Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Science

Research Collection School Of Computing and Information Systems

Attack strategies

Articles 1 - 1 of 1

Full-Text Articles in Theory and Algorithms

On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras Apr 2020

On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras

Research Collection School Of Computing and Information Systems

How can we assess a network's ability to maintain its functionality under attacks? Network robustness has been studied extensively in the case of deterministic networks. However, applications such as online information diffusion and the behavior of networked public raise a question of robustness in probabilistic networks. We propose three novel robustness measures for networks hosting a diffusion under the Independent Cascade (IC) model, susceptible to node attacks. The outcome of such a process depends on the selection of its initiators, or seeds, by the seeder, as well as on two factors outside the seeder's discretion: the attack strategy and the …