Skip to main content
Log in

Heuristic Search with Cut Point Based Strategy for Critical Node Problem

  • Regular Paper
  • Theory and Algorithms
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The critical node problem (CNP) aims to deal with critical node identification in a graph, which has extensive applications in many fields. Solving CNP is a challenging task due to its computational complexity, and it attracts much attention from both academia and industry. In this paper, we propose a population-based heuristic search algorithm called CPHS (Cut Point Based Heuristic Search) to solve CNP, which integrates two main ideas. The first one is a cut point based greedy strategy in the local search, and the second one involves the functions used to update the solution pool of the algorithm. Besides, a mutation strategy is applied to solutions with probability based on the overall average similarity to maintain the diversity of the solution pool. Experiments are performed on a synthetic benchmark, a real-world benchmark, and a large-scale network benchmark to evaluate our algorithm. Compared with state-of-the-art algorithms, our algorithm has better performance in terms of both solution quality and run time on all the three benchmarks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Shen Y, Nguyen N P, Xuan Y, Thai M T. On the discovery of critical links and nodes for assessing network vulnerability. IEEE/ACM Trans. Networking, 2013, 21(3): 963–973. DOI: https://doi.org/10.1109/TNET.2012.2215882.

    Article  MATH  Google Scholar 

  2. Boginski V, Commander C W. Identifying critical nodes in protein-protein interaction networks. In Clustering Challenges in Biological Networks, Butenko S, Chaovalitwongse W A, Pardalos P M (eds.), World Scientific, 2009, pp.153–167. DOI: https://doi.org/10.1142/9789812771667_0007.

    Chapter  MATH  Google Scholar 

  3. Tomaino V, Arulselvan A, Veltri P, Pardalos P M. Studying connectivity properties in human protein–protein interaction network in cancer pathway. In Data Mining for Biomarker Discovery, Pardalos P M, Xanthopoulos P, Zervakis M (eds.), Springer-Verlag, 2012, pp.187–197. DOI: https://doi.org/10.1007/978-1-4614-2107-8_10.

    Chapter  MATH  Google Scholar 

  4. Nguyen D T, Shen Y, Thai M T. Detecting critical nodes in interdependent power networks for vulnerability assessment. IEEE Trans. Smart Grid, 2013, 4(1): 151–159. DOI: https://doi.org/10.1109/TSG.2012.2229398.

    Article  MATH  Google Scholar 

  5. Aspnes J, Chang K, Yampolskiy A. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Journal of Computer and System Sciences, 2006, 72(6): 1077–1093. DOI: https://doi.org/10.1016/j.jcss.2006.02.003.

    Article  MathSciNet  MATH  Google Scholar 

  6. Kempe D, Kleinberg J, Tardos É. Maximizing the spread of influence through a social network. In Proc. the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug. 2003, pp.137–146. DOI: https://doi.org/10.1145/956750.956769.

    MATH  Google Scholar 

  7. Borgatti S P. Identifying sets of key players in a social network. Computational & Mathematical Organization Theory, 2006, 12: 21–34. DOI: https://doi.org/10.1007/s10588-006-7084-x.

    Article  MATH  Google Scholar 

  8. Arulselvan A, Commander C W, Elefteriadou L, Pardalos P M. Detecting critical nodes in sparse graphs. Computers & Operations Research, 2009, 36(7): 2193–2200. DOI: https://doi.org/10.1016/j.cor.2008.08.016.

    Article  MathSciNet  MATH  Google Scholar 

  9. Shen S, Smith J C. Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks, 2012, 60(2): 103–119. DOI: https://doi.org/10.1002/net.20464.

    Article  MathSciNet  MATH  Google Scholar 

  10. Lalou M, Tahraoui M A, Kheddouci H. The critical node detection problem in networks: A survey. Computer Science Review, 2018, 28: 92–117. DOI: https://doi.org/10.1016/j.cosrev.2018.02.002.

    Article  MathSciNet  MATH  Google Scholar 

  11. Di Summa M, Grosso A, Locatelli M. Branch and cut algorithms for detecting critical nodes in undirected graphs. Computational Optimization and Applications, 2012, 53(3): 649–680. DOI: https://doi.org/10.1007/s10589-012-9458-y.

    Article  MathSciNet  MATH  Google Scholar 

  12. Pavlikov K. Improved formulations for minimum connectivity network interdiction problems. Computers & Operations Research, 2018, 97: 48–57. DOI: https://doi.org/10.1016/j.cor.2018.04.012.

    Article  MathSciNet  MATH  Google Scholar 

  13. Dinh T N, Thai M T. Precise structural vulnerability assessment via mathematical programming. In Proc. the 2011 Military Communications Conference, Nov. 2011, pp.1351–1356. DOI: https://doi.org/10.1109/MILCOM.2011.6127492.

    MATH  Google Scholar 

  14. Walteros J L, Veremyev A, Pardalos P M, Pasiliao E L. Detecting critical node structures on graphs: A mathematical programming approach. Networks, 2019, 73(1): 48–88. DOI: https://doi.org/10.1002/net.21834.

    Article  MathSciNet  MATH  Google Scholar 

  15. Aringhieri R, Grosso A, Hosteins P, Scatamacchia R. VNS solutions for the critical node problem. Electronic Notes in Discrete Mathematics, 2015, 47: 37–44. DOI: https://doi.org/10.1016/j.endm.2014.11.006.

    Article  MathSciNet  MATH  Google Scholar 

  16. Ventresca M, Aleman D. A derandomized approximation algorithm for the critical node detection problem. Computers & Operations Research, 2014, 43: 261–270. DOI: https://doi.org/10.1016/j.cor.2013.09.012.

    Article  MathSciNet  MATH  Google Scholar 

  17. Ventresca M. Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Computers & Operations Research, 2012, 39(11): 2763–2775. DOI: https://doi.org/10.1016/j.cor.2012.02.008.

    Article  MathSciNet  MATH  Google Scholar 

  18. Ventresca M, Aleman D. A fast greedy algorithm for the critical node detection problem. In Proc. the 8th International Conference on Combinatorial Optimization and Applications, Dec. 2014, pp.603–612. DOI: https://doi.org/10.1007/978-3-319-12691-3_45.

    Chapter  MATH  Google Scholar 

  19. Aringhieri R, Grosso A, Hosteins P, Scatamacchia R. Local search metaheuristics for the critical node problem. Networks, 2016, 67(3): 209–221. DOI: https://doi.org/10.1002/net.21671.

    Article  MATH  Google Scholar 

  20. Pullan W. Heuristic identification of critical nodes in sparse real-world graphs. Journal of Heuristics, 2015, 21(5): 577–598. DOI: https://doi.org/10.1007/s10732-015-9290-5.

    Article  MATH  Google Scholar 

  21. Zhou Y, Hao J K, Glover F. Memetic search for identifying critical nodes in sparse graphs. IEEE Trans. Cybernetics, 2019, 49(10): 3699–3712. DOI: https://doi.org/10.1109/TCYB.2018.2848116.

    Article  MATH  Google Scholar 

  22. Addis B, Aringhieri R, Grosso A, Hosteins P. Hybrid constructive heuristics for the critical node problem. Annals of Operations Research, 2016, 238(1/2): 637–649. DOI: https://doi.org/10.1007/s10479-016-2110-y.

    Article  MathSciNet  MATH  Google Scholar 

  23. Aringhieri R, Grosso A, Hosteins P, Scatamacchia R. A general evolutionary framework for different classes of critical node problems. Engineering Applications of Artificial Intelligence, 2016, 55: 128–145. DOI: https://doi.org/10.1016/j.engappai.2016.06.010.

    Article  MATH  Google Scholar 

  24. Zhou Y, Hao J K, Fu Z H, Wang Z, Lai X. Variable population memetic search: A case study on the critical node problem. IEEE Trans. Evolutionary Computation, 2021, 25(1): 187–200. DOI: https://doi.org/10.1109/TEVC.2020.3011959.

    Article  MATH  Google Scholar 

  25. Zhou Y, Hao J K. A fast heuristic algorithm for the critical node problem. In Proc. the Genetic and Evolutionary Computation Conference Companion, Jul. 2017, pp.121–122. DOI: https://doi.org/10.1145/3067695.3075993.

    Chapter  MATH  Google Scholar 

  26. Tarjan R. Depth-first search and linear graph algorithms. SIAM Journal on Computing, 1972, 1(2): 146–160. DOI: https://doi.org/10.1137/0201010.

    Article  MathSciNet  MATH  Google Scholar 

  27. Lü Z, Hao J K. A memetic algorithm for graph coloring. European Journal of Operational Research, 2010, 203(1): 241–250. DOI: https://doi.org/10.1016/j.ejor.2009.07.016.

    Article  MathSciNet  MATH  Google Scholar 

  28. Rossi R A, Ahmed N K. The network data repository with interactive graph analytics and visualization. In Proc. the 29th AAAI Conference on Artificial Intelligence, Jan. 2015, pp.4292–4293. DOI: https://doi.org/10.1609/aaai.v29i1.9277.

    MATH  Google Scholar 

  29. Rossi R A, Gleich D F, Gebremedhin A H, Patwary M M A. Fast maximum clique algorithms for large graphs. In Proc. the 23rd Int. Conf. World Wide Web, Apr. 2014, pp.365–366. DOI: https://doi.org/10.1145/2567948.2577283.

    MATH  Google Scholar 

  30. Lin J, Cai S, Luo C, Su K. A reduction based method for coloring very large graphs. In Proc. the 26th International Joint Conference on Artificial Intelligence, Aug. 2017, pp.517–523. DOI: https://doi.org/10.24963/ijcai.2017/73.

    MATH  Google Scholar 

  31. Cai S, Hou W, Wang Y, Luo C, Lin Q. Two-goal local search and inference rules for minimum dominating set. In Proc. the 29th International Joint Conference on Artificial Intelligence, Jul. 2020, pp.1467–1473. DOI: https://doi.org/10.24963/ijcai.2020/204.

    MATH  Google Scholar 

  32. Conover W J. Practical Nonparametric Statistics (3rd edition). John Wiley & Sons, 1999.

    MATH  Google Scholar 

  33. Luo C, Zhao Q, Cai S, Zhang H, Hu C. SamplingCA: Effective and efficient sampling-based pairwise testing for highly configurable software systems. In Proc. the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Nov. 2022, pp.1185–1197. DOI: https://doi.org/10.1145/3540250.3549155.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shao-Wei Cai  (蔡少伟).

Ethics declarations

Conflict of Interest The authors declare that they have no conflict of interest.

Additional information

This work was supported by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant Nos. XDA0320000 and XDA0320300, and the National Natural Science Foundation of China under Grant No. 61972063.

Zhi-Han Chen received his B.S. degree in computer science and technology from Peking University, Beijing, in 2020. He is currently pursuing his Ph.D. degree with the School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing. His current research interests include constraint solving and electronic design automation.

Shao-Wei Cai received his Ph.D. degree in computer science from Peking University, Beijing, in 2012. He is currently a professor in Institute of Software, Chinese Academy of Sciences, Beijing. He has developed efficient SAT/SMT/MaxSAT solvers, which have received many awards in SAT/SMT/MaxSAT competitions (or evaluations). He has won the best paper award of SAT 2021 conference. His current research interests include constraint solving and electronic design automation.

Jian Gao received his Ph.D. degree in computer application technology from Dalian Maritime University, Dalian. He is currently a professor of computer science in Northeast Normal University, Changchun. His research interests include automated reasoning, constraint programming and heuristics.

Shi-Ke Ge received his B.E. degree in computer science and technology from Shenyang University of Technology, Shenyang, in 2021. He is currently a master degree candidate in computer science and technology from Dalian University of Technology, Dalian. His research interest includes constraint solving.

Chan-Juan Liu received her Ph.D. degree in computer software and theory from Peking University, Beijing, in 2016. She is currently an associate professor with School of Computer Science and Technology, Dalian University of Technology, Dalian. Her current research interests include game theory and multi-agent decision making.

Jin-Kun Lin received his Ph.D. degree in computer science and theory from Peking University, Beijing, in 2018. He is currently the chief technology officer with SeedMath Technology Limited, Beijing. His current research interests include software testing and heuristic search.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, ZH., Cai, SW., Gao, J. et al. Heuristic Search with Cut Point Based Strategy for Critical Node Problem. J. Comput. Sci. Technol. 39, 1328–1340 (2024). https://doi.org/10.1007/s11390-024-2850-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-024-2850-0

Keywords