Next Article in Journal
Quantum Coherence and Purity in Dissipative Hydrogen Atoms: Insights from the Lindblad Master Equation
Previous Article in Journal
Active Inference with Dynamic Planning and Information Gain in Continuous Space by Inferring Low-Dimensional Latent States
Previous Article in Special Issue
RDPNet: A Multi-Scale Residual Dilated Pyramid Network with Entropy-Based Feature Fusion for Epileptic EEG Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Synergistic Effects of Structural Evolution and Attack Strategies on Network Matching Robustness

1
Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 611731, China
2
Department of Physics, University of Fribourg, 1700 Fribourg, Switzerland
3
School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu 611731, China
4
School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(8), 847; https://doi.org/10.3390/e27080847
Submission received: 1 May 2025 / Revised: 22 July 2025 / Accepted: 7 August 2025 / Published: 9 August 2025
(This article belongs to the Special Issue Complexity, Entropy and the Physics of Information II)

Abstract

Research on network robustness has long focused on changes in the structure connectivity of networks under attacks, effectively depicting structural integrity while ignoring the exploration of functional integrity. When the core path of the network is attacked, even if it remains connected, the rapid increase in energy consumption may still trigger systematic risks. Existing studies mainly use random networks and scale-free networks as comparative models, which has become a classic research paradigm. However, real-world networks often exhibit mixed topological features. To address the above issues, this paper introduces the concept of energy from physics into bipartite networks and establishes an evaluation framework for assessing the synergistic effects of structural evolution and attack strategies on network matching robustness. We first introduce a structural parameter u to construct a structural evolution model, where the network’s minimal matching energy distribution evolves from topological heterogeneity to random features. When u approaches 0, edges with the minimal matching energy concentrate on a few candidates, manifesting scale-free network features. When u approaches 1, the uniform distribution of the minimum-matching-energy edges corresponds to random network features. We then design three types of edge attack strategies—minimum-energy (min-E), random-energy (ran-E), and maximum-energy (max-E) attacks—simulating the impacts of critical path destruction, uniform perturbation, and redundancy removal, respectively. In addition, we construct two evaluation indicators, the average matching energy and the matching retention rate. The results show that structural evolution significantly affects network matching robustness in a nonlinear manner. Different attack strategies also exert different influence on matching robustness. Furthermore, the findings reveal the synergistic effects of the two factors on network matching robustness. The synergistic effects of redundancy capacity and network structure on matching robustness are also explored. The research deepens the understanding of network matching robustness and provides a theoretical basis for resource allocation systems to combat network attacks.

1. Introduction

Research on network robustness [1,2,3,4] has long focused on changes in network structure connectivity (the largest connected component) under different attacks [4,5,6]. Drawing inspiration from percolation theory in physics [7,8,9], robustness is quantified through monitoring the dynamic decay of the giant component size with node or edge removal, thereby evaluating structural integrity. Targeted attacks (i.e., of nodes with highest degrees) and random attacks are two of the most studied attack strategies [10,11,12], widely revealing the vulnerability of scale-free networks to targeted attacks and their resilience to random attacks [13,14,15,16]. However, while existing studies effectively depict the structural integrity of networks, they ignore the exploration of functional integrity in resource allocation scenarios [8].
Research on network matching robustness is crucial to ensuring the integrity of network functions, especially in resource allocation scenarios, such as logistics networks [17,18,19,20] and transportation networks [21,22,23]. For example, on the Internet, accidental cuts in optical fibers lead to declines in communication efficiency. Similarly, in covert networks (including terrorist networks and criminal networks), the removal of important connections could cause a weakening of the resilience of criminal organizations, as these eliminated nodes are not easily replaceable [24,25]. The phenomenon of matching instability caused by such edge failures reveals the limitations of traditional connectivity indicators in evaluating functional integrity. When the optimal matching path fails, even if the network remains connected, the rapid increase in energy consumption caused by suboptimal paths may still trigger systematic risks.
Compared with traditional connectivity research, matching robustness extends the research perspective to the dynamic equilibrium mechanism of network micro-interactions, focusing on the sustainability of global optimal allocation under resource-constrained conditions [26,27,28]. Its core lies in exploring the dynamic impact of disturbances on the network’s energy landscape. Therefore, constructing a matching robustness evaluation framework holds important application value for designing disaster-resistant resource allocation networks.
Additionally, in the study of network robustness, employing random networks and scale-free networks as comparative models has become a classic research paradigm [29,30]. Despite sharing identical node counts and edge numbers, these two network types exhibit fundamental topological differences. Random networks follow a Poisson degree distribution with relatively uniform node connectivity, while scale-free networks display a power-law degree distribution characterized by a small number of highly connected hub nodes. However, this analysis framework exhibits two primary limitations. First, the framework overlooks the mixed topological features in real-world networks, which often integrate both power-law and random features [31,32,33,34]. Second, the fixed structural parameters in experimental designs fail to capture the dynamic evolution inherent in actual networks. These limitations hinder the exploration of the continuous evolution of network structures and limit the explanatory power of theoretical models for actual networks.
To address these issues, this study proposes a network matching robustness evaluation framework and explores the impact of edge attacks based on structural evolution on matching robustness. The main research contents include the following: (i) introducing a structural parameter u to construct a structural evolution model from the energy perspective of physics, where the matching energy distribution of the network evolves from topological heterogeneity ( u 0 ) to random features ( u 1 ); (ii) designing three types of edge attack strategies: minimum-energy (min-E), random-energy (ran-E), and maximum-energy (max-E) attacks; (iii) constructing two robustness evaluation indicators, the average matching energy and the matching retention rate. By monitoring the changes in the two indicators with the attack scale f and the structural parameter u, the impact of attack strategies and structural evolution on the matching robustness is revealed. Furthermore, the synergistic effects of redundancy capacity and network structure on matching robustness are also explored.

2. Model Description

2.1. Network Construction

We introduce the concept of energy from physics into bipartite networks composed of two distinct sets: m, individuals (e.g., users), and n, candidates (e.g., resources). Each individual i ( i = 1 , 2 , , m ) ranks all candidates ( j = 1 , 2 , , n ) and generates matching energies based on personalized preferences. By constructing the network structural parameter u ( u ( 0 , 1 ] ) , we then establish an evaluation framework for assessing the synergistic effects of structural evolution and attack strategies on network matching robustness.
The basic idea of the framework is as follows: Set the initial matching energy to each candidate as e j = j / n , where j { 1 , 2 , , n } . When u approaches 0, the network exhibits highly similar preferences converging to initial settings, reflecting high similarity in group preferences. At this stage, edges with minimal matching energy concentrate on a few candidates, manifesting ‌scale-free network features [35,36] (Figure 1a). With increasing values of u, the distribution of the minimal matching energy gradually changes to randomization, showing mixed features. ‌When u approaches 1‌, the network shows typical random features with completely random individual preferences and uniformly distributed minimum-matching-energy edges, corresponding to random network features (Figure 1b). Based on the framework, we first establish a matching energy distribution function and then construct a matching energy matrix reflecting collective preferential behaviors. Specifically, based on the Boltzmann distribution in physics, the matching energy distribution is defined as follows:
p i j ( 0 ) ( u ) = e x p ( l o g ( u ) e j / λ ) j = 1 n e x p ( l o g ( u ) e j / λ ) ,
where p i j ( 0 ) ( u ) represents the initial matching probability between individual i and candidate j under the parameter u, while e j represents the initial matching energy of candidate j. The parameter λ ( > 0 ) modulates the exponential decay rate of preference concentration. The larger the λ value, the more dispersed the distribution. As u approaches 0, l o g ( u ) ; the exponential decay is sharpened and the optimal matching energy of the group is forced to concentrate. Meanwhile, as u approaches 1, l o g ( u ) 0 ; the decay rate slows, flattening the distribution to uniformity.
Information entropy is a concept that quantifies the uncertainty of a system [37,38], originating from the concept of entropy in physics. A higher value of information entropy indicates greater uncertainty in the system. Based on the matching energy distribution, we can calculate the information entropy for different network structures as follows:
H ( u ) = 1 m i = 1 m H i ( u ) = 1 m i = 1 m j = 1 n p i j ( 0 ) ( u ) l o g ( p i j ( 0 ) ( u ) ) ,
In order to compare the information entropy under different network structures, we normalize it as follows:
H n o r m ( u ) = H ( u ) H m i n ( u ) H m a x ( u ) H m i n ( u ) ,
where H m a x represents the maximum information entropy value, which corresponds to the random network characteristics with parameter u = 1. All candidates have the same probability of being selected, that is,
H max ( u ) = H ( 1 ) = log ( n ) .
H m i n represents the minimum information entropy value, which corresponds to the scale-free network characteristic with parameter u = 0.01; H m i n ( u ) = H ( 0.01 ) . At this time, there is a significant difference in the probability of options being selected.
We then generate preference lists based on the distribution using the Plackett–Luce model [39,40], which is a probabilistic ranking method that balances deterministic preferences and randomness. The procedure iteratively samples the candidates without replacement. To be specific, for each individual i, it initializes its preference sequence E i as an empty set, and at each time step, t ( t = 1 , , n ) , candidate j t is sampled without replacement from the remaining set with a probability equal to p i j ( t 1 ) ( u ) . The matching energy between the individual i and the selected candidate j ( t ) is defined as follows:
e i j ( t ) = t n ,
where t represents the preference ranking value assigned by individual i to candidate j ( t ) , while n represents the total number of candidate options. The energy value corresponds to the position in the preference ranking. The higher the ranking, the lower the energy value and the higher the matching stability. For example, the candidate selected by i at the first time step is its favorite, corresponding to the highest stability, and thus has the lowest matching energy 1 / n .
Then, the probability distribution for the remaining candidates is renormalized as follows:
p i j ( t ) ( u ) = p i j ( t 1 ) ( u ) 1 s = 1 t p i j ( s 1 ) ( u ) ,
where s = 1 t p i j ( s 1 ) ( u ) represents the cumulative probability of all the selected candidates. It is guaranteed that during each step, the sum of probabilities across all available candidate options equals exactly 1. This mathematical framework maintains probabilistic consistency throughout the selection process.
By recording the candidates selected by the individual i at each time, t, along with their corresponding matching energies, e i j = e i j ( t ) , we obtain the preference sequence E i for the individual, which is formally defined as
E i = e i 1 e i 2 e i n .
Repeating this process for all individuals, we obtain the collective energy matrix E, which is defined as follows:
E = E 1 E 2 E m = e 11 e 12 e 1 n e 21 e 22 e 2 n e m 1 e m 2 e m n .
The matrix corresponds to a fully connected bipartite network, where each individual i ranks all candidates according to personalized preferences. We then model the problem as a flow network and apply the minimum-cost maximum-flow algorithm from Python’s ortools library to yield the optimal matching set M = { ( i , j ) } for the network [41,42]. The energy values e i j in the matrix serve as unit flow costs, and the matching capacity of each candidate is set to c j .
In this study, we mainly focus on resource-scarce matching scenarios with limited candidate capacity. We first explore the impact of structural evolution and attack strategies on matching robustness in the simplest case, with all capacities being one. Then, we investigate the synergistic effect of a slight increase in capacity and structural evolution on matching robustness, where the capacity of each candidate equals 3, 5, 7, and 9, respectively.

2.2. Attack Strategies

To systematically evaluate the matching robustness of networks under different adversarial conditions, we designed three edge-based attack strategies: min-E attacks, ran-E attacks, and max-E attacks (Figure 1c). The min-E attacks are designed to evaluate network vulnerability to targeted removal of critical low-energy edges, reflecting attacks on high-preference connections. This strategy prioritizes disrupting the most stable matching paths. The ran-E attacks aim to assess the system’s resilience against uniformly distributed disruptions, mimicking random failures or non-targeted adversarial actions. The removal probability is uniform across all edges, independent of energy values. The max-E attacks aim to evaluate the role of redundant high-energy edges in maintaining network robustness, simulating attacks on less-preferred but important backup paths.
The attack scale is defined as f ( f [ 0 , 1 ) ), and the implementation step is that for each individual i, the attack removes the f n edges with the smallest energy, randomly selected energies, and the largest energy, respectively. After each attack, the updated energy matrix E a is fed into the minimum-cost flow solver to recompute the optimal matching set M.
The fully connected bipartite graph is selected as the initial state primarily to establish an idealized limit reference frame. This approach eliminates interference from the initial topological heterogeneity, ensuring that experimental differences stem entirely from the distinct attack strategies. By progressively increasing the attack ratio f, the impact of the three edge-based attack strategies on the optimal matching energy of the network can be accurately quantified.

2.3. Evaluation Indicators

Two indicators are defined to reveal the matching robustness of networks under edge attacks in this subsection. The first indicator is the average matching energy, defined as
e ¯ = 1 | M | ( i , j ) M e i j ,
where e i j represents the matching energy of individual i and candidate j in the set of optimal solutions M, and | M | represents the number of matching pairs in M. A lower e ¯ indicates a higher matching stability. This metric captures the dynamic impact of attacks on matching quality by quantifying the incremental increase in network energy resulting from matching conflicts. When optimal matches are disrupted, suboptimal matching produces elevated network energy levels. This energy variation directly captures the extent of matching quality degradation.
The second indicator is the matching retention rate, defined as
p = | M | | M m a x | ,
where | M m a x | is the maximum number of matching pairs when the attack scale is zero ( f = 0 ). A higher p represents a higher matching stability. This metric quantifies the proportion of matching preserved at a macro level after attacks.

3. Results

The results indicate that the structural parameter of the network u is proportional to the entropy value H n o r m ( u ) , and the larger the u, the faster the H n o r m ( u ) increases (Figure 2). This shows that when the optimal matching energy distribution of the network shows complete topological heterogeneity, the individual matching preferences become highly predictable, resulting in a lower uncertainty in the optimal matching of the network—that is, lower information entropy. Conversely, when the energy distribution is completely random, all candidate options are chosen with equal probability, leading to a higher uncertainty—that is, to a higher information entropy.
The results show significant differences in the impact of different attack strategies on average matching energy (Figure 3). Specifically, the min-E attacks severely destabilize networks, with the energy ( e ¯ ) increasing sharply as attack intensity (f) increases (Figure 3a). Even low-intensity attacks trigger significant fluctuations. This is mainly because the attacks preferentially remove low-energy (i.e., critical) connections, destroying the optimal matching path and triggering a cascading effect. In contrast, under the ran-E attacks, the network exhibits strong robustness. Even for large attack scales ( f < 0.8 ), the energy remains relatively stable (Figure 3b). This is because the random edge removal uniformly distributes damage without causing cascading effects. Under the max-E attacks, the network shows moderate robustness, as removing high-energy redundant edges minimally affects core connections (Figure 3c).
In addition, the results reveal that the network structure significantly affects the matching robustness through nonlinear regulation (Figure 4). Specifically, under the unattacked condition, the average matching energy values corresponding to the structural parameters u = 0.01, 0.2, 0.4, 0.6, 0.8, and 1.0 are 0.459, 0.387, 0.310, 0.192, 0.0266, and 0.002, respectively. The lower the energy, the higher the matching robustness. When the network is dominated by topological heterogeneity ( u 0 ), which indicates a sensitive structure state, increasing u significantly enhances network robustness. In scenarios such as logistics optimization and resource allocation, the optimal matching of nodes highly depends on the availability of low-energy edges. The high spatial aggregation of a small number of key connections intensifies the resource competition among the nodes. This mechanism is similar to the cascading failures observed in traditional node attacks targeting central nodes [8,43,44,45]. When u 1 , the network enters a stability state, where a further increasing u will not improve the robustness. In this state, low-energy edges are widely distributed in the topological space. When under attack, the dispersion of key paths effectively avoids local overload, thereby significantly improving the matching robustness, aligning with the percolation resilience observed in random networks [29,30].
Figure 5 shows the synergistic impact of f and u on the average matching energy under different attack strategies. Redder colors indicate lower energy (higher stability), while bluer colors denote higher energy (lower stability). Under min-E attacks, the network exhibits obvious dual-stage impact features: when under low-intensity attack ( f < 0.3 ), the change in matching energy arises from the synergistic interaction between the attack scale and the topological structure. However, as the attack scale increases to f = 0.6 , the change in energy is mainly driven by the attack scale, and the influence of the structure can be neglected (Figure 5a). At this high attack level, in varied topological structures with u values of 0.01, 0.2, 0.4, 0.6, 0.8, and 1.0, the corresponding energy values are always greater than 0.6. This shows a significant difference compared to the unattacked condition, reflecting the vulnerability of matching robustness to targeted attacks. In contrast, under ran-E attacks, the network displays a structure-dominated property where attack scale minimally affects matching energy, as structural differences primarily dictate energy variations. In contrast, when the attack ratio f = 0.6 , the energy values in different structures are 0.465, 0.402, 0.334, 0.227, 0.051, and 0.004, respectively (Figure 5b). The low degree of energy change compared to the unattacked condition indicates that the difference in network topology becomes the decisive factor. Only in the case of extreme attacks ( f > 0.9 ) does the structural influence become ineffective. Under max-E attacks, the network also shows dual-stage impact features, and its change trend is similar to that when under min-E attacks (Figure 5c).
It should be emphasized that this study mainly focuses on matching problems in resource-scarce scenarios; that is, the number of candidates does not exceed the number of individuals. The research findings are based on conditions where the user sets and the resource sets are of equal size ( n = m ). To validate the generalizability of the results, we further investigated conditions where the number of candidates is significantly smaller than the number of individuals ( n m ). Experimental results demonstrate that the changing trend of network average matching energy remains highly consistent across varying resource/user ratios (Figure A1). This consistency validates the generality of our research findings.
Notably, relevant studies show that under the same complex network size, the network structure (random network vs. scale-free network) has almost no significant impact on connectivity robustness under the random attack strategy. However, our study reveals that under random attacks, the structure still has a significant effect on network matching robustness. This is due to the connectivity focusing on the existence of edges between nodes, whereas matching stability concerns the global optimality of interconnection costs. Structural differences, therefore, lead to divergent stability, especially under resource scarcity. This highlights the need for functional integrity metrics beyond traditional connectivity measures.
We also explore the impact of f and u on the matching retention rate (p) under different attack strategies, and its changing characteristics are similar to the changes in e ¯ . Specifically, under min-E attacks, p declines dramatically as f rises (Figure 6 and Figure A2), and structural changes further affect p (Figure A3). Figure 6a intuitively shows the changing trend of p. The larger the f and the smaller the u, the greater the decrease in p. Under ran-E attacks, the p remains stable even at high f and different u values, showing strong robustness (Figure 6b). Under max-E attacks, the changing trend is similar to with min-E attacks (Figure 6c). The main difference is that as u increases, p is more stable against f.
Furthermore, we investigate the synergistic effect of a slight increase in matching capacity c and structural evolution on matching robustness. The impact of capacity on matching robustness depends on the structural features of the network. Specifically, when the network is dominated by topological heterogeneity (small u), a slight increase in capacity can significantly improve robustness under min-E attacks, with a lower energy and a higher matching rate (Figure 7). This change shows the same trend with different attack strategies (Figure A4 and Figure A5). This verifies the positive feedback mechanism between redundant capacity and robustness [46,47], where redundant capacity effectively disperses the local load impact caused by attacks by providing alternative matching paths. It shows that the degree of influence of redundancy on robustness decreases as the structural parameter increases. When the network is dominated by random features, changes in capacity will no longer work. This is because both the uniformity of the network structure and the redundant capacity play a role in dispersing the key paths and reducing the damage of targeted attacks to the network as a whole. Therefore, when structural uniformity is large enough, additional capacity redundancy will not come further into play.

4. Conclusions

This study introduces the concept of energy from physics into bipartite networks and constructs a structural parameter for networks in order to investigate network robustness from a matching perspective. By formalizing the structural evolution model and the three attack strategies, this work establishes an evaluation framework for assessing the synergistic effects of structural evolution and attack strategies on network matching robustness. Attack strategies exhibit significant differences in their impact on network matching robustness. The structural evolution also influences network matching robustness in a nonlinear manner. Furthermore, the findings reveal the synergistic effects of the two factors on network matching robustness. Specifically, the network exhibits obvious dual-stage impact features under min-E attacks and max-E attacks, whereas the network displays a structure-dominated property under ran-E attacks. The findings also emphasize the synergistic role of topological heterogeneity and redundancy management in enhancing matching robustness. The research deepens the understanding of network matching robustness and provides a theoretical basis for resource allocation systems to combat network attacks.
In addition, this study offers insights for the design and optimization of real-world network systems. In network cybersecurity protection, it highlights the necessity of establishing a multidimensional robustness evaluation framework. This framework should simultaneously monitor changes in network connectivity and network matching energy under attacks. When confronting attacks, the system should maintain topological connectivity while employing optimization algorithms to select repair paths with minimal matching energy increments. Such a dynamic mechanism will effectively reduce network operational costs. In network architecture design, implementing resilience recovery strategies against critical edge attacks is essential. For critical edges, systems should deploy redundant connections characterized by low energy consumption. When they are compromised, the system can automatically switch to preset alternative low-energy pathways, thereby significantly enhancing the network’s robustness against attacks.

Author Contributions

Conceptualization, X.N. and L.L.; methodology, X.N. and J.C.; software, X.N. and C.S.; validation, S.C.; formal analysis, J.C. and C.S.; writing—original draft preparation, X.N. and J.C.; writing—review and editing, S.C. and L.L.; supervision, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the STI 2030—Major Projects (Grant No. 2022ZD0211400), the National Natural Science Foundation of China (Grant Nos. T2293771, 62306191), and the New Cornerstone Science Foundation through the XPLORER PRIZE.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
min-EMinimum-energy
ran-ERandom-energy
max-EMaximum-energy

Appendix A

Figure A1. Synergistic effects of attack strategies with ratio f and structural parameter u on average matching energy e ¯ under the condition where n < < m . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The parameters of the network are m = 10 3 , n = 10 2 , and λ = 0.03 , and simulations were done for 50 iterations.
Figure A1. Synergistic effects of attack strategies with ratio f and structural parameter u on average matching energy e ¯ under the condition where n < < m . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The parameters of the network are m = 10 3 , n = 10 2 , and λ = 0.03 , and simulations were done for 50 iterations.
Entropy 27 00847 g0a1
Figure A2. The impact of attack strategies with ratio f on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The structural parameters are 0.01, 0.3, 0.5, 0.7, and 1.0 respectively.
Figure A2. The impact of attack strategies with ratio f on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The structural parameters are 0.01, 0.3, 0.5, 0.7, and 1.0 respectively.
Entropy 27 00847 g0a2
Figure A3. The impact of structural parameter u on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The attack ratios are 0.0, 0.1, 0.5, 0.9, and 0.999 respectively.
Figure A3. The impact of structural parameter u on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The attack ratios are 0.0, 0.1, 0.5, 0.9, and 0.999 respectively.
Entropy 27 00847 g0a3
Figure A4. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under ran-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Figure A4. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under ran-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Entropy 27 00847 g0a4
Figure A5. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under max-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Figure A5. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under max-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Entropy 27 00847 g0a5

References

  1. Wang, S.; Jin, Y.; Cai, M. Enhancing the robustness of networks against multiple damage models using a multifactorial evolutionary algorithm. IEEE Trans. Syst. Man, Cybern. Syst. 2023, 53, 4176–4188. [Google Scholar] [CrossRef]
  2. Zhao, J.; Li, D.; Sanhedrai, H.; Cohen, R.; Havlin, S. Spatio-temporal propagation of cascading overload failures in spatially embedded networks. Nat. Commun. 2016, 7, 10094. [Google Scholar] [CrossRef]
  3. Dong, G.; Gao, J.; Du, R.; Tian, L.; Stanley, H.E.; Havlin, S. Robustness of network of networks under targeted attack. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2013, 87, 052804. [Google Scholar] [CrossRef]
  4. Li, Z.; Liu, J.; Ren, J.; Dong, Y.; Li, W. Application of hybrid strategies of complex network attack and defense games. Chaos Solitons Fractals 2024, 189, 115662. [Google Scholar] [CrossRef]
  5. Freitas, S.; Yang, D.; Kumar, S.; Tong, H.; Chau, D.H. Graph vulnerability and robustness: A survey. IEEE Trans. Knowl. Data Eng. 2022, 35, 5915–5934. [Google Scholar] [CrossRef]
  6. Liu, J.; Zhou, M.; Wang, S.; Liu, P. A comparative study of network robustness measures. Front. Comput. Sci. 2017, 11, 568–584. [Google Scholar] [CrossRef]
  7. Cai, Q.; Alam, S.; Pratama, M.; Liu, J. Robustness evaluation of multipartite complex networks based on percolation theory. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 6244–6257. [Google Scholar] [CrossRef]
  8. Artime, O.; Grassia, M.; De Domenico, M.; Gleeson, J.P.; Makse, H.A.; Mangioni, G.; Perc, M.; Radicchi, F. Robustness and resilience of complex networks. Nat. Rev. Phys. 2024, 6, 114–131. [Google Scholar] [CrossRef]
  9. Jahnke, L.; Kantelhardt, J.W.; Berkovits, R.; Havlin, S. Wave localization in complex networks with high clustering. Phys. Rev. Lett. 2008, 101, 175702. [Google Scholar] [CrossRef]
  10. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef]
  11. Shang, Y. Subgraph robustness of complex networks under attacks. IEEE Trans. Syst. Man, Cybern. Syst. 2017, 49, 821–832. [Google Scholar] [CrossRef]
  12. Nie, T.; Guo, Z.; Zhao, K.; Lu, Z.M. The dynamic correlation between degree and betweenness of complex network under attack. Phys. A Stat. Mech. Appl. 2016, 457, 129–137. [Google Scholar] [CrossRef]
  13. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed]
  14. Gu, Y.; Fu, X.; Liu, Z.; Xu, X.; Chen, A. Performance of transportation network under perturbations: Reliability, vulnerability, and resilience. Transp. Res. Part E Logist. Transp. Rev. 2020, 133, 101809. [Google Scholar] [CrossRef]
  15. Candelieri, A.; Galuzzi, B.G.; Giordani, I.; Archetti, F. Vulnerability of public transportation networks against directed attacks and cascading failures. Public Transp. 2019, 11, 27–49. [Google Scholar] [CrossRef]
  16. Chan, H.; Akoglu, L. Optimizing network robustness by edge rewiring: A general framework. Data Min. Knowl. Discov. 2016, 30, 1395–1425. [Google Scholar] [CrossRef]
  17. Başligil, H.; Kara, S.S.; Alcan, P.; Özkan, B.; Çağlar, E.G. A distribution network optimization problem for third party logistics service providers. Expert Syst. Appl. 2011, 38, 12730–12738. [Google Scholar] [CrossRef]
  18. Cao, X.; Lam, J.S.L. Simulation-based catastrophe-induced port loss estimation. Reliab. Eng. Syst. Saf. 2018, 175, 1–12. [Google Scholar] [CrossRef]
  19. Rousset, L.; Ducruet, C. Disruptions in spatial networks: A comparative study of major shocks affecting ports and shipping patterns. Netw. Spat. Econ. 2020, 20, 423–447. [Google Scholar] [CrossRef]
  20. Rodrigue, J.P.; Notteboom, T. Foreland-based regionalization: Integrating intermediate hubs with port hinterlands. Res. Transp. Econ. 2010, 27, 19–29. [Google Scholar] [CrossRef]
  21. Erhardt, G.D.; Roy, S.; Cooper, D.; Sana, B.; Chen, M.; Castiglione, J. Do transportation network companies decrease or increase congestion? Sci. Adv. 2019, 5, eaau2670. [Google Scholar] [CrossRef] [PubMed]
  22. Sun, X.; Wandelt, S. Robustness of air transportation as complex networks: Systematic review of 15 years of research and outlook into the future. Sustainability 2021, 13, 6446. [Google Scholar] [CrossRef]
  23. Diao, M.; Kong, H.; Zhao, J. Impacts of transportation network companies on urban mobility. Nat. Sustain. 2021, 4, 494–500. [Google Scholar] [CrossRef]
  24. Ficara, A.; Curreri, F.; Fiumara, G.; De Meo, P.; Liotta, A. Covert network construction, disruption, and resilience: A survey. Mathematics 2022, 10, 2929. [Google Scholar] [CrossRef]
  25. Duijn, P.A.; Kashirin, V.; Sloot, P.M. The relative ineffectiveness of criminal network disruption. Sci. Rep. 2014, 4, 4238. [Google Scholar] [CrossRef]
  26. Baybusinov, I.B.; Fenoaltea, E.M.; Zhang, Y.C. Negotiation problem. Phys. A Stat. Mech. Appl. 2022, 592, 126806. [Google Scholar] [CrossRef]
  27. Laureti, P.; Zhang, Y.C. Matching games with partial information. Phys. A Stat. Mech. Appl. 2003, 324, 49–65. [Google Scholar] [CrossRef]
  28. Fenoaltea, E.M.; Baybusinov, I.B.; Zhao, J.; Zhou, L.; Zhang, Y.C. The stable marriage problem: An interdisciplinary review from the physicist’s perspective. Phys. Rep. 2021, 917, 1–79. [Google Scholar] [CrossRef]
  29. Shang, Y. Generalized k-cores of networks under attack with limited knowledge. Chaos Solitons Fractals 2021, 152, 111305. [Google Scholar] [CrossRef]
  30. Yin, Y.; Liu, Q.; Zhang, C.; Zhou, J. Survivability analysis of weighted-edge attacks on complex networks with incomplete information. Phys. A Stat. Mech. Appl. 2019, 531, 120957. [Google Scholar] [CrossRef]
  31. Stumpf, M.P.; Porter, M.A. Critical truths about power laws. Science 2012, 335, 665–666. [Google Scholar] [CrossRef]
  32. Radicchi, F.; Fortunato, S.; Castellano, C. Universality of citation distributions: Toward an objective measure of scientific impact. Proc. Natl. Acad. Sci. USA 2008, 105, 17268–17272. [Google Scholar] [CrossRef]
  33. Zhou, B.; Meng, X.; Stanley, H.E. Power-law distribution of degree–degree distance: A better representation of the scale-free property of complex networks. Proc. Natl. Acad. Sci. USA 2020, 117, 14812–14818. [Google Scholar] [CrossRef]
  34. Broido, A.D.; Clauset, A. Scale-free networks are rare. Nat. Commun. 2019, 10, 1017. [Google Scholar] [CrossRef]
  35. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
  36. Chakrabarti, D.; Faloutsos, C. Graph mining: Laws, generators, and algorithms. ACM Comput. Surv. (CSUR) 2006, 38, 2-es. [Google Scholar] [CrossRef]
  37. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  38. Omar, Y.M.; Plapper, P. A survey of information entropy metrics for complex networks. Entropy 2020, 22, 1417. [Google Scholar] [CrossRef] [PubMed]
  39. Cheng, W.; Hüllermeier, E.; Dembczynski, K.J. Label ranking methods based on the Plackett-Luce model. In Proceedings of the 27th International Conference on Machine Learning (ICML-10), Haifa, Israel, 21–25 June 2010; pp. 215–222. [Google Scholar]
  40. Guiver, J.; Snelson, E. Bayesian inference for Plackett-Luce ranking models. In Proceedings of the 26th Annual International Conference on Machine Learning, Montreal, QC, Canada, 14–18 June 2009; pp. 377–384. [Google Scholar]
  41. Hadji, M.; Zeghlache, D. Minimum cost maximum flow algorithm for dynamic resource allocation in clouds. In Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, Honolulu, HI, USA, 24–29 June 2012; pp. 876–882. [Google Scholar]
  42. Chen, L.; Kyng, R.; Liu, Y.P.; Peng, R.; Gutenberg, M.P.; Sachdeva, S. Almost-linear-time algorithms for maximum flow and minimum-cost flow. Commun. ACM 2023, 66, 85–92. [Google Scholar] [CrossRef]
  43. Cicchini, T.; Caridi, I.; Ermann, L. Robustness of the public transport network against attacks on its routes. Chaos Solitons Fractals 2024, 184, 115019. [Google Scholar] [CrossRef]
  44. Gao, X.; Peng, M.; Chi, K.T.; Zhang, H. A stochastic model of cascading failure dynamics in cyber-physical power systems. IEEE Syst. J. 2020, 14, 4626–4637. [Google Scholar] [CrossRef]
  45. Mizutaka, S.; Yakubo, K. Robustness of scale-free networks to cascading failures induced by fluctuating loads. Phys. Rev. E 2015, 92, 012814. [Google Scholar] [CrossRef]
  46. Radicchi, F.; Bianconi, G. Redundant interdependencies boost the robustness of multiplex networks. Phys. Rev. X 2017, 7, 011013. [Google Scholar] [CrossRef]
  47. Tan, W.J.; Zhang, A.N.; Cai, W. A graph-based model to measure structural redundancy for supply chain resilience. Int. J. Prod. Res. 2019, 57, 6385–6404. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of network construction. (a): The structural features of the network when u 0 , and an optimal matching set. (b): The structural features of the network when u 1 , and the optimal matching set. (c): The effects of the three attack strategies under u 1 . The matching capacities of the three candidates are 1, 1, and 2, respectively. The size of the arrow represents the matching energy; the smaller the energy, the thinner the arrow. The gray dotted arrows represent all possible matches, and the red solid arrows represent the optimal matches.
Figure 1. Schematic diagram of network construction. (a): The structural features of the network when u 0 , and an optimal matching set. (b): The structural features of the network when u 1 , and the optimal matching set. (c): The effects of the three attack strategies under u 1 . The matching capacities of the three candidates are 1, 1, and 2, respectively. The size of the arrow represents the matching energy; the smaller the energy, the thinner the arrow. The gray dotted arrows represent all possible matches, and the red solid arrows represent the optimal matches.
Entropy 27 00847 g001
Figure 2. The relationship between network structure parameter u and information entropy H n o r m ( u ) . The structural parameter’s range is [0.01, 1].
Figure 2. The relationship between network structure parameter u and information entropy H n o r m ( u ) . The structural parameter’s range is [0.01, 1].
Entropy 27 00847 g002
Figure 3. The impact of attack strategies with ratio f on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The structural parameters are 0.01, 0.3, 0.5, 0.7, and 1.0 respectively. The figures from left to right (ac) represent min-E, ran-E, and max-E, respectively. In all cases, the parameters of the network are m = 10 3 , n = 10 3 , and λ = 0.03 , and simulations were conducted for 50 iterations.
Figure 3. The impact of attack strategies with ratio f on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The structural parameters are 0.01, 0.3, 0.5, 0.7, and 1.0 respectively. The figures from left to right (ac) represent min-E, ran-E, and max-E, respectively. In all cases, the parameters of the network are m = 10 3 , n = 10 3 , and λ = 0.03 , and simulations were conducted for 50 iterations.
Entropy 27 00847 g003
Figure 4. The impact of structural parameter u on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The attack ratios are 0.0, 0.1, 0.5, 0.9, and 0.999 respectively.
Figure 4. The impact of structural parameter u on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks. The attack ratios are 0.0, 0.1, 0.5, 0.9, and 0.999 respectively.
Entropy 27 00847 g004
Figure 5. Synergistic effects of attack strategies with ratio f and structural parameter u on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks.
Figure 5. Synergistic effects of attack strategies with ratio f and structural parameter u on average matching energy e ¯ . (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks.
Entropy 27 00847 g005
Figure 6. Synergistic effects of attack strategies with ratio f and structural parameter u on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks.
Figure 6. Synergistic effects of attack strategies with ratio f and structural parameter u on matching retention rate p. (a) The min-E attacks. (b) The ran-E attacks. (c) The max-E attacks.
Entropy 27 00847 g006
Figure 7. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under min-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9 m ( = 10 3 ), representing the number of individuals in the network. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Figure 7. Synergistic effects of structural parameter u and candidate capacity c on matching robustness under min-E attacks. The structural parameters are 0.01, 0.5, and 1 respectively, and the matching capacity varies from 1 to 3, 5, 7, and 9 m ( = 10 3 ), representing the number of individuals in the network. The figures from (ac) and (df) represent the changes in average matching energy and matching retention rate, respectively.
Entropy 27 00847 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Na, X.; Cui, J.; Su, C.; Cai, S.; Lü, L. The Synergistic Effects of Structural Evolution and Attack Strategies on Network Matching Robustness. Entropy 2025, 27, 847. https://doi.org/10.3390/e27080847

AMA Style

Na X, Cui J, Su C, Cai S, Lü L. The Synergistic Effects of Structural Evolution and Attack Strategies on Network Matching Robustness. Entropy. 2025; 27(8):847. https://doi.org/10.3390/e27080847

Chicago/Turabian Style

Na, Xu, Junying Cui, Chang Su, Shimin Cai, and Linyuan Lü. 2025. "The Synergistic Effects of Structural Evolution and Attack Strategies on Network Matching Robustness" Entropy 27, no. 8: 847. https://doi.org/10.3390/e27080847

APA Style

Na, X., Cui, J., Su, C., Cai, S., & Lü, L. (2025). The Synergistic Effects of Structural Evolution and Attack Strategies on Network Matching Robustness. Entropy, 27(8), 847. https://doi.org/10.3390/e27080847

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop