Abstract

Real-world complex systems inevitably suffer from perturbations. When some system components break down and trigger cascading failures on a system, the system will be out of control. In order to assess the tolerance of complex systems to perturbations, an effective way is to model a system as a network composed of nodes and edges and then carry out network robustness analysis. Percolation theories have proven as one of the most effective ways for assessing the robustness of complex systems. However, existing percolation theories are mainly for multilayer or interdependent networked systems, while little attention is paid to complex systems that are modeled as multipartite networks. This paper fills this void by establishing the percolation theories for multipartite networked systems under random failures. To achieve this goal, this paper first establishes two network models to describe how cascading failures propagate on multipartite networks subject to random node failures. Afterward, this paper adopts the largest connected component concept to quantify the networks’ robustness. Finally, this paper develops the corresponding percolation theories based on the developed network models. Simulations on computer-generated multipartite networks demonstrate that the proposed percolation theories coincide quite well with the simulations.

1. Introduction

It is universally acknowledged that complex systems are ubiquitous in our lives [1]. Complex systems like city transportation systems [2] and power supplier systems [3] are indispensable infrastructures to human life. In order to better understand complex systems so as to facilitate better service providing, an effective way is to model a complex system as a complex network composed of nodes and edges with the nodes denoting the system components and the edges representing the interactions between system components [4]. For example, a power grid system can be represented by a network in which a node denotes a power station and an edge denotes the transmission line between two stations. Complex network modeling and analysis have proven as a potent instrument for system control [57] and have received great popularity in the last two decades [8, 9].

Note that complex systems in reality will inevitably suffer from external and/or internal unpredictable perturbations which can trigger cascading failures wreaking havoc on system structures and functionalities [5, 10]. A dramatic event in history was the Italian blackout that happened in 2003 [11]. It had been reported that the blackout was triggered by the breakdown of several power lines caused by a storm. It was until the seminal work done in [11] that the science underlying the event had been disclosed from the perspective of network robustness analysis. Network robustness analysis now has proven to be an effective approach to evaluating the robustness of complex systems so as to help prevent unseen system disasters [1214]. Due to its significant economical values, many efforts have been made towards networked system robustness analysis. Existing studies can be roughly categorised into two classes, i.e., simulation-based studies [1517] and theoretical studies [11, 18, 19]. Simulation-based studies investigate the robustness of networked systems by carrying out computer simulations. Their main drawback is that they cannot uncover the governing principles for system robustness. To overcome this drawback, theoretical studies came out and amongst which are the percolation theories [1, 20].

Percolation on networks can not only measure the systems’ robustness but also provide the mathematical explanations for the systems’ robustness behaviours. Note that real-world systems are not independent but are organized in a layer-layer interdependent way, which are widely modeled as multilayer networks [18, 21, 22]. The component failures in one layer of a multilayer networked system can induce the failures in other layers and cascading failures could eventually occur. The work in [11] indicates that multilayer networked systems are vulnerable to perturbations and have sparked the research enthusiasm on the percolation theories for multilayer networked systems. Albeit the maturity of percolation theories for multilayer networked systems, little attention is paid to multipartite networked systems. Many complex systems like ecosystems [23, 24], certain control systems [1], and metabolic systems [25] can be modeled as multipartite networks. To explore the robustness of multipartite networked systems is also of great significance.

The structure difference between multilayer and multipartite networks renders the applications of existing percolation theories to multipartite networked systems infeasible. With regard to this, for a given multipartite networked system, this paper first establishes two network cascading models to prescribe the way how cascading failures propagate on multipartite networks when initial node failures occur. Afterward, this paper develops the percolation theories for assessing the robustness of multipartite networked systems under random node failures based on the largest connected component concept.

The remainder of this paper is structured as follows. Section 2 provides related preliminaries including basic network notations, network robustness evaluation metrics, and percolation theory for single-layer networked systems. Section 3 presents the research problem and motivation. Section 4 delineates in detail the proposed percolation theories for analyzing the robustness of multipartite networked systems subject to random node failures. Section 5 validates the correctness of the proposed theories through simulations on random multipartite networks with Poisson degree distributions. Section 6 concludes the paper.

2. Preliminaries

2.1. Network Notations

Generally, a network is mathematically denoted by , where and represent the sets of nodes and edges, respectively. The edges between nodes can be depicted by the adjacency matrix of with being the number of nodes in . The matrix is usually symmetric and binary. Let be the entry of . If there is an edge between nodes and , then ; otherwise, it is equal to 0.

Regarding complex network analytics, one of the most concerned properties is the node degree. For a network , the degree of node is defined as the number of edges attached to it. Generally, can be calculated as . Another property is the degree distribution of which specifies the probability for a node to have degree . With and , we have the mean degree of , which can be calculated as .

2.2. Multipartite and Multilayer Networked Systems

Definition 1. Let us consider a complex system that can be modeled as a network whose node set consists of subsets, i.e., . If , satisfies the following conditions:Then, we say this system is a multipartite networked system and the network is called a multipartite network.

Remark 1. The node set of a multipartite networked system can also be called a partite set. Equation (1) indicates that an edge of a multipartite network only happens between two nodes with one coming from partite set and the other one from partite set or .

Definition 2. Let us consider another system which can be modeled as a network , and is composed of subnetworks, i.e., . The node set can also be divided into subsets with being the node set for network . If satisfies the following conditions:then we call this system a multilayer networked system and the network is called a multilayer network [26, 27].

Remark 2. In the literature, a multilayer network can also be called an interdependent network or a network of networks [21, 28]. We can see from the above definitions that the only structural difference between a multilayer network and a multipartite network is that parallel edges (edges between nodes from the same node set) are not allowed in a multipartite network.

2.3. Networked System Robustness Evaluation

Network robustness analysis has proven as an effective tool for assessing the robustness of networked systems under disturbances [29, 30]. Regarding system robustness analysis, the foremost issue is how one defines or quantifies the robustness of a networked system. Hitherto, a handful of robustness metrics have been proposed by researchers, and most of them share the common idea as delineated in Figure 1.

In the left panel of Figure 1 is a multilayer network . Assume that is under node perturbations and fraction of nodes is removed (marked in red in the figure). The node removals will trigger the cascading breakdown of other nodes and edges. Based on a prescribed cascading model which defines the way how cascading failures propagate on , finally reaches a stable stage (the final remaining part of ) in which no node/edge removal is possible. Then, one counts , the fraction of effective nodes, in the stable stage. One then gets the robustness curve drawn in the right panel of Figure 1 in which is shown with respect to under different values.

In the literature, is widely defined as the fraction of non-zero-degree nodes in the stable stage of [15, 16, 24] after removing fraction of nodes. Based on this kind of definition for , the robustness of a network then can be quantified by the node robustness index devised in [16] or by the area index used in [15, 24]. The index is calculated as , while the index is measured as the area of the region covered by the robustness curve and the X-Y axis (see the dark region in the right panel of Figure 1). The larger the value of or is, the higher robustness the focal network has.

The above definition for is effective for network robustness analysis. However, scientists argue that this kind of definition may not reflect the real robustness of networks. In reality, the breakup of some components of a complex system will fragment the system into pieces and it is argued that only the largest piece will keep functioning. As per this assumption, scientists suggest the definition of as the fraction of nodes in the largest connected component (LCC, the subnetwork that contains the most nodes) in the stable stage . The LCC-based definition for has been widely recognized [11, 21, 31], and this paper also adopts this kind of definition for network robustness analysis.

Note that how to select the fraction of nodes to be removed from a network depends on how one models the perturbations on the network [3234]. Figure 1 only illustrates network robustness under node failures. In reality, failures can occur to the edges of a network. Meanwhile, many networks have been reported to possess community structures [35, 36]; therefore, failures can also occur to network communities. Related works can be found in [37, 38].

2.4. Percolation on Single-Layer Networked Systems

Percolation theories have gained large popularity for analyzing the robustness of networked systems [32, 39]. In the following we will illustrate the percolation theory for analyzing the robustness of single-layer networked systems.

Given that a fraction of nodes from a given single-layer network is randomly removed, the node removal breaks into small parts and there exists the largest one, i.e., the LCC. Percolation theory aims to mathematically figure out the fraction of nodes in the LCC, hereafter denoted by , with respect to and the degree distribution of [18, 40, 41], i.e., it aims to derive the relation with being a map or a function. Before presenting the mathematical derivations, we first present in the following some related definitions.

Definition 3 (generating function). A generating function for a degree distribution is defined aswhere is the degree of a node and is an arbitrary placeholder.

Definition 4. (excess degree distribution). Following a randomly chosen edge we reach a node . Define the excess degree distribution as the probability for node to have extra neighbours.

Remark 3. The excess degree distribution practically denotes the probability for a randomly chosen node to have degree . In the literature [1, 42], is widely calculated as

Remark 4. Analogous to equation (3), the generating function for is formulated aswith being the first-order derivative of .
With the above definitions, the percolation theory for calculating for a single-layer network can be mathematically written aswith being the probability for node (reached by following a randomly chosen edge) not to be connected to the LCC via its neighbouring node .
The probability variable is calculated by the following transcendental equation:There exists a critical value of , denoted by . Once the fraction of node removal surpasses , then the focal network will break down, i.e., . The critical value appears when the right and left panels of equation (7) meet with each other tangentially at . By calculating the derivative of equation (7), we havewhich further leads toin which is the second moment of . Generally, the smaller the value of is, the more robust the focal network is.

3. Problem Definition and Research Motivation

3.1. Problem Definition

This paper is dedicated to mathematically investigating the robustness of multipartite networks. Below we present the mathematical definition for our studied problem.

Definition 5. (research problem). Consider a system that is modeled as an -partite network . Denote , , as the bipartite network composed of node sets and with . Assume that is under random attack and fraction of nodes is randomly removed from for all and . For a given network cascading model which specifies how cascading failures propagate on , then reaches a stable stage. Consider the LCC in the stable stage of . Then, the research problem is to derive the relationwith being the fraction of nodes remaining in which also belongs to the LCC and being the degree distribution for the nodes in .

3.2. Research Motivation

From the definitions given in Section 2.1, one may argue that a multipartite network can be regarded as a simplified multilayer network and in turn a multilayer network can be regarded as a relaxation of a multipartite network. Therefore, one may think that models and theories developed for multilayer networks will work for multipartite networks. In what follows, we elaborate in detail our research motivations for proposing the percolation theories for multipartite networks.(M1) Limitation of Percolation Theory for Multilayer Networks with One-to-One Correlations

The percolation theory introduced in Section2.4 is for single-layer networks and therefore does not work for multilayer networks. In view of this, the authors in [11] first investigated the robustness of multilayer networks with one-to-one (O2O) correlations, i.e., each node in one subnetwork depends on one and only one node in its coupled subnetwork. Similar network models can be found in [18, 21].

Figure 2 exhibits the dynamic cascading model established in [11] for analyzing the robustness of multilayer networks with O2O correlations. This model assumes that for each subnetwork contained in a multilayer network, only the nodes that belong to the LCC will survive perturbations and cascading failures will not stop until a mutual LCC is reached.

Based on the model illustrated in Figure 2, the authors further devised the corresponding percolation theory. Obviously, the model shown in Figure 2 together with its corresponding theory is not applicable to multipartite networks. The reason is obvious as a multipartite network does not obey the O2O correlation hypothesis.(M2) Limitation of Percolation Theory for Multilayer Networks with One-to-Many Correlations

Real-world multilayer networks are often one-to-many (O2M) correlated, i.e., each node in one subnetwork depends on more than one node in its coupled subnetwork. With regard to this, studies on the robustness of multilayer networks with O2M correlations came out [31, 43, 44].

Figure 3 shows the dynamic cascading model proposed in [18] for analyzing the robustness of multilayer networks with O2M correlations. Given a two-layer network consisting of subnetworks A and B, let (and ) be the degree distribution of the nodes in A (and B) that have correlations with nodes in B (and A). Assume that a fraction and a fraction of nodes are randomly removed from A and B, respectively. With the model shown in Figure 3 the authors then have devised the corresponding percolation theory which is mathematically written aswhere and are, respectively, the generating functions of and . The corresponding variables , , , and are calculated as

Note that a multipartite network can be regarded as a simplified multilayer network with O2M correlations. However, the model shown in Figure 3 still does not work for multipartite networks. The reasons are twofold. On the one hand, the model shown in Figure 3 considers the LCC of the network in each layer, while the nodes in each “layer” of a multipartite network are disconnected from each other, and thus the LCC does not exist. On the other hand, the percolation theory based on the model shown in Figure 3 involves the degree distributions and . Bear in mind that denotes the degree distribution of the nodes in network A that have connections with each other. Thus, we have for a multipartite network, and the substitution of this condition into equation (11) will lead to the following result:

For one thing, the above equation only works for bipartite networks. For another thing, the extension of the above equation definitely does not fit for multipartite networks because equation (11) is based on the dynamic model shown in Figure 3 which is not applicable to multipartite networks. One more thing is that the derivations of equation (11) are very complicated. Therefore, new models and theories for analyzing the robustness of multipartite networks are desirable, and this is the very motivation of this work.

4. Proposed Models and Theories

4.1. Global Model for Robustness Analysis

Although the models exhibited in Figures 2 and 3 are not feasible for multipartite networked systems, their ideas could provide us inspirations. Equipped with the concept of LCC, we first establish a simple cascading model, which we call it the global model, for multipartite networks.

Definition 6. (global model). Consider an -partite network with being its -th node set. Assume that is under random attack and fraction of nodes is randomly removed from for and . The edges attached to the removed nodes are also removed. The removal of nodes and edges fragments into small parts, and the largest one is regarded as the LCC of and only the LCC will survive in the final stable stage.

Example 1. Figure 4 gives a graphical example of the global model for defining the way how failures propagate on multipartite networks. We can observe from Figure 4 that the global model practically takes a multipartite network as a whole. When a multipartite network is under attack, the global model directly calculates the LCC in the network.

4.2. Local Model for Robustness Analysis

The global model is simple and straightforward. However, it may not reflect the dynamics of all types of multipartite networks. Inspired by the models proposed in [11, 18], we further develop another cascading model which we call it the local model.

Definition 7. (local model). Consider an -partite network with being its -th node set. Assume that is under random attack and fraction of nodes is randomly removed from for and . The edges attached to the removed nodes are also removed. The removal of nodes and edges fragments into small parts, and the nodes outside the LCC of , together with their edges, are removed. The removal of nodes and edges further fragments into small parts, and nodes outside the LCC of are removed. The node removal and network fragmentation processes repeat recursively on for all until reaches a stable stage in which no node/edge removal and network fragmentations are possible. Then, the remaining subnetwork in the stable stage is the LCC of .

Example 2. Figure 5 presents a graphical example of the proposed local model for depicting the dynamic process on a multipartite network under node failures. It can be noticed from Figure 5 that the local model considers the LCC in each bipartite network contained in a multipartite network. In the final stable stage, the local model focuses on the LCC that contains nodes from every partite set of the multipartite network in question.

4.3. Variables and Notations

Before starting depicting our proposed theories for analyzing the robustness of multipartite networks, we first list out related variables and notations that will be heavily used in our later derivations.

Given an -partite network with being its -th partite set and being the number of nodes in , let be the degree distribution of the nodes in . Denote as the bipartite network consisting of partite sets and with . Let be the degree distribution of the nodes in that have connections with nodes in .

Based on the definition of excess degree distribution, we, respectively, define the excess degree distributions of and as and . Then, based on the definition of generating function, we define and , respectively, as the generating functions for and . Analogously, we define and , respectively, as the generating functions for and .

4.4. Percolation Theory Based on the Global Model

With all the above defined variables, for an L-partite networked system, we propose the following percolation theory for calculating with respect to the global model presented in Definition 6.

Definition 8. (probability vector ). Consider the situation that fraction of nodes is randomly removed from of an L-partite network for with . For , define a probability vector , with being the probability for a node in not to be connected to the LCC of via a node in .

Theorem 1. (percolation theory based on the global model). Consider an L-partite network with ; we randomly remove fraction of nodes from for with . Based on the global model given in Definition 4, reaches a stable stage. Define the probability vector . In the limit of , the fraction of nodes in that also belongs to the LCC in the stable stage of is calculated aswith the variable being calculated aswhere , if , and , if .

Proof. We start by considering . As the probability for a node not to be connected to the LCC via a node is , the probability for nodes in not to be connected to the LCC via nodes in is calculated asIn the limit of , we haveNote that fraction of nodes is removed from for ; thus, fraction of nodes is remaining in . Therefore, in the LCC of , the remaining fraction of nodes in is calculated asAnalogously, we can prove the correctness of the expression of as given in Theorem 1. Now, let us consider .
Note that a node can simultaneously have neighbours in and . If nodes in do not belong to the LCC, then the nodes in should not be connected to the LCC via their neighbours. Based on the above analysis, we know that the probability for nodes in not to be connected to the LCC via nodes in isAnalogously, the probability for nodes in not to be connected to the LCC via nodes in isThen, the probability for nodes in not to be connected to the LCC via their neighbours is . Therefore, in the limit of , we further havebased on which we can figure out asTo this end, the first part of Theorem 1, i.e., the part regarding , is proved. Next, we give the proof for the second part regarding the probability vector .
We start by analyzing , which denotes the probability for the event that a node is not connected to the LCC of via a node to happen. Note that if node is removed, which happens with a probability , then the above event obviously happens. Now, consider the situation that node is not removed. Then, the aforementioned event happens if is not connected to the LCC via its neighbours. As a consequence, in the limit of , we haveAnalogously, we can prove the correctness of the expression of . Next, we consider with .
Note that nodes in have connections with nodes in . The event that a node is not connected to the LCC via a node , which happens with the probability , can happen under two situations: (S1) node has been removed; (S2) node is not removed and itself is not connected to the LCC via its own neighbours. Situation S1 happens with the probability . Thus, the key step for working out then lies in the calculation of the probability for situation S2 to happen.
Because a node can simultaneously have neighbours in and , if is not connected to the LCC via its neighbours, then should neither be connected to the LCC via nodes in nor via nodes in . Assume that node has neighbours in ; then, the probability for node not to be connected to the LCC via nodes in isAnalogously, when node has neighbours in , the probability for node not to be connected to the LCC via nodes in isRecall the definition of excess degree distribution; the probabilities for node to, respectively, have neighbours in and neighbours in are and . As a consequence, the probability can be calculated asNote that situations S1 and S2 are two independent events; therefore, in the limit of , the probability is calculated asThe proof of for is omitted as it is analogous to that of for as presented above. To this end, Theorem 1 is proved.

Remark 5. Note that when analyzing , it is easy to derive the wrong expression of in the following way:The idea of the above derivations is that out of neighbours of a node are not connected to the LCC via nodes in , and the remaining neighbours of are not connected to the LCC via nodes in . However, the event that node has neighbours in and the event that node has neighbours in are independent. Therefore, variable does not need to run over for .

Remark 6. From Theorem 1, one can easily derive the percolation theory for L-partite networked systems with , i.e., bipartite networked systems. Specifically, one can havewith and , respectively, being calculated as

4.5. Percolation Theory Based on the Local Model

When calculating the LCC, the global model takes a multipartite network as a whole while the local model by contrast analyzes its subnetworks. The local model requires that the final LCC should encompass nodes from every partite set. Therefore, the above proposed percolation theory does not work for multipartite networked systems with respect to the local model. In what follows we elucidate our proposed percolation theory based on the local model.

Theorem 2. (percolation theory based on the local model). Consider an L-partite network with ; we randomly remove fraction of nodes from for with . Based on the local model given in Definition 5, reaches a stable stage. Define the probability vector . In the limit of , the fraction of nodes in which also belongs to the LCC in the stable stage of is calculated aswith the variable being calculated aswhere , if , and , if .

Proof. We only present the proof for , since the proofs for and are exactly the same as that presented in Theorem 1. As mentioned earlier, a node can simultaneously have neighbours in and . Based on the local model given in Definition 5, we see that as long as there exists one neighbour of node that connects to the LCC, then node definitely belongs to the LCC. According to the proof of Theorem 1, we know that in the limit of , the probability for nodes in not to be connected to the LCC via nodes in isAnalogously, we have . Therefore, the probability for node to be connected to the LCC via at least one neighbour in is . Analogously, the probability for node to be connected to the LCC via at least one neighbour in is . Consequently, the probability for nodes in to be connected to the LCC via their neighbours is calculated asTherefore, in the limit of , is calculated asTo this end, the correctness of as given in Theorem 2 is proved. Next, we give the proof for the probability variable . The proofs for variables and are omitted as they are the same as that given in the proof for Theorem 1. We first analyze with .
Recall that the variable denotes the probability that a node is not connected to the LCC via a node . Analogous to what are analyzed in the proof for Theorem 1, the event that is not connected to the LCC via also happens under two situations: (S1) node is removed, which happens with the probability ; (S2) remains and is not connected to the LCC via its neighbours. Note that the probability for situation S2 to happen cannot be calculated in the way demonstrated in the proof of Theorem 1. The reason is that the local model requires that the LCC contains nodes from for , while the global model does not require this condition.
Because node has neighbours in and , the probabilities and are, respectively, calculated as and . Therefore, the probability for neither to be connected to the LCC via neighbours in nor via nodes in isIn the limit of , can be further calculated asAs , in the limit of , the probability is calculated asBased on the same token shown above, we can work out for asand therefore Theorem 2 is proved.

5. Numerical Simulations

5.1. Random Multipartite Networks

The proposed theories exhausted in Section 4 theoretically investigate the robustness of multipartite networks with arbitrary degree distributions in face of random node failures. Here we generate multipartite networks with Poisson degree distributions to validate the correctness of the proposed theories. The reasons for doing so are twofold. First, generating multipartite networks with Poisson degree distributions is easy to implement. Second, a Poisson distribution has very good mathematical properties. To be specific, for a Poisson distribution with being its expectation, it is easy to prove that

Given an empty L-partite network , for all , we construct by connecting each pair of nodes with one from and the other one from with a predefined probability , where is a constant. Then, it is easy to figure out that the degree distributions and for nodes in comply with the following Poisson distributions:where and .

5.2. Validation for Theorem 1

Without loss of generality, in the simulations, we consider L-partite networks with , i.e., tripartite networks. For a tripartite network generated in the way illustrated in the previous section, when fraction of nodes is randomly removed from for all and the cascading failures propagate on based on the defined global model, then Theorem 1 leads to the following simplified equations:

For simplicity, in the simulations, we set the parameters of a tripartite network to be , , and . As a consequence, we have .

Because the parameter affects the robustness of multipartite networks, in order to better demonstrate the simulation results, here we consider two simple cases: (C1) , i.e., we randomly remove the same fraction of nodes from each partite set; (C2) , , i.e., we only remove nodes from partite set .

Under case 1, the critical value becomes

Under case 2, the critical value . Interested readers are encouraged to discover this conclusion by themselves.

Figure 6 shows the simulation and theoretical results on the robustness of tripartite networks based on the global model. The theoretical results shown in Figure 6 are obtained by solving equations (44) and (45). During the simulations, ranges from 0 to 1 at an interval of 0.025. It can be clearly seen from Figure 6 that the theoretical results coincide quite well with the simulations. Under case 1, the critical value given in equation (46) has the simplified form of . Under case 2, , which indicates that the focal networks are extremely robust to random node failures. It can be observed from Figure 6 that the values of are in accordance with that of the simulations. The results shown in Figure 6 indicate that multipartite networks are robust to node failures when the global model is of concern.

5.3. Validation for Theorem 2

For a tripartite network with Poisson degree distributions, Theorem 2 leads to the following simplified equations:

Figure 7 shows the simulation and theoretical results on the robustness of tripartite networks based on the local model. The theoretical results shown in Figure 7 are obtained by solving equations (47) and (48) with the same parameter settings presented in the previous section. The results recorded in Figure 7 also demonstrate that the proposed theory coincides quite well with the simulations.

By comparing Figures 6 and 7, we can see that the robustness of multipartite networks with respect to the local model shows first-order phase transition, which indicates that multipartite networks with the local model are vulnerable to perturbations. Both Figures 6 and 7 show that larger mean degrees will enhance the networks’ robustness.

6. Conclusion

Investigating the robustness of complex systems under perturbations is pivotal. Network robustness analysis provides a potent instrument towards that purpose. While the majority of existing studies on network robustness analysis focus on multilayer networked systems, this paper theoretically studied the robustness of multipartite networked systems. This paper first established two network models for depicting the cascading failures on multipartite networked systems in face of node failures. Equipped with the established network models together with the largest connected component concept, this paper then developed the corresponding percolation theories for analyzing the robustness of multipartite networked systems under random node failures. The proposed theories uncovered the second-order and first-order phase transition phenomena on the robustness of multipartite networked systems. The correctness of the proposed theories had been validated through simulations on multipartite networks with Poisson degree distributions.

Note that complex systems in reality can suffer from target attacks. Although this paper only investigates the robustness of multipartite networked systems under random perturbations, the proposed models and theories provide scientific insights for the target attack scenarios. Meanwhile, the proposed theories could shed new lights on the optimal structure design of robustness network and/or networked systems.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.