A loop enhancement strategy for network robustness

Many real systems are extremely vulnerable against attacks, since they are scale-free networks as commonly existing topological structure in them. Thus, in order to improve the robustness of connectivity, several edge rewiring methods have been so far proposed by enhancing degree–degree correlations. In fact, onion-like structures with positive degree–degree correlations are optimally robust against attacks. On the other hand, recent studies suggest that the robustness and loops are strongly related to each other. Therefore, we focus on enhancing loops as a new approach for improving the robustness. In this work, we propose edge rewiring methods and evaluate the effect on the robustness by applying to real networks. Our proposed methods are two types of rewirings in preserving degrees or not for investigating the effect of the degree modification on the robustness. Numerical results show that our proposed methods improve the robustness to the level as same or more than the state-of-the-art methods. Furthermore, our work shows that the following two points are more important for further improving the robustness. First, the robustness is strongly related to loops more than degree–degree correlations. Second, it significantly improves the robustness by reducing the gap between the maximum and minimum degrees.


Introduction
Improving robustness against malicious attacks has been one of the important issues in network science.Because many real networks are scale-free whose degree distributions follow power-law, and their connectivity is extremely vulnerable against removal of targeted nodes [1,2,3].This vulnerability causes the loss of essential functions as networks in many real systems, which operate on the assumption that all nodes are connected.
For example, the following infrastructures were damaged by disasters, and caused significant impacts on our society.A massive ice storm in Eastern Canada caused a long-term blackout in 1998 [4].It reveals the strong dependence on electric power.Also, a power outage in the USA and Canada continued for two days in 2003, and caused transportation and economic disruptions [5].In 2008, a power grid network in China broken down due to heavy snowfall [6].On the other type of disasters, the eruption of Icelandic volcano Eyjafjallajökull in 2010 affected European air traffic and stranded thousands of passengers [7].The earthquakes and tsunamis that struck Japan in 2011 caused a terrible loss of life and property further disrupting the global supply chain network [8].In 2012, Hurricane Sandy destroyed the large areas in New York and New Jersey [9].After that, the blackout in several months affected the transportation network, and caused multiple damages [10].Thus, these infrastructures directly connected to our life have potential risks, and it is necessary to design a new structure to mitigate the outage.
They are also seriously damaged by attacks with targeting a specific part.For example, the North American power network is robust against failures, but its function is greatly reduced for targeted attacks [11].Moreover, an assessment of the urban rail transport network indicates that the Shanghai Metro is vulnerable to degree-based attacks [12].In investigating the robustness of the global air transport network against intentional attacks, the weak points are discussed in a viewpoint from each airport's centrality [13].Furthermore, the robustness is analyzed against both failures and attacks of airline network routes in combining Low Cost Carriers (LCCs) and Full Service Carriers (FSCs) [14].It is concluded that route networks of LCC are more robust than ones of FSC.
Since many of the above infrastructures in daily life have vulnerability against attacks, several methods should be developed for improving the robustness of connectivity in network systems.We remark that such systems can be more robust by partial edge rewiring without adding new resources of edges [15].Thus, we aim to improve the robustness without adding any resources in assuming that the number of both nodes and edges is constant.Particularly, the edges in the airline network or the wireless communication network can be easily changed as rewiring.The rewiring with preserving degrees in the airport network or wireless communication is possible by changing the destination of the airport or the direction of the wireless beam.In contrast, it may be difficult to change the network structure when edges are spatially embedded, such as road networks, water supply networks, and power grid networks.However, even on such systems, it will be useful for maintaining network functions to make the robust structure by adding new resources or renovating and rebuilding.
Although we discuss the robustness of connectivity by attacks, we may consider other attacks.Some edge rewiring algorithms have also been proposed as adversarial attacks against link prediction [16] and community detection [17].While they aim to rewire the connections for privacy protections, we aim to enhance the tolerance of connectivity against node removals.
On the other hand, an onion-like structure with positive degree-degree correlations [18] is optimally robust against targeted attacks under a given degree distribution [15,19].The degree-degree correlations r is defined as the Pearson correlation coefficient for degrees at both ends of an edge [18].The onion-like structure is visualized by arranging similar degree nodes on a concentric circle in decreasing order of degrees from the core to the peripheral.Since similar degree nodes tend to be connected by the positive degree-degree correlations, they draw a circle.It can be generated by greedy rewiring to maximize a robustness index R hub , which accumulates the size of the largest connected component after attacks [15].The robustness index R hub is defined as R hub = 1 N 1 q=1/N S(q), where S(q) denotes the number of nodes included in the largest connected component after removing qN nodes, and q is the fraction of removal nodes by high degree adaptive attacks.However, there is no strict definition of an onion-like structure for the thresholds of R hub or r, since too high degree-degree correlations rather decrease the robustness [15,19,20].Thus, through numerical simulations, it is considered that the onion-like networks have R hub > 0.3 and r > 0.2 because not onion-like scale-free networks by Barabási-Albert model [1] have R hub < 0.23 and r ≈ 0 at the same size [21].The values of R hub and r for onion-like networks are also obtained by rewiring for enhancing degree-degree correlations [22].Note that the R hub represents the area under the curve S(q)/N versus q = 1 N , 2 N , ... N −1 N , 1, and can take different values for networks with the same critical point q c for whole fragmentation.In other words, the R hub takes a large value when S(q) decreases steeply at q c , whereas it takes a small value when S(q) decreases gently even at the same q c .Based on enhancing the degree-degree correlations, several rewiring methods have been proposed for improving the robustness [23,22].However, in recent years, an incrementally growing method is also proposed for constructing an onion-like network by enhancing loops (or cycles in graph theory) instead of the degree-degree correlations [24,21].It has been suggested that there is a strong relation between robustness and loop structure.
In this work, we propose new rewiring methods to enhance loops, and discuss the topological structures in improving the robustness for real data of the infrastructure networks.We emphasize the relation between robustness and loop rather than the conventional degree-degree correlations.

Methods
We explain our motivations for the rewiring strategy in enhancing loops.Several methods have been so far proposed for improving the robustness to be an onion-like structure by increasing the degree-degree correlations [23,22].However, a network with the extremely high degree-degree correlations is not the best [15,19,20].Therefore, for the improvement of robustness, there may exist other approaches instead of the degree-degree correlations.
We remark a strong relation of robustness and loops from some suggesting works [25,21].One of them is the equivalence of network dismantling and decycling problems [25].Here, network dismantling problem is finding a minimum set of nodes that removal makes the network broken into connected components at most a given size.Network decycling problem is finding a minimum set of nodes that removal makes the network without loops.The decycling set is named as Feedback Vertex Set (FVS) in computer science.The equivalence means that networks become a tree structure at the critical point before the whole fragmentation.Therefore, in order to avoid fragmentation, it is necessary not to be a tree as long as possible against node removals.On the other hand, the relation of the robustness and loops is also discussed in generating the onion-like structure with the optimal tolerance of connectivity against attacks.In the generation based on a pair of random and intermediation attachments, a new node links to a randomly selected node and the minimum degree node in distant neighbors through a few hops of intermediation from the randomly selected pair node [21].We intuitively understand that many loops with bypasses are formed by pairs of attachments as shown in Fig. 1.In fact, it is found that the robustness index R hub and the size of FVS have strong correlations in the networks.

A new node
Random attach.
Bypass in existing network.Focusing the above correlations, we propose a new edge rewiring strategy for enhancing loops in two types: Preserving and Non-Preserving with modification of the degree distribution.As similar to the conventional methods, in Preserving, the rewiring does not change each node's degree under the original degree distribution.However, in Non-Preserving, the rewiring changes degrees and the degree distribution in order to investigate the effect of changes in the degree distribution on robustness.

Spanning trees and the fundamental cycles
The fundamental system of cycles (loops) in a spanning tree is known in graph theory.A spanning tree is a subgraph that all nodes of the network are connected without loops.The chords are edges not belonging in the spanning tree.Each chord and a loop called a fundamental cycle are one-to-one correspondings [26].In other words, a spanning tree has M − N + 1 fundamental cycles as a linearly independent basis, where M and N denote the numbers of edges and nodes.Therefore, any loop is represented as a combination of the basis.It is expected that there are many loops independently on networks with a large number of spanning trees.Independently from the above our explanation, a rewiring method for increasing the number of spanning trees has been proposed by applying the perturbation theory of the Laplacian matrix [27].The authors consider a rewiring in Preserving by the addition and removal of edges based on the Kirchhoff's matrix-tree theorem [28].In contrast, we consider the edge rewiring strategy to enhance loops by increasing the size of Feedback Vertex Set instead of the number of spanning trees.

Feedback Vertex Set
Since the Feedback Vertex Set (FVS) is the minimum set of nodes whose removal makes the network acyclic, the remaining trees after removing the FVS are easily fragmented by further removal.The attack method to a node estimated in the FVS by Belief Propagation is proposed [29].Inversely, it is expected that increasing the size of FVS leads to improve the robustness of connectivity against node removal.
For increasing the size of FVS, we propose a new rewiring strategy by enhancing loops to improve the robustness.Since to find the FVS belongs to a class of NP-hard combinatorial optimization problems, the exact solution is intractable for a large network.Therefore, we apply an approximation algorithm of Belief Propagation (BP) in statistical physics [30].
The algorithm estimates the probability q 0 i belonging to FVS for node i.Here, q Ai i denotes the marginal probability for node i's root: A i = 0 (empty) or A i = i (the root is itself).When the node is empty, it is unnecessary as a root so that it is estimated as belonging to the FVS.Based on a cavity method [30,29], the explicit formulas are where ∂i denotes node i's set of neighbor nodes, x > 0 is a parameter of inverse temperature, and z i is normalization constant.The q 0 i→j and q i i→j are calculated from the following self-consistent BP equations, where ∂i\j denotes node i's set of neighbor nodes except node j, and z i→j is normalization constant.Equations ( 1)-( 5) are iterated from an initial set of random values in (0, 1) until given rounds in practically.In each round, a set {q 0 i |i = 1, ..., N } are updated in order of random permutation of the all N nodes.To obtain the FVS, we remove a node i with a higher q 0 i and recalculate a set {q 0 i } for all existing nodes until given rounds.The removed nodes are estimated as the FVS.We repeat them until the network without loops.A node i with a smaller q 0 i is less related to loops.In other words, a node i with a smaller q 0 i tends not to belong to FVS.Using this {q 0 i }, we consider the edge addition and deletion for increasing the size of FVS as follows.i and q 0 j and the edges between them are filled with red, while the nodes with smaller q 0 k and q 0 l and the edges between them are filled with blue.

BP Non-Preserving
The following rewiring without preserving degrees is called BP Non-Preserving.Here this rewiring modifies degrees under a constant number of nodes and edges.In BP Non-Preserving, to increase the size of FVS, we add an edge (k, l) between nodes with smaller q 0 k and q 0 l in the all unconnected nodes pairs.It is expected to increase the size of FVS by adding the edge, since these nodes tend not to belong to any loops, and their connection makes a new loop.To keep the number of edges, we remove an edge (i, j) between nodes with larger q 0 i and q 0 j in the all connected nodes pairs.Removing the edge (i, j) has little impact on the size of FVS, since the nodes i and j are on many loops because of large q 0 i and q 0 j as candidates of FVS.As shown in Fig. 2a, the following steps are repeated in BP Non-Preserving.Note that we may exchange steps 1 and 2 because they are independent processes.
Step 1. Add a non-existing edge (k, l) with the minimum q 0 k and q 0 l .
Step 2. Remove an edge (i, j) with the maximum q 0 i and q 0 j .

BP Preserving
The following rewiring with preserving degrees is called BP Preserving.As similar to [27], we apply the three steps:(i) add a non-existing edge (i, j), (ii) remove edges (i, k) and (j, l), and (iii) add a non-existing edge (k, l).We illustrate the steps before and after rewiring at the top and bottom in Fig. 2b, respectively.It consists of the additions of two edges (i, j) and (k, l), and the removal of two edges (i, k) and (j, l) in order to preserve degrees.
For increasing the size of FVS, it is effective to add two edges between nodes with smaller q 0 i .However, it can not apply to BP Preserving, since the removal for preserving degrees in the above step (ii) makes fragmentation.Nodes with smaller q 0 i tend to have smaller degrees and belong to a tree.In the worst-case, when we select nodes i and j with degree one or on a dangling tree, they are isolated by the removal.To avoid it, we select two unconnected nodes i and j with larger q 0 i and q 0 j in all nodes at first, since they tend to have large degrees and removing edges emanated from them is not likely to decrease the connectivity.Then, we select unconnected nodes k and l with smaller q 0 k and q 0 l in the neighbors of nodes i and j, respectively, in order to enhance loops by connecting them in the above step (iii).Since the nodes k and l are selected in the neighbors of nodes i or j, not in all nodes, they may be a little contained in loops, which is not the worst-case and prevents isolation.In this way, we first add an edge (i, j) between nodes i and j with larger q 0 i and q 0 j in avoiding fragmentation by rewiring as much as possible.These selections possibly increase the size of FVS, since the nodes k and l with smaller q 0 k and q 0 l are expected to be included in new loops.For the removal, we select edges (i, k) between nodes with larger q 0 i and smaller q 0 k , and (j, l) between nodes with larger q 0 j and smaller q 0 l .The removals have little impact on the size of FVS, since the edges linked to nodes with smaller q 0 k or q 0 l tend to belong to fewer loops.As shown in Fig. 2b, the following steps are repeated in BP Preserving.
Step 1.Let (i, j) be a non-existing edge with the maximum q 0 i and q 0 j in a network.
Step 2. Let k be a node with the minimum q 0 k in the neighbor of either node i.Let l be a node with the minimum q 0 l in the neighbor of node j but not the neighbor of node k.
Step 3. Add non-existing edges (i,j) and (k,l) and remove edges (i,k) and (j,l).

Results
In this section, we evaluate the effects of enhancing loops on the improvement of robustness in our proposed methods.Also, we discuss a relation between the robustness and the size of FVS.For comparison, Degree, WuHolme [22], and SP [27] are investigated.Degree is a modification of our rewiring strategy between nodes with smaller degrees instead of smaller q 0 i of BP.It has two types: Degree Preserving and Degree Non-Preserving, corresponding to BP Preserving and BP Non-Preserving.We consider WuHolme as a baseline in Preserving, because it is the best conventional method for improving the robustness by increasing the degree-degree correlations.SP is the previously mentioned method for increasing the number of spanning trees, and it also has two types: SP Preserving and SP Non-Preserving.We compare it as a different approach in order to enhance loops.We apply our proposed and conventional methods for several real networks including social, biological, and technological networks, for which similar results are obtained (See Additional File).As a typical result, Figure 3 shows the robustness index R hub , the approximate size of FVS, and the degree-degree correlations r versus the number of rewirings for a real network: an airline network named OpenFlights with N = 2905 nodes and M = 15, 645 edges [31].The robustness index R hub is the sum of the fraction of nodes in the largest connected component against high degree adaptive attacks with recalculation of degrees [15].The degree-degree correlations r is the Pearson correlation coefficient for degrees [18].In the following, |FVS| denotes the size of FVS by Belief Propagation [30], and #Rewire is the number of rewirings.Note that almost all edges are rewired at #Rewire = 7800, which is nearly half of M .First, we show the results for our proposed BP Preserving.At the left in Fig. 3c, BP Preserving (denoted by the green line) increases up to |FVS| = 698 from the original |FVS| = 528 before rewiring at #Rewire = 0.The rate of FVS rises from 18% to 24%.Since the baseline (denoted by the red dot line) is |FVS| = 646, BP Preserving increases |FVS| over the baseline.Furthermore, at the left in Fig. 3a, BP Preserving (denoted by the green line) improves R hub to almost the same as the baseline (denoted by the red dot line).The maximum R hub is 0.175 in BP Preserving (denoted by the green line) and 0.174 in the baseline (denoted by the red dot line) at the left in Fig. 3a.The maximum R hub in Degree Preserving (denoted by the violet line) is 0.136, which is smaller than that in BP Preserving (denoted by the green line).Therefore, BP Preserving increases |FVS| more than other methods of Degree and SP Preserving and improves R hub to almost the same level as the conventional best in Preserving.Enhancing the loop effectively improves the robustness.We find that the rewirings in Non-Preserving commonly make the network more homogeneous and reduce the fraction of the high degree nodes as follows.Figure 4a shows the initial degree distribution for OpenFlights and the modified degree distribution after rewired 7800 times by each method.The initial distribution has a long-tailed distribution characterized as a scale-free property, in which the minimum and maximum degrees are 1 and 242.After rewiring by the three methods, a gap between the minimum and maximum degree becomes smaller.In particular, SP Non-Preserving modifies to the very narrow gap with the minimum and maximum degree of 9 and 41 in which the 61% occupy the nodes with degree 10. Figure 4b shows that the maximum degree is lower than 100.The methods of Degree, BP, and SP Non-Preserving also decrease the gap between the minimum and maximum degrees.Thus, it is suggest that reducing the gap of degrees leads to improve both R hub and |FVS| significantly.The increases in R hub and |FVS| by BP Non-Preserving are partly due to changing the degree distributions as reducing large degree nodes.On the other hand, the increases in them by BP Preserving are only due to enhancing loops with preserving degrees.However, the values of R hub and |FVS| in BP Non-Preserving are larger than ones in BP Preserving.

Relation between the robustness and the size of FVS
In more detailed comparisons, we discuss a relation between R hub and |FVS| in Preserving and Non-Preserving.At the left in Figs.3ace for Preserving, we compare the ordering of BP, Degree, SP Preserving, and WuHolme by the maximum value of each index.It is BP > WuHolme > Degree > SP for R hub , BP > Degree > WuHolme > SP for |FVS|, and Degree > BP > WuHolme > SP for r.The order for R hub and |FVS| are almost the same, only the order of Degree and WuHolme are exchanged.As shown in Table 1, R hub and |FVS| have a very strong correlation coefficient of 0.970 in Preserving.On the other hand, the correlation coefficient between R hub and r is 0.762.It is lower than that of R hub and |FVS|.These values suggest that |FVS| is more strongly related to R hub than r.
The difference in the ordering is more remarkable in Non-Preserving.At the right in Figs.3bdf for Non-Preserving, in BP, Degree, SP Non-Preserving and WuHolme, it is Degree > BP > SP > WuHolme for both R hub and |FVS|, while Degree > BP > WuHolme > SP for r.Furthermore, as shown in Table 1, the correlation coefficient in Non-Preserving is 0.980 for R hub and |FVS|.It is slightly larger than that in Preserving.On the other hand, the correlation between R hub and r is 0.527, which is smaller than that in Preserving.From these results, the correlation between R hub and r in Non-Preserving becomes weaker than that in Preserving.Thus, |FVS| is more strongly related to R hub than r.

Strongly robust networks with negative degree-degree correlations
As known in the onion-like structure, it has been considered that networks with the moderate degree-degree correlations tend to be more robust [15,19].However, from the obtained results, we find that networks with the negative degreedegree correlations are possible to be highly robust.Figures 3bf show that SP Non-Preserving (denoted by the light blue line) decreases r, while increases R hub .SP Non-Preserving modifies it negatively up to -0.187, showing as the light blue line at the right in Fig. 3f.However, at the right in Fig. 3b, SP Non-Preserving increases R hub at the almost same level as both Degree and BP Non-Preserving.Note that both Degree and BP Non-Preserving make the degree-degree correlations positive over the baseline.These obtained results are commonly found for other networks (See Additional File).

Summary
This study proposes a strategy for enhancing loops in increasing the size of FVS to improve the robustness of connectivity.We consider two kinds of rewirings for enhancing loops as BP Preserving and BP Non-Preserving.The rewiring in Preserving does not change each node's degree, while the rewiring in Non-Preserving changes the degree.We obtain similar results in applying our proposed and conventional rewirings to several real networks (See the Additional Files).
From the results, BP Preserving increases the size of FVS effectively.It also improves the robustness index to the level as the same or more than the conventional best.Thus, enhancing loops is a useful strategy for improving robustness.On the other hand, BP Non-Preserving increases the robustness index and the size of FVS much more than the conventional best in Preserving.Moreover, the other rewirings in Non-Preserving also increase them as the same, and commonly reduce the gap of maximum and minimum degrees.Therefore, it is suggested that reducing the difference in degrees strongly affects increasing the robustness index and the size of FVS.Note that the results in BP Non-Preserving are partly due to changing the degree distributions, while ones in BP Preserving are only due to enhancing loops.
In addition, we discuss the relation between the robustness and the size of FVS.The size of FVS is more strongly related to the robustness than the degree-degree correlations in both Preserving and Non-Preserving.We also find that existing of strongly robust networks with the negative degree-degree correlations is possible.Therefore, we suggest that enhancing loops is more essential for improvements of robustness than the degree-degree correlations.Power Grid

Figure 1 :
Figure 1: Illustration of pairs of intermediation attachments.Black bold and blue dashed lines denote added edges and existing paths in the network.Orange line denote paths of intermediations from randomly selected nodes.

Figure 2 :
Figure 2: Illustration of our proposed methods.(a) BP Non-Preserving, (b) BP Preserving.The nodes with larger q 0

Figure 3 :
Figure 3: The robustness index, the approximate size of FVS, and the degree-degree correlations vs. the number of rewiring.(Left: a, c, e) Rewirings in Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Preserving, respectively.The red dot line indicates a baseline of the conventional best.(Right: b, d, f) Rewirings in Non-Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Non-Preserving, respectively.
Next, we show the results in BP Non-Preserving.At the right in Fig. 3d, BP Non-Preserving (denoted by the green line) increases to the maximum |FVS| = 1549, which is 53% of nodes are included in FVS.It is about twice larger than |FVS| = 698 for the baseline (denoted by the red dot line) at the right in Fig. 3d.In addition, other rewirings in Non-Preserving also increase |FVS| at the same level as BP Non-Preserving.The maximum |FVS| is 1566 in Degree Non-Preserving (denoted by the violet line) and 1527 in SP Non-Preserving (denoted by the light blue line) at the right in Fig. 3d.At the right in Fig. 3b, BP Non-Preserving (denoted by the green line) increases to the maximum R hub = 0.404.It is also about twice larger than R hub = 0.174 for the baseline (denoted by the red dot line).As similar to the result for |FVS|, other methods also increase R hub to almost the same level as BP Non-Preserving.The maximum R hub is 0.405 in Degree Non-Preserving (denoted by the violet line) and 0.392 in SP Non-Preserving (denoted by the light blue line) at the right in Fig. 3b.Therefore, in comparison with the baseline, BP Non-Preserving is more effective for improving both R hub and |FVS|.Moreover, from the difference between the results in Non-Preserving and Preserving, it suggests that modification of the degree distribution significantly affects both R hub and |FVS|.

Figure 4 :
Figure 4: Change of the degree distributions by the rewirings in Non-Preserving.(a) Degree distributions in original and after rewiring networks, (b) Maximum and minimum degrees vs. the number of rewiring in Degree, BP, and SP Non-Preserving for OpenFlights.The above three lines show the maximum degrees.The below three lines show the minimum degrees.Violet, green, and light blue denote Degree, BP, and SP Non-Preserving.Orange denotes the original degree distribution.

Figure S1 :
Figure S1: AirTraffic [6].Comparison of the robustness index R hub , the size approximate of FVS, and the degree-degree correlation coefficient r vs. the number of rewiring.(Left: a, c, e) Rewirings in Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Preserving, respectively.The red dot line indicates a baseline of the conventional best.(Right: b, d, f) Rewirings in Non-Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Non-Preserving, respectively.

Figure S2 :
Figure S2: AirTraffic [6].(a) Degree distributions in original and after rewiring networks, (b) Maximum and minimum degrees vs. the number of rewiring in Degree, BP, and SP Non-Preserving.The above three lines show the maximum degrees.The below three lines show the minimum degrees.Violet, green, and light blue denote Degree, BP, SP Non-Preserving.Orange denotes the original degree distribution.

Figure
Figure S3: E-mail [7].Comparison of the robustness index R hub , the size approximate of FVS, and the degree-degree correlation coefficient r vs. the number of rewiring.(Left: a, c, e) Rewirings in Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Preserving, respectively.The red dot line indicates a baseline of the conventional best.(Right: b, d, f) Rewirings in Non-Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Non-Preserving, respectively.

Figure
Figure S4: E-mail [7].(a) Degree distributions in original and after rewiring networks, (b) Maximum and minimum degrees vs. the number of rewiring in Degree, BP, and SP Non-Preserving.The above three lines show the maximum degrees.The below three lines show the minimum degrees.Violet, green, and light blue denote Degree, BP, SP Non-Preserving.Orange denotes the original degree distribution.

Figure S5 :
Figure S5: Power Grid [8].Comparison of the robustness index R hub , the size approximate of FVS, and the degree-degree correlation coefficient r vs. the number of rewiring.(Left: a, c, e) Rewirings in Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Preserving, respectively.The red dot line indicates a baseline of the conventional best.(Right: b, d, f) Rewirings in Non-Preserving.Violet, green, and light blue solid lines denote the result by Degree, BP, and SP Non-Preserving, respectively.

Figure S6 :
Figure S6: Power Grid [8].(a) Degree distributions in original and after rewiring networks, (b) Maximum and minimum degrees vs. the number of rewiring in Degree, BP, and SP Non-Preserving.The above three lines show the maximum degrees.The below three lines show the minimum degrees.Violet, green, and light blue denote Degree, BP, SP Non-Preserving.Orange denotes the original degree distribution.

Table 1 :
The correlation coefficient between R hub and r, and R hub and |FVS| after rewiring.