Research Article

Underestimated Cost of Targeted Attacks on Complex Networks

Table 3

The improvement of the DCFE of each algorithm, comparing with the baseline, that is, site percolation method. The best performing algorithm in each column is emphasized in bold.

Improvement HDHDAEGPCIMin-SumCoreHDBPDBetwBridgHPI-Ncut

PB−32%−44%−35%3%−3%−14%−28%−13%6%−43%56%
PH−30%−8%−11%−19%−10%−8%−17%−5%15%−10%64%
PG18%30%21%29%41%65%31%70%61%−13%96%
AS−7%−2%−7%−4%00−2%1%7%−9%66%
ER−25%9%−8%17%27%55%−8%59%36%10%95%
−10%−13%−14%−8%−5%−3%−7%−2%−9%−12%45%
27%43%44%15%47%50%44%53%23%13%77%
SBM20%13%22%18%28%41%23%44%28%−6%84%

Average−5%3%2%6%16%23%5%26%21%−9%73%