u t satisfying k o u t = k o u t m a x k o u t = k ¯ o u t p k o u t = p . For all out-degree values except for k ¯ o u t , their corresponding probabilities p k o u t are equal to the probabilities P o u t ( k o u t ) in the generating function. Then, we use p ¯ o u t , the effective proportion of removed nodes based on out-degree, to estimate the minimum number of driver nodes, which is given by the following expression:
G ¯ i n ( x ) = G i n ( p + ( 1 p ) x ) , G ¯ o u t ( x ) = G o u t ( p ¯ o u t + ( 1 p ¯ o u t ) x ) , n d = 1 2 { G ¯ i n ( ω 2 ) + G ¯ i n ( 1 ω 1 ) 2 + G ¯ o u t ( ω 2 ^ ) + G ¯ o u t ( 1 ω 1 ^ ) + k ( 1 p + p ¯ o u t 2 ) [ ω 1 ^ ( 1 ω 2 ) + ω 1 ( 1 ω 2 ^ ) ] } ( 1 p + p ¯ o u t 2 ) + p + p ¯ o u t 2 ,
where ω 1 , ω 2 , ω 1 ¯ and ω 2 ¯ satisfy Equation (11).

5.2. Results for Targeted Node Attacks

5.2.1. Case:  α = 1

We ran simulations on various networks, as described in Section 2. We carried out 10,000 realizations for all networks to ensure sufficient statistical power. For ER and real-world networks, which have a relatively small number of nodes, one node was removed at each step until all nodes had been removed during each realization. Then, a recalculation of the minimum fraction of driver nodes was conducted by using the algorithm. On the other hand, due to the large number of nodes in SSNs and SFs, 1 % of nodes were removed at each step until all nodes had been removed during each realization. Subsequently, the minimum fraction of driver nodes was recalculated based on the modified network structure. The average value of results obtained from the 10,000 realizations was taken as the final simulation output.
We present the results of targeted node removal based on in-degree and out-degree with α = 1 , as depicted in Figure 1 and Figure 2. The simulation results are shown in green lines, whereas the analytical results are in red. The results of random node removal are also presented in gray lines for comparison. We observe that the analytical results serve as a closed-form approximation of the minimum fraction of driver nodes ( n D ), as a discrepancy exists between the predicted and simulation values during the targeted node removal process based on in-degree or out-degree. In the case of ER networks and SFs, the in-degree and out-degree distributions are identical. Consequently, the predicted values of targeted removal based on in-degree and out-degree are also the same. For SSNs, the out-degree of nodes is fixed. Therefore, the lines of analytical results of targeted node removal based on out-degree with α = 1 in SSNs overlap with the lines of random node removal. We find that for SFs and SSNs, the simulation results of targeted removal based on in-degree and out-degree are slightly different from the simulation results of random removals. Thus, even though the analytical results of SFs differ slightly from the simulation results of random removals and the analytical results of SSNs are the same as the random removal results, they closely approach the simulation results of targeted removals.
When the removed fraction p is small, the simulation results of targeted removals based on in-degree and out-degree are close to those of random removals. We verified this by calculating the Root Mean Square Error (RMSE) between the simulation results of targeted removals based on in-degree and out-degree and analytical results of randomly removing nodes below 10 % , as shown in Table 2. Moreover, we calculated the RMSE between the simulation and analytical results of targeted node removals based on in-degree and out-degree below 10 % , as shown in Table 3. The results indicated that both methods provide a good approximation of the simulation results, as the values in both tables for targeted node removals based on in-degree and out-degree with α = 1 are reasonably small.

5.2.2. Case: α = 10

We ran the simulations of 10,000 realizations with α = 10 under in-degree and out-degree node removals in mentioned networks. Each realization of every network is the same as described in case α = 1 . The simulation results of network controllability are shown in the green lines in Figure 3 and Figure 4. As before, the analytical results are depicted in red lines, while the simulation results of network controllability under random node attacks are shown in gray lines.
In addition to targeted node removals based on out-degree in SSNs with fixed out-degree, the analytical results are consistent with random node removals. Notably, the analytical results exhibit a similar pattern for α = 10 , where they initially surpass the simulation results before eventually intersecting and becoming inferior to the targeted node attack lines but superior to the random node attack lines as the fraction of removed nodes approaches one. We find the proposed methods can closely approximate network controllability using a closed-form approach, but do not precisely align with simulation results.
Upon examining Table 2 and Table 3, we observe that both the proposed analytical methods and the analytical results of random node removal demonstrate satisfactory performance for targeted node removal based on in-degree and out-degree with α = 10 when the fraction of removed nodes p is below 10 % . However, the values obtained for α = 10 are comparatively inferior to those obtained for α = 1 and random node removal. These outcomes highlight the limitations of our proposed approach. Specifically, our method assumes that nodes are removed from the node with the highest degree to the node with the lowest degree, which is true when α is large enough, such as infinity. In this context, we choose α = 10 and the node with the highest degree is much more likely to be removed, but still cannot be guaranteed to be removed at each step.

6. Conclusions and Discussion

This study introduces analytical methods based on generating functions to determine the minimum fraction of driver nodes required to maintain network controllability in directed networks under node failures based on in-degree and out-degree. We develop separate analytical techniques for two scenarios, namely α = 1 and α = 10 . Our proposed analytical methods demonstrate reasonable results to predict the minimum fraction of driver nodes under targeted attacks. Furthermore, our investigation indicates that random node removal may also serve as a reliable predictor of the results of various targeted node removals, particularly when the fraction of removed nodes is minimal (below 10%).
In addition to the findings presented in this paper, we have endeavored to apply our simulations to various other real-world networks. Our analysis reveals that the minimum fraction of driver nodes calculated by the proposed analytical method utilizing generating functions does not coincide with the results obtained using the maximum matching algorithm before node removal. As such, our proposed methods are inadequate for predicting the minimum fraction of driver nodes under node removal for these networks. When targeted node removal is based on in-degree and out-degree with α = 10 , our approximation method assumes that nodes are removed in descending order of in-degree and out-degree. However, the assumption does not reflect the actual removal process, as we recalculated the removal probabilities to choose nodes at each step. This discrepancy is one of the reasons for the inaccurate results obtained. Moreover, we acknowledge that further improvements are required to enhance the method’s efficacy. Notably, the numerical solution of the predicted outcomes can be challenging to obtain, particularly when attempting to acquire the results for SFs with some other parameters.
The approximation of node removals based on in- or out-degree involves an assumption that the in-degree distribution and out-degree distribution evolve independently. However, the assumption requires further investigation to ensure its validity. To address this issue, an avenue of promising research involves examining the relationship between in-degree and out-degree distributions through the randomization of networks. Such analyses may provide upper and lower bounds for analytical methods, contributing to the improvement of predictions about network controllability under targeted attacks based on in-degree and out-degree.
In the future, we aim to broaden the scope of our findings by including other types of node attacks, specifically localized node attacks, as documented in [28]. Furthermore, we intend to verify our conclusions on a more comprehensive collection of real-world networks and various types of networks, such as interdependent networks. We also plan to apply additional prediction techniques, such as machine learning methods, to assess network controllability under node removals concerning in-degree and out-degree.

Author Contributions

Conceptualization, R.E.K.; methodology, F.W. and R.E.K.; software, F.W.; validation, F.W. and R.E.K.; formal analysis, F.W. and R.E.K.; investigation, F.W. and R.E.K.; resources, F.W. and R.E.K.; data curation, F.W. and R.E.K.; writing—original draft preparation, F.W.; writing—review and editing, F.W. and R.E.K.; visualization, F.W.; supervision, R.E.K.; project administration, R.E.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to acknowledge the valuable discussions and help from Peng Sun and the financial support from the China Scholarship Council (No. 201906040194).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ERErdös-Rényi networks
SSNsSwarm Signal networks
SFsScale-free networks
RMSERoot Mean Square Error

Appendix A. The Simulation Results Based on Different α Values

The following figures demonstrate for α = 0 , α = 1 , α = 10 and α = 100 how the minimum fraction of driver nodes changes under targeted attacks based on degree, in-degree and out-degree for ER networks and SSNs. We find that the results of α = 10 and α = 100 overlap.
Figure A1. The minimum fraction of driver nodes n D during targeted node removal based on in-degree and out-degree with α = 0 , α = 1 , α = 10 and α = 100 for different kinds of networks. The results are the average n D calculated by the maximum matching algorithm over 10,000 realizations of real-world networks and 1000 realizations of model networks. The blue, orange, and green dashed lines are the results of simulations with α = 0 , α = 1 and α = 10 separately. The pink dotted lines are obtained by the simulation results with α = 100 .
Figure A1. The minimum fraction of driver nodes n D during targeted node removal based on in-degree and out-degree with α = 0 , α = 1 , α = 10 and α = 100 for different kinds of networks. The results are the average n D calculated by the maximum matching algorithm over 10,000 realizations of real-world networks and 1000 realizations of model networks. The blue, orange, and green dashed lines are the results of simulations with α = 0 , α = 1 and α = 10 separately. The pink dotted lines are obtained by the simulation results with α = 100 .
Entropy 25 00656 g0a1

Appendix B. Comparison with Node Removal Based on Degree with α=1

We present the results of four types of node removal strategies: random removal, targeted node removal based on the total degree with α = 1 , targeted node removal based on in-degree with α = 1 , and targeted node removal based on out-degree with α = 1 for three networks in Figure A2. We find that the three targeted node removal strategies are more disruptive than random removal. However, the effectiveness of the targeted node removal strategies varies depending on the network structure. For instance, in ER(100,0.04), all three targeted node removal strategies show similar performance. In SSN( 10 4 , 2 ), the targeted node removal based on in-degree is the most disruptive; whereas, in HinerniaGlobal, the targeted node removal based on out-degree is the most disruptive.
Figure A2. The minimum fraction of driver nodes n D during random removal and targeted node removal based on degree, in-degree and out-degree with α = 1 for three networks. The results are the average n D calculated by the maximum matching algorithm over 10,000 realizations of HinerniaGlobal and 1000 realizations of ER(100, 0.04) and SSN( 10 4 , 2 ). The blue, red, orange and pink dashed lines are the results of simulations with random removal, target removal based on the total degree with α = 1 , target removal based on in-degree with α = 1 and target removal based on out-degree with α = 1 separately.
Figure A2. The minimum fraction of driver nodes n D during random removal and targeted node removal based on degree, in-degree and out-degree with α = 1 for three networks. The results are the average n D calculated by the maximum matching algorithm over 10,000 realizations of HinerniaGlobal and 1000 realizations of ER(100, 0.04) and SSN( 10 4 , 2 ). The blue, red, orange and pink dashed lines are the results of simulations with random removal, target removal based on the total degree with α = 1 , target removal based on in-degree with α = 1 and target removal based on out-degree with α = 1 separately.
Entropy 25 00656 g0a2

Appendix C. Another Real-World Network Results

In this study, the real-world graphs utilized have an average degree ranging from 2 to 3. To further evaluate the efficacy of the proposed techniques, we selected a network from the Topology Zoo dataset, namely BtNorthAmerica, which possesses an average total degree of 4.22. The network under consideration comprises 36 nodes and 76 links. We analyzed the controllability of the network under node removals concerning node in-degree and out-degree with different α . The results are presented in Figure A3 and Table A1 and Table A2. Our findings suggest that the predicted values of the proposed methods are valid. It is worth mentioning that, when α = 10 , attacks based on out-degree at the onset are not as deleterious as random removals. Removing the node with the highest out-degree in the initial steps results in a lower average number of driver nodes than removing other nodes, on average.
Table A1. The RMSE between the analytical results of random removals and the simulation results under random removals, target removals with α = 1 and α = 10 , respectively, while removing 10% of the nodes. The analytical method for random removals is from the reference [19].
Table A1. The RMSE between the analytical results of random removals and the simulation results under random removals, target removals with α = 1 and α = 10 , respectively, while removing 10% of the nodes. The analytical method for random removals is from the reference [19].
NetworkRandom α = 1 α = 10
IndegreeOutdegreeDegreeIndegreeOutdegreeDegree
BtNorthAmerica0.00970.01400.01040.01210.01170.00960.0101
Table A2. The RMSE between the analytical results of the proposed analytical methods and the simulation results under different kinds of removals while removing 10% of the nodes. The analytical methods for random removals and targeted node removals based on the total degree are from the reference [19].
Table A2. The RMSE between the analytical results of the proposed analytical methods and the simulation results under different kinds of removals while removing 10% of the nodes. The analytical methods for random removals and targeted node removals based on the total degree are from the reference [19].
NetworkRandom α = 1 α = 10
IndegreeOutdegreeDegreeIndegreeOutdegreeDegree
BtNorthAmerica0.00970.01260.01750.00910.05380.06120.0527
Figure A3. The minimum fraction of driver nodes n D during targeted node removal based on in-degree and out-degree with α = 1 and α = 10 , respectively, for the network BtNorthAmerica.
Figure A3. The minimum fraction of driver nodes n D during targeted node removal based on in-degree and out-degree with α = 1 and α = 10 , respectively, for the network BtNorthAmerica.
Entropy 25 00656 g0a3

Appendix D. Analytical Approximation of Random Node Removals about SFs

This section shows the analytical solution for random node removal in SFs. In SFs, the in-degree distribution and out-degree distribution both follow the pure power-law distribution with minimum degree a and exponent γ , which can be denoted as follows:
P i n ( k i n ) = C i n k i n γ , P o u t ( k o u t ) = C o u t k o u t γ ,
where C i n = 1 k i n = a k i n γ = 1 ζ ( γ , a ) and C o u t = 1 k o u t = a k o u t γ = 1 ζ ( γ , a ) , where ζ ( γ , a ) is the Hurwitz Zeta function, and the average degree k = ζ ( γ 1 , a ) ζ ( γ , a ) . Correspondingly, the generating functions can be obtained by
G i n ( x ) = x a Φ ( x , γ , a ) ζ ( γ , a ) , G o u t ( x ) = x a Φ ( x , γ , a ) ζ ( γ , a ) ,
where Φ ( z , s , α ) denotes the Lerch transcendent function.
Together with Equations (9) and (10), the fraction of the minimum number of driver nodes n D after randomly removing a fraction p nodes can be calculated by
n D = ( 1 p ) p ω 2 + p + ω 2 a Φ p ω 2 + p + ω 2 , γ , a ζ ( γ , a ) + ( 1 p ) Φ ( p 1 ) Φ p ω 2 + p + ω 2 , γ 1 , a p ω 2 + p + ω 2 a 1 ζ ( γ 1 , a ) + 1 , γ , a ζ ( γ , a ) × ( p 1 ) p ω 2 + p + ω 2 a 1 Φ p ω 2 + p + ω 2 , γ 1 , a ζ ( γ 1 , a ) + 1 a + k ( 2 p 1 p 2 ) ω 2 1 p ω 2 + p + ω 2 a 1 Φ p ω 2 + p + ω 2 , γ 1 , a ζ ( γ 1 , a ) + 2 p 1
where 1 ω 2 H ¯ o u t ( 1 H ¯ i n ( ω 2 ) ) = 0 .

References

  1. Wu, L.; Li, M.; Wang, J.X.; Wu, F.X. Controllability and its applications to biological networks. J. Comput. Sci. Technol. 2019, 34, 16–34. [Google Scholar] [CrossRef]
  2. Rinaldi, M. Controllability of transportation networks. Transp. Res. Part B Methodol. 2018, 118, 381–406. [Google Scholar] [CrossRef] [Green Version]
  3. Solimine, P.C. Network Controllability Metrics for Corruption Research. In Corruption Networks; Granados, O.M., Nicolás-Carlock, J.R., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 29–50. [Google Scholar] [CrossRef]
  4. Kalman, R.E. Mathematical Description of Linear Dynamical Systems. J. Soc. Ind. Appl. Math. Ser. A Control 1963, 1, 152–192. [Google Scholar] [CrossRef]
  5. Lin, C.T. Structural controllability. IEEE Trans. Autom. Control 1974, 19, 201–208. [Google Scholar] [CrossRef]
  6. Liu, Y.Y.; Slotine, J.J.; Barabási, A.L. Controllability of complex networks. Nature 2011, 473, 167–173. [Google Scholar] [CrossRef]
  7. Cowan, N.J.; Chastain, E.J.; Vilhena, D.A.; Freudenberg, J.S.; Bergstrom, C.T. Nodal Dynamics, Not Degree Distributions, Determine the Structural Controllability of Complex Networks. PLoS ONE 2012, 7, e38398. [Google Scholar] [CrossRef] [Green Version]
  8. Yuan, Z.; Zhao, C.; Di, Z.; Wang, W.X.; Lai, Y.C. Exact controllability of complex networks. Nat. Commun. 2013, 4, 2447. [Google Scholar] [CrossRef] [Green Version]
  9. Van Mieghem, P.; Doerr, C.; Wang, H.; Hernandez, J.M.; Hutchison, D.; Karaliopoulos, M.; Kooij, R. A Framework for Computing Topological Network Robustness; Report20101218; Delft University of Technology: Delft, The Netherlands, 2010; pp. 1–15. [Google Scholar]
  10. Pu, C.L.; Pei, W.J.; Michaelson, A. Robustness analysis of network controllability. Phys. A Stat. Mech. Its Appl. 2012, 391, 4420–4425. [Google Scholar] [CrossRef]
  11. Lu, Z.M.; Li, X.F. Attack Vulnerability of Network Controllability. PLoS ONE 2016, 11, e0162289. [Google Scholar] [CrossRef]
  12. Wang, L.; Zhao, G.; Kong, Z.; Zhao, Y. Controllability and Optimization of Complex Networks Based on Bridges. Complexity 2020, 2020, 6695026. [Google Scholar] [CrossRef]
  13. Sun, P.; Kooij, R.E.; Van Mieghem, P. Reachability-Based Robustness of Controllability in Sparse Communication Networks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 2764–2775. [Google Scholar] [CrossRef]
  14. Lou, Y.; Wang, L.; Chen, G. A Framework of Hierarchical Attacks to Network Controllability. Commun. Nonlinear Sci. Numer. Simul. 2021, 98, 105780. [Google Scholar] [CrossRef]
  15. Menichetti, G.; Dall’Asta, L.; Bianconi, G. Network Controllability Is Determined by the Density of Low In-Degree and Out-Degree Nodes. Phys. Rev. Lett. 2014, 113, 078701. [Google Scholar] [CrossRef] [Green Version]
  16. Lou, Y.; Yang, D.; Wang, L.; Tang, C.B.; Chen, G. Controllability Robustness of Henneberg-Growth Complex Networks. IEEE Access 2022, 10, 5103–5114. [Google Scholar] [CrossRef]
  17. Zhang, Z.; Yin, Y.; Zhang, X.; Liu, L. Optimization of robustness of interdependent network controllability by redundant design. PLOS ONE 2018, 13, e0192874. [Google Scholar] [CrossRef] [Green Version]
  18. Chen, A.; Sun, P.; Kooi, R.E. The Recoverability of Network Controllability. In Proceedings of the 2021 5th International Conference on System Reliability and Safety (ICSRS), Palermo, Italy, 24–26 November 2021; pp. 198–208. [Google Scholar] [CrossRef]
  19. Wang, F.; Kooij, R. Robustness of Network Controllability with Respect to Node Removals. In Proceedings of the Complex Networks and Their Applications XI; Cherifi, H., Mantegna, R.N., Rocha, L.M., Cherifi, C., Micciche, S., Eds.; Springer International Publishing: Cham, Switzerland, 2023; pp. 383–394. [Google Scholar] [CrossRef]
  20. Dhiman, A.; Sun, P.; Kooij, R. Using Machine Learning to Quantify the Robustness of Network Controllability. In Machine Learning for Networking; Springer International Publishing: Cham, Switzerland, 2021; pp. 19–39. [Google Scholar] [CrossRef]
  21. Lou, Y.; He, Y.; Wang, L.; Chen, G. Predicting Network Controllability Robustness: A Convolutional Neural Network Approach. IEEE Trans. Cybern. 2022, 52, 4052–4063. [Google Scholar] [CrossRef]
  22. Lou, Y.; He, Y.; Wang, L.; Tsang, K.F.; Chen, G. Knowledge-Based Prediction of Network Controllability Robustness. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 5739–5750. [Google Scholar] [CrossRef]
  23. Lou, Y.; Wu, R.; Li, J.; Wang, L.; Li, X.; Chen, G. A Learning Convolutional Neural Network Approach for Network Robustness Prediction. IEEE Trans. Cybern. 2022, 1–14. [Google Scholar] [CrossRef]
  24. Komareji, M.; Bouffanais, R. Resilience and Controllability of Dynamic Collective Behaviors. PLoS ONE 2013, 8, e82578. [Google Scholar] [CrossRef] [Green Version]
  25. Barabási, A.L.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
  26. Knight, S.; Nguyen, H.X.; Falkner, N.; Bowden, R.; Roughan, M. The Internet Topology Zoo. IEEE J. Sel. Areas Commun. 2011, 29, 1765–1775. [Google Scholar] [CrossRef]
  27. Hopcroft, J.E.; Karp, R.M. An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM J. Comput. 1973, 2, 225–231. [Google Scholar] [CrossRef]
  28. Kenett, D.Y.; Gao, J.; Huang, X.; Shao, S.; Vodenska, I.; Buldyrev, S.V.; Paul, G.; Stanley, H.E.; Havlin, S. Network of Interdependent Networks: Overview of Theory and Applications. In Networks of Networks: The Last Frontier of Complexity; Springer International Publishing: Cham, Switzerland, 2014; pp. 3–36. [Google Scholar] [CrossRef]
  29. Shao, J.; Buldyrev, S.V.; Braunstein, L.A.; Havlin, S.; Stanley, H.E. Structure of shells in complex networks. Phys. Rev. E 2009, 80, 036105. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. The minimum fraction of driver nodes n D during targeted node removal based on in-degree with α = 1 for different kinds of networks.
Figure 1. The minimum fraction of driver nodes n D during targeted node removal based on in-degree with α = 1 for different kinds of networks.
Entropy 25 00656 g001aEntropy 25 00656 g001b
Figure 2. The minimum fraction of driver nodes n D during targeted node removal based on out-degree with α = 1 for different kinds of networks.
Figure 2. The minimum fraction of driver nodes n D during targeted node removal based on out-degree with α = 1 for different kinds of networks.
Entropy 25 00656 g002aEntropy 25 00656 g002b
Figure 3. The minimum fraction of driver nodes n D during targeted node removal based on in-degree with α = 10 for different kinds of networks.
Figure 3. The minimum fraction of driver nodes n D during targeted node removal based on in-degree with α = 10 for different kinds of networks.
Entropy 25 00656 g003
Figure 4. The minimum fraction of driver nodes n D during targeted node removal based on out-degree with α = 10 for different kinds of networks.
Figure 4. The minimum fraction of driver nodes n D during targeted node removal based on out-degree with α = 10 for different kinds of networks.
Entropy 25 00656 g004
Table 1. Properties of four real-world communication networks.
Table 1. Properties of four real-world communication networks.
NameNL < k >
HinerniaGlobal55812.95
Syringa74742.00
Interoute1101462.65
Cogentco1972432.47
Table 2. The RMSE between the analytical results of random removals and the simulation results under random removals, target removals with α = 1 and α = 10 , respectively, while removing 10% of the nodes. The column labeled “Random” indicates the RMSE under random removals. The columns labeled “ α = 1 ” and “ α = 10 ” represent the RMSE under targeted node removals with α = 1 and α = 10 , respectively. The columns labeled “Indegree”, “Outdegree”, and “Degree” represent the RMSE under targeted node removals based on in-degree, out-degree, and total degree, respectively. The analytical method for random removals is from the reference [19].
Table 2. The RMSE between the analytical results of random removals and the simulation results under random removals, target removals with α = 1 and α = 10 , respectively, while removing 10% of the nodes. The column labeled “Random” indicates the RMSE under random removals. The columns labeled “ α = 1 ” and “ α = 10 ” represent the RMSE under targeted node removals with α = 1 and α = 10 , respectively. The columns labeled “Indegree”, “Outdegree”, and “Degree” represent the RMSE under targeted node removals based on in-degree, out-degree, and total degree, respectively. The analytical method for random removals is from the reference [19].
NetworkRandom α = 1 α = 10
IndegreeOutdegreeDegreeIndegreeOutdegreeDegree
SF( 10 5 , 3, 5)0.00050.00100.00100.00100.00320.00320.0032
SF( 10 5 , 3, 10)0.00010.00010.00010.00010.00010.00010.0001
ER(50, 0.07)0.01370.01640.01560.01550.01900.01950.0223
ER(100, 0.04)0.00790.00860.00950.00940.01260.01210.0156
HinerniaGlobal0.00390.00520.01100.00840.00250.01520.0152
Syringa0.00710.01360.02170.01790.02370.02630.0443
Interoute0.00110.00080.01060.00560.00640.00720.0175
Cogentco0.00110.00900.00530.00710.01560.00910.0248
SSN( 10 4 , 2)0.00000.01030.00030.00520.01430.00070.0155
SSN( 10 4 , 5)0.00000.00060.00000.00030.00080.00010.0008
Table 3. The RMSE between the analytical results of the proposed analytical methods and the simulation results under different kinds of removals while removing 10% of the nodes. The column labeled “Random” indicates the RMSE under random removals. The columns labeled “ α = 1 ” and “ α = 10 ” represent the RMSE under targeted node removals with α = 1 and α = 10 , respectively. The columns labeled “Indegree”, “Outdegree”, and “Degree” represent the RMSE under targeted node removals based on in-degree, out-degree, and total degree, respectively. The analytical methods for random removals and targeted node removals based on the total degree are from the reference [19].
Table 3. The RMSE between the analytical results of the proposed analytical methods and the simulation results under different kinds of removals while removing 10% of the nodes. The column labeled “Random” indicates the RMSE under random removals. The columns labeled “ α = 1 ” and “ α = 10 ” represent the RMSE under targeted node removals with α = 1 and α = 10 , respectively. The columns labeled “Indegree”, “Outdegree”, and “Degree” represent the RMSE under targeted node removals based on in-degree, out-degree, and total degree, respectively. The analytical methods for random removals and targeted node removals based on the total degree are from the reference [19].
NetworkRandom α = 1 α = 10
IndegreeOutdegreeDegreeIndegreeOutdegreeDegree
SF( 10 5 , 3, 5)0.00050.00100.00100.05460.07640.07640.1573
SF( 10 5 , 3, 10)0.00010.00010.00010.05550.07990.07990.1600
ER(50, 0.07)0.01370.01220.01130.00950.05880.05950.0543
ER(100, 0.04)0.00790.00580.00670.00390.01890.01930.0284
HinerniaGlobal0.00390.00890.01360.00250.02810.03490.0354
Syringa0.00710.00960.01430.00610.01570.02350.0142
Interoute0.00110.01510.02420.00090.02650.04540.0229
Cogentco0.00110.02330.02440.00500.03140.03300.0322
SSN( 10 4 , 2)0.00000.00850.00020.00270.03310.00060.0343
SSN( 10 4 , 5)0.00000.00940.00000.00240.01670.00010.0264
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, F.; Kooij, R.E. Robustness of Network Controllability with Respect to Node Removals Based on In-Degree and Out-Degree. Entropy 2023, 25, 656. https://doi.org/10.3390/e25040656

AMA Style

Wang F, Kooij RE. Robustness of Network Controllability with Respect to Node Removals Based on In-Degree and Out-Degree. Entropy. 2023; 25(4):656. https://doi.org/10.3390/e25040656

Chicago/Turabian Style

Wang, Fenghua, and Robert E. Kooij. 2023. "Robustness of Network Controllability with Respect to Node Removals Based on In-Degree and Out-Degree" Entropy 25, no. 4: 656. https://doi.org/10.3390/e25040656

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop