Next Article in Journal
Satellite Constellation Multi-Target Robust Observation Method Based on Hypergraph Algebraic Connectivity and Observation Precision Theory
Previous Article in Journal
Complex Variable Approach for Thermoelastic Boundary Value Problem Using Rational Mapping Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Minimum-Cost Shortest-Path Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm

1
Aliyun School of Big Data, Changzhou University, Changzhou 213164, China
2
School of Industrial Engineering, Purdue University, West Lafayette, IN 47907, USA
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(19), 3219; https://doi.org/10.3390/math13193219
Submission received: 2 September 2025 / Revised: 29 September 2025 / Accepted: 4 October 2025 / Published: 7 October 2025
(This article belongs to the Section D2: Operations Research and Fuzzy Decision Making)

Abstract

Network interdiction problems involving edge deletion on shortest paths have wide applications. However, in many practical scenarios, the complete removal of edges is infeasible. The minimum-cost shortest-path interdiction problem for trees with the weighted l norm (MCSPIT) is studied in this paper. The goal is to upgrade selected edges at minimum total cost such that the shortest root–leaf distance is bounded below by a given value. We designed an O ( n log n ) algorithm based on greedy techniques combined with a binary search method to solve this problem efficiently. We then extended the framework to the minimum-cost shortest-path double interdiction problem for trees with the weighted l norm, which imposes an additional requirement that the sum of root–leaf distances exceed a given threshold. Building upon the solution to (MCSPIT), we developed an equally efficient O ( n log n ) algorithm for this variant. Finally, numerical experiments are presented to demonstrate both the effectiveness and practical performance of the proposed algorithms.

1. Introduction

Critical edge deletion in network interdiction problems typically involves two entities, a decision-maker (defender) and a disruptor (attacker), competing in a specific Stackelberg game. The decision-maker operates the network to optimize their objective function, such as shortest path, maximum flow, or minimum cost flow, whereas the disruptor attempts to degrade this performance by interdicting several arcs with limited resources [1].
The interdiction problem was first applied to the shortest-path problem by Corley and Sha in [2] in the shortest-path interdiction problem (denoted by (SPIP)). Ball et al. [3] proved that this problem is NP-hard. Israeli et al. [4] transformed this problem into a bilevel mixed integer programming problem. Khachiyan et al. [5] proved that this problem does not admit an approximation algorithm with a performance ratio of 2, which is the current best result. Chen et al. [6] provided an O ( m + n log n ) algorithm for the problem on undirected networks when K = 1 . Nardelli et al. [7] improved the time complexity to O ( m α ( m , n ) ) , where α is the inverse Ackermann function, and m and n are the number of edges and nodes, respectively. Building upon classical deterministic frameworks, recent advances in SPIP have expanded into stochastic, temporal, and information-asymmetric settings while simultaneously enhancing our understanding of the problem’s computational complexity and solution methods. Henke et al. [8] established the NP-hardness of the bilevel SPIP, clearly delineating its intractability. Similarly, Boeckmann et al. [9] demonstrated that the temporal version remains NP-hard even when interdicting a single edge. To address uncertainty, Punla-Green et al. [10] and Azizi et al. [11] both developed models for SPIP with incomplete information; the former employed a max–min framework for asymmetric uncertainty, while the latter adopted a robust optimization approach. Nguyen et al. [12] further enriched the stochastic domain by incorporating the conditional value-at-risk (CVaR) metric to model asymmetric risk aversion in an uncertain environment. Beyond traditional mathematical programming, Huang et al. [13] pioneered a novel approach by solving the SPIP using reinforcement learning, demonstrating the potential of AI-based methods. Finally, previous research also clarifies strategic choices as Holzmann et al. [14] laid a key complexity foundation by proving that the problem with randomized interdiction strategies is generally NP-hard but can be solved in pseudo-polynomial time, while Borrero et al. [15] tackled sequential decision-making in a stochastic environment, proposing an approximate dynamic programming algorithm for optimal interdiction policies. Collectively, these studies significantly broaden the modeling landscape and clarify the hardness frontiers of SPIP under various complex conditions.
Currently, the majority of research in this area focuses on the SPIP under the assumption of critical edge deletion. However, factors such as rapid system recovery mechanisms and the presence of backup pathways often make complete edge deletion difficult or even infeasible in practical scenarios. For instance, in a military network scenario, available mobile forces may only be capable of interdicting support between K pairs of adjacent enemy positions. The objective is to choose which K pairs to disrupt so as to maximize the enemy’s support time [16]. This represents a typical application of the shortest-path interdiction problem in military operations. Classical interdiction models focus on completely severing support between enemy positions, that is, deleting edges between the K selected pairs to make communication impossible. However, in reality, adjacent positions may maintain connectivity through multiple alternative means, such as sea, rail, or air transport. As a result, interdiction efforts may only partially disrupt certain support channels rather than entirely eliminating all connections. Another example is shown in Figure 1 [17]: Once the disruptor attacks node k 10 , a fire will break out at that node. The disruptor aims to delay the fire truck’s arrival by maximizing the shortest path from node k 1 to k 10 with a limited interdiction budget. In this case, the disruptor can only increase the length of certain arcs rather than deleting them entirely. Correspondingly, the decision-maker must proactively identify vulnerable arcs and preemptively plan safer alternative routes to ensure the fire truck can reach the incident as quickly as possible. Recent work on the quickest path reliability problem underlines a similar focus on optimizing path performance under resource constraints [18]. This connection highlights the broad applicability of our interdiction and upgrade framework to diverse network optimization scenarios, such as ensuring reliable flow transmission.
Therefore, the classical SPIP with critical edge deletion has inherent limitations. To overcome these, refs. [19,20] introduced the concept of upgrading edges and investigated the maximum shortest-path interdiction problem involving upgrading edges on trees (denoted by MSPIT), which can be defined as follows. Let T = ( V , E , w ) be an edge-weighted tree rooted at v 1 , where V : = { v 1 , v 2 , , v n } , and E : = { e 2 , e 3 , , e n } be the sets of nodes and edges, respectively. Let Y : = { t 1 , , t r } be the set of leaves. Let w ( e ) and u ( e ) be the original weight and upper bounds of the upgraded weight for an edge e E , respectively, where w ( e ) u ( e ) . Let c ( e ) > 0 be a cost to upgrade the edge e E . Δ w ( e ) : = u ( e ) w ( e ) denotes the deviation between u ( e ) and w ( e ) . P v i , v j denotes the unique path from v i to v j on the tree T and P k : = P v 1 , t k the “root–leaf path” of the leaf node t k Y in brief. Define f ( P k ) : = e P k f ( e ) as the “root–leaf distance” for a weight vector f and a root–leaf path P k , where t k Y . The problem MSPIT involves finding an upgrade scheme w ¯ to maximize the shortest root–leaf distance of the tree on the premise that the total upgrade cost with some norm is upper bounded by a given value M. The mathematical model can be stated as follows.
max w ¯ min t k Y w ¯ ( P k ) ( MSPIT ) s . t . w ¯ ( e ) w ( e ) M , w ( e ) w ¯ ( e ) u ( e ) , e E .
The corresponding minimum-cost shortest-path interdiction problem involving upgrading edges on trees (denoted by MCSPIT) entails upgrading some edges to minimize the total cost with measurement on the premise that the shortest root–leaf distance of the tree is bounded below by a given value D. The mathematical model can be stated as follows.
max w ¯ w ^ ( e ) w ( e ) ( MCSPIT ) s . t . w ^ ( P k ) D , t k Y , w ( e ) w ^ ( e ) u ( e ) , e E .
Using the weighted l 1 norm, Zhang et al. [16] proposed primal–dual algorithms with time complexity O ( n 2 ) for both problems and with the unit l 1 norm and developed linear-time algorithms. Using the weighted Hamming distance, Zhang et al. [21] proved that both problems are NP-hard and designed dynamic programming algorithms with time complexities O ( n 4 ) and O ( n 4 log n ) for the problems MSPIT and MCSPIT with unit Hamming distance, respectively. Yi et al. [22] subsequently improved these algorithms with local optimizations for time complexities O ( n 3 ) and O ( n 3 log n ) , respectively. Zhang et al. [23] also investigated the sum of the root–leaf distance interdiction problem involving upgrading edges on trees along with its corresponding minimum cost problem. Using the weighted l 1 norm, they provided linear-time algorithms for both problems. They showed the NP-hardness of the problems with the weighted Hamming distance and unit Hamming distance and designed a linear-time greedy algorithm and an O ( n log n ) time algorithm based on a binary search method for each problem. Furthermore, Li et al. [24] studied the problem with cardinality constraints and its corresponding minimum cost problem. Using the weighted l norm, they provided two algorithms with time complexity O ( n log n ) and O ( N n 2 ) for the problems, respectively, where N denotes the cardinality budget as the maximum number of edges that can be upgraded. They proposed two algorithms using the weighted bottleneck Hamming distance, both in O ( n log n ) time.
Research on extensions of the shortest-path interdiction problem involving upgrading edges remains relatively limited. Mohammadi et al. [25] studied the maximum capacity path interdiction problem involving upgrading edges with the sum-type Hamming distance. Unlike the traditional shortest-path problem, where the weight of a path is defined as the sum of the weights of all edges along it, this problem uses the maximum edge weight along the path as its capacity. They provided a strongly polynomial-time algorithm for the case where the cost of reducing each arc’s capacity is fixed. Tayyebi et al. [26] studied the continuous maximum capacity path interdiction problem, where the capacity of each arc in the network can be reduced by any continuous amount. They proposed an efficient algorithm based on a binary search method and the discrete Newton method, solving the problem in polynomial time. Li et al. [27] introduced the minimum-cost shortest-path double interdiction problem involving upgrading edges on trees (MCDSPIT). They addressed the problem that measures the upgrade cost with both weighted l and weighted sum Hamming distances. They showed that the problem is NP-hard and proposed a pseudo-polynomial time algorithm. Research on the shortest-path interdiction problem involving upgrading edges is highly significant and greatly enriches the theory of network interdiction problems.
In this paper, we concentrate on the problems MSPIT and MCSPIT with the weighted l norm, denoted by MSPIT and MCSPIT, respectively. They can be formulated as follows by applying the weighted l norm to the · in models (1) and (2), respectively.
max w ¯ D ( w ¯ ) : = min t k Y w ¯ ( P k ) ( MSPIT ) s . t . max e E c ( e ) ( w ¯ ( e ) w ( e ) ) M , w ( e ) w ¯ ( e ) u ( e ) , e E .
min w ¯ C ( w ^ ) : = max e E c ( e ) ( w ^ ( e ) w ( e ) ) ( MCSPIT ) s . t . min t k Y w ^ ( P k ) D , w ( e ) w ^ ( e ) u ( e ) , e E .
We analyzed their models and properties and designed optimization algorithms with time complexity analysis. As summarized in Table 1, our study delineates the computational complexity of the MSPIT, MCSPIT, and MCDSPIT with various norms, including 1 , Hamming distance, and  . A key contribution of this work is the establishment of efficient algorithms with complexities of O ( n ) and O ( n log n ) for the weighted norm variants, thereby resolving previously open problems.
The paper is organized as follows. In Section 2, we propose an O ( n ) time algorithm to solve the problem MSPIT. In Section 3, we research the problem MCSPIT and propose a greedy algorithm in O ( n log n ) time based on a binary search method. In Section 4, based on the problem MCSPIT, the  problem MCDSPIT is studied, and an O ( n log n ) time algorithm is proposed. In Section 5, we present some computational experiments to show the effectiveness of the algorithms. In Section 6, we conclude and present directions for future research.

2. Solving the Problem MSPIT

In this section, we propose a linear time algorithm for the problem MSPIT based on the analysis of properties.
According to model (3) for the MSPIT problem, the optimal strategy for any edge e E is to upgrade its weight to the maximum possible value. This upgrade is subject to the cost constraint M and the upper bound u ( e ) . The optimal increment for the edge weight can be determined with min M c ( e ) , Δ u ( e ) , where Δ u ( e ) = u ( e ) w ( e ) . Thus an optimal solution is
w ¯ ( e ) : = w ( e ) + min M c ( e ) , Δ u ( e ) ( e E )
and its relevant optimal objective value D ( w ¯ ) = min t k Y w ¯ ( P k ) .
Theorem 1. 
The solution w ¯ defined as (5) is an optimal solution of the problem MSPIT.
Proof. 
(1) For any edge e E , we have
w ( e ) w ¯ ( e ) = w ( e ) + min M c ( e ) , u ( e ) w ( e ) w ( e ) + u ( e ) w ( e ) = u ( e )
and
c ( e ) ( w ¯ ( e ) w ( e ) ) = c ( e ) · min M c ( e ) , u ( e ) w ( e ) c ( e ) · M c ( e ) = M .
Therefore, w ¯ is a feasible solution of the problem MSPIT.
(2) Suppose w ¯ is not optimal, but  w is. Then, D ( w ) = w ( P t ) > D ( w ¯ ) = w ¯ ( P t ¯ ) .
(i) If t = t ¯ , then there exists an edge e ^ P t satisfying u ( e ^ ) w ( e ^ ) > w ¯ ( e ^ ) as w ( P t ) > w ¯ ( P t ) . Then, we have
C ( w ) c ( e ^ ) ( w ( e ^ ) w ( e ^ ) ) > c ( e ^ ) ( w ¯ ( e ^ ) w ( e ^ ) ) = M ,
which contradicts the feasibility of w .
(ii) If t t ¯ , then w ( P t ¯ ) w ( P t ) > w ¯ ( P t ¯ ) w ¯ ( P t ) , and there is an edge e ^ P t ¯ satisfying u ( e ^ ) w ( e ^ ) > w ¯ ( e ^ ) . Similarly, we have
C ( w ) c ( e ^ ) ( w ( e ^ ) w ( e ^ ) ) > c ( e ^ ) ( w ¯ ( e ^ ) w ( e ^ ) ) = M ,
which contradicts the feasibility of w .
Hence, w ¯ is an optimal solution of the problem MSPIT.    □
For a given tree T ( V , E ) with a set Y of leaves, cost vector c, and two weight vectors w and u along with a given budget M, we can obtain an optimal solution w ¯ for the problem MSPIT using Formula (5). This solution allows us to determine the corresponding optimal objective value D ( w ¯ ) = min t Y w ¯ ( P t ) . For convenience, we represent the above process with (6):
[ w ¯ , D ( w ¯ ) ] : = MSPIT ( T , Y , w , u , c , M ) .
Theorem 2. 
The problem MSPIT can be solved using (6) in O ( n ) time.

3. Solving the Problem MCSPIT

In this section, we address the problem MCSPIT. Through a series of property analyses and case discussions, we developed an efficient algorithm. The algorithm leverages greedy strategies and a binary search method to achieve a time complexity of O ( n log n ) .
We begin by sorting c ( e ) Δ u ( e ) in a non-decreasing order and removing any duplicates to obtain the sequence { α n } :
c ( e α 1 ) Δ u ( e α 1 ) < c ( e α 2 ) Δ u ( e α 2 ) < < c ( e α n ) Δ u ( e α n )
Define M j : = c ( e α j ) Δ u ( e α j ) for  j : = 1 , 2 , , n . We can then apply (6) using the assignment [ w ^ j , D ( w ^ j ) ] : = MSPIT ( T , Y , w , u , c , M j ) to compute the value w ^ j and the corresponding shortest root–leaf distance D j = D ( w ^ j ) . Since M j is increasing, the output D j is non-decreasing.
Specifically, for  j = n and j = 1 , the processes are defined as
[ w ^ n , D ( w ^ n ) ] : = MSPIT ( T , Y , w , u , c , M n ) with M n = c ( e α n ) Δ u ( e α n )
and
[ w ^ 1 , D ( w ^ 1 ) ] : = MSPIT ( T , Y , w , u , c , M 1 ) with M 1 = c ( e α 1 ) Δ u ( e α 1 ) .
These computations yield w ^ n and w ^ 1 along with their respective distances D n and D 1 . Upon analysis, we derive the following two straightforward lemmas.
Lemma 1. 
The optimal objective value of the problem MCSPIT is in the range [ 0 , M n ] .
Lemma 2. 
If w ^ is an optimal solution of the problem MCSPIT, then its relevant length D ( w ^ ) of the shortest root–leaf distance satisfies D ( w ) D ( w ^ ) D n .
According to Lemma 2, the problem MCSPIT is infeasible for D > D n as all edges have been upgraded to their maximum capacity. For  D D ( w ) , the optimal solution is conversely w with an optimal value 0 since w already satisfies the feasibility conditions. We can consequently state the following theorems.
Theorem 3.
(1) If D > D n , the (MCSPIT) is infeasible.
(2) If D D ( w ) , the optimal solution is w, and the optimal value is 0.
We next consider the problem MCSPIT when D ( w ) < D D 1 . The optimal objective value is denoted by M . The optimal objective value M of problem MCSPIT therefore satisfies M M 1 . Consequently, the upgrade amount for any edge e E is given by M c ( e ) . Let Y < : = { t k Y | w ( P k ) < D } be the set of leaves with root–leaf distances of less than D. Then, for each path P k ( t k Y < ) , e P k M c ( e ) + w ( P k ) D holds. Hence, we have the following theorem.
Theorem 4. 
When D ( w ) < D D 1 , M = max t k Y < D w ( P k ) e P k 1 c ( e ) is the optimal objective value of problem MCSPIT, where Y < = { t k Y | w ( P k ) < D } .
Proof. 
Let w ¯ ( e ) = w ( e ) + min { M c ( e ) , Δ u ( e ) } = w ( e ) + M c ( e ) be the corresponding optimal solution of the objective value M as defined in the theorem.
(1) We show the feasibility of the solution w ¯ . For any t k Y ,
w ¯ ( P k ) = w ( P k ) + e P k M c ( e ) = w ( P k ) + max t j Y D w ( P j ) e P j 1 c ( e ) · e P k 1 c ( e ) w ( P k ) + D w ( P k ) e P k 1 c ( e ) · e P k 1 c ( e ) = D
Hence, w ¯ is feasible.
(2) Next, we show the optimality. Suppose w ¯ is not an optimal solution, but  w ^ ( e ) = w ( e ) + M ^ c ( e ) (for e E ) is, where M ^ < M M 1 is its corresponding objective value. Let P t ^ be the shortest path with the weight w ^ .
(2.1) If P t ^ is also the shortest path with the weight w ¯ , then w ¯ ( P t ^ ) = D according to the definition of M . We then have
w ^ ( P t ^ ) = w ( P t ^ ) + e P t ^ M ^ c ( e ) < w ( P t ^ ) + e P t ^ M c ( e ) = w ¯ ( P t ^ ) = D ,
which contradicts the fact that w ^ is feasible.
(2.2) If P t ^ is not the shortest path with the weight w ¯ , but  P t ¯ is, and  w ¯ ( P t ¯ ) < w ¯ ( P t ^ ) , then we have
w ^ ( P t ^ ) w ^ ( P t ¯ ) < w ¯ ( P t ¯ ) = D ,
which contradicts the fact that w ^ is optimal.
In conclusion, w ¯ is an optimal solution to the problem with its relevant optimal objective value M .    □
When D 1 < D D n , we employ a binary search method to determine the range of the optimal solution for the problem MCSPIT. We present the optimal solution by identifying the smallest cost among the infeasible paths and provide an O ( n log n ) time algorithm to solve the problem MCSPIT.
Specifically, we first use a binary search method based on the ascending sequence in (7) to determine the index k satisfying D k < D D k + 1 . We call (6) to solve [ w ^ k , D ( w ^ k ) ] : = MSPIT ( T , Y , w , u , c , M k ) , obtaining w ^ k and its corresponding shortest root–leaf path length D k = D ( w ^ k ) . Next, we call (6) to solve [ w ^ k + 1 , D ( w ^ k + 1 ) ] : = MSPIT ( T , Y , w , u , c , M k + 1 ) , obtaining w ^ k + 1 and its corresponding shortest root–leaf path length D k + 1 = D ( w ^ k + 1 ) . When D k + 1 = D , the current cost M k + 1 is just enough to satisfy the constraint, and the following theorem is obvious.
Theorem 5. 
If D k + 1 = D , then M k + 1 is the optimal value to problem MCSPIT, and the corresponding optimal solution is w ^ k + 1 .
Then, we have the following theorem to give the optimal solution.
Theorem 6. 
Suppose D k < D D k + 1 for an index k based on the ascending sequence in (7). The optimal objective value of the problem MCSPIT is
M = max t k Y < D w ( P k ) e P k E > Δ u ( e ) e P k E > 1 c ( e ) ,
where Y < : = { t k Y w ( P k ) < D } and E > : = { e E c ( e ) Δ u ( e ) > M k } . Then, the corresponding optimal solution is given by
w ( e ) = w ( e ) + min M c ( e ) , Δ u ( e ) .
Proof. 
We mainly show that w is a feasible solution of the problem MCSPIT. Notice that for any edge e E > , we have c ( e ) Δ u ( e ) > M k , and c ( e ) Δ u ( e ) > M also holds. Otherwise, the case M > c ( e ) Δ u ( e ) > M k occurs, which contradicts D k < M D k + 1 , implying no values between M k and M k + 1 in sequence (7). Additionally, for any edge e P k E > , we obviously have c ( e ) Δ u ( e ) M k < M .
For any t k Y < ,
w ( P k ) = e P k w ( e ) = e P k w ( e ) + min M c ( e ) , Δ u ( e )
= w ( P k ) + e P k E > M c ( e ) + e P k E > Δ u ( e )
w ( P k ) + e P k E > D w ( P k ) e P k E > Δ u ( e ) e P k E > 1 c ( e ) c ( e ) + e P k E > Δ u ( e ) = w ( P k ) + D w ( P k ) e P k E > Δ u ( e ) + e P k E > Δ u ( e ) = D
For any t k Y Y < , we have w ( P k ) w ( P k ) D .
The proof for the optimality of M follows a similar argument to that in part (2) of Theorem 4, and we omit the details here.   □
Based on the analysis above, we have the following Algorithm 1 to solve the problem MCSPIT.
Theorem 7. 
The problem MCSPIT can be solved with Algorithm 1 in O ( n log n ) time.
Proof. 
We analyze the time complexity of Algorithm 1 step by step to establish the O ( n log n ) bound. The algorithm begins by calculating the weight difference vector Δ u = u w in Line 1. This involves a simple subtraction operation for each of the O ( n ) edges, which requires O ( n ) time. In Line 2, sorting the edges based on the value of c ( e ) Δ u ( e ) is a fundamental operation. Since there are O ( n ) edges, sorting them requires O ( n log n ) time.
In Lines 4–5, the algorithm calls the MSPIT subroutine as (6) twice for the extreme values M 1 and M n in O ( n ) time. Lines 6–13 handle special cases regarding the feasibility and triviality of the problem. The checks D > D n and D D ( w ) involve simple comparisons. The calculation of M for the case D ( w ) < D D 1 involves iterating over the paths to leaves in the set Y < , which can be obtained from a breadth-first search in O ( n ) time. Thus, this entire block runs in O ( n ) time.
Algorithm 1  [ w ¯ , M ] : = MCSPIT ( T , Y , w , u , c , D )
  • Input: The tree T ( V , E ) rooted at a root node v 1 ,
  •    The set Y of leaf nodes,
  •    The cost vector c,
  •    Two weight vectors w, u,
  •    A given value D.
  • Output: An optimal solution w ¯ ,
  •     Its relevant objective value M .
  1:
Calculate Δ u : = u w .
  2:
Sort edges e E by c ( e ) Δ u ( e ) in ascending order (remove duplicates).
  3:
Let the sorted distinct values be: M 1 M 2 M n .
  4:
Call (6) [ w ^ n , D n ] : = MSPIT ( T , Y , w , u , c , M n ) .
  5:
Call (6) [ w ^ 1 , D 1 ] : = MSPIT ( T , Y , w , u , c , M 1 ) .
  6:
if  D > D n  then
  7:
return “The problem is infeasible.”
  8:
else if  D D ( w )  then
  9:
return  ( w , 0 ) .
10:
else if  D ( w ) < D D 1  then
11:
M : = max t k Y < D w ( P k ) e P k 1 c ( e ) , where Y < : = { t k Y w ( P k ) < D } .
12:
 Call (6) [ w ¯ , D ( w ¯ ) ] : = MSPIT ( T , Y , w , u , c , M ) .
13:
return  ( w ¯ , M ) .
14:
else
15:
 Initialize a : = 1 , b : = n , k : = null
16:
if  a = b  then
17:
   k : = a
18:
end if
19:
while  k = null  do
20:
   k : = a + b 2 .
21:
  Call (6) [ w ^ k , D k ] : = MSPIT ( T , Y , w , u , c , M k ) .
22:
  Call (6) [ w ^ k + 1 , D k + 1 ] : = MSPIT ( T , Y , w , u , c , M k + 1 ) .
23:
  if  D k + 1 < D  then
24:
    a : = k .
25:
  else if D k D then
26:
    b : = k .
27:
  else if D k < D D k + 1 then
28:
    k : = k .
29:
  end if
30:
end while
31:
Y < : = { t k Y w ( P k ) < D } .
32:
E > : = { e E c ( e ) Δ u ( e ) > M k } .
33:
 Calculate M as (8) and w as (9).
34:
return  ( w , M ) .
35:
end if
The binary search loop in Lines 15–30 is the core component of the algorithm. The loop performs a binary search over the n (which is O ( n ) ) sorted M j values to find the critical interval [ M k , M k + 1 ] such that D k < D D k + 1 . The number of iterations of this binary search is O ( log n ) . In each iteration, the algorithm makes two calls to the MSPIT subroutine (Lines 21 and 22) to compute D k and D k + 1 for the current pivot M k and its successor M k + 1 . Since each call to MSPIT takes O ( n ) time, the cost per iteration is O ( n ) . Therefore, the total time cost of the binary search loop is O ( log n ) × O ( n ) = O ( n log n ) .
After identifying the critical index k , the final solution is constructed. Lines 31–32 define the sets Y < and E > , which can be determined by checking each leaf and each edge, taking O ( n ) time. Line 33 calculates M and the optimal weight vector w according to (8) and (9) in O ( n ) time.
To sum up, the overall time complexity is dominated by the sorting operation and the binary search loop, both of which are O ( n log n ) . Hence, Algorithm 1 solves the MCSPIT problem in O ( n log n ) time.    □

4. Minimum-Cost Shortest-Path Double Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm

In this section, we consider an extended version of the problem MCSPIT, referred to as the minimum-cost shortest-path double interdiction problem involving upgrading edges on trees (MCDSPIT) with the weighted l norm (MCDSPIT). Li et al. [27] introduced the MCDSPIT problem, which has significant implications in diverse areas such as transportation networks, military strategies, and counter-terrorism efforts. The objective is to find a minimum-cost upgrade scheme such that two constraints are satisfied: the shortest root–leaf distance is at least a given value D, and the sum of all root–leaf distances is no less than a given value B. The mathematical model can be stated as follows.
min w ˜ w ˜ ( e ) w ( e ) ( MCDSPIT ) s . t . w ˜ ( P i ) D , t i Y , t i Y w ˜ ( P i ) B , w ( e ) w ˜ ( e ) u ( e ) , e E .
When the l norm applies to · in model (12), we can obtain the problem MCDSPIT, which is formulated as follows.
min w ˜ C ( w ˜ ) : = max e E c ( e ) ( w ˜ ( e ) w ( e ) )
( MCDSPIT ) s . t . w ˜ ( P i ) D , t i Y ,
t i Y w ˜ ( P i ) B ,
w ( e ) w ˜ ( e ) u ( e ) , e E .
It follows from the model of the problem MCDSPIT that if upgrading all edges to their upper bounds still cannot satisfy the conditions (14) or (15), then the problem is infeasible.
Theorem 8. 
If t i Y u ( P i ) < B or min t i Y u ( P i ) < D , then the problem MCDSPIT is infeasible.
Notice that (13), (14), and (16) are the problem MCSPIT. An optimal solution of the problem MCDSPIT is thus a feasible solution of the problem MCSPIT. Then, we have the following conclusion for the optimal objective values of the two problems. Note that for any e E , Δ u ( e ) = u ( e ) w ( e ) .
Lemma 3. 
We have M K max e E c ( e ) Δ u ( e ) , where K and M are the optimal values of the problems MCDSPIT and MCSPIT, respectively.
For any K 0 , define the weight vector w K as follows:
w K ( e ) : = w ( e ) + min K c ( e ) , Δ u ( e ) , e E .
Then, we have the following lemma to show the relationship between the optimal value K of the problem MCDSPIT and any cost K 0 .
Lemma 4. 
The vector w K as (17) is feasible for MCDSPIT if and only if K K , where K is the optimal values of the problem MCDSPIT. Moreover, if  K = K , then w K is an optimal solution of the problem MCDSPIT.
Proof. 
Necessity: Let w K be defined as (17), a feasible solution to the problem MCDSPIT, and suppose K < K . This contradicts that K is the optimal value of the problem MCDSPIT.
Sufficiency: Suppose w is an optimal solution to problem MCDSPIT. We will prove that for any e E , w K ( e ) w ( e ) holds. Suppose there exists e i E , such that w K ( e i ) = w ( e i ) + min K c ( e i ) , Δ u ( e i ) < w ( e i ) .
(1) If K c ( e i ) > Δ u ( e i ) , then w K ( e i ) = w ( e i ) + Δ u ( e i ) = u ( e i ) < w ( e i ) , which contradicts w ( e i ) u ( e i ) .
(2) If K c ( e i ) Δ u ( e i ) , then w K ( e i ) = w ( e i ) + K c ( e i ) < w ( e i ) , which implies that K c ( e i ) ( w ( e i ) w ( e i ) ) > c ( e i ) ( w K ( e i ) w ( e i ) ) = K . This contradicts K K .
Therefore, for any e E , w K ( e ) w ( e ) holds so that constraints (14)–(16) hold for the vector w K , confirming that w K is indeed feasible.    □
We can solve the problem MCDSPIT from the analysis above based on an optimal solution w ^ of MCSPIT with its corresponding optimal cost M : = C ( w ^ ) . If the constraint for the sum of the root–leaf distance holds already, then w ^ is also optimal for the problem MCDSPIT.
Theorem 9. 
If t i Y w ^ ( P i ) B , then w ˜ : = w ^ is an optimal solution of the problem MCDSPIT, where w ^ is an optimal solution of the problem MCSPIT.
Otherwise, we have the case when t i Y w ^ ( P i ) < B , which is the most significant and difficult part of solving the problem MCSPIT. To address this case, we first choose the sequence (7) by removing any duplicates and the values lower than C ( w ¯ ) to obtain the sequence { β n ^ } :
K ^ c ( e β 1 ) Δ u ( e β 1 ) < c ( e β 2 ) Δ u ( e β 2 ) < < c ( e β n ^ ) Δ u ( e β n ^ )
Define K 0 : = K ^ , K j : = c ( e β j ) Δ u ( e β j ) for j : = 1 , 2 , , n ^ . Then, the following lemma holds immediately.
Lemma 5. 
The optimal value K of the problem MCDSPIT lies in [ K 0 , k n ^ ] .
We can consequently determine the index k through a binary search method such that K k < K K k + 1 , that is, t i Y w k ( P i ) < B t i Y w k + 1 ( P i ) , where w k and w k + 1 are constructed as (17) with K k and K k + 1 , respectively. For convenience, we introduce the following concept Q ( e ) containing the leaf nodes controlled by an edge e E .
Definition 1 
([23]). Define Q ( e ) : = { t k | e P k , k = 1 , , r } as the set of leaf nodes with root–leaf paths passing through e. If  t k Q ( e ) , then the leaf node t k is controlled by the edge e E .
Based on the index k with K k < K K k + 1 in an non-decreasing sequence (18), we can then calculate the optimal value K as the following theorem.
Theorem 10. 
The value
K : = B t i Y e P i w ( e ) e E k | Q ( e ) | Δ u ( e ) e E > k | Q ( e ) | c ( e )
is the optimal objective value of the (MCDSPIT), where E > k : = { e E | c ( e ) Δ u ( e ) > K k } and E k : = { e E | c ( e ) Δ u ( e ) K k } . Then, w K as (17) is an optimal solution.
Proof. 
(1) We first prove that w K is a feasible solution of the (MCDSPIT). It is obvious that w ( e ) w K ( e ) u ( e ) , for e E because it is constructed as (17). We then need to show that w K satisfies the constraints (14) and (15).
For constraint (14), as  K ^ K k < K K k + 1 , then for any t i Y , we have w K ( P i ) > w K ^ ( P i ) D .
For constraint (15), notice that for any edge e E > k , we have c ( e ) Δ u ( e ) > K k and c ( e ) Δ u ( e ) > K also holds. Otherwise, the case K > c ( e ) Δ u ( e ) > K k occurs, which contradicts K k < K K k + 1 , implying no values between K k and K k + 1 in sequence (18). We also obviously have c ( e ) Δ u ( e ) K k < K for any edge e E k . Then, we have
t i Y w K ( P i ) = t i Y e P i w K ( e ) = t i Y e P i w ( e ) + min K c ( e ) , Δ u ( e ) = t i Y e P i w ( e ) + t i Y e P i min K c ( e ) , Δ u ( e ) = t i Y e P i w ( e ) + e E e P i , t i Y min K c ( e ) , Δ u ( e ) = t i Y e P i w ( e ) + e E | Q ( e ) | min K c ( e ) , Δ u ( e ) = t i Y e P i w ( e ) + e E > k | Q ( e ) | K c ( e ) + e E k | Q ( e ) | Δ u ( e ) = t i Y e P i w ( e ) + B t i Y e P i w ( e ) e E k | Q ( e ) | Δ u ( e ) + e E k | Q ( e ) | Δ u ( e ) = B
Therefore, w K as (17) with K is a feasible solution of the problem MCDSPIT.
(2) We next prove that K is the optimal value. Suppose that K < K is the optimal value of the problem MCDSPIT and w K is a corresponding optimal solution; then, we have
t i Y w K ( P i ) = t i Y e P i w ( e ) + e E > k | Q ( e ) | K c ( e ) + e E k | Q ( e ) | Δ u ( e ) < B ,
which contradicts the feasibility of w K . Hence, K is the optimal value of the problem MCDSPIT.    □
From the above analysis, we have the following algorithm to solve the problem MCDSPIT.
Theorem 11. 
The problem MCDSPIT can be solved using Algorithm 2 in O ( n log n ) time.
Algorithm 2  [ w ¯ , K ] : = MCDSPIT ( T , Y , w , u , c , D , B )
  • Input: The tree T ( V , E ) rooted at a root node v 1 ,
  •    The set Y of leaf nodes,
  •    The cost vector c,
  •    Two weight vectors w, u,
  •    Given values D and B.
  • Output: An optimal solution w ¯ ,
  •     Its relevant objective value K .
  1:
if  t k Y u ( P k ) < B or min t k Y u ( P k ) < D  then
  2:
return “The problem is infeasible.”
  3:
else
  4:
 Call [ w ^ , M ] : = MCSPIT ( T , Y , w , u , c , D ) .
  5:
if  t k Y w ¯ ( P k ) B  then
  6:
  return  ( w ^ , M ) .
  7:
end if
  8:
 Calculate Δ u : = u w .
  9:
 Construct the sequence { β n ^ } by removing duplicates and values lower than C ( w ¯ ) from sequence (7):
K ¯ c ( e β 1 ) Δ u ( e β 1 ) < c ( e β 2 ) Δ u ( e β 2 ) < < c ( e β n ^ ) Δ u ( e β n ^ ) .
10:
 Let K 0 : = K ¯ , K j : = c ( e β j ) Δ u ( e β j ) for j : = 1 , 2 , , n ^ .
11:
 Initialize a : = 0 , b : = n ^ .
12:
while  b a > 1  do
13:
   k : = a + b 2 .
14:
  Construct w K k as Formula (17).
15:
  if  t i Y w K k ( P i ) < B  then
16:
    a : = k .
17:
  else if  t i Y w K k ( P i ) > B  then
18:
    b : = k .
19:
  end if
20:
end while
21:
 Let k : = a .
22:
 Determine E > : = { e E c ( e ) Δ u ( e ) > K k } , E : = { e E c ( e ) Δ u ( e ) K k } .
23:
 Calculate K as Formula (19).
24:
 Determine optimal value w K as Formula (17).
25:
return  ( w K , K ) .
26:
end if
Proof. 
We analyze the time complexity of Algorithm 2 step by step to establish the O ( n log n ) bound. The algorithm begins with a feasibility check in Lines 1–2. This involves computing the sum of path weights k Y u ( P k ) and finding the minimum path weight min k Y u ( P k ) over all leaf nodes, which can be obtained from a breadth-first search in O ( n ) time. In Line 3, the algorithm calls Algorithm 1 MCSPIT. As established in Theorem 7, Algorithm 1 has a time complexity of O ( n log n ) , which contributes significantly to the overall complexity.
Lines 4–5 perform a condition check k Y w ˜ ( P k ) B and potentially return early. This operation involves summing path weights for all leaves, requiring O ( n ) time. Line 6 calculates the weight difference vector Δ u = u w , which is a simple subtraction operation over O ( n ) edges, taking O ( n ) time. The sequence construction in Lines 7–9 involves sorting and filtering operations. Constructing the sequence { β n ^ } from the original sequence requires removing duplicates and values below C ( w ˜ ) . The sorting step dominates this process with O ( n log n ) time complexity, while the subsequent initialization of K j values takes O ( n ) time.
The core of Algorithm 2 is the binary search loop in Lines 10–20. This loop performs a binary search over the n ^ (which is O ( n ) ) sorted K j values, resulting in O ( log n ) iterations. Within each iteration, the algorithm computes the midpoint ( O ( 1 ) time); constructs w K k using Formula (17) which processes O ( n ) edges ( O ( n ) time); and evaluates the condition i l Y w K k ( P i ) which requires O ( n ) time. Therefore, each iteration takes O ( n ) time, and the entire binary search loop requires O ( log n ) × O ( n ) = O ( n log n ) time.
Finally, Lines 21–24 handle the solution construction after the binary search. These steps include simple assignments ( O ( 1 ) ), set operations on edges ( O ( n ) ), and calculations using Formulas (19) and (17) ( O ( n ) each). The total time for these final steps is O ( n ) . To sum up, the  overall time complexity is dominated by the O ( n log n ) operations.    □

5. Computational Experiments

We used synthetic trees and enforced bit-level reproducibility within machine precision across typical environments to demonstrate the efficiency and reproducibility of our experimental results. All randomness was keyed with per-trial seeds, costs were median-normalized so that budget magnitudes do not drift with n, and all targets and path-sum budgets were calibrated on an instance-intrinsic, unit-free scale. These choices ensure that the results are comparable across sizes and that any observed differences reflect algorithmic behavior, not arbitrary units or sampling noise.
Instances were tested in the rooted recursive trees T = ( V , E ) : node i attaches uniformly to { 1 , , i 1 } . Each edge e receives a base weight w ( e ) Uniform [ 0 , 1 ] and an available slack Δ u ( e ) Uniform [ 0 , 1 ] , with the upper bound u ( e ) = w ( e ) + Δ u ( e ) . Raw costs c raw ( e ) Uniform [ 0.5 , 2 ] are converted to unit-free costs via median normalization: c ( e ) = c raw ( e ) / median ( c raw ) . For a budget M 0 , upgrading along an edge follows
w M ( e ) = w ( e ) + min { M / c ( e ) , Δ u ( e ) } ,
which in turn determines the minimum root–leaf distance D ( M ) . Let M min = min e c ( e ) Δ u ( e ) and M max = max e c ( e ) Δ u ( e ) . We set the target distance at the midpoint,
D = 1 2 D ( M min ) + D ( M max ) ,
and quantify the instance difficulty with
ρ = D D ( M min ) D ( M max ) D ( M min ) ( 0 , 1 ] ,
so that ρ measures how far the target lies between “no upgrades’’ and “maximal upgrades’’ on that specific instance. In the double-constraint setting, we analogously work with the aggregate path sum S ( M ) . Let M be the MCSPIT solution that attains the chosen D, and define   
B = 1 2 S ( M ) + S ( M max ) , β = B S ( M ) S ( M max ) S ( M ) ( 0 , 1 ] ,
which pairs ( ρ , β ) as difficulty indices for distance and path-sum goals, respectively. Rare degeneracies in which the reachable interval collapses are resolved by a minimal backoff (e.g., D D ( M max ) 10 6 ). All feasibility checks and accept/reject outcomes were recorded so that third parties can replay the exact run list.
We evaluated the algorithms for the problems MSPIT, MCSPIT, and MCDSPIT. Unless stated otherwise, problem MSPIT was parameterized by M = θ M max with θ = 0.5 in the main results. Timing isolated the algorithms: instance generation and ( D , B ) calibration occurred once per trial, after which inputs were frozen. Each routine received a single untimed warm-up call and was then timed with timeit; timed functions contained no internal random draws, guaranteeing byte-identical repeats with a fixed seed. We swept n { 10 3 , 5 × 10 3 , 10 4 , 2 × 10 4 , 3 × 10 4 , 5 × 10 4 } ; ran 30 trials per size; and report the mean, maximum, and minimum wall-clock seconds in Table 2. To diagnose growth rates, we regressed time on n and on n log n and report R 2 in Table 3.
All artifacts followed a strict provenance protocol. A manifest MANIFEST.csv enumerated every run by ( n , trial _ id , seed , M , D , B , ρ , β , D 1 , D all , S 0 , S 1 ) , and optional per-instance .mat files stored ( T , w , u , c , D , B ) for bit-level reproduction. Experiments were conducted in Matlab R2025a on a laptop (Intel® Core™ i9-14900HX, 2.20 GHz; Windows 11). Absolute times naturally depend on hardware and BLAS/JIT settings, but our seeded, deterministic protocol ensures that relative comparisons and scaling trends are stable across environments. See the Supplementary Material (“Program_Result”) for the full experiment manifest, fixed seed list, and results for all experiments and figures.
The results align with the intended complexity interpretations. Across a 50 × increase in n, MSPIT grows by 34 × , MCSPIT by 52 × , and MCDSPIT by 51 × , indicative of near-linear behavior over our range. Least-squares fits achieve R 2 0.996 throughout; the log–log slope is 0.898 1 for MSPIT and ≈1.00 for MCSPIT and MCDSPIT, with the latter showing a mild finite-size preference for n log n in the parametric regressions (Table 3). Together, these diagnostics suggest O ( n ) versus O ( n log n ) behavior in practice for the studied algorithms.
The empirical scaling trends are further visualized in Figure 2, where each panel reports the mean CPU time (dots), the min–max range across instances (shaded band), a least-squares linear fit (solid line with R 2 value), and a reference curve proportional to the theoretical complexity (dashed line). The figure clearly demonstrates the linear growth for MSPIT and the n log n scaling for MCSPIT and MCDSPIT.
Recent work studied related problems for the l1 norm and Hamming distance. We do not report cross-norm runtime plots because changing the norm (for example, from the infinity norm to the l1 norm or to Hamming distance) changes the problem class itself and leads to different algorithmic structures and complexity profiles. As is typical in combinatorial optimization, each norm induces its own objective geometry and constraints, which in turn invite specialized methods—for instance, decision-diagram dynamic programming for bottleneck-style objectives versus flow-based, knapsack-like, or budgeted-edit formulations for additive or Hamming-style objectives. Direct wall-clock comparisons across different norms would therefore mix modeling choices with implementation details and hardware/software constants and would not yield a fair apples-to-apples assessment. Our experiments instead focus on validating the predicted scaling behavior for the studied infinity-norm model using a deterministic and reproducible protocol. Table 1 situates the related problem families and summarizes their typical algorithmic landscapes to make the scope of our comparisons explicit.

6. Conclusions and Further Research

Three interdiction problems on trees with the weighted l norm were investigated in this study: the maximum shortest-path interdiction problem MSPIT, its corresponding minimum-cost shortest-path interdiction problem MCSPIT, and the double-interdiction variant MCDSPIT. The problems have wide applications in cybersecurity, logistics, and infrastructure resilience. For MSPIT, we presented a linear-time greedy algorithm. For MCSPIT, we developed an efficient O ( n log n ) -time algorithm based on greedy selection and binary search. Building on this framework, we extended the methodology to handle the additional constraint in MCDSPIT and proposed an algorithm with the same asymptotic complexity. Numerical experiments on synthetic instances confirmed the scalability and practical effectiveness of the proposed methods.
Further research is needed to design more advanced approaches for extremely large-scale graphs with millions of edges and nodes, such as graph decomposition, to enhance scalability. It should also be noted that while our algorithms address the interdiction problems with the l norm, they may not directly extend to other norms—a common challenge in combinatorial optimization, where tailored methods are often necessary. Nevertheless, the methodology developed in this work provides a foundation that can be adapted to related interdiction problems in alternative infinite-norm settings.
In summary, a comprehensive and efficient algorithmic framework for solving a class of critical interdiction problems on tree networks was established in this work, providing both theoretical guarantees and practical computational tools. Future research directions include extending the proposed models and algorithms to more general graph classes (e.g., series–parallel graphs or general directed acyclic graphs), as well as developing stochastic and robust variants where edge upgrade costs or capacity bounds are uncertain. Moreover, interdiction problems involving node upgrades—rather than edge upgrades— remain largely unexplored and present both theoretical and computational challenges. Finally, applying these models to real-world domains such as cybersecurity, logistics, and infrastructure resilience represents a promising avenue for empirical validation and practical impact.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/math13193219/s1. The supplementary material “Program_Result” contains: (i) MainProgram.m—the MATLAB driver script to reproduce the numerical experiments; and (ii) results/ MANIFEST.csv—the experiment manifest listing all runs and parameters (e.g., n, trial_id, seed, M, D, B, ρ , β , D 1 , D all , S 0 , S 1 ). No other data files are included.

Author Contributions

Conceptualization, Q.Z. and X.L.; methodology, Q.Z. and X.L.; software, X.L.; validation, X.L.; formal analysis, Q.Z. and X.L.; investigation, Q.Z.; resources, Q.Z.; data curation, Q.Z.; writing—original draft preparation, Q.Z.; writing—review and editing, Q.Z. and X.L.; visualization, X.L.; supervision, X.L.; project administration, X.L.; funding acquisition, Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The work of Q. Zhang was supported by National Natural Science Foundation of China (Grant No. 1230012046). None of the remaining authors received external funding. The APC was funded by the National Natural Science Foundation of China (Grant No. 1230012046).

Data Availability Statement

The original contributions presented in this study are included in the article/Supplementary Materials. Further inquiries can be directed to the corresponding authors.

Acknowledgments

The authors would like to thank the anonymous reviewers for their constructive comments that helped improve the quality of this manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SymbolMeaning
T = ( V , E , w ) Edge-weighted tree rooted at v 1 ; set V of nodes, set E of edges; weight vector w.
Y = { t 1 , , t r } Set of leaves.
P v i , v j ; P k Unique path from v i to v j ; shorthand P k : = P v 1 , t k (root–leaf path).
u ( e ) Upper bound of the upgraded weight on edge e E .
Δ u ( e ) Upgrade capacity on e: Δ u ( e ) : = u ( e ) w ( e ) .
c ( e ) (Weighted) cost coefficient on edge e.
w ( · ) , w ¯ ( · ) , w ^ ( · ) Edge/path weights before and after upgrading (notations follow the algorithms).
D ( w ¯ ) Shortest root–leaf distance with weights w ¯ : D ( w ¯ ) : = min t k Y w ¯ ( P k ) .
C ( w ^ ) Bottleneck (max) cost with weights w ^ : C ( w ^ ) : = max e E c ( e ) ( w ^ ( e ) w ( e ) ) .
M , D , B Budget/threshold parameters used in the models; see Problems (3)–(4), (12)–(16).
Q ( e ) Set of leaves with root–leaf paths passing through e (Def. 1).
AcronymExpanded Form
SPIPShortest path interdiction problem (background)
MSPITMaximum shortest path interdiction on trees
MSPITMSPIT with weighted norm
MCSPITMinimum-cost shortest-path interdiction on trees
MCSPITMCSPIT with weighted norm
MCDSPIT       minimum-cost shortest-path double interdiction on trees with weighted norm

References

  1. Smith, J.C.; Song, Y.J. A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 2020, 283, 797–811. [Google Scholar] [CrossRef]
  2. Corley, H.W.; Sha, D.Y. Most vital links and nodes in weighted networks. Oper. Res. Lett. 1982, 1, 157–161. [Google Scholar] [CrossRef]
  3. Ball, M.O.; Golden, B.L.; Vohra, R.V. Finding the most vital arcs in a network. Oper. Res. Lett. 1989, 8, 73–76. [Google Scholar] [CrossRef]
  4. Israeli, E.; Wood, R.K. Shortest-path network interdiction. Networks 2002, 40, 97–111. [Google Scholar] [CrossRef]
  5. Khachiyan, L.; Boros, E.; Borys, K.; Elbassioni, K.; Gurvich, V.; Rudolf, G.; Zhao, J.H. On short paths interdiction problems: Total and node-wise limited interdiction. Theory Comput. Syst. 2008, 43, 204–233. [Google Scholar] [CrossRef]
  6. Chen, G.T. Finding the most vital edge of a shortest path in undirected networks. J. Hangzhou Inst. Electron. Eng. 2002, 22, 48–50. [Google Scholar]
  7. Nardelli, E.; Proietti, G.; Widmayer, P. A faster computation of the most vital edge of a shortest path. Inf. Process. Lett. 2001, 79, 81–85. [Google Scholar] [CrossRef]
  8. Henke, D.; Wulf, L. On the Complexity of the Bilevel Shortest Path Problem. Networks 2025, 1–18. [Google Scholar] [CrossRef]
  9. Boeckmann, J.; Thielen, C.; Wittmann, A. Complexity of the temporal shortest path interdiction problem. In Leibniz International Proceedings in Informatics (LIPIcs), SAND; Schloss Dagstuhl—Leibniz-Zentrum für Informatik: Wadern, Germany, 2023; Volume 257, pp. 9:1–9:20. [Google Scholar]
  10. Punla-Green, S.Z.; Mitchell, J.E.; Gearhart, J.L.; Hart, W.E.; Phillips, C.A. Shortest path network interdiction with asymmetric uncertainty. Networks 2024, 83, 605–623. [Google Scholar] [CrossRef]
  11. Azizi, E.; Seifi, A. Shortest path network interdiction with incomplete information: A ro-bust optimization approach. Ann. Oper. Res. 2024, 335, 727–759. [Google Scholar] [CrossRef]
  12. Nguyen, D.H.; Smith, J.C. Asymmetric stochastic shortest-path interdiction under condi-tional value-at-risk. Iise Trans. 2024, 56, 398–410. [Google Scholar] [CrossRef]
  13. Huang, D.; Mao, Z.F.; Fang, K.; Chen, L. Solving the shortest path interdiction problem via reinforcement learning. Int. J. Prod. Res. 2023, 61, 31–48. [Google Scholar] [CrossRef]
  14. Holzmann, T.; Smith, J.C. The Shortest Path Interdiction Problem with Randomized In-terdiction Strategies: Complexity and Algorithms. Oper. Res. 2021, 69, 82–99. [Google Scholar] [CrossRef]
  15. Borrero, J.S.; Sauré, D.; Trigo, N. Optimal sequential stochastic shortest path interdiction. Eur. J. Oper. Res. 2025, 326, 641–655. [Google Scholar] [CrossRef]
  16. Zhang, Q.; Guan, X.C.; Pardalos, P.M. Maximum shortest path interdiction problem by upgrading edges on trees under weighted l1 norm. J. Glob. Optim. 2021, 79, 959–987. [Google Scholar] [CrossRef]
  17. Ayyıldız, E.; Zelik, G.; Gencer, C.T. Determining the most vital arcs on the shortest path for fire trucks in terrorist actions that will cause fire. Commun. Ser. A1 Math. Stat. 2019, 68, 441–450. [Google Scholar] [CrossRef]
  18. Forghani, E.M.; Alsalami, O.M. Using a node–child matrix to address the quickest path problem in multistate flow networks under transmission cost constraints. Mathematics 2023, 11, 4889. [Google Scholar] [CrossRef]
  19. Zhang, Q.; Guan, X.C. Chapter 6: Shortest path interdiction problems on trees. In Inverse Combinatorial Optimization Problems; Springer Optimization and Its Applications 225; Guan, X., Pardalos, P.M., Zhang, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2025. [Google Scholar] [CrossRef]
  20. Li, X.; Zhang, Q.; Guan, X.C. Chapter 7: Sum of root-leaf distance interdiction problems on trees. In Inverse Combinatorial Optimization Problems; Springer Optimization and Its Applications 225; Guan, X., Pardalos, P.M., Zhang, B., Eds.; Springer: Berlin/Heidelberg, Germany, 2025. [Google Scholar] [CrossRef]
  21. Zhang, Q.; Guan, X.C.; Wang, H.; Pardalos, P.M. Maximum shortest path interdiction problem by upgrading edges on trees under Hamming distance. Optim. Lett. 2021, 15, 2661–2680. [Google Scholar] [CrossRef]
  22. Yi, L.; Shao, H.; Wu, T.; Liu, P.J. An accelerating algorithm for maximum shortest path interdiction problem by upgrading edges on trees under unit Hamming distance. Optim. Lett. 2023, 17, 453–469. [Google Scholar]
  23. Zhang, Q.; Guan, X.C.; Jia, J.H.; Qian, X.Q. The sum of root-leaf distance interdiction problem by upgrading edges/nodes on trees. J. Comb. Optim. 2022, 44, 74–93. [Google Scholar] [CrossRef]
  24. Li, X.; Zhang, Q.; Guan, X.C.; Pardalos, P.M. The sum of root-leaf distance interdiction problem with cardinality constraint by upgrading edges on trees. J. Comb. Optim. 2024, 48, 39. [Google Scholar] [CrossRef]
  25. Mohammadi, A.; Tayyebi, J. Maximum capacity path interdiction problem with fixed costs. Asia-Pac. J. Oper. Res. 2019, 36, 1950019. [Google Scholar] [CrossRef]
  26. Tayyebi, J.; Mitra, A.; Sefair, J.A. The continuous maximum capacity path interdiction problem. Eur. J. Oper. Res. 2023, 305, 38–52. [Google Scholar] [CrossRef]
  27. Li, X.; Guan, X.C.; Jia, J.H.; Pardalos, P.M. Double interdiction problem on trees on the sum of root-leaf distances by upgrading edges. J. Glob. Optim. 2025, 92, 951–972. [Google Scholar] [CrossRef]
Figure 1. A terrorist network consisting of 10 nodes and 26 arcs, taken from [17], illustrating a shortest-path interdiction scenario. The disruptor aims to delay the fire truck’s arrival by increasing the travel time (length) of arcs from node k 1 to the target node k 10 , subject to a limited budget. The interdiction cost for each relevant arc is annotated. This scenario motivates the study of interdiction models based on partial edge degradation (weight increase) rather than complete edge deletion.
Figure 1. A terrorist network consisting of 10 nodes and 26 arcs, taken from [17], illustrating a shortest-path interdiction scenario. The disruptor aims to delay the fire truck’s arrival by increasing the travel time (length) of arcs from node k 1 to the target node k 10 , subject to a limited budget. The interdiction cost for each relevant arc is annotated. This scenario motivates the study of interdiction models based on partial edge degradation (weight increase) rather than complete edge deletion.
Mathematics 13 03219 g001
Figure 2. Empirical scaling of the algorithms confirms the theoretical time complexities. CPU time is plotted against instance size n. Dots represent mean execution time, the shaded band shows the min-max range, the solid line is a least-squares fit (with R 2 value), and the dashed line is a reference curve proportional to the theoretical complexity ( O ( n ) for MSPIT, O ( n log n ) for the others). The results validate the linear scaling of MSPIT and the linearithmic scaling of MCSPIT and MCDSPIT.
Figure 2. Empirical scaling of the algorithms confirms the theoretical time complexities. CPU time is plotted against instance size n. Dots represent mean execution time, the shaded band shows the min-max range, the solid line is a least-squares fit (with R 2 value), and the dashed line is a reference curve proportional to the theoretical complexity ( O ( n ) for MSPIT, O ( n log n ) for the others). The results validate the linear scaling of MSPIT and the linearithmic scaling of MCSPIT and MCDSPIT.
Mathematics 13 03219 g002
Table 1. Recent advances upgrading edges on trees in shortest-path interdiction problems.
Table 1. Recent advances upgrading edges on trees in shortest-path interdiction problems.
ProblemNormsComplexityReference
MSPITweighted 1 O ( n 2 ) [16]
weighted HammingNP-hard[21]
unit Hamming O ( n 4 ) & O ( n 3 ) [21,22]
weighted O ( n ) Section 2
MCSPITweighted 1 O ( n 2 ) [16]
weighted HammingNP-hard[21]
unit Hamming O ( n 4 log n ) & O ( n 3 log n ) [21,22]
weighted O ( n log n ) Section 3
MCDSPITweighted + HammingNP-hard[27]
weighted O ( n log n ) Section 4
Table 2. Empirical CPU time (in seconds) for the proposed algorithms on tree instances of varying sizes (n denotes the number of edges). T 1 , T 2 , and  T 3 report the average time for algorithms MSPIT, MCSPIT, and MCDSPIT, respectively. For each algorithm, T max and T min denote the maximum and minimum observed times across test instances.
Table 2. Empirical CPU time (in seconds) for the proposed algorithms on tree instances of varying sizes (n denotes the number of edges). T 1 , T 2 , and  T 3 report the average time for algorithms MSPIT, MCSPIT, and MCDSPIT, respectively. For each algorithm, T max and T min denote the maximum and minimum observed times across test instances.
Complexityn1000500010,00020,00030,00050,000
O ( n ) T 1 0.0060.0270.0480.0840.1210.200
T 1 max 0.0080.0310.0510.0900.1310.229
T 1 min 0.0050.0250.0440.0810.1130.180
O ( n log n ) T 2 0.1450.8001.6113.1484.5587.517
T 2 max 0.2251.0401.9003.5805.0308.191
T 2 min 0.0720.5531.1842.5173.8395.275
O ( n log n ) T 3 2.0309.93319.51639.27559.510104.171
T 3 max 2.19310.51020.55140.12161.901107.392
T 3 min 1.9129.55119.02738.40358.089101.737
Table 3. Scaling diagnostics from least-squares fits and log–log slopes.
Table 3. Scaling diagnostics from least-squares fits and log–log slopes.
R 2 for t an + b R 2 for t a ( n log n ) + b log–log Slope
MSPIT0.99870.99610.898
MCSPIT0.99960.99711.007
MCDSPIT0.99890.99981.001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Q.; Li, X. Minimum-Cost Shortest-Path Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm. Mathematics 2025, 13, 3219. https://doi.org/10.3390/math13193219

AMA Style

Zhang Q, Li X. Minimum-Cost Shortest-Path Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm. Mathematics. 2025; 13(19):3219. https://doi.org/10.3390/math13193219

Chicago/Turabian Style

Zhang, Qiao, and Xiao Li. 2025. "Minimum-Cost Shortest-Path Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm" Mathematics 13, no. 19: 3219. https://doi.org/10.3390/math13193219

APA Style

Zhang, Q., & Li, X. (2025). Minimum-Cost Shortest-Path Interdiction Problem Involving Upgrading Edges on Trees with Weighted l Norm. Mathematics, 13(19), 3219. https://doi.org/10.3390/math13193219

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop