[1]
R. Bai, H. Lin, X. Yang, X. Wu, M. Li, and W. Jia, “Defending against Contagious Attacks on a Network with Resource Reallocation”, AAAI, vol. 35, no. 6, pp. 5135-5142, May 2021.