Abstract
Identification of Influential nodes in complex networks is challenging due to the largely scaled data and network sizes, and frequently changing behaviors of the current topologies. Various application scenarios like disease transmission and immunization, software virus infection and disinfection, increased product exposure and rumor suppression, etc., are applicable domains in the corresponding networks where identification of influential nodes is crucial. Though a lot of approaches are proposed to address the challenges, most of the relevant research concentrates only on single and limited aspects of the problem. Therefore, we propose Global Structure Model (GSM) for influential nodes identification that considers self-influence as well as emphasizes on global influence of the node in the network. We applied GSM and utilized Susceptible Infected Recovered model to evaluate its efficiency. Moreover, various standard algorithms such as Betweenness Centrality, Profit Leader, H-Index, Closeness Centrality, Hyperlink Induced Topic Search, Improved K-shell Hybrid, Density Centrality, Extended Cluster Coefficient Ranking Measure, and Gravity Index Centrality are employed as baseline benchmarks to evaluate the performance of GSM. Similarly, we used seven real-world and two synthetic multi-typed complex networks along-with different well-known datasets for experiments. Results analysis indicates that GSM outperformed the baseline algorithms in identification of influential node(s).
Subject terms: Computer science, Information technology
The concepts of complex networks are abstracted from real-world system networks1–3, like transport system networks, human friendship, web hyperlink and protein networks, etc. Such networks have common characteristics, i.e., heterogeneous topologies, that make it impossible to assign the same importance to each node in the network. Therefore, it is essential to identify the influential nodes via quantitative approaches to examine their properties and to practice their proper usage. For example, in infectious diseases network, preventing the spread of rumors and viruses4,5, in criminal networks, quickly identifying a terrorist organization’s leader6. Similarly, in the traffic system network7, food chain network8, drug network9, and so on. There are a good number of studies have been proposed and deployed in the field of complex network on the identification of influential nodes10–12,12–20 where identification of most important nodes from local and global perspectives is worth mentioning21. Although closeness centrality (CC) and betweenness centrality (BC)22 are path-based indicators that consider the global structure of the network to identify the influence of nodes. However, due to their high computational complexity, they may not be applicable to many networks. It’s common that degree centrality (DC)23 is the simplest method to identify the influential nodes, but it fails to consider the global structure of networks. Kitsak et al.24 proposed the k-shell method for locating influential nodes, but it is too coarse to identify the required influential nodes. Besides these, iterative-based centralities such as eigenvector centrality (EC)25, page rank (PR)26, hypertext induced topic search (HITS)27, and son on are not appropriate for networks with tight connections.
Recently, some approaches have put efforts forward for the identification of influential nodes such as profit leader28, inverse square law29 and gravity index model30. The profit leader method considers the set of important nodes on the basis of the profit leader concept analysis. In the paper by L.-l. Ma et al.30 proposed gravity formula-based algorithm, which considers both neighbour’s nodes influences and path information. However, in some cases, it is also important to combine the global as well as local structure of nodes in the entire network. Similarly, the inverse square model is based on node interactions and is not suitable for large network. Furthermore, in view of propagation probability, Ma et al.31 proposed hybrid degree centrality (HC), which combines local indicators and degree centrality measures. All in all, these approaches have their own shortcomings and limitations. Still, the identification of influential nodes is a challenge.
From the above discussion, to address these changeling problems, inspired from literature10,29,30, in this study, we design a new mechanism called GSM that not only considers the self-influence of the node in the network but also concentrates on the global influence of nodes. To analyze the algorithmic performance, we employed GSM on different kinds of real as well as synthetic networks where we used the susceptible-infected-recovered (SIR) and kendall’s coefficient models to examine the effectiveness of GSM. In addition, we compared the experimental results of the baseline algorithms and with recently proposed approaches, where simulation results on seven different types of real and two synthetic networks showed that GSM effectively identifies influential nodes.
The framework of the paper is organized as follows: We present preliminaries and a brief introduction of baseline algorithms, including BC, PL, GIC, HI, CC, ECRM, DNC, IKH and HITS in Preliminaries section. The proposed GSM model is presented in Proposed method. Results and discussion to illustrate the effectiveness of the GSM are discussed in Results and discussion section, and finally, some conclusion and future recommendations are given in Conclusion and future recommendations section.
Preliminaries
A network can be denoted by G, equated as G = (V, E), where V and E represent nodes and edges, respectively. Moreover, Betweenness Centrality (BC)32, Closeness Centrality (CC)33, HITS34, H-Index (HI)35, Profit Leader (PL)28, Improved k-shell hybrid method (IKSh)12, Extended Cluster Coefficient Ranking Measure (ECRM)36, Gravity Index Centrality (GIC)30 and Density centrality (DNC)37 are introduced in this section.
- Betweenness Centrality (BC): BC calculates influential nodes based on global information32. is defined as:
where indicates number of paths between nodes j and k, and represents the shortest paths between nodes j and k, that pass through node i.1 - Closeness Centrality (CC): CC also calculates influential nodes based on global information. It uses the shortest distance between each pair of nodes to identify the influence of each node33. CC of node i is defined as:
2 Hyperlink Induced Topic Search (HITS): This algorithm is based on two factors i-e., Authority Update, and Hub Update. Authority update is computed by considering the number of hub edges associated with the authority website, and Hub Update is computed by considering the number of authority websites linked by the Hub website34.
H-Index (HI): This algorithm identifies the influential node’s by taking into account the node’s neighbor and using H-index notation. A high H-index represents that the node has more important than other connected nodes35.
Profit Leader (PL): This algorithm is based on profit leader concept analysis and suitable for any network i.e., directed or undirected28.
Improved K-shell Hybrid (IKH): This algorithm considers the k-shell, shortest distance between the nodes and parameter (in range between 0 and 1) to identify the most influential nodes12.
- Gravity Index Centrality (GIC): This algorithm basis on universal gravity concept; that considers both neighbor’s nodes influences and path information30. GIC(i) is defined as:
where is the set of neighbors node i.3 Extended Cluster Coefficient Ranking Measure (ECRM): This algorithm is working on the basis of local clustering coefficients and uses link similarity between adjacent nodes36.
- Density centrality (DNC): It is inspired by the area density formula to identify the influence of nodes in the spreading dynamics37. DNC(i) is defined as:
4
Proposed method
Several approaches based on the global structure of the network to identify the influence of nodes have been developed and deployed, but better utilization of self as well as global structure influence is still a challenge, needs to be addressed. Inspired from literature37–39 , a Global Structure Model (GSM) was proposed, which consists of self and global influences.
Self-influence
In this context, we used e (natural logarithm) and take k-shell , and nodes number (N) in the network as power parameters to minimize the overestimation of the self-influence.
| 5 |
where N shows the number of all nodes in the network.
Global-influence
The node influence also considers the influence of the other connected nodes to it. Normally, the node influence is increased if its neighborhoods have a high value of k-shell; however, the contact distance between the two nodes cannot be ignored, which is inversely proportional to the influence of the nodes.
| 6 |
where is the shortest distance between node i and node j.
Node influence
The node influence is not only on its own influence but also on the nodes around it. Therefore, the proposed GSM simultaneously considers these two aspects, self and global influence, which can be defined as,
| 7 |
We can also express GSM of the node ,
| 8 |
where and denote the k-shell of node i and node j,
Computation process
The proposed GSM model is divided into four parts; first, construction of corresponding network; second, calculation of the network’s global influence and the k-shell of node and the distance between nodes. In the third step, we consider the self-influence of the network, the self influence of the node itself is computed. Finally, the influence of each node on the entire network is calculated. To further demonstrate GSM method, as shown in Fig. 1, for a specific calculation process, here we consider a simple network to clarify it in detail. In Fig. 2, consists of 13 nodes and 17 edges. As shown in the network, we consider GSM method by taking the node V4 influence as an example. First, we calculate the k-shell and the shortest distance between each node; we have
Figure 1.
The flow chart of the proposed GSM.
Figure 2.

A network with 17 edges and 13 nodes.
d4-1 = 1 d4-2 = 1,d4-3 = 1, d4-5 = 2, d4-6 = 3, d4-7 = 1, d4-8 = 1, d4-9 = 2, d4-10 = 1, d4-11 = 2, d4-12 = 2, d4-13 = 2.
To calculate the self influence and global influence, here we apply Eqs. (6) and (7); we have, , and , , , , , , , , , , , we have added all these values based on Eq. (7), we have, , Finally, the influence of node V4 can be calculated, we have . Table 1 shows the ranking influence of each node in the given simple network.
Table 1.
GSM results of Figure 2.
| Node | 4 | 2 | 1 | 3 | 5 | 8 | 7 | 10 | 11 | 9 | 6 | 12 | 13 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Influence | 21.833 | 20.15 | 19.52 | 18.053 | 15.06 | 15.06 | 14.48 | 14.12 | 14.12 | 10.02 | 9.91 | 9.21 | 9.21 |
Experiments
Experimental setup is performed on system with configuration as: CPU: Feiteng 1500A (1, 16-core, 1.5 ghz), Operating system: galaxy kirin server os Bios: China-made Kunlun firmware Memory: 3 GB and Hard disk: 2 TB (Fig. 2).
Evaluation metrics
SIR model
We used the SIR model to investigate the spreading dynamic of each node40,41 to quantify the performance of GSM and other benchmark centralities. In the SIR model, there are three states, (i) Susceptible (S), (ii) Infected (I), (iii) Recovered (R). Susceptible (S) refers to a healthy state and can be infected by others. Infected (I) refers infected state and can infect other individuals. Recovered (R) denotes a recovered state, which cannot be infected by other individuals again. For the first time, all the seed nodes are in a susceptible form. At each time step, the seed node can infect its nearest and next-nearest neighbor nodes (in the susceptible state) with a probability , then each node (the node which was infected) enters into the recovered state with a probability . This process continued till there are no more infected nodes. Finally, all the recovered nodes are used to simulate the actual node impact. Here, S(t), I(t), and R(t) indicate the nodes numbers in susceptible, infected, and recovered states, respectively. Therefore,
| 9 |
The spreading influence of the node follows as
| 10 |
where indicates iteration numbers, nI and nR are the number of infected and recovered nodes, respectively. Where we set = 1000 independent run.
Kendall’s Tau
We used kendall’s 42,43 to calculate the performance of GSM further. Let suppose, two-node sequences are correlated with similar nodes number (n), and . One pair of two annotations and are said to be concordant if the ranking of both component agree, i-e. if both and or and . They are said to be discordant if and or and or if or , the pair is neither concordant nor discordant. The kendall’s is defined as:
| 11 |
where , and denote the number of concordant and discordant pairs, respectively.
Datasets description
Real-world networks
We evaluated GSM on seven different real-world networks to validate its efficiency. The seven real networks are publicly available and can be obtained from (http://networkrepository.com). The datasets are, e.g., (i) Jazz44: this is a communication network , consist of 198 nodes and 2472 edges. (ii) H-friendship network45: this network reflects user friendship and contains 12534 edges and 1858 nodes. (iii) E-mail network46: this is a communication network of the Roviraa Virgilli University of Spain, where nodes are e-mail user, and edges represent at least one e-mail was sent. (iv) Crime network47: this network consists of 829 nodes and 1476 edges . (v) Dolphin48: it is a social network with 62 nodes and 159 edges. (vi) Web-spam49: this is a famous social netwok provided by Purdue University, which consists of 4767 nodes and 37375 edges. (vii) Astroph-e50: this network consists of 18771 nodes and 198,050 edges. The topological characteristics of the seven real-world multi-typed complex networks are shown in Table 2.
Table 2.
The topological characteristics of the seven different real networks, where E and V are the numbers of edges and nodes.
| Network | |||||
|---|---|---|---|---|---|
| H-friendship | 12534 | 1858 | 13.49 | 272 | 0.141 |
| Jazz | 2472 | 198 | 27 | 100 | 0.6174 |
| 5451 | 1133 | 9 | 71 | 0.2202 | |
| Crime | 1476 | 829 | 3 | 25 | 0.0058 |
| Dolphin | 159 | 62 | 5 | 12 | 0.2589 |
| Web-spam | 37,375 | 4767 | 15 | 477 | 0.2859 |
| Astroph-e | 198,050 | 18,771 | 21 | 504 | 0.6306 |
The , and represents the maximum degree, averages degree, and average cluster coefficient of each network.
Synthetic networks
There is a bulk of exemplary complex networks exist in the real world and we do not know the details of ground realities about all of them because it’s not even possible to conceal such a large number of information about a matter that is so widely being exploited. Therefore in order to evaluate GSM and the baseline methodologies, we applied the benchmark generator model51,52 to generate different synthetic networks for the process of experimentations. (i) Random network: it is an synthetic random network in which we set the number of nodes as V= 1000, probability 0.01, the average degree as , and it consists of E = 4852 edges. (ii) BA network: this synthetic network consists of V = 2000 nodes and E = 7984 edges and 4 edges added are each time.
Results and discussion
To measure the influence of nodes in different real and synthetic networks and to validate the applicability and effectiveness of the GSM, we used two evaluation metrics i-e., SIR, and Kendall’s models. First, we used a simple graph containing 13 nodes and 17 edges, as shown in Fig. 2, applied GSM to find the influential nodes and, results are compared and analyzed with the outcomes of the rest of the benchmark algorithms such as BC, CC, HITS, HI, GIC, DNC, IKH, ECRM and PL.
Kendall’s of the proposed GSM and other algorithms are shown in Fig. 3. As, it can be seen that in terms Kendall , GSM achieves higher values, i.e., the values in range from 0.9 to 1 for , shows that GSM is performance-wise better on different networks, such as Dolphin, H-friendships, Jazz, Crime, E-mail, Web-spam, Astroph-e, BA, and Random networks.
Figure 3.
Kendall coloration coefficient results are obtained by comparing the ranking results generated by 10 algorithms and the SIR model. The infection probability of the network is set in the range between range between 0.01 to 0.10, and results are calculated based on average outcome of 1000 independent runs. Where (a) represents E-mail, (b) H-friendship, (c) Web-spam, (d) Crime, (e) Jazz (f) Dolphin, (g) Astroph-e, (h) Random, (i) BA, etc.
In order to further examine the propagation effect of GSM, we analyzed the spreading impact of the ranked nodes in the SIR model. To better distinguish the influential nodes, the infection probability needed to be set in the range between 0.01 and 0.1. For big networks (Astroph-e, Web-spam, BA and H-friendship), we set because, in case of bigger values, propagation will occur across the whole network24. Where it is not easy to differentiate the importance of distinct nodes. For small networks (Dolphin, Jazz, Crime, Random, and E-mail), we set , and also we set the recovery probability and the time t = 1000. First, the influence of each node is computed using different algorithms, and then sorted in descending order. Tables 3 and 4 shows the top ten ranked nodes; due to the limited space, only we present the top ten nodes of two networks Dolphin and Crime. We observed that most of the top-10 nodes of our algorithm are also exist in other algorithms. Hence, the proposed GSM validity is verified. Second, each ranked node is treated as a seed node to impacting other ranked nodes. Finally, we computed the infected numbers of nodes for each seed node through an average of over 1000 turns. Figure 4 indicates the results of the average infected number of nodes using ten algorithms. In general, more influential nodes can infect more nodes, so an efficient and effective method can create a curve that decreases from left to right. As shown in Fig. 4, our proposed GSM gets a better infection effect than other methods on different networks.
Table 3.
Top-10 ranking nodes of the Dolphin network using ten different methods.
| Rank | BC | CC | HITS | HI | PL | DNC | IKH | ECRM | GIC | GSM |
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 37 | 37 | 15 | 15 | 15 | 15 | 15 | 15 | 15 | 38 |
| 2 | 2 | 41 | 38 | 17 | 46 | 38 | 38 | 38 | 38 | 15 |
| 3 | 41 | 38 | 46 | 19 | 38 | 46 | 46 | 46 | 46 | 46 |
| 4 | 38 | 21 | 34 | 21 | 34 | 34 | 21 | 21 | 21 | 21 |
| 5 | 8 | 15 | 51 | 22 | 52 | 52 | 34 | 34 | 41 | 34 |
| 6 | 18 | 2 | 30 | 25 | 58 | 21 | 41 | 30 | 34 | 51 |
| 7 | 21 | 8 | 52 | 30 | 21 | 30 | 37 | 41 | 37 | 41 |
| 8 | 55 | 29 | 17 | 34 | 14 | 41 | 30 | 52 | 51 | 30 |
| 9 | 52 | 34 | 41 | 38 | 30 | 18 | 52 | 51 | 30 | 37 |
| 10 | 58 | 9 | 22 | 41 | 18 | 58 | 51 | 39 | 2 | 52 |
Table 4.
Top-10 ranking nodes of the Crime network using ten different methods.
| Rank | BC | CC | HITS | HI | PL | DNC | IKH | ECRM | GIC | GSM |
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 815 | 815 | 425 | 95 | 110 | 815 | 815 | 2 | 815 | 815 |
| 2 | 2 | 110 | 110 | 110 | 95 | 425 | 2 | 815 | 110 | 110 |
| 3 | 110 | 2 | 95 | 39 | 2 | 110 | 110 | 425 | 425 | 425 |
| 4 | 56 | 56 | 715 | 2 | 425 | 56 | 425 | 110 | 56 | 56 |
| 5 | 356 | 425 | 2 | 10 | 815 | 220 | 56 | 56 | 220 | 404 |
| 6 | 425 | 404 | 56 | 356 | 56 | 2 | 220 | 220 | 404 | 220 |
| 7 | 220 | 46 | 695 | 404 | 404 | 356 | 356 | 356 | 356 | 356 |
| 8 | 39 | 39 | 59 | 46 | 220 | 153 | 404 | 43 | 39 | 695 |
| 9 | 43 | 43 | 531 | 51 | 356 | 43 | 39 | 39 | 95 | 95 |
| 10 | 14 | 356 | 43 | 56 | 715 | 514 | 43 | 514 | 514 | 514 |
Figure 4.
Propagation influence of ranking effect using GSM and other baseline benchmarks, where F(t) represents the number of infected and recovered nodes at the time (t), and horizontal index line means the ranking order list. For big networks we set such as (Astroph-e, Web-spam, BA and H-friendship) networks and for small networks (Dolphin, Jazz, Crime, Random, and E-mail), we set .
Moreover, we compared the top ten nodes’ effects selected by our proposed GSM and the corresponding baseline centrality measures for different networks. All top ten nodes are considered as seed nodes and the time t in the range between 1 and 25. Figure 5 illustrates the influence of the top ten nodes in nine different networks; as can be seen, the proposed GSM gets the highest spreading efficiency than other centralities. In addition, It clearly shows that when the infection F(t) increases as time t increases and finally gets a steady value at a time t after consecutive time point. Since there are ten seed nodes, and most network propagation arrives in a steady state on time t=25, where we analyzed the spreading effects of GSM and the rest of other centralities measures.
Figure 5.
Propagation influence of top-10 ranking effect using GSM and the corresponding baseline measures, where F(t) represents the number of infected and recovered nodes at time (t), and horizontal index line represents the ranking order list. Where (a) represents E-mail, (b) Dolphin, (c) Crime, (d) BA, (e) Random (f) H-friendship, (g) Jazz, (h) Web-spam, (i) Astroph-e, etc.
Computational complexity of GSM
There are two main components of the proposed GSM. In the first stage, the time complexity of the node’s global influence is calculated. We used Dijkstra to calculate the shortest distance, and its complexity is . In the second stage, the time of complexity is O(n). Therefore, the total computational complexity of GSM is . Table 5 lists the computational complexity of the proposed GSM and other benchmarks, as we can see that the computational complexity of GSM is not very low, but its accuracy is better than other benchmarks, and also GSM can automatically measure nodes influence without any parameters (shown in Figs. 3, 4 and 5). In future work, we plan to enhance GSM as paralleling computations.
Table 5.
Computational complexity of GSM and other benchmarks.
| Methods | Complexity |
|---|---|
| BC | |
| CC | O(nm) |
| HITS | O(n) |
| HI | O(nlogn) |
| PL | |
| DNC | |
| IKH | |
| ECRM | |
| GIC | |
| GSM |
Conclusion and Future Recommendations
We studied the problem of identification of nodes influence in complex networks. Several approaches have been developed and deployed in this area but still, it is a big issue for scientists and researchers. In this regard, we proposed an algorithm called GSM to identify influential nodes, which considers both self as well as global influence of nodes in the networks. We applied the proposed GSM on different real as well as synthetic networks and employed two evaluation metrics (SIR and Kendall ) to verify its efficiency. Experimental results demonstrated that our algorithm performed better than the benchmarks. For further work, the proposed GSM algorithm can be extended to many forms for better results. For instance, adding some parameters to control the intensity among various nodes to yield better performance. Furthermore, we also plan to combine the profit leader algorithm concept with the proposed algorithm to enhance the performance.
Acknowledgements
This work is supported by the National Key Research and Development Program of China under Grant No. 2018YFB1003602.
Author contributions
Conceptualization, B.W., J.S. and J.L.; Analysis, A.U., J.L.; Methodology, A.U. and B.W.; Supervision, J.L., B.W. and J.S.; Validation, A.U., N.K., Z.S.; Writing, A.U. and J.S.
Data availability
All the real networks are available publicly and can be accessed from http://networkrepository.com.
Competing interests
The authors declare no competing interests.
Footnotes
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Zhong J, Zhang F, Li Z. Identification of vital nodes in complex network via belief propagation and node reinsertion. IEEE Access. 2018;6:29200–29210. doi: 10.1109/ACCESS.2018.2843532. [DOI] [Google Scholar]
- 2.Li C, Wang L, Sun S, Xia C. Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 2018;320:512–523. doi: 10.1016/j.cam.2018.05.051. [DOI] [Google Scholar]
- 3.Zareie A, Sheikhahmadi A, Jalili M. Identification of influential users in social network using gray wolf optimization algorithm. Exp. Syst. Appl. 2020;142:112971. doi: 10.1016/j.eswa.2019.112971. [DOI] [Google Scholar]
- 4.Curado M, Tortosa L, Vicent JF, Yeghikyan G. Analysis and comparison of centrality measures applied to urban networks with data. J. Comput. Sci. 2020;43:101127. doi: 10.1016/j.jocs.2020.101127. [DOI] [Google Scholar]
- 5.Barabási A-L, Bonabeau E. Scale-free networks. Sci. Am. 2003;288:60–69. doi: 10.1038/scientificamerican0503-60. [DOI] [PubMed] [Google Scholar]
- 6.Yang Y, Wang X, Chen Y, Hu M. Identifying key nodes in complex networks based on global structure. IEEE Access. 2020;8:32904–32913. doi: 10.1109/ACCESS.2020.2973241. [DOI] [Google Scholar]
- 7.Rosvall M, Esquivel AV, Lancichinetti A, West JD, Lambiotte R. Memory in network flows and its effects on spreading dynamics and community detection. Nat. Commun. 2014;5:1–13. doi: 10.1038/ncomms5630. [DOI] [PubMed] [Google Scholar]
- 8.Zagenczyk TJ, Scott KD, Gibney R, Murrell AJ, Thatcher JB. Social influence and perceived organizational support: a social networks analysis. Org. Behav. Human Decis. Process. 2010;111:127–138. doi: 10.1016/j.obhdp.2009.11.004. [DOI] [Google Scholar]
- 9.Sidders B, et al. Network-based drug discovery: coupling network pharmacology with phenotypic screening for neuronal excitability. J. Mol. Biol. 2018;430:3005–3015. doi: 10.1016/j.jmb.2018.07.016. [DOI] [PubMed] [Google Scholar]
- 10.Li Z, et al. Identifying influential spreaders by gravity model. Sci. Rep. 2019;9:1–7. doi: 10.1038/s41598-019-44930-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 11.Xing, Y. et al. A node influence based label propagation algorithm for community detection in networks. Sci. World J. 10.1155/2014/627581 (2014). [DOI] [PMC free article] [PubMed]
- 12.Maji G, Namtirtha A, Dutta A, Malta MC. Influential spreaders identification in complex networks with improved k-shell hybrid method. Exp. Syst. Appl. 2020;144:113092. doi: 10.1016/j.eswa.2019.113092. [DOI] [Google Scholar]
- 13.Yi, Z., Wu, X. & Li, F. Ranking spreaders in complex networks based on the most influential neighbors. Discrete Dyn. Nat. Soc.10.1155/2018/3649079 (2018).
- 14.Zareie A, Sheikhahmadi A, Jalili M. Identification of influential users in social networks based on users’ interest. Inf. Sci. 2019;493:217–231. doi: 10.1016/j.ins.2019.04.033. [DOI] [Google Scholar]
- 15.Zhao G, Jia P, Zhou A, Zhang B. Infgcn: identifying influential nodes in complex networks with graph convolutional networks. Neurocomputing. 2020;414:18–26. doi: 10.1016/j.neucom.2020.07.028. [DOI] [Google Scholar]
- 16.Yang H, An S. Critical nodes identification in complex networks. Symmetry. 2020;12:123. doi: 10.3390/sym12010123. [DOI] [Google Scholar]
- 17.Guo C, et al. Influential nodes identification in complex networks via information entropy. Entropy. 2020;22:242. doi: 10.3390/e22020242. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 18.Ediger, D. et al. Massive social network analysis: mining twitter for social good. In 2010 39th International Conference on Parallel Processing, 583–593 (IEEE, 2010).
- 19.Zekun W, Xiangxi W, Minggong W. Identification of key nodes in aircraft state network based on complex network theory. IEEE Access. 2019;7:60957–60967. doi: 10.1109/ACCESS.2019.2915508. [DOI] [Google Scholar]
- 20.Yang Y-Z, Hu M, Huang T-Y. Influential nodes identification in complex networks based on global and local information. Chin. Phys. B. 2020;29:088903. doi: 10.1088/1674-1056/ab969f. [DOI] [Google Scholar]
- 21.Sheng J, et al. Identifying influential nodes in complex networks based on global and local structure. Phys. A Stat. Mech. Its Appl. 2020;541:123262. doi: 10.1016/j.physa.2019.123262. [DOI] [Google Scholar]
- 22.Sabidussi G. The centrality index of a graph. Psychometrika. 1966;31:581–603. doi: 10.1007/BF02289527. [DOI] [PubMed] [Google Scholar]
- 23.Koschützki, D. et al. Centrality indices. In Network analysis, 16–61 (Springer, 2005).
- 24.Kitsak M, et al. Identification of influential spreaders in complex networks. Nat. Phys. 2010;6:888–893. doi: 10.1038/nphys1746. [DOI] [Google Scholar]
- 25.Solá L, et al. Eigenvector centrality of nodes in multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 2013;23:033131. doi: 10.1063/1.4818544. [DOI] [PubMed] [Google Scholar]
- 26.Kun Z, Peipei L, Baoping Z, Manyu H. Evaluation method for node importance in directed-weighted complex networks based on pagerank [j] J. Nanjing Univ. Aeronaut. Astron. 2013;45:429–434. [Google Scholar]
- 27.Zhao B, Hu S, Zhang Z, Xu C, Tang X. Hyperlink induced topic search-based method to predict essential proteins. Int. J. Data Min. Bioinform. 2019;22:250–264. doi: 10.1504/IJDMB.2019.100627. [DOI] [Google Scholar]
- 28.Yu Z, Shao J, Yang Q, Sun Z. Profitleader: identifying leaders in networks with profit capacity. World Wide Web. 2019;22:533–553. doi: 10.1007/s11280-018-0537-6. [DOI] [Google Scholar]
- 29.Fei L, Zhang Q, Deng Y. Identifying influential nodes in complex networks based on the inverse-square law. Phys. A Stat. Mech. Its Appl. 2018;512:1044–1059. doi: 10.1016/j.physa.2018.08.135. [DOI] [Google Scholar]
- 30.Ma L-L, Ma C, Zhang H-F, Wang B-H. Identifying influential spreaders in complex networks based on gravity formula. Phys. A Stat. Mech. Its Appl. 2016;451:205–212. doi: 10.1016/j.physa.2015.12.162. [DOI] [Google Scholar]
- 31.Ma Q, Ma J. Identifying and ranking influential spreaders in complex networks with consideration of spreading probability. Phys. A Stat. Mech. Its Appl. 2017;465:312–330. doi: 10.1016/j.physa.2016.08.041. [DOI] [Google Scholar]
- 32.Freeman, L. C. A set of measures of centrality based on betweenness. Sociometry40(1), 35–41 (1977).
- 33.Freeman LC. Centrality in social networks conceptual clarification. Soc. Netw. 1978;1:215–239. doi: 10.1016/0378-8733(78)90021-7. [DOI] [Google Scholar]
- 34.Liu B, Jiang S, Zou Q. Hits-pr-hhblits: protein remote homology detection by combining pagerank and hyperlink-induced topic search. Brief. Bioinform. 2020;21:298–308. doi: 10.1093/bib/bby104. [DOI] [PubMed] [Google Scholar]
- 35.Lü L, Zhou T, Zhang Q-M, Stanley HE. The h-index of a network node and its relation to degree and coreness. Nat. Commun. 2016;7:1–7. doi: 10.1038/ncomms10168. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 36.Zareie A, Sheikhahmadi A, Jalili M, Fasaei MSK. Finding influential nodes in social networks based on neighborhood correlation coefficient. Knowl. Based Syst. 2020;194:105580. doi: 10.1016/j.knosys.2020.105580. [DOI] [Google Scholar]
- 37.Ibnoulouafi A, El Haziti M. Density centrality: identifying influential nodes based on area density formula. Chaos Solit. Fract. 2018;114:69–80. doi: 10.1016/j.chaos.2018.06.022. [DOI] [Google Scholar]
- 38.Koyré A. An unpublished letter of robert hooke to isaac newton. Isis. 1952;43:312–337. doi: 10.1086/348155. [DOI] [PubMed] [Google Scholar]
- 39.Kang B, Chhipi-Shrestha G, Deng Y, Hewage K, Sadiq R. Stable strategies analysis based on the utility of z-number in the evolutionary games. Appl. Math. Comput. 2018;324:202–217. [Google Scholar]
- 40.Allen LJ. Some discrete-time si, sir, and sis epidemic models. Math. Biosci. 1994;124:83–105. doi: 10.1016/0025-5564(94)90025-6. [DOI] [PubMed] [Google Scholar]
- 41.Gang Y, Tao Z, Jie W, Zhong-Qian F, Bing-Hong W. Epidemic spread in weighted scale-free networks. Chin. Phys. Lett. 2005;22:510. doi: 10.1088/0256-307X/22/2/068. [DOI] [Google Scholar]
- 42.Kendall MG. The treatment of ties in ranking problems. Biometrika. 1945;33:239–251. doi: 10.1093/biomet/33.3.239. [DOI] [PubMed] [Google Scholar]
- 43.Knight WR. A computer method for calculating kendall’s tau with ungrouped data. J. Am. Stat. Assoc. 1966;61:436–439. doi: 10.1080/01621459.1966.10480879. [DOI] [Google Scholar]
- 44.Gleiser PM, Danon L. Community structure in jazz. Adv. Complex Syst. 2003;6:565–573. doi: 10.1142/S0219525903001067. [DOI] [Google Scholar]
- 45.Hamsterster friendships network dataset – KONECT (2017). http://konect.uni-koblenz.de/networks/petster-friendships-hamster.
- 46.Guimera R, Danon L, Diaz-Guilera A, Giralt F, Arenas A. Self-similar community structure in a network of human interactions. Phys. Rev. E. 2003;68:065103. doi: 10.1103/PhysRevE.68.065103. [DOI] [PubMed] [Google Scholar]
- 47.Rossi, R.A. & Ahmed, N. K. The network data repository with interactive graph analytics and visualization. In AAAI (2015). http://networkrepository.com.
- 48.Lusseau D, et al. The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations. Behav. Ecol. Sociobiol. 2003;54:396–405. doi: 10.1007/s00265-003-0651-y. [DOI] [Google Scholar]
- 49.Castillo, C., Chellapilla, K. & Denoyer, L. Web spam challenge 2008. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) (2008).
- 50.Leskovec J, Kleinberg J, Faloutsos C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data (TKDD) 2007;1:2-es. doi: 10.1145/1217299.1217301. [DOI] [Google Scholar]
- 51.Barabási, A.-L. Emergence of scaling in complex networks. Handbook of Graphs and Networks: From the Genome to the Internet. Berlin: Wiley-VCH (2003).
- 52.Newman ME, et al. Random graphs as models of networks. Handb. Gr. Netw. 2003;1:35–68. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
All the real networks are available publicly and can be accessed from http://networkrepository.com.




