Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2021 Mar 17;11:6173. doi: 10.1038/s41598-021-84684-x

Identification of nodes influence based on global structure model in complex networks

Aman Ullah 1, Bin Wang 1, JinFang Sheng 1,, Jun Long 1,2, Nasrullah Khan 3,4, ZeJun Sun 5
PMCID: PMC7969936  PMID: 33731720

Abstract

Identification of Influential nodes in complex networks is challenging due to the largely scaled data and network sizes, and frequently changing behaviors of the current topologies. Various application scenarios like disease transmission and immunization, software virus infection and disinfection, increased product exposure and rumor suppression, etc., are applicable domains in the corresponding networks where identification of influential nodes is crucial. Though a lot of approaches are proposed to address the challenges, most of the relevant research concentrates only on single and limited aspects of the problem. Therefore, we propose Global Structure Model (GSM) for influential nodes identification that considers self-influence as well as emphasizes on global influence of the node in the network. We applied GSM and utilized Susceptible Infected Recovered model to evaluate its efficiency. Moreover, various standard algorithms such as Betweenness Centrality, Profit Leader, H-Index, Closeness Centrality, Hyperlink Induced Topic Search, Improved K-shell Hybrid, Density Centrality, Extended Cluster Coefficient Ranking Measure, and Gravity Index Centrality are employed as baseline benchmarks to evaluate the performance of GSM. Similarly, we used seven real-world and two synthetic multi-typed complex networks along-with different well-known datasets for experiments. Results analysis indicates that GSM outperformed the baseline algorithms in identification of influential node(s).

Subject terms: Computer science, Information technology


The concepts of complex networks are abstracted from real-world system networks13, like transport system networks, human friendship, web hyperlink and protein networks, etc. Such networks have common characteristics, i.e., heterogeneous topologies, that make it impossible to assign the same importance to each node in the network. Therefore, it is essential to identify the influential nodes via quantitative approaches to examine their properties and to practice their proper usage. For example, in infectious diseases network, preventing the spread of rumors and viruses4,5, in criminal networks, quickly identifying a terrorist organization’s leader6. Similarly, in the traffic system network7, food chain network8, drug network9, and so on. There are a good number of studies have been proposed and deployed in the field of complex network on the identification of influential nodes1012,1220 where identification of most important nodes from local and global perspectives is worth mentioning21. Although closeness centrality (CC) and betweenness centrality (BC)22 are path-based indicators that consider the global structure of the network to identify the influence of nodes. However, due to their high computational complexity, they may not be applicable to many networks. It’s common that degree centrality (DC)23 is the simplest method to identify the influential nodes, but it fails to consider the global structure of networks. Kitsak et al.24 proposed the k-shell method for locating influential nodes, but it is too coarse to identify the required influential nodes. Besides these, iterative-based centralities such as eigenvector centrality (EC)25, page rank (PR)26, hypertext induced topic search (HITS)27, and son on are not appropriate for networks with tight connections.

Recently, some approaches have put efforts forward for the identification of influential nodes such as profit leader28, inverse square law29 and gravity index model30. The profit leader method considers the set of important nodes on the basis of the profit leader concept analysis. In the paper by L.-l. Ma et al.30 proposed gravity formula-based algorithm, which considers both neighbour’s nodes influences and path information. However, in some cases, it is also important to combine the global as well as local structure of nodes in the entire network. Similarly, the inverse square model is based on node interactions and is not suitable for large network. Furthermore, in view of propagation probability, Ma et al.31 proposed hybrid degree centrality (HC), which combines local indicators and degree centrality measures. All in all, these approaches have their own shortcomings and limitations. Still, the identification of influential nodes is a challenge.

From the above discussion, to address these changeling problems, inspired from literature10,29,30, in this study, we design a new mechanism called GSM that not only considers the self-influence of the node in the network but also concentrates on the global influence of nodes. To analyze the algorithmic performance, we employed GSM on different kinds of real as well as synthetic networks where we used the susceptible-infected-recovered (SIR) and kendall’s τ coefficient models to examine the effectiveness of GSM. In addition, we compared the experimental results of the baseline algorithms and with recently proposed approaches, where simulation results on seven different types of real and two synthetic networks showed that GSM effectively identifies influential nodes.

The framework of the paper is organized as follows: We present preliminaries and a brief introduction of baseline algorithms, including BC, PL, GIC, HI, CC, ECRM, DNC, IKH and HITS in Preliminaries section. The proposed GSM model is presented in Proposed method. Results and discussion to illustrate the effectiveness of the GSM are discussed in Results and discussion section, and finally, some conclusion and future recommendations are given in Conclusion and future recommendations section.

Preliminaries

A network can be denoted by G, equated as G = (V, E), where V and E represent nodes and edges, respectively. Moreover, Betweenness Centrality (BC)32, Closeness Centrality (CC)33, HITS34, H-Index (HI)35, Profit Leader (PL)28, Improved k-shell hybrid method (IKSh)12, Extended Cluster Coefficient Ranking Measure (ECRM)36, Gravity Index Centrality (GIC)30 and Density centrality (DNC)37 are introduced in this section.

  1. Betweenness Centrality (BC): BC calculates influential nodes based on global information32. BC(i) is defined as:
    BC(i)=j,k1gjk(i)gjk, 1
    where gjk indicates number of paths between nodes j and k, and gjk(i) represents the shortest paths between nodes j and k, that pass through node i.
  2. Closeness Centrality (CC): CC also calculates influential nodes based on global information. It uses the shortest distance between each pair of nodes to identify the influence of each node33. CC of node i is defined as:
    CC(i)=N-1j1dij, 2
  3. Hyperlink Induced Topic Search (HITS): This algorithm is based on two factors i-e., Authority Update, and Hub Update. Authority update is computed by considering the number of hub edges associated with the authority website, and Hub Update is computed by considering the number of authority websites linked by the Hub website34.

  4. H-Index (HI): This algorithm identifies the influential node’s by taking into account the node’s neighbor and using H-index notation. A high H-index represents that the node has more important than other connected nodes35.

  5. Profit Leader (PL): This algorithm is based on profit leader concept analysis and suitable for any network i.e., directed or undirected28.

  6. Improved K-shell Hybrid (IKH): This algorithm considers the k-shell, shortest distance between the nodes and parameter λ (in range between 0 and 1) to identify the most influential nodes12.

  7. Gravity Index Centrality (GIC): This algorithm basis on universal gravity concept; that considers both neighbor’s nodes influences and path information30. GIC(i) is defined as:
    GIC(i)=jϵθikshell(i)×kshell(j)disti,j2, 3
    where θi is the set of neighbors node i.
  8. Extended Cluster Coefficient Ranking Measure (ECRM): This algorithm is working on the basis of local clustering coefficients and uses link similarity between adjacent nodes36.

  9. Density centrality (DNC): It is inspired by the area density formula to identify the influence of nodes in the spreading dynamics37. DNC(i) is defined as:
    DNC(i)=jϵξidegreeiπdi,j2, 4

Proposed method

Several approaches based on the global structure of the network to identify the influence of nodes have been developed and deployed, but better utilization of self as well as global structure influence is still a challenge, needs to be addressed. Inspired from literature3739 , a Global Structure Model (GSM) was proposed, which consists of self and global influences.

Self-influence

In this context, we used e (natural logarithm) and take k-shell Ks(vi), and nodes number (N) in the network as power parameters to minimize the overestimation of the self-influence.

SI(vi)=eKs(vi)N 5

where N shows the number of all nodes in the network.

Global-influence

The node influence also considers the influence of the other connected nodes to it. Normally, the node influence is increased if its neighborhoods have a high value of k-shell; however, the contact distance between the two nodes cannot be ignored, which is inversely proportional to the influence of the nodes.

GI(vi)=ijKs(vj)dij 6

where dij is the shortest distance between node i and node j.

Node influence

The node Vi influence is not only on its own influence but also on the nodes around it. Therefore, the proposed GSM simultaneously considers these two aspects, self and global influence, which can be defined as,

GSM(vi)=SI(vi)×GI(vi) 7

We can also express GSM of the node vi,

GSM(vi)=eKs(vi)N×ijKs(vj)dij 8

where Ks(vi) and Ks(vj) denote the k-shell of node i and node j,

Computation process

The proposed GSM model is divided into four parts; first, construction of corresponding network; second, calculation of the network’s global influence and the k-shell of node and the distance between nodes. In the third step, we consider the self-influence of the network, the self influence of the node itself is computed. Finally, the influence of each node on the entire network is calculated. To further demonstrate GSM method, as shown in Fig. 1, for a specific calculation process, here we consider a simple network to clarify it in detail. In Fig. 2, consists of 13 nodes and 17 edges. As shown in the network, we consider GSM method by taking the node V4 influence as an example. First, we calculate the k-shell and the shortest distance between each node; we have

Figure 1.

Figure 1

The flow chart of the proposed GSM.

Figure 2.

Figure 2

A network with 17 edges and 13 nodes.

KS1=3,KS2=3,KS3=3KS4=3,KS5=2,Ks6=1,KS7=2,KS8=2,KS9=1,KS10=1,KS11=1,KS12=1,KS13=1, d4-1 = 1 d4-2 = 1,d4-3 = 1, d4-5 = 2, d4-6 = 3, d4-7 = 1, d4-8 = 1, d4-9 = 2, d4-10 = 1, d4-11 = 2, d4-12 = 2, d4-13 = 2.

To calculate the self influence and global influence, here we apply Eqs. (6) and (7); we have, S(4)=e313=1.25956, and GI(4-1)=31=3 GI(4-2)=3, GI(4-3)=3, GI(4-5)=1, GI(4-6)=0.3333, GI(4-7)=2, GI(4-8)=2, GI(4-9)=0.5, GI(4-10)=1, GI(4-11)=0.5, GI(4-12)=0.5, GI(4-13)=0.5, we have added all these values based on Eq. (7), we have, GI(4-1)+GI(4-2)+GI(4-3)+GI(4-5)+GI(4-6)+G(4-7)+GI(4-8)+GI(4-9)+GI(4-10)+GI(4-11)+GI(4-12)+GI(4-13)=17.333333, Finally, the influence of node V4 can be calculated, we have GSM4=1.25956×17.333333=21.833. Table 1 shows the ranking influence of each node in the given simple network.

Table 1.

GSM results of Figure 2.

Node 4 2 1 3 5 8 7 10 11 9 6 12 13
Influence 21.833 20.15 19.52 18.053 15.06 15.06 14.48 14.12 14.12 10.02 9.91 9.21 9.21

Experiments

Experimental setup is performed on system with configuration as: CPU: Feiteng 1500A (1, 16-core, 1.5 ghz), Operating system: galaxy kirin server os Bios: China-made Kunlun firmware Memory: 3 GB and Hard disk: 2 TB (Fig. 2).

Evaluation metrics

SIR model

We used the SIR model to investigate the spreading dynamic of each node40,41 to quantify the performance of GSM and other benchmark centralities. In the SIR model, there are three states, (i) Susceptible (S), (ii) Infected (I), (iii) Recovered (R). Susceptible (S) refers to a healthy state and can be infected by others. Infected (I) refers infected state and can infect other individuals. Recovered (R) denotes a recovered state, which cannot be infected by other individuals again. For the first time, all the seed nodes are in a susceptible form. At each time step, the seed node can infect its nearest and next-nearest neighbor nodes (in the susceptible state) with a probability β, then each node (the node which was infected) enters into the recovered state with a probability μ. This process continued till there are no more infected nodes. Finally, all the recovered nodes are used to simulate the actual node impact. Here, S(t), I(t), and R(t) indicate the nodes numbers in susceptible, infected, and recovered states, respectively. Therefore,

ds(t)d(t)=-βs(t)i(t),di(t)d(t)=βs(t)i(t)-βi(t),dr(t)d(t)=βi(t). 9

The spreading influence Ki of the node Vi follows as

Ki=F(t)=1Nite(nI+nR) 10

where Nite indicates iteration numbers, nI and nR are the number of infected and recovered nodes, respectively. Where we set Nite= 1000 independent run.

Kendall’s Tau (τ)

We used kendall’s (τ)42,43 to calculate the performance of GSM further. Let suppose, two-node sequences (X&Y) are correlated with similar nodes number (n), X=(x1,x2,,xn) and Y=(y1,y2,,yn). One pair of two annotations (xi,yi) and (xj,yj) (ij) are said to be concordant if the ranking of both component agree, i-e. if both xi>xj and yi>yj or xi<xj and yi<yj. They are said to be discordant if xi>xj and yi<yj or xi<xj and yi>yj or if xi=xj or yi=yj , the pair is neither concordant nor discordant. The kendall’s (τ) is defined as:

τ(X,Y)=nc-ndn(n-1)/2 11

where nc, and nd denote the number of concordant and discordant pairs, respectively.

Datasets description

Real-world networks

We evaluated GSM on seven different real-world networks to validate its efficiency. The seven real networks are publicly available and can be obtained from (http://networkrepository.com). The datasets are, e.g., (i) Jazz44: this is a communication network , consist of 198 nodes and 2472 edges. (ii) H-friendship network45: this network reflects user friendship and contains 12534 edges and 1858 nodes. (iii) E-mail network46: this is a communication network of the Roviraa Virgilli University of Spain, where nodes are e-mail user, and edges represent at least one e-mail was sent. (iv) Crime network47: this network consists of 829 nodes and 1476 edges . (v) Dolphin48: it is a social network with 62 nodes and 159 edges. (vi) Web-spam49: this is a famous social netwok provided by Purdue University, which consists of 4767 nodes and 37375 edges. (vii) Astroph-e50: this network consists of 18771 nodes and 198,050 edges. The topological characteristics of the seven real-world multi-typed complex networks are shown in Table 2.

Table 2.

The topological characteristics of the seven different real networks, where E and V are the numbers of edges and nodes.

Network |E| |V| davg dmax <CC>
H-friendship 12534 1858 13.49 272 0.141
Jazz 2472 198 27 100 0.6174
E-mail 5451 1133 9 71 0.2202
Crime 1476 829 3 25 0.0058
Dolphin 159 62 5 12 0.2589
Web-spam 37,375 4767 15 477 0.2859
Astroph-e 198,050 18,771 21 504 0.6306

The davg , dmax and <CC> represents the maximum degree, averages degree, and average cluster coefficient of each network.

Synthetic networks

There is a bulk of exemplary complex networks exist in the real world and we do not know the details of ground realities about all of them because it’s not even possible to conceal such a large number of information about a matter that is so widely being exploited. Therefore in order to evaluate GSM and the baseline methodologies, we applied the benchmark generator model51,52 to generate different synthetic networks for the process of experimentations. (i) Random network: it is an synthetic random network in which we set the number of nodes as V= 1000, probability 0.01, the average degree as <k>=3, and it consists of E = 4852 edges. (ii) BA network: this synthetic network consists of V = 2000 nodes and E = 7984 edges and 4 edges added are each time.

Results and discussion

To measure the influence of nodes in different real and synthetic networks and to validate the applicability and effectiveness of the GSM, we used two evaluation metrics i-e., SIR, and Kendall’s models. First, we used a simple graph containing 13 nodes and 17 edges, as shown in Fig. 2, applied GSM to find the influential nodes and, results are compared and analyzed with the outcomes of the rest of the benchmark algorithms such as BC, CC, HITS, HI, GIC, DNC, IKH, ECRM and PL.

Kendall’s (τ) of the proposed GSM and other algorithms are shown in Fig. 3. As, it can be seen that in terms Kendall (τ), GSM achieves higher values, i.e., the values in range from 0.9 to 1 for β=0.01-0.1, shows that GSM is performance-wise better on different networks, such as Dolphin, H-friendships, Jazz, Crime, E-mail, Web-spam, Astroph-e, BA, and Random networks.

Figure 3.

Figure 3

Kendall coloration coefficient τ results are obtained by comparing the ranking results generated by 10 algorithms and the SIR model. The infection probability β of the network is set in the range between range between 0.01 to 0.10, and results are calculated based on average outcome of 1000 independent runs. Where (a) represents E-mail, (b) H-friendship, (c) Web-spam, (d) Crime, (e) Jazz (f) Dolphin, (g) Astroph-e, (h) Random, (i) BA, etc.

In order to further examine the propagation effect of GSM, we analyzed the spreading impact of the ranked nodes in the SIR model. To better distinguish the influential nodes, the infection probability λ needed to be set in the range between 0.01 and 0.1. For big networks (Astroph-e, Web-spam, BA and H-friendship), we set λ=0.01 because, in case of bigger values, propagation will occur across the whole network24. Where it is not easy to differentiate the importance of distinct nodes. For small networks (Dolphin, Jazz, Crime, Random, and E-mail), we set λ=0.1, and also we set the recovery probability ϵ=1 and the time t = 1000. First, the influence of each node is computed using different algorithms, and then sorted in descending order. Tables 3 and 4 shows the top ten ranked nodes; due to the limited space, only we present the top ten nodes of two networks Dolphin and Crime. We observed that most of the top-10 nodes of our algorithm are also exist in other algorithms. Hence, the proposed GSM validity is verified. Second, each ranked node is treated as a seed node to impacting other ranked nodes. Finally, we computed the infected numbers of nodes for each seed node through an average of over 1000 turns. Figure 4 indicates the results of the average infected number of nodes using ten algorithms. In general, more influential nodes can infect more nodes, so an efficient and effective method can create a curve that decreases from left to right. As shown in Fig. 4, our proposed GSM gets a better infection effect than other methods on different networks.

Table 3.

Top-10 ranking nodes of the Dolphin network using ten different methods.

Rank BC CC HITS HI PL DNC IKH ECRM GIC GSM
1 37 37 15 15 15 15 15 15 15 38
2 2 41 38 17 46 38 38 38 38 15
3 41 38 46 19 38 46 46 46 46 46
4 38 21 34 21 34 34 21 21 21 21
5 8 15 51 22 52 52 34 34 41 34
6 18 2 30 25 58 21 41 30 34 51
7 21 8 52 30 21 30 37 41 37 41
8 55 29 17 34 14 41 30 52 51 30
9 52 34 41 38 30 18 52 51 30 37
10 58 9 22 41 18 58 51 39 2 52

Table 4.

Top-10 ranking nodes of the Crime network using ten different methods.

Rank BC CC HITS HI PL DNC IKH ECRM GIC GSM
1 815 815 425 95 110 815 815 2 815 815
2 2 110 110 110 95 425 2 815 110 110
3 110 2 95 39 2 110 110 425 425 425
4 56 56 715 2 425 56 425 110 56 56
5 356 425 2 10 815 220 56 56 220 404
6 425 404 56 356 56 2 220 220 404 220
7 220 46 695 404 404 356 356 356 356 356
8 39 39 59 46 220 153 404 43 39 695
9 43 43 531 51 356 43 39 39 95 95
10 14 356 43 56 715 514 43 514 514 514

Figure 4.

Figure 4

Propagation influence of ranking effect using GSM and other baseline benchmarks, where F(t) represents the number of infected and recovered nodes at the time (t), and horizontal index line means the ranking order list. For big networks we set λ=0.01 such as (Astroph-e, Web-spam, BA and H-friendship) networks and for small networks (Dolphin, Jazz, Crime, Random, and E-mail), we set λ=0.10.

Moreover, we compared the top ten nodes’ effects selected by our proposed GSM and the corresponding baseline centrality measures for different networks. All top ten nodes are considered as seed nodes and the time t in the range between 1 and 25. Figure 5 illustrates the influence of the top ten nodes in nine different networks; as can be seen, the proposed GSM gets the highest spreading efficiency than other centralities. In addition, It clearly shows that when the infection F(t) increases as time t increases and finally gets a steady value at a time t after consecutive time point. Since there are ten seed nodes, and most network propagation arrives in a steady state on time t=25, where we analyzed the spreading effects of GSM and the rest of other centralities measures.

Figure 5.

Figure 5

Propagation influence of top-10 ranking effect using GSM and the corresponding baseline measures, where F(t) represents the number of infected and recovered nodes at time (t), and horizontal index line represents the ranking order list. Where (a) represents E-mail, (b) Dolphin, (c) Crime, (d) BA, (e) Random (f) H-friendship, (g) Jazz, (h) Web-spam, (i) Astroph-e, etc.

Computational complexity of GSM

There are two main components of the proposed GSM. In the first stage, the time complexity of the node’s global influence is calculated. We used Dijkstra to calculate the shortest distance, and its complexity is O(n2). In the second stage, the time of complexity is O(n). Therefore, the total computational complexity of GSM is O(n2). Table 5 lists the computational complexity of the proposed GSM and other benchmarks, as we can see that the computational complexity of GSM is not very low, but its accuracy is better than other benchmarks, and also GSM can automatically measure nodes influence without any parameters (shown in Figs. 3, 4 and 5). In future work, we plan to enhance GSM as paralleling computations.

Table 5.

Computational complexity of GSM and other benchmarks.

Methods Complexity
BC O(n2m)
CC O(nm)
HITS O(n)
HI O(nlogn)
PL O(n<k>)
DNC O(n3)
IKH O(n<k>r)
ECRM O(|e|+|n|)
GIC O(n2)
GSM O(n2)

Conclusion and Future Recommendations

We studied the problem of identification of nodes influence in complex networks. Several approaches have been developed and deployed in this area but still, it is a big issue for scientists and researchers. In this regard, we proposed an algorithm called GSM to identify influential nodes, which considers both self as well as global influence of nodes in the networks. We applied the proposed GSM on different real as well as synthetic networks and employed two evaluation metrics (SIR and Kendall τ) to verify its efficiency. Experimental results demonstrated that our algorithm performed better than the benchmarks. For further work, the proposed GSM algorithm can be extended to many forms for better results. For instance, adding some parameters to control the intensity among various nodes to yield better performance. Furthermore, we also plan to combine the profit leader algorithm concept with the proposed algorithm to enhance the performance.

Acknowledgements

This work is supported by the National Key Research and Development Program of China under Grant No. 2018YFB1003602.

Author contributions

Conceptualization, B.W., J.S. and J.L.; Analysis, A.U., J.L.; Methodology, A.U. and B.W.; Supervision, J.L., B.W. and J.S.; Validation, A.U., N.K., Z.S.; Writing, A.U. and J.S.

Data availability

All the real networks are available publicly and can be accessed from http://networkrepository.com.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Zhong J, Zhang F, Li Z. Identification of vital nodes in complex network via belief propagation and node reinsertion. IEEE Access. 2018;6:29200–29210. doi: 10.1109/ACCESS.2018.2843532. [DOI] [Google Scholar]
  • 2.Li C, Wang L, Sun S, Xia C. Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 2018;320:512–523. doi: 10.1016/j.cam.2018.05.051. [DOI] [Google Scholar]
  • 3.Zareie A, Sheikhahmadi A, Jalili M. Identification of influential users in social network using gray wolf optimization algorithm. Exp. Syst. Appl. 2020;142:112971. doi: 10.1016/j.eswa.2019.112971. [DOI] [Google Scholar]
  • 4.Curado M, Tortosa L, Vicent JF, Yeghikyan G. Analysis and comparison of centrality measures applied to urban networks with data. J. Comput. Sci. 2020;43:101127. doi: 10.1016/j.jocs.2020.101127. [DOI] [Google Scholar]
  • 5.Barabási A-L, Bonabeau E. Scale-free networks. Sci. Am. 2003;288:60–69. doi: 10.1038/scientificamerican0503-60. [DOI] [PubMed] [Google Scholar]
  • 6.Yang Y, Wang X, Chen Y, Hu M. Identifying key nodes in complex networks based on global structure. IEEE Access. 2020;8:32904–32913. doi: 10.1109/ACCESS.2020.2973241. [DOI] [Google Scholar]
  • 7.Rosvall M, Esquivel AV, Lancichinetti A, West JD, Lambiotte R. Memory in network flows and its effects on spreading dynamics and community detection. Nat. Commun. 2014;5:1–13. doi: 10.1038/ncomms5630. [DOI] [PubMed] [Google Scholar]
  • 8.Zagenczyk TJ, Scott KD, Gibney R, Murrell AJ, Thatcher JB. Social influence and perceived organizational support: a social networks analysis. Org. Behav. Human Decis. Process. 2010;111:127–138. doi: 10.1016/j.obhdp.2009.11.004. [DOI] [Google Scholar]
  • 9.Sidders B, et al. Network-based drug discovery: coupling network pharmacology with phenotypic screening for neuronal excitability. J. Mol. Biol. 2018;430:3005–3015. doi: 10.1016/j.jmb.2018.07.016. [DOI] [PubMed] [Google Scholar]
  • 10.Li Z, et al. Identifying influential spreaders by gravity model. Sci. Rep. 2019;9:1–7. doi: 10.1038/s41598-019-44930-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.Xing, Y. et al. A node influence based label propagation algorithm for community detection in networks. Sci. World J. 10.1155/2014/627581 (2014). [DOI] [PMC free article] [PubMed]
  • 12.Maji G, Namtirtha A, Dutta A, Malta MC. Influential spreaders identification in complex networks with improved k-shell hybrid method. Exp. Syst. Appl. 2020;144:113092. doi: 10.1016/j.eswa.2019.113092. [DOI] [Google Scholar]
  • 13.Yi, Z., Wu, X. & Li, F. Ranking spreaders in complex networks based on the most influential neighbors. Discrete Dyn. Nat. Soc.10.1155/2018/3649079 (2018).
  • 14.Zareie A, Sheikhahmadi A, Jalili M. Identification of influential users in social networks based on users’ interest. Inf. Sci. 2019;493:217–231. doi: 10.1016/j.ins.2019.04.033. [DOI] [Google Scholar]
  • 15.Zhao G, Jia P, Zhou A, Zhang B. Infgcn: identifying influential nodes in complex networks with graph convolutional networks. Neurocomputing. 2020;414:18–26. doi: 10.1016/j.neucom.2020.07.028. [DOI] [Google Scholar]
  • 16.Yang H, An S. Critical nodes identification in complex networks. Symmetry. 2020;12:123. doi: 10.3390/sym12010123. [DOI] [Google Scholar]
  • 17.Guo C, et al. Influential nodes identification in complex networks via information entropy. Entropy. 2020;22:242. doi: 10.3390/e22020242. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18.Ediger, D. et al. Massive social network analysis: mining twitter for social good. In 2010 39th International Conference on Parallel Processing, 583–593 (IEEE, 2010).
  • 19.Zekun W, Xiangxi W, Minggong W. Identification of key nodes in aircraft state network based on complex network theory. IEEE Access. 2019;7:60957–60967. doi: 10.1109/ACCESS.2019.2915508. [DOI] [Google Scholar]
  • 20.Yang Y-Z, Hu M, Huang T-Y. Influential nodes identification in complex networks based on global and local information. Chin. Phys. B. 2020;29:088903. doi: 10.1088/1674-1056/ab969f. [DOI] [Google Scholar]
  • 21.Sheng J, et al. Identifying influential nodes in complex networks based on global and local structure. Phys. A Stat. Mech. Its Appl. 2020;541:123262. doi: 10.1016/j.physa.2019.123262. [DOI] [Google Scholar]
  • 22.Sabidussi G. The centrality index of a graph. Psychometrika. 1966;31:581–603. doi: 10.1007/BF02289527. [DOI] [PubMed] [Google Scholar]
  • 23.Koschützki, D. et al. Centrality indices. In Network analysis, 16–61 (Springer, 2005).
  • 24.Kitsak M, et al. Identification of influential spreaders in complex networks. Nat. Phys. 2010;6:888–893. doi: 10.1038/nphys1746. [DOI] [Google Scholar]
  • 25.Solá L, et al. Eigenvector centrality of nodes in multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 2013;23:033131. doi: 10.1063/1.4818544. [DOI] [PubMed] [Google Scholar]
  • 26.Kun Z, Peipei L, Baoping Z, Manyu H. Evaluation method for node importance in directed-weighted complex networks based on pagerank [j] J. Nanjing Univ. Aeronaut. Astron. 2013;45:429–434. [Google Scholar]
  • 27.Zhao B, Hu S, Zhang Z, Xu C, Tang X. Hyperlink induced topic search-based method to predict essential proteins. Int. J. Data Min. Bioinform. 2019;22:250–264. doi: 10.1504/IJDMB.2019.100627. [DOI] [Google Scholar]
  • 28.Yu Z, Shao J, Yang Q, Sun Z. Profitleader: identifying leaders in networks with profit capacity. World Wide Web. 2019;22:533–553. doi: 10.1007/s11280-018-0537-6. [DOI] [Google Scholar]
  • 29.Fei L, Zhang Q, Deng Y. Identifying influential nodes in complex networks based on the inverse-square law. Phys. A Stat. Mech. Its Appl. 2018;512:1044–1059. doi: 10.1016/j.physa.2018.08.135. [DOI] [Google Scholar]
  • 30.Ma L-L, Ma C, Zhang H-F, Wang B-H. Identifying influential spreaders in complex networks based on gravity formula. Phys. A Stat. Mech. Its Appl. 2016;451:205–212. doi: 10.1016/j.physa.2015.12.162. [DOI] [Google Scholar]
  • 31.Ma Q, Ma J. Identifying and ranking influential spreaders in complex networks with consideration of spreading probability. Phys. A Stat. Mech. Its Appl. 2017;465:312–330. doi: 10.1016/j.physa.2016.08.041. [DOI] [Google Scholar]
  • 32.Freeman, L. C. A set of measures of centrality based on betweenness. Sociometry40(1), 35–41 (1977).
  • 33.Freeman LC. Centrality in social networks conceptual clarification. Soc. Netw. 1978;1:215–239. doi: 10.1016/0378-8733(78)90021-7. [DOI] [Google Scholar]
  • 34.Liu B, Jiang S, Zou Q. Hits-pr-hhblits: protein remote homology detection by combining pagerank and hyperlink-induced topic search. Brief. Bioinform. 2020;21:298–308. doi: 10.1093/bib/bby104. [DOI] [PubMed] [Google Scholar]
  • 35.Lü L, Zhou T, Zhang Q-M, Stanley HE. The h-index of a network node and its relation to degree and coreness. Nat. Commun. 2016;7:1–7. doi: 10.1038/ncomms10168. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 36.Zareie A, Sheikhahmadi A, Jalili M, Fasaei MSK. Finding influential nodes in social networks based on neighborhood correlation coefficient. Knowl. Based Syst. 2020;194:105580. doi: 10.1016/j.knosys.2020.105580. [DOI] [Google Scholar]
  • 37.Ibnoulouafi A, El Haziti M. Density centrality: identifying influential nodes based on area density formula. Chaos Solit. Fract. 2018;114:69–80. doi: 10.1016/j.chaos.2018.06.022. [DOI] [Google Scholar]
  • 38.Koyré A. An unpublished letter of robert hooke to isaac newton. Isis. 1952;43:312–337. doi: 10.1086/348155. [DOI] [PubMed] [Google Scholar]
  • 39.Kang B, Chhipi-Shrestha G, Deng Y, Hewage K, Sadiq R. Stable strategies analysis based on the utility of z-number in the evolutionary games. Appl. Math. Comput. 2018;324:202–217. [Google Scholar]
  • 40.Allen LJ. Some discrete-time si, sir, and sis epidemic models. Math. Biosci. 1994;124:83–105. doi: 10.1016/0025-5564(94)90025-6. [DOI] [PubMed] [Google Scholar]
  • 41.Gang Y, Tao Z, Jie W, Zhong-Qian F, Bing-Hong W. Epidemic spread in weighted scale-free networks. Chin. Phys. Lett. 2005;22:510. doi: 10.1088/0256-307X/22/2/068. [DOI] [Google Scholar]
  • 42.Kendall MG. The treatment of ties in ranking problems. Biometrika. 1945;33:239–251. doi: 10.1093/biomet/33.3.239. [DOI] [PubMed] [Google Scholar]
  • 43.Knight WR. A computer method for calculating kendall’s tau with ungrouped data. J. Am. Stat. Assoc. 1966;61:436–439. doi: 10.1080/01621459.1966.10480879. [DOI] [Google Scholar]
  • 44.Gleiser PM, Danon L. Community structure in jazz. Adv. Complex Syst. 2003;6:565–573. doi: 10.1142/S0219525903001067. [DOI] [Google Scholar]
  • 45.Hamsterster friendships network dataset – KONECT (2017). http://konect.uni-koblenz.de/networks/petster-friendships-hamster.
  • 46.Guimera R, Danon L, Diaz-Guilera A, Giralt F, Arenas A. Self-similar community structure in a network of human interactions. Phys. Rev. E. 2003;68:065103. doi: 10.1103/PhysRevE.68.065103. [DOI] [PubMed] [Google Scholar]
  • 47.Rossi, R.A. & Ahmed, N. K. The network data repository with interactive graph analytics and visualization. In AAAI (2015). http://networkrepository.com.
  • 48.Lusseau D, et al. The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations. Behav. Ecol. Sociobiol. 2003;54:396–405. doi: 10.1007/s00265-003-0651-y. [DOI] [Google Scholar]
  • 49.Castillo, C., Chellapilla, K. & Denoyer, L. Web spam challenge 2008. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) (2008).
  • 50.Leskovec J, Kleinberg J, Faloutsos C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data (TKDD) 2007;1:2-es. doi: 10.1145/1217299.1217301. [DOI] [Google Scholar]
  • 51.Barabási, A.-L. Emergence of scaling in complex networks. Handbook of Graphs and Networks: From the Genome to the Internet. Berlin: Wiley-VCH (2003).
  • 52.Newman ME, et al. Random graphs as models of networks. Handb. Gr. Netw. 2003;1:35–68. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All the real networks are available publicly and can be accessed from http://networkrepository.com.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES