Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Reliability Engineering and System Safety, 2021
It is well-known that real-world systems, modeled as complex networks, are mostly robust against random failures but susceptible to targeted attacks. In this study, we propose a novel perspective to solve the network dismantling problem. Instead of designing an effective attack from scratch, we show how knowledge extracted from random failures in the network leads to extremely effective attacks. This observed connection between random failures and targeted attacks is striking on its own. Experiments on a wide range of networks show the efficacy of our novel method for network dismantling, providing an excellent trade-off between attack quality and scalability. We believe that our contribution also stimulates research in related domains, including social network influence analysis, spreading dynamics in networks, and efficiency considerations.
Download here
Published in Soft Computing, 2021
Throughout the past decades, network dismantling gained an increasing interest by the research community, given tremendous importance of robust socio-technical systems. The problem of optimally dismantling a given network is provably NP-hard. Accordingly, existing studies on network dismantling resort to various heuristics, including the use of node centralities and finely tuned decycling and cutting techniques. However, it is known that these existing techniques largely lack the optimal baseline. Particularly, these techniques perform bad when compared to (expensive-to-compute) betweenness-based attacks. Therefore, there is a strong need for developing scalable, yet accurate attacking methods for being able to understand the robustness of large, real-world complex systems. In this study, we propose a novel network attack technique based on genetic algorithms. In order to develop a scalable framework, we first design an exact method for measuring the effectiveness of an attack, requiring O(E) time, where E is the number of edges in the network. Since this algorithm runs in linear time of the network size, it can scale up well for very large networks. Second, we develop and analyze a collection of genetic population constructors, which aim at providing a rich set of initial genetic material to the framework. Several genetic operators are proposed, which preferably select previously critical nodes to be attacked first. Finally, we evaluate our framework on a wide range of real-world networks. Results show that our novel technique significantly outperforms the state-of-the-art methods, providing an interesting sweet spot between attack quality and computational complexity. We believe that our work contributes toward the scalable robustness estimation of complex networks, and that the perspective of using non-deterministic methods will inspire future research in this domain.
Download here
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.