Robust Controllability Network Method on Temporal Network Using Temporal Link Prediction and Network Embedding
Abstract
Controllability in temporal networks is considered one of the most important challenges in this type of network. Network controllability methods try to fully control the network with the minimum number of control nodes. This type of network is always exposed to internal and external attacks and failures. Therefore, controllability processes need recovery mechanisms to be resistant to various types of failures. The high volume of temporal networks causes the recovery controllability processes to be disrupted. In the paper, a novel method of recovery controllability in temporal networks is proposed to improving controllability network robustness. To restore controllability of the network, the RCTE framework is proposed, in which a temporal network is converted into snapshots at discrete times and then its dimensions are reduced by using network embedding. Finally, using link prediction based on local and global similarity, links that are subject to failure are identified. The effectiveness of the proposed method against various network attacks has been evaluated and compared with other conventional methods. The results show that the RCTE framework performed better than other conventional methods. Also, the proposed method has more controllability and tolerance against malicious attacks compared to other recovery methods.
1. Introduction
Temporal networks, also known as dynamic or time-varying networks, are a type of network in which the connections (edges) between nodes change over time [1]. Unlike static networks, which remain unchanged once established, temporal networks reflect the evolving nature of interactions and relationships in real-world systems [2]. This dynamism is crucial for understanding and modeling complex systems such as social networks, communication networks, transportation systems, and biological processes. In temporal networks, the edges have a temporal component, indicating when interactions occur [3]. This added dimension allows for a more granular analysis of the patterns and processes that govern the behavior of the network. Temporal networks provide a powerful framework for understanding and predicting the behavior of complex systems over time, making them a crucial area of study in the ever-evolving landscape of network science [4]. For example, in a social network, temporal data can reveal not just who interacts with whom, but also when and how frequently these interactions occur, providing deeper insights into social dynamics and influence patterns [5]. The study of temporal networks involves developing and applying various mathematical and computational techniques to capture and analyze the time-dependent aspects of these networks. Key challenges include handling the increased complexity due to the temporal dimension, efficiently storing and processing temporal data, and developing models that can accurately reflect the underlying dynamics. Research in temporal networks is interdisciplinary, drawing from fields such as physics, computer science, sociology, and biology [6]. This cross-disciplinary approach is essential for addressing the diverse range of applications and phenomena that temporal networks can represent, from the spread of diseases through populations to the propagation of information in online social media [7].
The controllability of temporal networks is a fundamental aspect of modern network science, addressing the ability to steer a dynamic system from an initial state to a desired state within a finite time through appropriate external inputs [8]. Unlike static networks, where controllability is assessed based on fixed topological structures, temporal networks introduce an additional layer of complexity due to the time-varying nature of connections between nodes. These dynamic interactions are ubiquitous in real-world systems, such as social networks, transportation systems, and biological networks, where the timing and order of interactions play a critical role in system behavior [9]. Understanding controllability in such contexts requires not only analyzing the network’s structural properties but also accounting for the temporal sequencing of edges, which can significantly influence the system’s control pathways and energy requirements [10]. A key challenge in studying the controllability of temporal networks lies in reconciling traditional control theory with the time-dependent nature of network links [11]. Classical controllability frameworks, such as those based on Kalman’s rank condition or structural controllability, must be adapted to accommodate the evolving topology of temporal networks [12]. For instance, the time-varying adjacency matrix necessitates a dynamic approach to identify control nodes and determine the minimum number of external signals needed to achieve full control. Moreover, the temporal dimension introduces phenomena such as time-respecting paths and causal dependencies, which can either enhance or hinder controllability depending on the network’s evolution. Recent research has explored metrics like temporal controllability Gramians and reachability algorithms to quantify how control energy and node importance vary over time, providing deeper insights into the interplay between structure and dynamics in control processes. The practical implications of temporal network controllability are vast, spanning fields such as epidemic containment, robotic swarm coordination, and power grid stability. e.g., in disease spread models, understanding how to control a temporal contact network can inform optimal vaccination strategies by targeting nodes that are most influential at specific times. Similarly, in multi-agent systems, ensuring controllability over time-varying communication links is essential for achieving coordinated movements or task allocations. Despite significant progress, open questions remain, such as how stochastic or bursty temporal patterns affect controllability, or how to design robust control strategies for networks with incomplete temporal data. Addressing these challenges will not only advance theoretical network science but also enhance our ability to manage and optimize complex, real-world dynamic systems. Examples of the application of controllability in real-world networks include: Epidemiology: By identifying critical individuals and optimal times for interventions, such as vaccinations or quarantines, public health officials can better control the spread of infectious diseases [12]. Traffic Management: Controlling key intersections and timings can optimize traffic flow, reduce congestion, and improve overall transportation efficiency [13]. Social Influence: Strategic timing in disseminating information through influential individuals can maximize the impact of public awareness campaigns or marketing efforts [14]. Biological Systems: Controlling gene regulatory networks at specific times can lead to desired biological outcomes, aiding in disease treatment and research [15].
Let G = (V, E, T) be a temporal network, where:
V = {v1, v2, …, vN} is a finite set of nodes.
E = {e1, e2, …, eM}⊆V × V × T is a set of temporal edges.
is the time domain, which can be continuous (e.g., ) or discrete (e.g., ).
Temporal networks are a powerful framework for modeling dynamic systems where interactions between entities evolve over time. Unlike static networks, which represent relationships as fixed and unchanging, temporal networks capture the time-varying nature of connections, making them essential for studying real-world phenomena such as social interactions, transportation systems, and biological processes. One common approach to analyzing temporal networks is to discretize time into intervals, extracting a sequence of static graphs known as snapshot graphs. Each snapshot represents the state of the network during a specific time window, allowing researchers to apply traditional graph-theoretic methods while preserving temporal dynamics. The extraction of snapshot graphs from a temporal network involves partitioning the timeline into discrete segments, where edges are aggregated based on their occurrence within each interval. This discretization simplifies analysis by converting continuous temporal data into a series of manageable static graphs. The choice of time window size is crucial—too short, and the snapshots may miss meaningful patterns; too long, and they may obscure important temporal variations. By examining these snapshots, researchers can track changes in network topology, identify recurring structures, and study how properties like connectivity or centrality evolve over time. While snapshot graphs provide a simplified representation, they retain valuable insights into the temporal behavior of the network. For instance, analyzing the sequence of snapshots can reveal bursty activity patterns, periodic behaviors, or the emergence and dissolution of communities. However, this approach also has limitations, as it may overlook fine-grained temporal correlations or inter-snapshot dependencies. Despite these challenges, the snapshot-based method remains a widely used technique due to its compatibility with existing graph algorithms and its intuitive interpretation. By leveraging snapshot graphs, researchers can bridge the gap between static and temporal network analysis, uncovering dynamic processes that would otherwise remain hidden in a purely static framework.
Each temporal edge e ∈ E represents a quadruple tuple e = {vi, vj, aij, t}, where vi is the start node, vj is the end node, and aij is the weight of edge e at time t [16]. If , then the temporal network can be shown in a discrete form of times [17]. At any given time t ∈ T, a temporal network can be extracted as a discrete snapshot graph Gt = (V, Et), where Et(u, v, t) ∈ E represents the set of edges active at time t. The sequence of these snapshot graphs captures the temporal evolution of the network [18]. The dynamics of a temporal network from a start time (ts) to a desired time (td) can be displayed using graph snapshots. e.g., in Figure 1, a temporal network is shown from the ts = 1 to td = 3.

The dynamics of temporal networks, where connections between nodes evolve over time, can be effectively modeled using time-dependent linear discrete systems. These systems provide a mathematical framework to capture the time-varying nature of interactions, allowing for the analysis of how network structure influences dynamic processes such as information diffusion, synchronization, and epidemic spreading [19]. By representing the network’s adjacency matrix as a time-varying function, the model accounts for changes in connectivity patterns, enabling the study of both continuous and abrupt topological transitions. This approach is particularly useful in scenarios where the network’s evolution is driven by external factors or internal dynamics, offering insights into the stability, controllability, and performance of time-evolving networks. Linear discrete systems with time-dependent coefficients naturally extend classical network models to temporal settings, where the states of each node at a given time step depends linearly on its previous state and its neighbors’ states, weighted by the current network structure. Such models can incorporate periodic, stochastic, or arbitrary time variations in the network topology, making them adaptable to a wide range of applications, from social networks to biological systems. The analysis of these systems often involves tools from control theory, matrix algebra, and dynamical systems, allowing researchers to characterize transient and asymptotic behaviors. Additionally, this framework facilitates the study of how temporal correlations in link activations impact collective dynamics, providing a deeper understanding of the interplay between structure and dynamics in time-varying networks.
Moreover, the use of time-dependent linear systems enables the exploration of controllability and observability in temporal networks, addressing questions about how external inputs can steer the network toward desired states or how the system’s internal states can be inferred from limited observations. By leveraging concepts such as reachability and Gramian matrices adapted to discrete-time varying systems, it becomes possible to identify critical nodes and time windows that significantly influence the network’s behavior. This modeling paradigm not only bridges the gap between static network analysis and more realistic time-aware representations but also opens new avenues for optimizing interventions in dynamic networks, such as targeted vaccinations or strategic information dissemination. Thus, time-dependent linear discrete systems offer a versatile and powerful approach to understanding and harnessing the dynamics of temporal networks.
In this case, the network reaches fully controllability if rank(C(ts, td)) = N. Figure 2 shows a temporal network i.e., completely controllable by the proper selection of control nodes. In Figure 2(a), the number of non-zero columns of matrix C is equal to 3. Therefore, the rank of matrix C is equal to 3. In the same way, In Figure 2(b), the rank of matrix C is equal to 2.


A temporal network becoming uncontrollable due to internal and external attacks refers to a scenario where strategic disruptions or failures prevent the network from being guided to a desired state, despite interventions [21]. Internal Attacks: These disruptions originate within the network itself. They can result from malicious activities by insiders, software bugs, hardware failures, or other internal issues that lead to the failure of nodes or edges [22]. External Attacks: These are caused by external entities or influences, such as cyber-attacks, environmental events, or targeted interventions by adversaries [23]. External attacks can disrupt the functionality of nodes or edges, affecting the network’s overall stability and performance. When a temporal network is subjected to internal and external attacks, its controllability can be significantly impaired. The attacks may target critical nodes and edges, which are essential for maintaining the ability to control the network. As a result, the network may become uncontrollable, meaning it is no longer possible to guide it to a desired state through any feasible set of interventions. This scenario has profound implications for the security and resilience of vital systems [24]. Imagine a communication network where nodes represent devices, and edges represent communication links active at specific times. An internal attack might involve compromised devices spreading misinformation, while an external attack might be a denial-of-service (DoS) attack disrupting communication links or intelligent attacks which are a type of deliberate attack that is done intelligently [25]. If critical control nodes and links are disrupted, the network might become uncontrollable, meaning we can no longer ensure that messages reach their intended recipients regardless of the interventions attempted [26].
In modern control systems, maintaining controllability is a critical aspect of ensuring the stability and performance of dynamic processes. However, these systems are increasingly vulnerable to various types of attacks that can disrupt their controllability, leading to severe consequences in industrial, automotive, and cyber-physical applications. Attacks on controllability processes can take multiple forms, including false data injection, DoS attacks, and stealthy deception attacks, each designed to manipulate or disable the system’s ability to regulate its states effectively. Such malicious interventions can compromise safety, efficiency, and reliability, making the study of attack detection and mitigation strategies essential for secure control system design. One of the most concerning aspects of these attacks is their ability to remain undetected while gradually degrading system performance. For instance, false data injection attacks can alter sensor readings or control inputs, misleading the controller into taking incorrect actions without triggering immediate alarms. Similarly, DoS attacks disrupt communication channels between sensors, actuators, and controllers, preventing timely updates and leading to loss of controllability. More sophisticated attacks, such as replay or covert attacks, exploit system vulnerabilities by replaying past data or carefully designed signals to evade traditional detection mechanisms. These threats highlight the need for robust security frameworks that integrate resilience into the controllability analysis of dynamic systems. The impact of attacks on controllability extends beyond immediate operational disruptions, potentially causing cascading failures in interconnected systems. In critical infrastructure, such as power grids or transportation networks, a loss of controllability due to cyberattacks can result in widespread outages or safety hazards. Researchers have thus focused on developing resilient control strategies, including attack identification, adaptive control reconfiguration, and secure communication protocols, to preserve controllability under adversarial conditions. By understanding the mechanisms through which attacks impair controllability, engineers and cybersecurity experts can design more robust systems capable of withstanding malicious interference while maintaining desired performance and safety standards.
For example, in Figure 3, the e(v2, v3, 1, 2) is attacked by the attacker and removed at time ta = 2. As a result, by calculating the rank of the control matrix C, it is determined that the network is out of the fully controllable state.

One promising approach to tackle this issue involves leveraging advanced techniques in network embedding (NE) and link prediction [27]. NE has emerged as a powerful tool for analyzing the controllability of temporal networks, offering a compact and meaningful representation of network dynamics that captures both structural and temporal features. By mapping nodes into a low-dimensional vector space, NE techniques enable the identification of critical nodes and edges that influence the system’s controllability, while preserving the inherent temporal dependencies and topological properties. These methods facilitate the efficient computation of control strategies by reducing the complexity of high-dimensional temporal networks, thereby enhancing our ability to predict and manipulate network behavior over time. Moreover, embedding-based approaches provide insights into the interplay between network evolution and controllability, allowing for the design of robust control frameworks that adapt to dynamic changes. As a result, NE serves as a bridge between traditional control theory and modern network science, offering scalable solutions for controlling complex temporal systems in fields such as neuroscience, transportation, and social networks. NE is a method that transforms high-dimensional network data into a lower-dimensional space, preserving the essential structural information [28]. This transformation facilitates easier manipulation and analysis of the network’s properties. On the other hand, link prediction aims to forecast missing or future connections within the network, enabling a proactive approach to maintaining and restoring network structure and controllability [29]. By integrating NE with link prediction, we can develop a robust framework for monitoring and recovering the controllability of temporal networks. NE aids in capturing the evolving patterns and structural nuances of the network over time [30]. This embedded representation, when coupled with sophisticated link prediction algorithms, allows us to predict and reinforce critical connections that are essential for network controllability [31]. The process begins with embedding the temporal network into a continuous vector space where the temporal dynamics are preserved. This embedded representation provides a more tractable form for analyzing network properties and predicting future links. Using link prediction models, we can identify potential new links or recover lost links that are crucial for maintaining controllability [32]. By strategically adding these predicted links, we can restore the network’s ability to be controlled from any initial state to any desired state, thus recovering its completely controllability. This approach not only enhances our capability to manage temporal networks effectively but also opens new avenues for applying machine learning and data-driven techniques in network science [33]. The synergy between NE and link prediction offers a powerful toolset for ensuring the robustness and functionality of dynamic networks across various domains, from communication and transportation systems to social and biological networks [34]. By maintaining the controllability of these networks, we can ensure their optimal performance and resilience in the face of continual change. Temporal NE provides a sophisticated framework for analyzing and understanding the complex dynamics of temporal networks [35]. Embedding nodes technique enables effective analysis and prediction of network behaviors [36]. Whether it is for link prediction, anomaly detection, or understanding the evolution of communities, temporal NE offers a powerful tool for researchers and practitioners dealing with dynamic and evolving networks.
Long Short-Term Memory (LSTM) addresses these challenges by leveraging their gated architecture, which selectively retains and forgets information, enabling effective learning of temporal patterns and robust prediction of network states. By integrating LSTM-based models into control frameworks, researchers can enhance the ability to steer temporal networks toward desired states, even in the presence of complex, nonlinear dynamics. This approach has significant implications for applications such as power grids, transportation systems, and biological networks, where adaptive and predictive control is essential for stability and performance. The combination of LSTMs and temporal network controllability thus offers a promising direction for advancing the understanding and optimization of time-dependent complex systems.
So far, methods have been proposed to restore controllability in temporal networks, generally after an error occurs in the controllability process of the network, by optimally adding nodes and edges, it has been tried to return the network to a completely controllable state. In this paper, using NE and link prediction, a novel recovery controllability method is proposed to restore the controllability of temporal networks by predicting the links under attack and embedding suitable nodes in the network.
Traditional temporal network analyses often treat each timestep independently, overlooking stable higher-order relationships between nodes. NE methods (e.g., Node2Vec, DeepWalk) address this by mapping nodes to a low-dimensional space while preserving structural properties such as community membership, centrality, and multihop connectivity. These embeddings provide a time-invariant backbone in temporal networks. While embeddings capture static topology, temporal networks require explicit modeling of evolving interactions. LSTM networks were selected over alternatives (e.g., RNNs, TCNs) due to their ability to handle irregular time intervals through adaptive gating mechanisms and, learn long-range dependencies across timesteps (critical for controllability trajectories), mitigate vanishing gradients in deep sequences.
- •
Investigating the effects of various attacks on subordinate control processes in temporal networks.
- •
Proposing a new method to recovery controllability based on the prediction of attack-prone links.
- •
Using NE to reduce network dimensions in order to run controllable processes in massive networks.
- •
Presenting the proposed recovery controllability method against intelligent and DoS attacks.
2. Related Works
Network controllability is a core principle in network science, enabling systems to transition from an initial state to a target state through controlled inputs. In temporal networks, where connections change dynamically, maintaining robust controllability is difficult because of shifting topologies. Recent progress combines temporal link prediction and NE techniques to improve controllability resilience. This section summarizes major contributions in the field.
Following the development of complex network controllability, researchers have explored recovery strategies to address disruptions caused by errors or attacks. Early work focused on static networks. For instance, Chen et al. analyzed how random and cascading failures impact controllability in static networks [37]. Ding et al. introduced algorithms to restore structural controllability in such networks by strategically adding links [38]. Zhang et al. modified maximum matching algorithms to recover controllability through the addition of control nodes [39, 40].
As temporal networks gained prominence for their real-world applicability, controllability methods adapted to dynamic environments. Subsequent research prioritized recovery strategies for temporal networks. Ding et al. developed algorithms to regain controllability by inserting new links, aligning with a layered structural controllability framework [41]. Feng and Tesi addressed controllability restoration after DoS attacks, proposing a link-strengthening approach to mitigate damage [42]. Saif et al. tackled delays induced by DoS attacks, introducing methods to safeguard controllability processes in temporal networks [24].
Robust controllability in temporal networks benefits from temporal link prediction and NE, enabling adaptive control strategies. Recent works highlight the synergy between these methods, but further advancements are needed to address scalability and uncertainty. Future integration with deep learning and causal modeling may unlock new possibilities for dynamic network control. The conventional controllability recovery algorithms restore the network after failures and attacks. If it can be prevented before the failures occur in the network, the controllable processes in the network will never be disturbed. Therefore, one of the important techniques in preventing attacks and failures in the network is link prediction. Using a convolutional neural network (CNN), Lou et al. have proposed a method that uses a neural network to identify the links that are becoming defective [43]. On the other hand, the most important challenge for controllability recovery algorithms in complex temporal networks is the large volume of data in real-world temporal networks. Currently, there are networks with a very high data volume that if the algorithms described above are used, their processing will take a long time or the recovery processes will be disrupted. One of the important techniques to speed up network algorithms is to reduce network dimensions by using NE [44]. Ma et al. have proposed NE for temporal networks [30].
In this paper, a new controllability recovery method is proposed, which reduces the dimensions of the network by using NE and then prevents disruptions in controllability processes by using link prediction based on temporal similarity.
In Table 1, the most important differences of the proposed method compared to other conventional recovery controllability methods are highlighted.
Reference | Network type | Network attack | Model | Pruning process |
---|---|---|---|---|
[37] | Static | Random attacks | — | — |
[38] | Static | Not investigated | — | — |
[37] | Static | Not investigated | — | — |
[38] | Static | Not investigated | — | — |
[39] | Temporal | Degree attack | Layer model | — |
[42] | Temporal | Not investigated | Layer model | — |
[24] | Temporal | DoS attack | Layer model | Network embedding |
[43] | Temporal | Centrality attack | Link Prediction/CNN | — |
Proposed method | Temporal | Intelligent attacks DoS attack | Link Prediction/LSTM | Network embedding |
3. The Proposed Recovery Controllability Method
Fully controllability in a network ensures that with a suitable choice of control inputs applied to a subset of nodes, known as driver nodes, the entire network can be driven to any target state. However, due to the dynamic nature of temporal networks, changes in the network structure can lead to periods where the network is no longer completely controllable. Identifying these periods of lost controllability is vital for effective network management and intervention. The process involves modeling the temporal network as a sequence of time-dependent adjacency matrices, identifying the necessary driver nodes, constructing the controllability matrix at each time step, and computing its rank. A drop in the rank below the total number of nodes in the network signals a loss of completely controllability. This method provides a systematic approach to ensure that interventions can be made promptly to restore or maintain control over the network.
When the network is in completely controllability mode and the network is attacked, the most important criterion to determine that the attacked network is out of completely controllability mode is the doc criterion. Networks after the attack, their DoC value will be less than 1. The stronger the attack, the more the DoC value tends to zero.
Temporal NE is a powerful technique designed to address this need by representing the evolving network in a continuous vector space while preserving its temporal and structural characteristics. Temporal NEs can predict future or missing links in the network by leveraging the learned temporal dynamics and node interactions.
Definition 1. Temporal NE: Given a temporal network G = (V, E, T) and the corresponding time-stamped adjacency matrix A, temporal NE aims to learn a mapping function f : vi ⟶ yi ∈ Rd. The objective of the function is to make the similarity between yi and yi preserve the temporal proximity between vi and vj.
Definition 2. Temporal Node Embedding: Let d ≥ 1 be the dimensionality of the node embeddings. A node embedding function f is a map f : V⟶V′ ∈ Rd maps each node v ∈ V to a real-valued feature vector in v′ ∈ Rd.
Definition 3. Temporal Link Prediction: Given a series of snapshots {Gt − N, Gt − N + 1, …, Gt} of an evolving graph Gt = 〈V, Et〉 in which each e = (u, v) ∈ Et represents a link between u and v that took place at a particular time t. We seek to predict the most likely link state in the next time step Gt+1. The temporal link prediction also called a periodic link prediction when N ≫ 0.
In this paper, a novel framework is proposed for NE the complex temporal network and predicting the broken links. In Recovery Controllability using the Temporal Embedding Network (RCTE) Framework, by embedding the network and reducing the dimensions of the time network, the speed of the controllability recovery process should be increased, and then the network controllability is restored by predicting the links that are failing. NE excels in preserving persistent topological features by encoding nodes into low-dimensional vectors that capture structural properties (e.g., centrality, community structure), enabling robust identification of driver nodes invariant to temporal noise. Meanwhile, LSTMs model complex temporal dynamics by learning long-range dependencies and adapting to irregular time intervals, which is critical for predicting evolving controllability requirements. Together, their integration offers synergistic advantages: embeddings provide a stable structural prior to guide LSTM predictions, while LSTMs dynamically refine these representations to adapt to time-varying interactions. This hybrid approach ensures robust controllability, balancing topological stability with temporal adaptability and, outperforms methods relying solely on static or temporal information, as demonstrated by reduced control energy and higher prediction accuracy in experiments.
The combined framework effectively leverages the complementary strengths of both approaches to achieve superior temporal network controllability. NEs provide topology-aware initialization for LSTMs, offering stable structural priors that significantly reduce overfitting to transient temporal patterns. Simultaneously, the LSTM component dynamically refines these embeddings by incorporating temporal dependencies across network states, enabling adaptive controllability strategies that evolve with the network. Crucially, the static nature of the underlying embeddings serves as a powerful regularizer, constraining the LSTM’s learning process and preventing overfitting to noisy short-term fluctuations. This dual mechanism ensures robust performance by maintaining structural consistency while accommodating necessary temporal adaptations, ultimately yielding more reliable controllability outcomes than either method could achieve independently.
The different components of the RCTE framework are shown in Figure 4. As seen in Figure 4, a temporal network is transformed into snapshots of static networks at discrete times. Then, in the temporal NE process, the dimensions of the temporal network are reduced and, temporal node embedding vectors are formed. After that, in the learning representation module, a learning model is built using the LSTM neural network, which can be used to predict the failing links.

3.1. Temporal Embedding Network and Feature Extraction
The design often incorporates advanced techniques like attention mechanisms or transformers to enhance performance, making it highly effective for sequence-to-sequence and generative tasks. This architecture has become a cornerstone in modern AI systems due to its flexibility, scalability, and ability to generalize across diverse domains. In the RCTE framework, a decoder-encoder is designed based on deep neural networks to recognize the information about the structure and the network characteristics. In this method, a powerful threshold is presented to evaluate the loss rate of the encoder-decoder by combining local and global characteristics. Therefore, the efficiency of the link prediction algorithm has increased with the loss function improvement in the encoder-decoder. Figure 5 shows the steps of the temporal NE. In the process of temporal embedding network, the input layer is reduced to smaller dimensions, and then the NE is done using the loss function L and based on two criteria of local and global similarity.

Extracting the feature is the most important part of the RCTE framework, which is done by an encoder-decoder. Encoder-decoders play an essential role in unsupervised learning and deep networks. The purpose of using encoders is to represent data in a way that to be used in classification. The best advantage of encoder-decoders is the automatic selection of features. As can be seen in Figure 6, the encoder is a neural network that receives a set of data without labels encrypts them and, tries to represent the inputs at the output so that they have the least possible difference with the input value. In encoding, the input data is mapped to the attribute space, and in decoding, space is converted from the attribute space back to its original state. The main part of an encryption-decoder is the intermediate hidden layer that is used as the extracted property for categorization.

Autoencoders are a type of neural network designed to learn efficient representations of input data by compressing it into a lower-dimensional latent space and then reconstructing it back to the original form. The primary objective of an autoencoder is to minimize the reconstruction loss, which measures the difference between the input data and its reconstructed output. By doing so, the model learns to capture the most salient features of the data while discarding noise or irrelevant details. This process involves an encoder that maps the input to a compressed representation and a decoder that attempts to reconstruct the input from this representation. The quality of the reconstruction depends on the autoencoder’s ability to balance compression with fidelity, ensuring that the latent space retains enough information to reproduce the input accurately. Minimizing reconstruction loss is crucial for applications such as dimensionality reduction, denoising, and anomaly detection, where preserving essential data characteristics is key.
3.2. Loss Function
Using global information in loss calculation leads to high accuracy, but it takes a lot of time to be calculated. On the other hand, actions based on local information are generally faster but provide less accuracy. Because the network type is large-scale, irregular, and heterogeneous real-world networks, both local and global structures are important. In the RCTE framework, by combining local and global features, the accuracy of the loss function has improved.
- •
Compute the temporal shortest path from each node to every other node at each time step.
- •
Calculate the temporal closeness centrality by summing up the temporal distances and using the reciprocal for centrality.
- •
For each node, create a vector where each element is the temporal closeness centrality value at a specific time step.
- •
Use cosine similarity (or another similarity measure) to compute the similarity between the vectors of all pairs of nodes.
The α and β are hyperparameters that are responsible for controlling the balance between the two global similarity and local similarity thresholds. The α hyperparameter determines the effectiveness of the local criterion. If α = 0, the predictive function is performed only through the global threshold. The β hyperparameter indicates the effect of the global standard effect on the prediction operation.
3.3. Learning Representation Module
Representation learning involves discovering the best way to represent data to make it easier for machine learning algorithms to perform tasks like classification, regression, clustering, and more. LSTM networks, a specialized variant of recurrent neural networks (RNNs), are particularly well-suited for handling sequential data due to their ability to capture long-term dependencies and mitigate the vanishing gradient problem. In the context of recovery controllability, LSTMs can model the evolving structure of temporal networks, predict potential failure points, and optimize control strategies to restore system functionality efficiently. By leveraging their memory cells and gating mechanisms, LSTMs can retain and utilize historical network states to inform real-time decision-making, making them ideal for dynamic control scenarios. This capability is especially valuable in scenarios where the network topology changes unpredictably, such as in disaster response or power grid recovery. The integration of LSTM networks into recovery controllability frameworks offers a data-driven alternative to traditional model-based control methods. Unlike static approaches, LSTMs can adapt to the temporal evolution of network dynamics, enabling more resilient and responsive control strategies. For instance, in a transportation network disrupted by an unexpected event, an LSTM-based controller could analyze past traffic patterns, predict congestion propagation, and recommend optimal rerouting strategies to restore normal operations. Furthermore, the ability of LSTMs to process high-dimensional, nonlinear temporal data makes them suitable for complex networks where analytical solutions are intractable. The application of LSTM neural networks in recovery controllability of temporal networks represents a promising intersection of machine learning and control theory. By harnessing the predictive and adaptive capabilities of LSTMs, researchers and practitioners can develop more robust and scalable solutions for managing dynamic networks under uncertainty. Future advancements in this area could further enhance the autonomy and efficiency of control systems, paving the way for smarter and more resilient infrastructure in an increasingly interconnected world.
In this paper, the LSTM network is used to represent learning. The formulation of an LSTM network involves defining the mathematical operations that govern the flow of information through its architecture. An LSTM cell is designed to maintain long-term dependencies by carefully regulating the information that flows through its internal state using gates.
4. Simulations and Evaluation the Proposed Methods
The proposed controllability restoration method based on the RCTE framework enables controllability restoration processes to be performed with high speed and optimal accuracy. To evaluate the performance of the proposed recovery method, the method has been simulated in the Python environment and several tests have been performed to check its performance compared to other conventional methods.
To evaluate the effectiveness of the proposed controllability recovery method, the proposed method has been implemented on four real-world datasets related to temporal networks [46]. The selected datasets have a high diversity in the internal dynamics of the network. The most important features of the selected datasets can be seen in Table 1. In Table 2, assortativity means the tendency of nodes to connect to similar or dissimilar nodes based on the specific characteristics of nodes.
N | L | Density L/N(N − 1) | dmax/dmin/davg | Average clustering coefficient | Assortativity | |
---|---|---|---|---|---|---|
Email network | 33.7 K | 180.8 K | 0.000318501 | 1.4K/1/10 | 0.50919 | −0.116499 |
Collaboration network | 28.1 K | 4.6 M | 0.0116494 | 11.1K/1/327 | 1.53173 | 0.149852 |
Facebook friendship | 63.7 K | 1.3 M | 0.000625128 | 1.8K/1/39 | 0.211799 | 0.163713 |
Wikibooks | 8.4 K | 162 K | 0.00461677 | 11.3K/1/38 | 2.12468 | 0.0538031 |
As mentioned earlier, controllable processes in temporal networks face internal and external attacks and failures. Internal attacks are the random failures that occur in the network. These failures include disconnections or routers, and failures of servers and workstations. Intelligent attacks are based on the information obtained from different characteristics of nodes and edges of the network. In this paper, four common types of attacks are selected. These attacks are defined based on scenarios. Temporal Random attacks represent random failures in the network. A temporal degree centrality attack is a type of intelligent attack that occurs based on the local information of the network, which is the temporal degree of the nodes. A temporal closeness centrality attack is a type of intelligent attack that occurs based on the temporal closeness centrality of nodes and uses global network information. DoS attacks do not occur based on the characteristics of the network components, but by creating disturbances on the network links, they cause the links to be interrupted. In general, the temporal degree centrality attack occurs on both nodes and links, the temporal closeness centrality attack occurs only on nodes, and the DoS attack occurs only on links.
- •
Temporal Random Attack Scenario (TRA): Links and nodes with removal rate are randomly removed from the network in time interval T = [t1, t2].
- •
Temporal Degree Centrality Attack Scenario (TDA): Nodes are deleted in the order of their temporal degree centrality in descending order with the rate in the time interval T = [t1, t2].
- •
Temporal Closeness Centrality Attack Scenario (TCA): Nodes are deleted in the order of their temporal closeness centrality in descending order with the rate in the time interval T = [t1, t2].
- •
Temporal DoS Attack Scenario (TDoS): The links are deleted based on the distribution function and DoS attack parameters with the attack rate in the time interval T = [t1, t2].
The attack rate means the probability of an attack at any moment, which is equal to the ratio of the number of links/nodes removed to the total number of links/nodes in the network.
In the conducted attack experiments, the attack rate is considered. The parameters of DoS attacks are set as distributed function: Poisson process, mean service time = 3 s, background traffic load: 0.6, sampling rate = 50 samples/s, measurements packets from an attacker = 750, stochastic delay jitter = 7. The duration of the simulation was 15 min, and the results of the experiments based on random processes were reported as an average of 50 executions.
In order to determine the values of the α and β parameters, a sensitivity analysis of the hyperparameters α (global similarity weight) and β (local similarity weight) is performed and, the impact of global/local similarity weights (α, β) on model performance is evaluated. In the experiment, the proposed method is performed on datasets based on random attacks. In the first experiment, the value of parameter α ∈ [0, 1] is considered constant and the value of β is variable. In the second experiment, the value of β ∈ [0, 1] is considered constant and the value of α is variable. Figure 7 shows that if the values of α = 0.4 and β = 0.6 are, the performance of the learning model based on the ACC evaluation parameter is stable.


All models are trained using 75% of the data and then tested and checked using the remaining 25% of the data.
In Table 3 the effectiveness of the learning model in the RCTE method is compared to the controllability recovery method based on the NE [24] and CNN neural network [43] different attack strategies with different attack rates on datasets. The evaluation results demonstrate that the proposed RCTE method consistently outperforms both CNN and GNN-based controllability recovery methods across various attack strategies and datasets. This trend persists even at higher attack rates (e.g., 0.8), where RCTE maintains superior performance over CNN and NE. Similar improvements are observed in other datasets, such as Wikibooks, where RCTE achieves exceptional ACC (up to 0.989) and F1 scores (up to 0.970), significantly surpassing CNN and NE. The robustness of RCTE is particularly evident in adversarial scenarios, highlighting its enhanced capability to recover network controllability under diverse attack conditions. These results suggest that RCTE’s innovative approach effectively mitigates the limitations of traditional neural network-based methods, offering a more reliable solution for maintaining network integrity. On the other hand, the results show that, in general, the efficiency of the learning model increases with the increase in the attack rate, but in the proposed method, the efficiency of the learning model has increased with a greater slope, which indicates the high efficiency of proposed learning model with an increase in the attack rate. Finally, in datasets where the intensity of network dynamics and its changes are high, the accuracy of the learning model in the proposed method is much higher compared to the CNN and NE methods (in intelligent and DoS attacks is more than 95%).
Model features | NE | CNN | RCTE (our) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dataset | Attacks measure | TRA | TDA | TCA | TDoS | TRA | TDA | TCA | TDoS | TRA | TDA | TCA | TDoS | |
Email network | 0.2 | ACC | 0.675 | 0.681 | 0.692 | 0.675 | 0.683 | 0.682 | 0.695 | 0.685 | 0.695 | 0.708 | 0.718 | 0.704 |
F1 | 0.661 | 0.675 | 0.689 | 0.671 | 0.681 | 0.685 | 0.699 | 0.680 | 0.692 | 0.701 | 0.712 | 0.700 | ||
0.4 | ACC | 0.681 | 0.690 | 0.710 | 0.685 | 0.692 | 0.699 | 0.717 | 0.698 | 0.701 | 0.719 | 0.727 | 0.722 | |
F1 | 0.673 | 0.691 | 0.690 | 0.682 | 0.698 | 0.702 | 0.722 | 0.700 | 0.709 | 0.730 | 0.738 | 0.728 | ||
0.6 | ACC | 0.683 | 0.693 | 0.709 | 0.695 | 0.693 | 0.709 | 0.728 | 0.710 | 0.712 | 0.729 | 0.746 | 0.731 | |
F1 | 0.680 | 0.695 | 0.708 | 0.690 | 0.686 | 0.713 | 0.731 | 0.721 | 0.710 | 0.742 | 0.758 | 0.748 | ||
0.8 | ACC | 0.688 | 0.725 | 0.734 | 0.723 | 0.690 | 0.718 | 0.739 | 0.718 | 0.720 | 0.735 | 0.741 | 0.738 | |
F1 | 0.689 | 0.701 | 0.712 | 0.709 | 0.701 | 0.725 | 0.721 | 0.725 | 0.711 | 0.752 | 0.763 | 0.741 | ||
Collaboration network | 0.2 | ACC | 0.671 | 0.676 | 0.789 | 0.774 | 0.680 | 0.789 | 0.798 | 0.768 | 0.793 | 0.803 | 0.816 | 0.801 |
F1 | 0.658 | 0.669 | 0.786 | 0.772 | 0.689 | 0.781 | 0.795 | 0.781 | 0.791 | 0.800 | 0.810 | 0.799 | ||
0.4 | ACC | 0.678 | 0.689 | 0.701 | 0.780 | 0.713 | 0.790 | 0.724 | 0.789 | 0.799 | 0.812 | 0.825 | 0.820 | |
F1 | 0.669 | 0.687 | 0.784 | 0.779 | 0.745 | 0.799 | 0.748 | 0.795 | 0.801 | 0.828 | 0.836 | 0.826 | ||
0.6 | ACC | 0.681 | 0.689 | 0.702 | 0.789 | 0.750 | 0.802 | 0.752 | 0.803 | 0.808 | 0.825 | 0.842 | 0.830 | |
F1 | 0.679 | 0.692 | 0.701 | 0.785 | 0.745 | 0.808 | 0.763 | 0.813 | 0.805 | 0.839 | 0.854 | 0.843 | ||
0.8 | ACC | 0.684 | 0.715 | 0.728 | 0.713 | 0.774 | 0.818 | 0.783 | 0.809 | 0.818 | 0.832 | 0.839 | 0.834 | |
F1 | 0.685 | 0.698 | 0.702 | 0.702 | 0.740 | 0.823 | 0.801 | 0.812 | 0.801 | 0.849 | 0.859 | 0.839 | ||
Facebook friendship | 0.2 | ACC | 0.779 | 0.787 | 0.796 | 0.779 | 0.783 | 0.795 | 0.801 | 0.789 | 0.799 | 0.819 | 0.822 | 0.818 |
F1 | 0.768 | 0.783 | 0.792 | 0.777 | 0.774 | 0.798 | 0.802 | 0.786 | 0.786 | 0.815 | 0.819 | 0.816 | ||
0.4 | ACC | 0.786 | 0.794 | 0.813 | 0.789 | 0.789 | 0.802 | 0.814 | 0.795 | 0.812 | 0.829 | 0.834 | 0.824 | |
F1 | 0.776 | 0.792 | 0.794 | 0.783 | 0.788 | 0.812 | 0.821 | 0.799 | 0.810 | 0.842 | 0.842 | 0.839 | ||
0.6 | ACC | 0.788 | 0.796 | 0.815 | 0.798 | 0.795 | 0.816 | 0.825 | 0.805 | 0.819 | 0.836 | 0.845 | 0.838 | |
F1 | 0.785 | 0.799 | 0.812 | 0.795 | 0.799 | 0.824 | 0.828 | 0.812 | 0.818 | 0.849 | 0.864 | 0.852 | ||
0.8 | ACC | 0.795 | 0.729 | 0.838 | 0.826 | 0.803 | 0.827 | 0.831 | 0.811 | 0.823 | 0.842 | 0.846 | 0.841 | |
F1 | 0.792 | 0.704 | 0.815 | 0.810 | 0.812 | 0.830 | 0.839 | 0.825 | 0.815 | 0.859 | 0.869 | 0.856 | ||
Wikibooks | 0.2 | ACC | 0.785 | 0.804 | 0.810 | 0.809 | 0.793 | 0.814 | 0.823 | 0.818 | 0.838 | 0.869 | 0.892 | 0.872 |
F1 | 0.775 | 0.899 | 0.805 | 0.800 | 0.799 | 0.818 | 0.825 | 0.816 | 0.822 | 0.859 | 0.882 | 0.864 | ||
0.4 | ACC | 0.792 | 0.812 | 0.818 | 0.819 | 0.805 | 0.824 | 0.832 | 0.824 | 0.842 | 0.875 | 0.895 | 0.875 | |
F1 | 0.782 | 0.808 | 0.812 | 0.808 | 0.812 | 0.828 | 0.845 | 0.821 | 0.825 | 0.863 | 0.885 | 0.868 | ||
0.6 | ACC | 0.798 | 0.823 | 0.823 | 0.828 | 0.818 | 0.835 | 0.841 | 0.835 | 0.885 | 0.892 | 0.898 | 0.895 | |
F1 | 0.795 | 0.810 | 0.819 | 0.812 | 0.825 | 0.845 | 0.856 | 0.842 | 0.880 | 0.885 | 0.890 | 0.886 | ||
0.8 | ACC | 0.804 | 0.835 | 0.842 | 0.832 | 0.856 | 0.849 | 0.879 | 0.891 | 0.932 | 0.962 | 0.989 | 0.969 | |
F1 | 0.801 | 0.814 | 0.818 | 0.818 | 0.864 | 0.841 | 0.898 | 0.899 | 0.910 | 0.938 | 0.970 | 0.955 |
To investigate the destructive effects of different attacks on network controllability processes, attacks based on different scenarios have been carried out on datasets. In the attacks carried out, the rate of attacks is . As mentioned earlier, the DoC measure is proposed to determine the control coverage of the network by the control nodes. The smaller the network DoC, the more nodes are out of control. Figure 8 shows the D/N based on the attack rate (R). As can be seen in Figure 8, the number of control nodes (D) has increased with the increase in the attack rate. In general, the results demonstrate that the destructive effects of TCA and TDoS attacks were greater in crowded datasets than in other attacks. On the other hand, the TDA attack has been more destructive than other attacks in datasets with high dynamic intensity.

Figure 9 demonstrates the effects of attacks on network controllability. The results show that with the increase in the attack rate, the networks with a high gradient leave a state of completely controllability. The speed of leaving completely controllability in TCA and TDoS attacks is higher than other attacks.

By implementing the proposed recovery method (RCTE) and comparing it with the CNN method, the number of new links added to the network to prevent disturbance in the control processes can be seen in Figure 10. In controllability recovery methods, the lower the number of new links added to the network, the better the performance of that method. The data reveals notable differences in the effectiveness of various methods in mitigating the impact of attacks on network links. The RCTE method consistently demonstrates superior performance across all attack types, as evidenced by the fewer new links added compared to the NE and CNN methods. This suggests that the RCTE approach is more robust in maintaining network stability under adversarial conditions. In contrast, the NE method tends to result in a higher number of new links, indicating a less efficient response to attacks. The CNN method falls between the RCTE and NE methods, showing moderate effectiveness but still requiring more link additions than the RCTE approach. When examining the impact of different attack types, RA attacks appear to be the most disruptive, as they generally necessitate the highest number of new links across all methods. DA and BA attacks, while still harmful, are comparatively less severe, with fewer links required for recovery. This pattern holds true regardless of the mitigation method used, reinforcing the notion that RA attacks are particularly challenging to counter. The consistency of this trend suggests that network defenses may need to prioritize strategies specifically tailored to resist RA attacks. The discussion underscores the importance of selecting appropriate mitigation techniques based on the attack type. The RCTE method emerges as the most efficient, but further research could explore whether its advantages hold under more varied or intense attack scenarios. Additionally, the relatively poor performance of the NE method raises questions about its suitability for dynamic or large-scale networks. The CNN method, while not as effective as RCTE, may offer a balance between complexity and performance, warranting further investigation into its optimization. Overall, the findings highlight the need for adaptive and attack-specific strategies to minimize network disruptions. The results demonstrate that in all datasets, the RCTE method performed better than the CNN method and repaired the network with fewer new links. The improvement has been higher in datasets with high dynamics. Also, the efficiency of the RCTE method in malicious TCA and TDoS attacks is significant.

One of the efficiency criteria of recovery controllability methods is their execution speed. Considering that the speed of control processes in massive networks is low, the high recovery speed of control processes can play an important role in preventing the disruption of these types of processes. Figure 11 shows the execution time of different methods. The data highlights clear differences in computational efficiency among the three methods, with the RCTE method consistently demonstrating the fastest running times. This suggests that the RCTE approach is the most computationally efficient, requiring less time to execute compared to the NE and CNN methods. The NE method, while slower than RCTE, still outperforms the CNN method, which exhibits the longest running times. This trend indicates that the RCTE method may be better suited for real-time or time-sensitive applications where rapid processing is critical. The performance gap between the methods raises important considerations about the trade-offs between computational speed and other factors, such as accuracy or robustness. While the CNN method is the slowest, it may offer advantages in certain scenarios, such as handling complex or high-dimensional data, that justify its increased computational cost. Conversely, the efficiency of the RCTE method makes it an attractive option for systems where speed is prioritized, provided it meets other performance requirements. The NE method occupies a middle ground, potentially offering a balance between speed and functionality. These findings emphasize the importance of selecting a method based on the specific demands of the application. For tasks requiring rapid execution, the RCTE method is the most suitable, whereas the CNN method might be reserved for cases where its additional capabilities outweigh its slower performance. Further research could explore whether optimizations or hybrid approaches could improve the speed of the slower methods without compromising their effectiveness. Overall, the data underscores the need to align method selection with operational priorities, particularly in environments where computational efficiency is a key constraint.

5. Conclusion
In this paper, a new method to restore controllability in temporal networks is proposed. For this purpose, a new framework called RCTE has been proposed, in which the speed of recovery processes has been increased by reducing the dimensions of network data. In the framework of RCTE, by providing a learning model based on the LSTM neural network, links prone to failure have been identified to prevent disruptions in control processes. The experimental results demonstrate that the proposed RCTE method significantly outperforms existing CNN and NE-based approaches in recovering network controllability under various attack scenarios. Across multiple datasets and attack rates, RCTE consistently achieves higher accuracy, robustness, and efficiency, particularly in adversarial conditions where traditional methods struggle. Notably, RCTE maintains superior performance even at high attack intensities, requiring fewer new links to restore network stability compared to CNN and NE methods. This efficiency is especially pronounced in highly dynamic networks and against sophisticated attacks such as TCA and TDoS, where RCTE exhibits remarkable resilience. Additionally, RCTE excels in computational efficiency, executing recovery processes faster than both CNN and NE methods. This speed advantage makes it particularly suitable for real-time applications where rapid response is critical to maintaining network integrity. While CNN and NE methods may offer certain strengths in handling complex data structures, their slower performance and higher resource demands limit their effectiveness in time-sensitive scenarios. The findings suggest that RCTE strikes an optimal balance between speed, accuracy, and adaptability, making it a compelling solution for modern network controllability challenges. Future research could explore further optimizations of RCTE, such as hybrid approaches that integrate neural network strengths while preserving its computational efficiency. Additionally, testing RCTE under even more extreme attack conditions or in larger-scale networks could validate its scalability and robustness further. Overall, this study highlights RCTE as a highly effective and efficient method for controllability recovery, offering a reliable alternative to conventional neural network-based approaches in securing dynamic and adversarial network environments.
Disclosure
This work was sponsored in part by the Bidding Projects of Key Disciplines during the 14th Five—Year Plan Period of Xinjiang Normal University (Research on School Education for Strengthening the Sense of the Chinese Nation Community, 24XJKD0109) and, Xinjiang Teacher Education Research Center (Research on the Promoting Role of Progressive Teaching, Research and Training Integrated Activities on the Teaching and Research Abilities of Primary and Secondary School Mathematics Teachers, ZK2024W10).
Conflicts of Interest
The authors declare no conflicts of interest.
Funding
This work was sponsored in part by the Bidding Projects of Key Disciplines during the 14th Five—Year Plan Period of Xinjiang Normal University (Research on School Education for Strengthening the Sense of the Chinese Nation Community, 24XJKD0109) and, Xinjiang Teacher Education Research Center (Research on the Promoting Role of Progressive Teaching, Research and Training Integrated Activities on the Teaching and Research Abilities of Primary and Secondary School Mathematics Teachers, ZK2024W10).
Open Research
Data Availability Statement
The data that support the findings of this study are available on request from the corresponding authors. The data are not publicly available due to privacy or ethical restrictions.