A Computationally Efficient Evolutionary Algorithm for Multiobjective Network Robustness Optimization

The robustness of complex networks is of great significance. Great achievements have been made in robustness optimization based on single measures, however, such networks may still be vulnerable to multiple attack scenarios. Therefore, recently, multiobjective robustness optimization of networks has received increasing attention. Nevertheless, several challenges remain to be addressed, including the different computational complexities in evaluating the objectives, insufficient diversity in the obtained networks, and high computational costs of the search process. In this article, we address the aforementioned challenges by developing a computationally efficient multiobjective optimization algorithm. Based on the unique features of complex networks, a new parallel fitness evaluation method guided by a network property parameter is designed and embedded in a reference vector-guided multiobjective evolutionary algorithm. In addition, a surrogate ensemble with heterogeneous inputs is constructed based on graph embedding information to efficiently estimate multiple robustness of networks. The proposed algorithm is validated on synthetic and real-world network data and our results show that the designed algorithm outperforms the state-of-the-art method with a marked improvement on the computational efficiency. Compared with other single-objective optimization methods, the proposed algorithm demonstrates a considerable exploitation ability.

[1]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[2]  J. Liu,et al.  Robustness of single and interdependent scale-free interaction networks with various parameters , 2016 .

[3]  R. L. Hardy Multiquadric equations of topography and other irregular surfaces , 1971 .

[4]  Wei Pei,et al.  An efficient method of robustness analysis for power grid under cascading failure , 2014 .

[5]  Qingfu Zhang,et al.  MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition , 2007, IEEE Transactions on Evolutionary Computation.

[6]  Jing Liu,et al.  Finding Influential Nodes in Multiplex Networks Using a Memetic Algorithm , 2019, IEEE Transactions on Cybernetics.

[7]  D. Shepard A two-dimensional interpolation function for irregularly-spaced data , 1968, ACM National Conference.

[8]  Jian Pei,et al.  Community Preserving Network Embedding , 2017, AAAI.

[9]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[10]  Jianchao Zeng,et al.  Surrogate-Assisted Cooperative Swarm Optimization of High-Dimensional Expensive Problems , 2017, IEEE Transactions on Evolutionary Computation.

[11]  M E J Newman Assortative mixing in networks. , 2002, Physical review letters.

[12]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[13]  Yew-Soon Ong,et al.  A study on polynomial regression and Gaussian process global surrogate model in hierarchical surrogate-assisted evolutionary algorithm , 2005, 2005 IEEE Congress on Evolutionary Computation.

[14]  Bernhard Sendhoff,et al.  A Reference Vector Guided Evolutionary Algorithm for Many-Objective Optimization , 2016, IEEE Transactions on Evolutionary Computation.

[15]  Jing Liu,et al.  Constructing Robust Community Structure Against Edge-Based Attacks , 2019, IEEE Systems Journal.

[16]  Damien R. Farine,et al.  Measuring the robustness of network community structure using assortativity , 2016, Animal Behaviour.

[17]  Joshua D. Knowles,et al.  Multiobjective Optimization: When Objectives Exhibit Non-Uniform Latencies , 2015 .

[18]  Lin Gao,et al.  Maintain the structural controllability under malicious attacks on directed networks , 2013 .

[19]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[20]  Petros Koumoutsakos,et al.  Accelerating evolutionary algorithms with Gaussian process fitness function models , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[21]  Jing Liu,et al.  A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks , 2014 .

[22]  Vesa Ojalehto,et al.  Surrogate-assisted evolutionary biobjective optimization for objectives with non-uniform latencies , 2018, GECCO.

[23]  Xianglong Tang,et al.  Mitigate Cascading Failures on Networks using a Memetic Algorithm , 2016, Scientific Reports.

[24]  Jing Liu,et al.  A Multi-Objective Evolutionary Algorithm for Promoting the Emergence of Cooperation and Controllable Robustness on Directed Networks , 2018, IEEE Transactions on Network Science and Engineering.

[25]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[26]  M. Perc Evolution of cooperation on scale-free networks subject to error and attack , 2009, 0902.4661.

[27]  Wenwu Zhu,et al.  Structural Deep Network Embedding , 2016, KDD.

[28]  Terrence J. Sejnowski,et al.  The “independent components” of natural scenes are edge filters , 1997, Vision Research.

[29]  Yaochu Jin,et al.  Surrogate-assisted evolutionary computation: Recent advances and future challenges , 2011, Swarm Evol. Comput..

[30]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[31]  Handing Wang,et al.  Data-Driven Surrogate-Assisted Multiobjective Evolutionary Optimization of a Trauma System , 2016, IEEE Transactions on Evolutionary Computation.

[32]  Kaisa Miettinen,et al.  A Surrogate-Assisted Reference Vector Guided Evolutionary Algorithm for Computationally Expensive Many-Objective Optimization , 2018, IEEE Transactions on Evolutionary Computation.

[33]  Jing Liu,et al.  A comparative study of network robustness measures , 2017, Frontiers of Computer Science.

[34]  Jing Liu,et al.  A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks , 2017, IEEE Transactions on Cybernetics.

[35]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[36]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[37]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[38]  Jun Wu,et al.  Enhancing structural robustness of scale-free networks by information disturbance , 2017, Scientific Reports.

[39]  Jing Liu,et al.  Designing comprehensively robust networks against intentional attacks and cascading failures , 2019, Inf. Sci..

[40]  Dulcy M. Abraham,et al.  Minimizing the Consequences of Intentional Attack on Water Infrastructure , 2006, Comput. Aided Civ. Infrastructure Eng..

[41]  John Doherty,et al.  Committee-Based Active Learning for Surrogate-Assisted Particle Swarm Optimization of Expensive Problems , 2017, IEEE Transactions on Cybernetics.

[42]  Tianyou Chai,et al.  Heterogeneous Ensemble-Based Infill Criterion for Evolutionary Multiobjective Optimization of Expensive Problems , 2019, IEEE Transactions on Cybernetics.

[43]  Jure Leskovec,et al.  node2vec: Scalable Feature Learning for Networks , 2016, KDD.

[44]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[45]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[46]  Shuai Wang,et al.  Constructing Robust Cooperative Networks using a Multi-Objective Evolutionary Algorithm , 2017, Scientific Reports.

[47]  Jing Liu,et al.  Surrogate-Assisted Robust Optimization of Large-Scale Networks Based on Graph Embedding , 2020, IEEE Transactions on Evolutionary Computation.