Next Article in Journal
Entropy Algorithms Using Deep Learning for Signal Processing
Next Article in Special Issue
A Novel Temporal Network-Embedding Algorithm for Link Prediction in Dynamic Networks
Previous Article in Journal
Reconstruction of the Temporal Correlation Network of All-Cause Mortality Fluctuation across Italian Regions: The Importance of Temperature and Among-Nodes Flux
Previous Article in Special Issue
An Empirical Mode Decomposition Fuzzy Forecast Model for Air Quality
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks

1
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
2
Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
3
Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
4
Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(1), 22; https://doi.org/10.3390/e25010022
Submission received: 1 December 2022 / Revised: 18 December 2022 / Accepted: 19 December 2022 / Published: 23 December 2022
(This article belongs to the Special Issue Complexity, Entropy and the Physics of Information)

Abstract

:
The higher-order structure of networks is a hot research topic in complex networks. It has received much attention because it is closely related to the functionality of networks, such as network transportation and propagation. For instance, recent studies have revealed that studying higher-order networks can explore hub structures in transportation networks and information dissemination units in neuronal networks. Therefore, the destruction of the connectivity of higher-order networks will cause significant damage to network functionalities. Meanwhile, previous works pointed out that the function of a complex network depends on the giant component of the original(low-order) network. Therefore, the network functionality will be influenced by both the low-order and its corresponding higher-order network. To study this issue, we build a network model of the interdependence of low-order and higher-order networks (we call it ILH). When some low-order network nodes fail, the low-order network’s giant component shrinks, leading to changes in the structure of the higher-order network, which further affects the low-order network. This process occurs iteratively; the propagation of the failure can lead to an eventual network crash. We conducted experiments on different networks based on the percolation theory, and our network percolation results demonstrated a first-order phase transition feature. In particular, we found that an ILH is more fragile than the low-order network alone, and an ILH is more likely to be corrupted in the event of a random node failure.

1. Introduction

The study of complex networks involves many fields, such as the Internet, social networks, power networks, and transportation networks. In the past two decades, research on complex networks has mainly focused on real-world networks [1,2,3,4,5,6,7,8], these original networks can also be viewed as low-order networks. In recent years, higher-order networks have begun to attract more and more researchers’ attention [9]. The generation of higher-order networks is based on network motifs. A network motif is a network subgraph composed of three or more nodes, it is the basic unit for building complex networks, and it is also a valuable structure for implementing network functions [10,11,12]. One can generate a corresponding higher-order network based on the original network through a specific network motif. A specific demonstration is shown in Figure 1. Given a network and a motif, the framework generates an adjacency matrix by calculating the number of times two nodes co-occur in the motif. Then, an undirected higher-order network can be generated based on this adjacency matrix. Changes in the low-order structure will affect the higher-order structure, because changes in the low-order structure will affect the way the triangle is connected [9]. However, in the international trade network, the higher-order structure corresponds to an alliance. Suppose a node in an alliance withdraws from the alliance, the alliance may also collapse, and each node in the alliance cannot conduct trade through the alliance. Therefore, in the corresponding higher-order network, if a triangle in the high-order network is destroyed, the triangle will disappear in the higher-order network, and the corresponding edge in the low-order network will also be destroyed. Studying the characteristics of higher-order networks can help researchers identify important nodes in the network and then protect these important nodes through special means [13]. For instance, researchers used higher-order networks to study the spread of pollutants in the air and then provided valuable recommendations for environmental governance [14]. Therefore, it is essential to study the properties of higher-order networks, which can help us deeply explore the properties and the dynamic behavior of networks [15,16].
In complex networks, the robustness of the network is an essential issue. A significant number of traditional studies focused on the robustness of original (low-order) networks [17,18,19,20]. The robustness of a network is usually determined by the giant component of the network, which is the one with the largest size among all connected components in the network. If the giant component of the network is compromised, the functionality of the network can be significantly affected [21]. In reality, many real-world network systems exhibit the “scale-free” property; these networks typically feature a solid tolerance to random attacks, but they are vulnerable to deliberate attacks [22,23]. In the economic field, studying the robustness of the network can help us discover the risks existing in the economic system [24]. In the infrastructure network, the stability of the infrastructure can be evaluated by studying the network robustness, and then a more robust infrastructure network can be designed [25]. On the Internet, studying the robustness of the network can improve network safety [26]. On the other hand, studies have found that networks exhibit rich higher-order structures, and the connectivity patterns of these higher-order structures play a crucial role in understanding and controlling many complex systems [9]. For example, higher-order organizations composed of open bidirectional wedges are significant for brain neural networks [27]; higher-order structures composed of triangular motifs also play a crucial role in social networks [28]. Therefore, it is fair to say that higher-order networks reveal structural patterns in complex systems, and if higher-order networks are compromised, the functionality of the entire network will be inevitably damaged.
To address this issue, we propose a network model in which both higher-order and low-order networks are interdependent. We conduct experiments on real-world networks and apply percolation theory to study the robustness of these networks based on this model. Theoretically, we find that first-order phase transitions characterize the network percolation results for this network model. In application, our model proves that when the low-order network and its higher-order network are coupled, the network will be more fragile.

2. Related Works

Traditional research on the robustness of complex networks generally focuses on the low-order (original) networks, and the robustness of a network typically refers to the network’s ability to maintain its connectivity when some nodes or edges are damaged. The robustness of the network can be expressed by the size of its largest connected component after being attacked [29,30]. In 2000, Albert et al. found that many networks with scale-free properties had high robustness [22]. In another study in 2007, Karrer et al. assessed the importance of community structure by measuring the robustness of the network. They proposed a suitable method of perturbing the network, studied the changes in network structure after perturbation, and used them to determine the importance of community structure [31]. Furthermore, Peng et al. in 2016 showed a conflicting relationship between the small-world effect and network robustness when the degree distribution of the network was the same. Increasing the robustness of the network could reduce the small-world effect. They proposed an optimization model to obtain an optimal trade-off between small-world effect and network robustness [32]. In addition, in 2020, Smolyak et al. proposed a method for protecting critical nodes to mitigate cascading failures and validated it on a financial network [33]. In summary, the study of network robustness remains a crucial research direction in complex networks.
To reveal the structural design principles of complex networks, Milo et al. defined “network motifs” in 2002 based on collecting a large amount of data and conducting many analyses. Some interconnection patterns frequently appear in complex networks, and the number of such patterns is higher than in random networks [34]. Network motifs affect network functioning. For example, in the central neural network of the brain, open bidirectional wedges play a crucial role, and triangular motifs frequently appear in social networks. The most subsequent studies are based on the statistics of network motifs.
Over the years, researchers have explored the influence of motif structure on complex networks. In 2016, Benson stated that complex networks could represent rich higher-order organizations through different network motifs, and they could be displayed based on the clustering of higher-order organizations. The authors proposed the theoretical knowledge of higher-order networks [9]. Additionally, real-world problems can be analyzed and solved using the knowledge of the higher-order organization of complex networks. In 2017, Wang et al. applied higher-order network methods to study the generation and propagation paths of PM2.5 in urban networks [14]. In 2021, Xia et al. used different attack strategies on the original network and then observed the robustness of the low- and higher-order networks. They found that higher-order networks were more fragile than original networks [35]. Hypergraphs can be used to explore higher-order structures and capture higher-order interactions in complex systems. In 2022, Peng Hao et al. studied the robustness of the hypergraph network and found that the network will be more fragile when the probability of large-cardinality hyperedges and high-degree nodes, being deleted, increases [36,37]. Exploring the properties of higher-order networks is becoming increasingly important for the study of complex networks.
Many studies in the field of complex networks have analyzed individual networks, meaning that the interaction between different networks has been ignored. However, many networks in the real world are interdependent and interact with each other [38,39,40,41]. In 2010, Buldyrev et al. established a model of interdependent networks, and their research showed that in interdependent networks, networks with a wider degree distribution are more vulnerable to general attacks. In addition, the authors gave an exact analytical solution to the first-order phase transitions [42] in interdependent networks [43]. Furthermore, in 2013, Huang et al. devised an analytical approach to study the impact of clustering within an interdependent network on network robustness. Their results suggested that clustering increased the network’s vulnerability [44]. In 2016, Sun et al. found that degree heterogeneity had a greater impact on the vulnerability of interdependent networks; their research showed that a stronger coupling between networks led to a more fragile network. Last but not least, in 2021, Turalska et al. proposed two control strategies to control cascading failures in interdependent networks [45].
Higher-order networks can realize the functions of networks. Therefore, when we study complex networks, we should not focus only on low-order networks but rather organically combine high- and low-order networks for analysis. As the function of a network not only depends on the low-order network but also the higher-order network, we build a network model, in which the low- and higher-order networks are interdependent. We study in this paper the properties of this interdependent network, such as the phase transition type of network percolation and the robustness of the network under attack.

3. Methods and Data

3.1. Methods

If a directed network is strongly connected, with the help of the theory of higher-order networks, we can generate a higher-order network corresponding to the low-order network through a certain three-node network motif M. We propose a model of the interdependence of complex networks and their higher-order networks, as shown in Figure 2. Some nodes in the low-order network are attacked or fail, and we simulate these nodes failure by removing them. For example, if node 9 is removed from the low-order network, then nodes 9 and 6 in the higher-order network generated by the low-order network will fail, causing node 6 in the low-order network to fail. At this time, nodes 7 and 8 do not belong to the giant strongly connected component of the low-order network, so they will be removed from the low-order network, causing the failure of nodes 7 and 8 in the higher-order network. In this way, the whole interdependent network is stable, and only five nodes remain in both the low- and higher-order networks. The entire simulation process is the case of ILH cascading failures.
Our research focuses on directed networks. Based on the percolation theory, when a network fails, it will split into multiple connected components with different scales, among which the giant strongly connected component has the largest scale, able to retain network functions. We randomly remove 1 p nodes from the network to simulate cascading failures in the network. When the remaining p nodes in the network reach the critical value of p c , the network gains giant strongly connected components. The term P represents the ratio of the number of nodes N in the giant strongly connected component to the total number of nodes N:
P = N N

3.2. Data Description

In this paper, we first use three undirected random networks, Erdős–Rényi networks(ER) [46,47], Scale-Free networks(BA) [48,49], where λ = 2.6, Small-World networks (SW) [50], which has a rewiring probability of 0.05. Then, we randomly specify a certain direction for each undirected edge with a probability 0.5. Therefore, these three types of undirected networks will become directed networks; the ER, SW, and BA mentioned below all refer to the corresponding directed networks. Here, we do not take bidirectional edges into consideration because the number of bidirectional edges in real-world networks is small; for example, the proportion of bidirectional edges in CELEGANS is only 8.4%, and only 6.9% in CHESS. If no description is given, the number of random network nodes generated is 1000 by default. To study the evolution of real-world networks, we then analyzed 14 directed networks, which are CELEGANS [50], EMAIL, GD06, TRUST, SPAM, PAIRS, PAGES, CHESS, CORA [51], POLBLOGS [52], UTM1700, MARAGAL, UTM3060 [53], ODLIS [54], respectively. PAGES, EMAIL, TRUST, POLBLOGS are social networks. CORA is the scientific paper citation network. Nodes in GD06 represent classes in Java, and edges represent dependencies between classes. SPAM is a network of hyperlinks to pages. CELEGANS is a neural network. In the CHESS network, nodes represent players, and edges represent two players in a chess match. ODLIS is an online dictionary network. In the PAIRS network, nodes represent words, and edges represent associated words associated with words. UTM1700, UTM3060, MARAGAL are miscellaneous networks of downloads in the internet. Table 1 gives some properties of these networks. Since some networks are not strongly connected, we use the giant strongly connected component of the network for experiments.

4. Experiments and Results

In this paper, we study the robustness of low-order networks for comparison and then the robustness of an ILH. As clearly shown in Figure 3a–c, under the same network size, networks with different average degrees < k > have different robustness. Regardless of the network type, a larger average degree implies more redundant wiring of the network. In other words, additional paths between two nodes exist in the network, enhancing the network’s connectivity. Even when some nodes are removed, the network still has high robustness. Next, we simulate a random attack on the ILH, and the average degree < k > of the low-order network is 16, as shown in Figure 3d–f. In the ER and SW networks, unlike the percolation of the low-order network (denoted by “Low” in these images), the percolation of ILH (“Low–High”) is characteristic of a first-order phase transition. Still, in the SW network, this phase transition is intermittent. However, in the BA network, both the percolation of the low-order network and that of the ILH exhibit second-order phase transitions. From the results, the robustness of ILH is clearly lower than that of low-order networks regardless of the random network; i.e., ILH is relatively fragile.
We observe that the percolation of the BA network shows all second-order phase transitions, so we rewire the BA network and disconnect the edges of the network with a ratio of q. Then, we randomly select two nodes without edges from the network to add a directed edge to them until the number of network edges returns to the initial state. Finally, we simulate a random attack on ILH, and the results are shown in Figure 4a–c. When q = 0 , the network is the BA network; when q = 1 , the network becomes an ER network. In the process of increasing q from 0 to 1, the percolation of ILH gradually changes from a second-order to a first-order phase transition. For example, when q = 0.68 , the percolation of ILH changes from the second-order to the first-order phase transition. However, this does not mean that the rewired network will show a first-order phase transition at every test at q = 0.68 . After 100 tests, the number of first-order phase transitions in the percolation of ILH at various q values are shown in Figure 4d. When q increases from 0 to 1, the network gradually changes from a BA network to ER network, and the probability n of first-order phase transition in the percolation of ILH continues to increase.
The above results preliminarily demonstrate that in some networks, such as ER, the percolation of the ILH may indicate a first-order phase transition. Next, we study the robustness of the ILH. Using the change of P with the parameter p mentioned above, we can calculate the area R under the curve and determine the network robustness by comparing the areas. A larger R indicates a more robust network. Likewise, a smaller R means a less robust network. As shown in Figure 5, different random networks are studied, observing the robustness of low-order networks and that of ILH by adjusting the average degree of the networks. The figure shows that ILH are significantly more vulnerable than low-order networks. However, this method compares the overall network performance, i.e., macro performance. A significant feature of interdependent networks is that when a node in the network fails, recursive failures of interconnected nodes result in other networks, leading to large-scale failures. Our results are in good agreement with this conclusion. An ILH is too fragile compared to low-order networks, although this difference in vulnerability can be compensated as the average degree of the network increases. However, an increase in the average degree yields additional edges of the network, which largely increases the cost of the network.
Our analysis shows that the percolation of an ILH on some random networks will show a first-order phase transition and that an ILH is more fragile than low-order networks. Thus, we further ask, what effect do different network sizes have on the robustness of complex networks? As shown in Figure 6a–c, when the average degree of the network is the same, the scale of the network has little effect on the robustness of the low-order network. However, in Figure 6d–f, when the average degree < k > is the same, the larger the scale of the network, the more vulnerable the ILH. This means that ILH is also affected by the size of the network; such a conclusion strongly indicates that ILH is more vulnerable, given that the real-world networks are usually of large size. Finally, we use the results obtained on 14 empirical networks as a concluding work. We calculate the area under the curves obtained when percolation occurred for each network separately and aggregated the results. As shown in Figure 7, among these different types of networks, no matter if it is the social network POLBLOGS or the neural network CELEGANS, the low-order network is more robust than the ILH, which also means that ILH is more fragile.

5. Conclusions and Discussion

The network motif is the basic building unit of the complex network, and the higher-order network generated by the motif can describe the internal structure of the complex network well. Motifs and higher-order networks play crucial roles in understanding many complex systems [9,10,34]. The low- and higher-order networks should be organically combined to form an interdependent network; therefore, the study of the ILH is of great significance. In this paper, we propose a model of the interdependence of complex networks and their higher-order networks. When some nodes in the low-order network fail, a failure of the dependent nodes may result in the failure of nodes in the corresponding higher-order network. Such failures can occur recursively, owing to the interaction of nodes between the networks, and leading to a chain of failures. Our results also demonstrate that the percolation of an ILH undergoes a first-order phase transition (i.e., discontinuous transition), which is different from the second-order phase transition that occurs with the percolation of a single network. In addition, the ILH will be more vulnerable and more likely to be paralyzed when it fails or is attacked.
In the future, one may consider building multi-layered interdependent networks of multiple motifs. At present, only the two-layer interdependent network is studied. One can try two kinds of motifs, generate two corresponding higher-order networks, and then couple them with the original low-order network to form a three-layer network. One can also aim to determine which nodes should be protected in this multi-layer network to avoid network damage. In addition, only directed networks are discussed in this work; undirected networks also need to be investigated. We hope that our research can provide inspiration for a wide range of scholars to contribute to the development of low-high order interdependent networks.

Author Contributions

Conceptualization, C.Z. and Y.L.; methodology, W.Y. and D.C.; validation, Q.L., Y.X. and H.Y.; data curation, W.Y. and X.S.; writing—original draft, C.Z. and Y.L.; writing—review and editing, C.Z. and Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All data are presented in main text.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Albert, R.; Barabási, A.L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002, 74, 47. [Google Scholar] [CrossRef] [Green Version]
  2. Bollobás, B.; Riordan, O.M. Mathematical results on scale-free random graphs. In Handbook of Graphs and Networks: From the Genome to the Internet; Wiley-Vch Weinheim: Berlin, Germany, 2003; pp. 1–34. [Google Scholar]
  3. Albert, R. Scale-free networks in cell biology. J. Cell Sci. 2005, 118, 4947–4957. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Dorogovtsev, S.N.; Goltsev, A.V.; Mendes, J.F.F. K-core organization of complex networks. Phys. Rev. Lett. 2006, 96, 040601. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Gao, J.; Buldyrev, S.V.; Stanley, H.E.; Xu, X.; Havlin, S. Percolation of a general network of networks. Phys. Rev. E 2013, 88, 062816. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Saberi, A.A. Recent advances in percolation theory and its applications. Phys. Rep. 2015, 578, 1–32. [Google Scholar] [CrossRef] [Green Version]
  7. Strogatz, S.H. Exploring complex networks. Nature 2001, 410, 268. [Google Scholar] [CrossRef] [Green Version]
  8. Newman, M.E. Complex systems: A survey. Am. J. Phys. 2011, 79, 800–810. [Google Scholar] [CrossRef]
  9. Benson, A.R.; Gleich, D.F.; Leskovec, J. Higher-order organization of complex networks. Science 2016, 353, 163–166. [Google Scholar] [CrossRef] [Green Version]
  10. Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.; Alon, U. Network motifs: Simple building blocks of complex networks. Science 2002, 298, 824–827. [Google Scholar] [CrossRef] [Green Version]
  11. Mangan, S.; Zaslaver, A.; Alon, U. The coherent feedforward loop serves as a sign-sensitive delay element in transcription networks. J. Mol. Biol. 2003, 334, 197–204. [Google Scholar] [CrossRef]
  12. Wang, T.; Peng, J.; Peng, Q.; Wang, Y.; Chen, J. FSM: Fast and scalable network motif discovery for exploring higher-order network organizations. Methods 2020, 173, 83–93. [Google Scholar] [CrossRef] [PubMed]
  13. Huang, J.; Hou, Y.; Li, Y. Efficient community detection algorithm based on higher-order structures in complex networks. Chaos Interdiscip. J. Nonlinear Sci. 2020, 30, 023114. [Google Scholar] [CrossRef] [PubMed]
  14. Wang, Y.; Wang, H.; Chang, S.; Liu, M. Higher-order network analysis of fine particulate matter (PM 2.5) transport in China at city level. Sci. Rep. 2017, 7, 13236. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Yaveroğlu, Ö.N.; Malod-Dognin, N.; Davis, D.; Levnajic, Z.; Janjic, V.; Karapandza, R.; Stojmirovic, A.; Pržulj, N. Revealing the hidden language of complex networks. Sci. Rep. 2014, 4, 4547. [Google Scholar] [CrossRef] [Green Version]
  16. Battiston, F.; Amico, E.; Barrat, A.; Bianconi, G.; Ferraz de Arruda, G.; Franceschiello, B.; Iacopini, I.; Kéfi, S.; Latora, V.; Moreno, Y.; et al. The physics of higher-order interactions in complex systems. Nat. Phys. 2021, 17, 1093–1098. [Google Scholar] [CrossRef]
  17. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [Green Version]
  18. Callaway, D.S.; Newman, M.E.J.; Strogatz, S.H.; Watts, D.J. Network robustness and fragility: Percolation on random graphs. Phys. Rev. Lett. 2000, 85, 5468. [Google Scholar] [CrossRef] [Green Version]
  19. Newman, M.E.J.; Strogatz, S.H.; Watts, D.J. Random graphs with arbitrary degree distributions and their applications. Phys. Rev. E 2001, 64, 026118. [Google Scholar] [CrossRef] [Green Version]
  20. Barabási, A.L.; Ravasz, E.; Vicsek, T. Deterministic scale-free networks. Phys. A Stat. Mech. Its Appl. 2001, 299, 559–564. [Google Scholar] [CrossRef] [Green Version]
  21. Dorogovtsev, S.N.; Mendes, J.F.F.; Samukhin, A.N. Giant strongly connected component of directed networks. Phys. Rev. E 2001, 64, 025101. [Google Scholar] [CrossRef]
  22. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Cohen, R.; Erez, K.; ben Avraham, D.; Havlin, S. Breakdown of the internet under intentional attack. Phys. Rev. Lett. 2001, 86, 3682. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Haldane, A.G.; May, R.M. Systemic risk in banking ecosystems. Nature 2011, 469, 351–355. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Dekker, A.H.; Colbert, B. Scale-free networks and robustness of critical infrastructure networks. In Proceedings of the 7th Asia-Pacific Conference on Complex Systems, Cairns, Australia, 6–10 December 2004; pp. 685–699. [Google Scholar]
  26. Draief, M.; Ganesh, A.; Massoulié, L. Thresholds for Virus Spread on Networks. In Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools; Association for Computing Machinery: New York, NY, USA, 2006; p. 51–es. [Google Scholar]
  27. Honey, C.J.; Kötter, R.; Breakspear, M.; Sporns, O. Network structure of cerebral cortex shapes functional connectivity on multiple time scales. Proc. Natl. Acad. Sci. USA 2007, 104, 10240–10245. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Holland, P.W.; Leinhardt, S. A method for detecting structure in sociometric data. In Social Networks; Elsevier: Amsterdam, The Netherlands, 1977; pp. 411–432. [Google Scholar]
  29. Schneider, C.M.; Moreira, A.A.; Andrade, J.S.; Havlin, S.; Herrmann, H.J. Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. USA 2011, 108, 3838–3841. [Google Scholar] [CrossRef] [Green Version]
  30. Tu, H.; Xia, Y.; Iu, H.H.; Chen, X. Optimal robustness in power grids from a network science perspective. IEEE Trans. Circuits Syst. II Express Briefs 2018, 66, 126–130. [Google Scholar] [CrossRef]
  31. Karrer, B.; Levina, E.; Newman, M.E.J. Robustness of community structure in networks. Phys. Rev. E 2008, 77, 046119. [Google Scholar] [CrossRef] [Green Version]
  32. Peng, G.S.; Tan, S.Y.; Wu, J.; Holme, P. Trade-offs between robustness and small-world effect in complex networks. Sci. Rep. 2016, 6, 37317. [Google Scholar] [CrossRef] [Green Version]
  33. Smolyak, A.; Levy, O.; Vodenska, I.; Buldyrev, S.V.; Havlin, S. Mitigation of cascading failures in complex networks. Sci. Rep. 2020, 10, 16124. [Google Scholar] [CrossRef]
  34. Shen-Orr, S.S.; Milo, R.; Mangan, S.; Alon, U. Network motifs in the transcriptional regulation network of Escherichia coli. Nat. Genet. 2002, 31, 64–68. [Google Scholar] [CrossRef]
  35. Xia, D.; Li, Q.; Lei, Y.; Shen, X.; Qian, M.; Zhang, C. Extreme vulnerability of high-order organization in complex networks. Phys. Lett. A 2022, 424, 127829. [Google Scholar] [CrossRef]
  36. Peng, H.; Qian, C.; Zhao, D.; Zhong, M.; Ling, X.; Wang, W. Disintegrate hypergraph networks by attacking hyperedge. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 4679–4685. [Google Scholar] [CrossRef]
  37. Peng, H.; Qian, C.; Zhao, D.; Zhong, M.; Han, J.; Wang, W. Targeting attack hypergraph networks. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 073121. [Google Scholar] [CrossRef] [PubMed]
  38. Gong, M.; Ma, L.; Cai, Q.; Jiao, L. Enhancing robustness of coupled networks under targeted recoveries. Sci. Rep. 2015, 5, 8439. [Google Scholar] [CrossRef]
  39. Radicchi, F. Percolation in real interdependent networks. Nat. Phys. 2015, 11, 597–602. [Google Scholar] [CrossRef] [Green Version]
  40. Sun, S.; Wu, Y.; Ma, Y.; Wang, L.; Gao, Z.; Xia, C. Impact of degree heterogeneity on attack vulnerability of interdependent networks. Sci. Rep. 2016, 6, 32983. [Google Scholar] [CrossRef] [Green Version]
  41. Bai, Y.; Huang, N.; Wang, L.; Wu, Z. Robustness and vulnerability of networks with dynamical dependency groups. Sci. Rep. 2016, 6, 37749. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  42. Pittel, B.; Spencer, J.; Wormald, N. Sudden emergence of a giantk-core in a random graph. J. Comb. Theory Ser. B 1996, 67, 111–151. [Google Scholar] [CrossRef] [Green Version]
  43. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [Green Version]
  44. Huang, X.; Shao, S.; Wang, H.; Buldyrev, S.V.; Stanley, H.E.; Havlin, S. The robustness of interdependent clustered networks. Europhys. Lett. 2013, 101, 18002. [Google Scholar] [CrossRef]
  45. Turalska, M.; Swami, A. Greedy control of cascading failures in interdependent networks. Sci. Rep. 2021, 11, 3276. [Google Scholar] [CrossRef] [PubMed]
  46. Gilbert, E.N. Random graphs. Ann. Math. Stat. 1959, 30, 1141–1144. [Google Scholar] [CrossRef]
  47. Erdos, P.; Rényi, A. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 1960, 5, 17–60. [Google Scholar]
  48. Barabási, A.L.; Bonabeau, E. Scale-free networks. Sci. Am. 2003, 288, 60–69. [Google Scholar] [CrossRef]
  49. Barabási, A.L. Scale-free networks: A decade and beyond. Science 2009, 325, 412–413. [Google Scholar] [CrossRef] [Green Version]
  50. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef]
  51. Jérôme, K. KONECT–The Koblenz Network Collection. In Proceedings of the International Conference on World Wide Web Companion, Rio de Janeiro, Brazil, 13–17 May 2013; pp. 1343–1350. [Google Scholar]
  52. Adamic, L.A.; Glance, N. The political blogosphere and the 2004 US election: Divided they blog. In Proceedings of the 3rd International Workshop on Link Discovery, Chicago, IL, USA, 21–25 August 2005; Association for Computing Machinery: New York, NY, USA, 2005; pp. 36–43. [Google Scholar]
  53. Ryan, A.R.; Nesreen, K.A. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015; AAAI Press: Washington, DC, USA, 2015; pp. 4292–4293. [Google Scholar]
  54. Joan, M.R.; Reitz, O. Online Dictionary of Library and Information Science. 2013. Available online: http://www.abc-clio.com/ODLIS/odlis_p.aspx (accessed on 11 October 2021).
Figure 1. In a directed network with 5 nodes, an adjacency matrix can be generated by calculating the co-occurrence times of two nodes in the motif, and then the corresponding higher-order network can be obtained by using the adjacency matrix.
Figure 1. In a directed network with 5 nodes, an adjacency matrix can be generated by calculating the co-occurrence times of two nodes in the motif, and then the corresponding higher-order network can be obtained by using the adjacency matrix.
Entropy 25 00022 g001
Figure 2. The ILH model. The original low-order network can generate a corresponding higher-order network through the three-node motif M (upper panel), and the cascading failure occurs in ILH (bottom panel).
Figure 2. The ILH model. The original low-order network can generate a corresponding higher-order network through the three-node motif M (upper panel), and the cascading failure occurs in ILH (bottom panel).
Entropy 25 00022 g002
Figure 3. Robustness of low-order networks and the robustness of ILH: (ac) are the robustness of random networks generated according to different average degrees < k > . Obviously, the greater the average degree of the network is, the higher the robustness of the network is. In (df), the average degree < k > of the low-order network is 16 and the robustness of ILH is lower than that of low-order networks. In addition, in the ER and SW networks, the percolation of ILH exhibits a first-order phase transition.
Figure 3. Robustness of low-order networks and the robustness of ILH: (ac) are the robustness of random networks generated according to different average degrees < k > . Obviously, the greater the average degree of the network is, the higher the robustness of the network is. In (df), the average degree < k > of the low-order network is 16 and the robustness of ILH is lower than that of low-order networks. In addition, in the ER and SW networks, the percolation of ILH exhibits a first-order phase transition.
Entropy 25 00022 g003
Figure 4. Percolation of ILH in which the low-order network changes gradually from a BA network to an ER network by adjusting the link rewiring probability q. For comparison, the percolation on the low-order network alone is shown. (ac) show the phase transition of the percolation in networks with q = 0, q = 0.68 and q = 1, respectively. In (b), we can observe two kinds of phase transitions, second-order phase transition (Low-High-A) and first-order phase transition (Low-High-B) in the percolation of ILH; these two kinds of phase transitions occur with different probabilities and the probability is demonstrated in (d). While the percolation always exhibits the second-order phase transition in the low-order network alone, the percolation phase transition of ILH becomes the first-order when q is large. (d) shows the probability n of observing the first-order phase transition under different link rewiring probability q in ILH.
Figure 4. Percolation of ILH in which the low-order network changes gradually from a BA network to an ER network by adjusting the link rewiring probability q. For comparison, the percolation on the low-order network alone is shown. (ac) show the phase transition of the percolation in networks with q = 0, q = 0.68 and q = 1, respectively. In (b), we can observe two kinds of phase transitions, second-order phase transition (Low-High-A) and first-order phase transition (Low-High-B) in the percolation of ILH; these two kinds of phase transitions occur with different probabilities and the probability is demonstrated in (d). While the percolation always exhibits the second-order phase transition in the low-order network alone, the percolation phase transition of ILH becomes the first-order when q is large. (d) shows the probability n of observing the first-order phase transition under different link rewiring probability q in ILH.
Entropy 25 00022 g004
Figure 5. Robustness of low-order networks and ILH under different average degrees, (ac) are the cases of BA, ER, and SW respectively, where R is the area under the curve when P and p change. As the average degree < k > increases, R increases, which means that the robustness of the network is enhanced. As these results show, the robustness of ILH is lower than that of low-order networks.
Figure 5. Robustness of low-order networks and ILH under different average degrees, (ac) are the cases of BA, ER, and SW respectively, where R is the area under the curve when P and p change. As the average degree < k > increases, R increases, which means that the robustness of the network is enhanced. As these results show, the robustness of ILH is lower than that of low-order networks.
Entropy 25 00022 g005
Figure 6. Effect of network size on network robustness, (ac) are low-order networks; obviously, when the average degree < k > of the network is the same, the network size N has little effect on the robustness of the network. (df) show the effect of network size on the robustness of ILH; results show that when the average degree < k > is the same, the larger the size N of the network is, and the lower the robustness of ILH is.
Figure 6. Effect of network size on network robustness, (ac) are low-order networks; obviously, when the average degree < k > of the network is the same, the network size N has little effect on the robustness of the network. (df) show the effect of network size on the robustness of ILH; results show that when the average degree < k > is the same, the larger the size N of the network is, and the lower the robustness of ILH is.
Entropy 25 00022 g006
Figure 7. Robustness of low-order networks and ILH on empirical networks. It can be observed from the results that the robustness of ILH is lower than that of low-order networks; this means that ILH are more vulnerable than low-order networks.
Figure 7. Robustness of low-order networks and ILH on empirical networks. It can be observed from the results that the robustness of ILH is lower than that of low-order networks; this means that ILH are more vulnerable than low-order networks.
Entropy 25 00022 g007
Table 1. Statistical properties of the empirical networks, where N is the number of nodes, M is the number of edges, < k > is the average degree of the network, < d > is the average shortest path of the network, C is the network clustering coefficient, and r is the degree assortativity.
Table 1. Statistical properties of the empirical networks, where N is the number of nodes, M is the number of edges, < k > is the average degree of the network, < d > is the average shortest path of the network, C is the network clustering coefficient, and r is the degree assortativity.
NetworksNM < k > < d > Cr
CELEGANS297234515.794.000.17−0.26
EMAIL90612,08526.682.680.340.08
POLBLOGS122419,02231.083.190.22−0.19
GD061538803210.445.210.22−0.12
UTM1700170019,80923.3011.250.410.33
MARAGAL196426,69227.183.230.10−0.14
ODLIS290018,24112.584.590.180.01
UTM3060306039,15125.5914.430.390.34
TRUST465840,13317.232.900.090.11
SPAM476737,37515.683.810.140.04
PAIRS501863,60825.354.260.13−0.02
PAGES705789,42925.344.250.210.07
CHESS730160,04616.454.290.100.39
CORA23,16691,5007.9013.330.150.02
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, C.; Lei, Y.; Shen, X.; Li, Q.; Yao, H.; Cheng, D.; Xie, Y.; Yu, W. Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks. Entropy 2023, 25, 22. https://doi.org/10.3390/e25010022

AMA Style

Zhang C, Lei Y, Shen X, Li Q, Yao H, Cheng D, Xie Y, Yu W. Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks. Entropy. 2023; 25(1):22. https://doi.org/10.3390/e25010022

Chicago/Turabian Style

Zhang, Chengjun, Yi Lei, Xinyu Shen, Qi Li, Hui Yao, Di Cheng, Yifan Xie, and Wenbin Yu. 2023. "Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks" Entropy 25, no. 1: 22. https://doi.org/10.3390/e25010022

APA Style

Zhang, C., Lei, Y., Shen, X., Li, Q., Yao, H., Cheng, D., Xie, Y., & Yu, W. (2023). Fragility Induced by Interdependency of Complex Networks and Their Higher-Order Networks. Entropy, 25(1), 22. https://doi.org/10.3390/e25010022

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop