Please wait a minute...
Frontiers of Engineering Management

ISSN 2095-7513

ISSN 2096-0255(Online)

CN 10-1205/N

Postal Subscription Code 80-905

Front. Eng    2022, Vol. 9 Issue (4) : 520-549    https://doi.org/10.1007/s42524-022-0190-8
REVIEW ARTICLE
Identifying spreading influence nodes for social networks
Yang OU1, Qiang GUO1, Jianguo LIU2()
1. Research Center of Complex Systems Science, University of Shanghai for Science and Technology, Shanghai 200093, China
2. Institute of Accounting and Finance, Shanghai University of Finance and Economics, Shanghai 200433, China
 Download: PDF(2150 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

The identification of spreading influence nodes in social networks, which studies how to detect important individuals in human society, has attracted increasing attention from physical and computer science, social science and economics communities. The identification algorithms of spreading influence nodes can be used to evaluate the spreading influence, describe the node’s position, and identify interaction centralities. This review summarizes the recent progress about the identification algorithms of spreading influence nodes from the viewpoint of social networks, emphasizing the contributions from physical perspectives and approaches, including the microstructure-based algorithms, community structure-based algorithms, macrostructure-based algorithms, and machine learning-based algorithms. We introduce diffusion models and performance evaluation metrics, and outline future challenges of the identification of spreading influence nodes.

Keywords complex network      network science      spreading influence      machine learning     
Corresponding Author(s): Jianguo LIU   
Just Accepted Date: 16 May 2022   Online First Date: 01 September 2022    Issue Date: 08 December 2022
 Cite this article:   
Yang OU,Qiang GUO,Jianguo LIU. Identifying spreading influence nodes for social networks[J]. Front. Eng, 2022, 9(4): 520-549.
 URL:  
https://academic.hep.com.cn/fem/EN/10.1007/s42524-022-0190-8
https://academic.hep.com.cn/fem/EN/Y2022/V9/I4/520
Approach Category Study problem Data Diffusion model Main analysis findings
Percolation-based greedy algorithm (PBGA) (Hu et al., 2018) MSB Influence maximization GrQc (Leskovec et al., 2007), HepTh (Leskovec et al., 2007), Enron (Leskovec et al., 2009), NoLA Facebook, DBLP (Yang and Leskovec, 2012), QQ (Ren et al., 2015), LiveJournal (Yang and Leskovec, 2012), Weibo, Delicious (Lü et al., 2011) Susceptible-infected-recovered (SIR) (Hethcote, 2000) The spreading influence of nodes can be approximately estimated by using the local structural information of nodes
Spreading strength (SS) (Yu et al., 2019) Node ranking Facebook (McAuley and Leskovec, 2012), PGP (Bogu?á et al., 2004), Protein (Jeong et al., 2001), Guntella08 (Leskovec et al., 2007), GrQc (Leskovec et al., 2007), CondMat (Leskovec et al., 2007), HepTh (Leskovec et al., 2007), US Air, PowerGrid (Watts and Strogatz, 1998) SIR (Hethcote, 2000) The indirect influence of a node on its neighborhood is important for measuring the spreading influence of the node
Local centrality (LC) (Chen et al., 2012) Node ranking Blog (Xie, 2006), Netscience (Newman, 2006), Router (Spring et al., 2002), Email (Guimerà et al., 2003) SIR (Hethcote, 2000) The degree information of high-order neighbors can improve the accuracy and resolution of the degree centrality (DC)
Neighborhood centrality (NC) (Liu et al., 2016b) Node ranking Email (Guimerà et al., 2003), HepTh (Leskovec et al., 2007), Hamster (Kunegis, 2016), PGP (Bogu?á et al., 2004), Astro Physics (Newman, 2001), Router (Spring et al., 2002) SIR (Hethcote, 2000) Considering the structural information of a node’s neighbors within two steps is a good choice to balance accuracy and efficiency
Local structure similarity (LSS) (Liu et al., 2017a) Influence maximization GrQc (Leskovec et al., 2007), Router (Spring et al., 2002), Hamster (Kunegis, 2016), Polblogs SIR (Hethcote, 2000), Susceptible-infected (SI) (Barabási and Albert, 1999) The local structural property of nodes can help identify multiple spreading influence nodes more accurately than by using the distance
VoteRank (Zhang et al., 2016) Influence maximization YouTube (Yang and Leskovec, 2012), CondMat (Leskovec et al., 2007), Berkstan (Leskovec et al., 2009), Notre DAME (Albert et al., 1999) SIR (Hethcote, 2000), SI (Barabási and Albert, 1999) The performance of VoteRank is highly correlated with the number of ranked nodes
ClusterRank (CR) (Chen et al., 2013) Node ranking Delicious (Lü et al., 2011), SM SIR (Hethcote, 2000) Nodes with small clustering coefficients are likely to connect with more nodes in the future
Local structure centrality (LSC) (Gao et al., 2014) Node ranking Email (Guimerà et al., 2003), Blog, PGP (Bogu?á et al., 2004), Twitter SIR (Hethcote, 2000) The positive effect of the clustering coefficient of a node’s second-order neighbors has a significant influence on the spreading influence of the node
V-communities (Vc) (Zhao et al., 2014b) CSB Node ranking Facebook (McAuley and Leskovec, 2012), GrQc (Leskovec et al., 2007), Netscience (Newman, 2006), Protein (Jeong et al., 2001) SIR (Hethcote, 2000) The number of communities connected to a node can help detect the spreading influence nodes that a single centrality may ignore
Community-based centrality (CbC) (Zhao et al., 2015) Node ranking Facebook (McAuley and Leskovec, 2012), Metabolic, Email, PowerGrid (Watts and Strogatz, 1998), Router (Spring et al., 2002), Blogcatalog SIR (Hethcote, 2000) The size of the community and the distribution of a node’s neighbors in each community play important roles in measuring the node’s spreading influence
Community-based mediator (CbM) (Tulu et al., 2018) Node ranking Karate (Zachary, 1977), American football network (Girvan and Newman, 2002), Dolphin (Lusseau et al., 2003), Airport, Internet SIR (Hethcote, 2000) The edge density within each community and the edge density between communities can be used to identify spreading influence nodes accurately with low computational complexity
Community-hole index (CHR) (Wang et al., 2018) Node ranking GrQc (Leskovec et al., 2007), Weibo (Tang and Liu, 2009), arXiv (Pan and Saram?ki, 2012), Amazon SIR (Hethcote, 2000) The importance of communities connected to a node is related to the node’s spreading influence
Modular centrality (MC) (Ghalmane et al., 2019a) Node ranking Facebook (McAuley and Leskovec, 2012), Netscience (Newman, 2006), GrQc (Leskovec et al., 2007) SIR (Hethcote, 2000) Dividing the network with an overlapping community structure into local and global networks can help identify spreading influence nodes more accurately
Network global structure-based centrality (NGSC) (Namtirtha et al., 2021) MASB Influence maximization Odlis, Netscience (Newman, 2006), Advogato (Massa et al., 2009) SIR (Hethcote, 2000) The network components and network density have a significant influence on the performance of identification algorithms
Gravity centrality (GC) (Ma et al., 2016) Node ranking Facebook, Netscience (Newman, 2006), Email (Guimerà et al., 2003), TAP (Zeng and Zhang, 2013), Y2H (Kumar and Snyder, 2002), Blogs (Xie, 2006), Router (Spring et al., 2002), HepTh (Leskovec et al., 2007), PGP (Bogu?á et al., 2004) SIR (Hethcote, 2000) The gravity model can be applied to identify the spreading influence of nodes with relatively high accuracy
CEffG (Shang et al., 2021) Node ranking Jazz, Netscience (Newman, 2006), GrQc (Leskovec et al., 2007), EEC, Email, PB, Facebook, US Air, Physicians, PDZBase, Haggle, Infectious SI (Barabási and Albert, 1999) Replacing the Euclidean distance of the gravity model by the effective distance can achieve higher accuracy
Dynamic-sensitive (DS) (Liu et al., 2016a) Influence maximization Erdos, Email contact (Kitsak et al., 2010), Router (Spring et al., 2002), Protein (Jeong et al., 2001) SIR (Hethcote, 2000), SI (Barabási and Albert, 1999) The spreading influence of a node is determined by topological structures and the spreading dynamics
Influence capacity (Wang et al., 2016) Node ranking Karate (Zachary, 1977), Netscience (Newman, 2006), Dolphin (Lusseau et al., 2003), Email (Guimerà et al., 2003), Jazz, PGP (Bogu?á et al., 2004), Blog (Xie, 2006), Facebook, Enron (Leskovec et al., 2009), Twitter SIR (Hethcote, 2000) The order in which nodes within the same layer are removed can distinguish the spreading influence of nodes located in the same shell
Link entropy (Liu et al., 2015a) Node ranking Router (Spring et al., 2002), Email contact (Kitsak et al., 2010), AS, Email (Guimerà et al., 2003), HepTh (Leskovec et al., 2007), Hamster (Kunegis, 2016), PGP (Bogu?á et al., 2004), Netscience (Newman, 2006), Astro Physics (Newman, 2001) SIR (Hethcote, 2000) The node with high coreness is a spreading influence node with a strong edge diversity to nodes located in other shells of the network
θ (Liu et al., 2013a) Node ranking Email (Guimerà et al., 2003), PGP (Bogu?á et al., 2004), AS, P2P (Leskovec et al., 2007) SIR (Hethcote, 2000) The distance from the node to nodes in the core–shell layer can effectively distinguish the spreading influence of nodes in the same shell layer
Multicentrality predictors (Bucur, 2020) MLB Node ranking Adolescent, Advogato (Massa et al., 2009), Astro Physics (Newman, 2001), CondMat (Leskovec et al., 2007), GrQc (Leskovec et al., 2007), HepTh (Leskovec et al., 2007), AS, Brightkite, Email, Epinions, Euroroad, Facebook, Github, Guntella, Googleplus, Hamster (Kunegis, 2016), IMDB, OpenFlights, PGP (Bogu?á et al., 2004), Twitch, Twitter Stanford, US Airports, PowerGrid (Watts and Strogatz, 1998), WikiTalk SIR (Hethcote, 2000) The spreading influence nodes identified by the MSB algorithms may be located in the peripheral regions of the network, and the MASB algorithms can help to rectify this shortcoming
Perturb and combine (P&C) (Tixier et al., 2019) Node ranking Email (Klimt and Yang, 2004), Epinions, WikiVote SIR (Hethcote, 2000) The idea of ensemble learning can improve the robustness of the k-core and PageRank algorithm
Influence deep learning (IDL) (Wang et al., 2019) Node ranking Sina Weibo, Epinions, WikiVote, NetHEPT (Pal et al., 2014) Independent cascading (IC) (Kempe et al., 2003) The graph convolutional networking (GCN) model has a great potential for the identification of spreading influence nodes
Tab.1  Approach names, categories, study problems, data, diffusion models, and main analysis findings of the representative MSB, CSB, MASB, and MLB algorithms
Fig.1  Diagram of four types of networks: (a) undirected and unweighted network; (b) directed and unweighted network; (c) undirected and weighted network; and (d) directed and weighted network.
Fig.2  Diagram of nodes with the same number of first-order neighbors but a different number of second-order neighbors.
Methods Advantages Disadvantages Computational complexity
DC (Freeman, 1978) Low computational complexity; Simple and easy to understand The structure information of high-order neighbors is ignored O(n)
LC (Chen et al., 2012) Considers the degree of high-order neighbor nodes Other structural attributes are disregarded, except the degree of the node O(?k?n2)
LNC (Dai et al., 2019) Measures the contributions of different neighbors to the spreading influence of the node; Outperforms DC and betweenness while keeping low computational complexity Unsuitable for the random network O(?k?n)
VoteRank (Zhang et al., 2016) Uses the idea of voting to aggregate the structural information of high-order neighbors; The accuracy is higher than PageRank and LeaderRank; Low computational complexity The differences in the initial voting abilities of nodes are ignored O(n)
AIRank (Zhang et al., 2019b) Distinguishes the voting abilities of nodes from the perspective of individuals and groups The performance will be unstable when the edge density between communities is low O(n)
NCRank (Kumar and Panda, 2020) Distinguishes the voting abilities of nodes by considering the position of the node Adjusting free parameters to obtain a stable performance is time consuming O(n)
EnRenew (Guo et al., 2020) Different initial voting abilities of nodes are distinguished on the basis of the information entropy The computational complexity is higher than VoteRank O(m+n+rlog?(n)+m2n2)
DynamicRank (Chen et al., 2019) Uses the probabilities of high-order neighbors being influenced to measure the spreading influence of nodes Adjusting the free parameter to obtain a stable performance is time consuming O(n)
Tab.2  Advantages and disadvantages of representative MSB algorithms, where r is the total number of iteration rounds, ?k? is the average degree of nodes, and n and m are total number of nodes and edges of a network, respectively
Method streams Related works Advantages Disadvantages
High-order-neighbor-degree-based LC (Chen et al., 2012); NC (Liu et al., 2016b); LNC (Dai et al., 2019); SS (Yu et al., 2019) Efficient and easy to understand Topological information, such as interactions between neighbors and the edge density, is ignored
Local-clustering-coefficient-based CR (Chen et al., 2013); LSC (Gao et al., 2014); Centrality (Berahmand et al., 2018); DCC (Yang et al., 2020) Higher resolution; Enables the spreading influence of nodes with the same degree value to be further distinguished The performance will be suppressed in densely connected networks because it only focuses on the edge density in the node’s neighborhood
Similarity-based DegreeDistance (Sheikhahmadi et al., 2015); LSS (Liu et al., 2017a); HC (Bao et al., 2017) Ensures that seed nodes are distributed in different parts of the network The selection of initial seed nodes has a large influence on its performance
VoteRank-based VoteRank (Zhang et al., 2016); AIRank (Zhang et al., 2019b); NCRank (Kumar and Panda, 2020); EnRenew (Guo et al., 2020) No distance calculation is included The initial state of each node and the spreading influence decreasing strategy will cause large influence on its performance
Diffusion-model-based DD (Chen et al., 2009); DynamicRank (Chen et al., 2019) The topological information and the diffusion mechanism are considered When the diffusion mechanism changes, its performance will be affected
Tab.3  Advantages and disadvantages of five main MSB method streams
Fig.3  Diagram of local and global network division of the network with overlapping community structure.
Methods Advantages Disadvantages Computational complexity
Vc (Zhao et al., 2014b) Identifies spreading influence nodes that cannot be detected by a single centrality The performance will be unstable when the community structure of the network changes O(n)
CbC (Zhao et al., 2015) Alleviates the instability of Vc by considering the community size and the distribution of neighbors Other community structural attributes are not used except the size of the community O(n?k?)
CbM (Tulu et al., 2018) The edge densities within and between communities are considered; CbM outperforms CbC The computational complexity is higher than CbC O(mn?k?)
CGA (Wang et al., 2010) Reduces the computational complexity of MixGreedy by narrowing the searching space to the community scale The accuracy is lower than MixGreedy O(MKTp+KNCompTp)
Community-based framework for influence maximization (CoFIM) (Shang et al., 2017) Divides the propagation process into two phases, which is more explainable; The computational complexity is low while keeping high accuracy Determining an appropriate infection rate and free parameters is time consuming O(K2nkmax)
PHG (Qiu et al., 2019) Reduces the computational complexity by filtering candidates before applying the greedy algorithm Only considers the degree of nodes when identifying the core node set O(nlogn+n+Knm)
ICC (Zhao et al., 2020c) Improves the performance of CC by adopting community structural attributes Unsuitable for large-scale networks
Community-based influence maximization (CIM) (Chen et al., 2014) Narrows the seed nodes’ searching space by the size of the community Other community structural attributes are ignored, except the size of the community
CHR (Wang et al., 2018) Considers the influence of community-level importance to node-level importance Unsuitable for large-scale networks
Tab.4  Advantages and disadvantages of representative CSB algorithms, where K is the number of seed nodes, M is the total number of communities, Tp is the time to compute the degree of a node in community p, NComp is the size of community p, and n and m are the number of candidate nodes and edges, respectively
Method streams Related works Advantages Disadvantages
Community-structural-attribute-based Vc (Zhao et al., 2014b); CbC (Zhao et al., 2015); CbM (Tulu et al., 2018); ICC (Zhao et al., 2020c); OC (Wei et al., 2018); MC (Ghalmane et al., 2019a) Community-level structural information can help detect spreading influence nodes that centralities may ignore Its performance relies on the community detection algorithms and the selection of community structural attributes
Diffusion-mechanism-based CGA (Wang et al., 2010); CoFIM (Shang et al., 2017) The topological information and diffusion mechanism are considered; Community structure information helps to accelerate the speed of seed node selection Application scenarios are limited by the diffusion mechanism
Community-importance-based CIM (Chen et al., 2014); CHR (Wang et al., 2018); PHG (Qiu et al., 2019) The difference in the importance of communities is considered; Community structure information helps to accelerate the speed of seed node selection How to quantify the importance of community has not been well studied
Tab.5  Advantages and disadvantages of three main CSB method streams
Fig.4  Diagram of k-shell decomposition: (a) original network; (b) network after the first removal of nodes with degree 1; and (c) network after all nodes with degree 1 have been removed.
Fig.5  Diagram of the structural hole (adapted from Su and Song (2015)): (a) network with a structural hole; and (b) network without a structural hole.
Methods Advantages Disadvantages Computational complexity
BC (Freeman, 1977) Identifies nodes that have strong control over the spreading process High computational complexity; Unsuitable for large-scale networks O(n3)
CC (Sabidussi, 1966) Uses the distances between nodes to measure the spreading of nodes High computational complexity; Unsuitable for large-scale networks O(n3)
PageRank (Brin and Page, 1998) Aggregates the structure information of neighbor nodes iteratively; Low computational complexity Difficult to converge when there are nodes with an out-degree 0 O(m)
k-shell (Kitsak et al., 2010) Considers the position of the node on the basis of the node’s degree The spreading influence of nodes in the same shell layer cannot be distinguished O(n)
LeaderRank (Lü et al., 2011) Ensures a faster convergence speed than PageRank by adding a ground node Only suitable for directed networks O(m)
Local and global node influence (LGI) (Ma et al., 2020) Introduces the entropy to distinguish differences in the spreading influence of nodes in the same shell layer Tuning free parameters is time consuming O(n2+m)
CumulativeRank (Zhang et al., 2019a) The local and global spreading influence of nodes is considered simultaneously Unsuitable for random networks O(n2+n?k?2)
GSM (Ullah et al., 2021) Considers the self-importance of the node and the relationship of the node with other nodes simultaneously High computational complexity; Unsuitable for large-scale networks O(n2)
IKs (Liu et al., 2015b) The nodes are divided into different shell layers in a more granular manner Unsuitable for random networks O(n)
Tab.6  Advantages and disadvantages of representative MASB algorithms
Method streams Related works Advantages Disadvantages
Iteration-based EC (Bonacich, 1972); PageRank (Brin and Page, 1998); LeaderRank (Lü et al., 2011); WleaderRank (Li et al., 2014) Aggregates the structural information of neighbor nodes in an iterative manner, which is more efficient than directly exploiting the structural information of the entire network The contribution of neighbor nodes to the spreading influence of the target node is mainly measured by the degree information
k-shell-based θ (Liu et al., 2013a); Resource Allocation Dynamics (Ma et al., 2014); IKs (Liu et al., 2015b); DSC (Zareie et al., 2019); Cnc (Bae and Kim, 2014); Link entropy (Liu et al., 2015a); Influence capacity (Wang et al., 2016); Classified neighbors (CN) (Li et al., 2018) The position information of nodes in the network is considered, which can avoid to identify nodes located in peripheral regions of the network as spreading influence nodes The nodes located in the core–shell layer are not always the spreading influence nodes
Micro-macro-based NGSC (Namtirtha et al., 2021); ksd (Maji, 2020); Influence (Ma et al., 2020) Guarantees stable performance in both sparsely and densely connected networks Weights assigned to each attribute need to be predefined, which is time consuming
Gravity-model-based GC (Ma et al., 2016); GM (Li et al., 2019); Yan et al. (2020); CEffG (Shang et al., 2021); Effective distance gravity model (EDGM) (Chen et al., 2021b) Considers the position of nodes and the effect of the distance between nodes on their interaction The calculation of distance results in high computational complexity
Tab.7  Advantages and disadvantages of four main MASB method streams
Fig.6  Framework of IDL (adapted from Wang et al. (2019)).
Fig.7  Framework of RCNN.
Fig.8  Simplified architecture of the ConvGNN-based algorithms.
Methods Advantages Disadvantages Machine learning models
InfEmb (Ivanov et al., 2018) Determines other seed nodes based on the structure information of the given seed nodes Unable to identify the remaining seed nodes with few positive samples accurately; Only the degree of the node is considered when selecting negative samples Linear regression
InfluenceRank (Nargundkar and Rao, 2016) Considers the topological and nontopological features simultaneously Cannot ensure that the selected features accurately reflect the node’s spreading influence DeepWalk; SVM
P&C (Tixier et al., 2019) Enhances the robustness of algorithms with weak anti-interference ability Relies on the network perturbation method Bagging
IDL (Wang et al., 2019) Considers the action logs of online users and network topology Only suitable for social networks GCN
InfGCN (Zhao et al., 2020b) Uses the low-dimensional vector representation and centralities of nodes as the input to predict the spreading influence of nodes High computational complexity GCN
RCNN (Yu et al., 2020) Only uses the degree of the node to transform the matrix representation of the node, which is more efficient than InfGCN and IDL The performance is unstable when the structure of the training network and the test network are different CNN
FINDER (Fan et al., 2020) Applies the reinforcement learning technique to evaluate the spreading influence of nodes High computational complexity RL; DeepWalk
Tab.8  Advantages and disadvantages of representative MLB algorithms
Method streams Related works Advantages Disadvantages
SMLB Multicentrality predictors (Bucur, 2020); Hu et al. (2019); Han et al. (2015); Zhao et al. (2020a); InfEmb (Ivanov et al., 2018); NCL (Yang and Xiong, 2021); InfluenceRank (Nargundkar and Rao, 2016); P&C (Tixier et al., 2019) Weights assigned to each structural attribute can be obtained automatically by training the model; Highly interpretable Requires the time-consuming feature engineering process; The accuracy of the model is unstable when the network structure of the training set and the test set are different
DLB IDL (Wang et al., 2019); InfGCN (Zhao et al., 2020b); RCNN (Yu et al., 2020); FINDER (Fan et al., 2020) Feature engineering is not required; Learning from streaming data Easy to overfit in the training process; The training process is a black box; The accuracy of the model is unstable when the network structure of the training set and the test set are different
Tab.9  Advantages and disadvantages of two main MLB method streams
Algorithms Advantages Disadvantages
MSB Estimates the spreading influence of nodes via micro-level structural information, thereby enabling the identification of spreading influence nodes in large-scale networks to be feasible Focuses on the edge density within a local area of the target node, leading to nodes located in peripheral regions of networks to be misclassified as spreading influence nodes
CSB Accelerates the speed of seed node selection for the influence maximization task; Community structural attributes can help to improve the accuracy of centralities The performance of CSB algorithms depends on the community detection algorithms
MASB Helps to rectify the identification results of MSB algorithms; Performs well in densely connected networks High computational complexity hinders the use of MASB algorithms in large-scale networks; Weights of MASB algorithms that consider multiple structural attributes need to be predefined
MLB Automatically calculates the weights assigned to different attributes of nodes; Higher accuracy of identification than traditional algorithms The computational complexity of MLB algorithms did not receive sufficient attention; The performance of MLB algorithms is influenced by the structural difference in the training network and the test network
Tab.10  Advantages and disadvantages of MSB, CSB, MASB, and MLB algorithms
1 R Albert, H Jeong, A L Barabási, ( 1999). Diameter of the World-Wide Web. Nature, 401( 6749): 130– 131
https://doi.org/10.1038/43601
2 J Bae, S Kim, ( 2014). Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Physica A: Statistical Mechanics and Its Applications, 395: 549– 559
https://doi.org/10.1016/j.physa.2013.10.047
3 Z K Bao, J G Liu, H F Zhang, ( 2017). Identifying multiple influential spreaders by a heuristic clustering algorithm. Physics Letters A, 381( 11): 976– 983
https://doi.org/10.1016/j.physleta.2017.01.043
4 A L Barabási, R Albert, ( 1999). Emergence of scaling in random networks. Science, 286( 5439): 509– 512
https://doi.org/10.1126/science.286.5439.509
5 A L Barabási, E Bonabeau, ( 2003). Scale-free networks. Scientific American, 288( 5): 60– 69
https://doi.org/10.1038/scientificamerican0503-60
6 M Belkin, P Niyogi, ( 2003). Laplacian eigenmaps for dimensionality reduction and data representation. Neural Computation, 15( 6): 1373– 1396
https://doi.org/10.1162/089976603321780317
7 K Berahmand, A Bouyer, N Samadi, ( 2018). A new centrality measure based on the negative and positive effects of clustering coefficient for identifying influential spreaders in complex networks. Chaos, Solitons, and Fractals, 110: 41– 54
https://doi.org/10.1016/j.chaos.2018.03.014
8 A L Bertozzi, E Franco, G Mohler, M B Short, D Sledge, ( 2020). The challenges of modeling and forecasting the spread of COVID-19. Proceedings of the National Academy of Sciences of the United States of America, 117( 29): 16732– 16738
https://doi.org/10.1073/pnas.2006520117
9 M Boguñá, R Pastor-Satorras, A Díaz-Guilera, A Arenas, ( 2004). Models of social networks based on social distance attachment. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 70( 5): 056122
pmid: 15600707
10 P Bonacich, ( 1972). Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology, 2( 1): 113– 120
https://doi.org/10.1080/0022250X.1972.9989806
11 J Borge-Holthoefer Y Moreno ( 2012). Absence of influential spreaders in rumor dynamics. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 85(2): 026116
pmid: 22463288
12 S Brin, L Page, ( 1998). The anatomy of a large-scale hypertextual web search engine. In: Proceedings of the 7th International Conference on World Wide Web. Brisbane: Association for Computing Machinery, 107– 117
13 D Brockmann, D Helbing, ( 2013). The hidden geometry of complex, network-driven contagion phenomena. Science, 342( 6164): 1337– 1342
https://doi.org/10.1126/science.1245200
14 D Bucur, ( 2020). Top influencers can be identified universally by combining classical centralities. Scientific Reports, 10( 1): 20550
https://doi.org/10.1038/s41598-020-77536-7
15 R S Burt, M Kilduff, S Tasselli, ( 2013). Social network analysis: Foundations and frontiers on advantage. Annual Review of Psychology, 64( 1): 527– 547
https://doi.org/10.1146/annurev-psych-113011-143828
16 A Buyalskaya, M Gallo, C F Camerer, ( 2021). The golden age of social science. Proceedings of the National Academy of Sciences of the United States of America, 118( 5): e2002923118
https://doi.org/10.1073/pnas.2002923118
17 A Campan, A Cuzzocrea, T M Truta, ( 2017). Fighting fake news spread in online social networks: Actual trends and future research directions. In: IEEE International Conference on Big Data. Boston, MA, 4453– 4457
18 G T Cantwell M E J Newman ( 2019). Mixing patterns and individual differences in networks. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 99(4): 042306
pmid: 31108687
19 Z Cao T Qin T Y Liu M F Tsai H (2007) Li. Learning to rank: From pairwise approach to listwise approach. In: Proceedings of the 24th International Conference on Machine Learning. Corvallis, OR: Association for Computing Machinery, 129– 136
20 D B Chen, H Gao, L Lü, T Zhou, ( 2013). Identifying influential nodes in large-scale directed networks: The role of clustering. PLoS One, 8( 10): e77455
https://doi.org/10.1371/journal.pone.0077455
21 D B Chen, L Y Lü, M S Shang, Y C Zhang, T Zhou, ( 2012). Identifying influential nodes in complex networks. Physica A: Statistical Mechanics and Its Applications, 391( 4): 1777– 1787
https://doi.org/10.1016/j.physa.2011.09.017
22 D B Chen, H L Sun, Q Tang, S Z Tian, M Xie, ( 2019). Identifying influential spreaders in complex networks by propagation probability dynamics. Chaos, 29( 3): 033120
https://doi.org/10.1063/1.5055069
23 J Y Chen, J Zhang, X H Xu, C B Fu, D Zhang, Q P Zhang, Q Xuan, ( 2021a). E-LSTM-D: A deep learning framework for dynamic network link prediction. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51( 6): 3699– 3712
https://doi.org/10.1109/TSMC.2019.2898456
24 S Chen, Z M Ren, C Liu, Z K Zhang, ( 2020). Identification methods of vital nodes on temporal network. Journal of University of Electronic Science and Technology of China, 49( 2): 291– 314 (in Chinese)
25 W Chen, Y J Wang, S Y Yang, ( 2009). Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Paris, 199– 208
26 Y Chen, Q Guo, M Liu, J G Liu, ( 2021b). Improved gravity model for identifying the influential nodes. Europhysics Letters, 136( 6): 68004
https://doi.org/10.1209/0295-5075/ac49d1
27 Y C Chen, W Y Zhu, W C Peng, W C Lee, S Y Lee, ( 2014). CIM: Community-based influence maximization in social networks. ACM Transactions on Intelligent Systems and Technology, 5( 2): 1– 31
https://doi.org/10.1145/2532549
28 J E Cohen, ( 1992). Infectious diseases of humans: Dynamics and control. Journal of the American Medical Association, 268( 23): 3381
https://doi.org/10.1001/jama.1992.03490230111047
29 J Y Dai, B Wang, J F Sheng, Z J Sun, F R Khawaja, A Ullah, D A Dejene, G H Duan, ( 2019). Identifying influential nodes in complex networks based on local neighbor contribution. IEEE Access, 7: 131719– 131731
https://doi.org/10.1109/ACCESS.2019.2939804
30 L Dai, Q Guo, X L Liu, J G Liu, Y C Zhang, ( 2018). Identifying online user reputation in terms of user preference. Physica A: Statistical Mechanics and Its Applications, 494: 403– 409
https://doi.org/10.1016/j.physa.2017.12.020
31 G Dong, F Wang, L M Shekhtman, M M Danziger, J Fan, R Du, J Liu, L Tian, H E Stanley, S Havlin, ( 2021). Optimal resilience of modular interacting networks. Proceedings of the National Academy of Sciences of the United States of America, 118( 22): e1922831118
https://doi.org/10.1073/pnas.1922831118
32 S N Dorogovtsev, A V Goltsev, J F F Mendes, ( 2008). Critical phenomena in complex networks. Reviews of Modern Physics, 80( 4): 1275– 1335
https://doi.org/10.1103/RevModPhys.80.1275
33 C Fan, L Zeng, Y Sun, Y Y Liu, ( 2020). Finding key players in complex networks through deep reinforcement learning. Nature Machine Intelligence, 2( 6): 317– 324
https://doi.org/10.1038/s42256-020-0177-2
34 L C Freeman, ( 1977). A set of measures of centrality based on betweenness. Sociometry, 40( 1): 35– 41
https://doi.org/10.2307/3033543
35 L C Freeman, ( 1978). Centrality in social networks conceptual clarification. Social Networks, 1( 3): 215– 239
https://doi.org/10.1016/0378-8733(78)90021-7
36 L C Freeman, S P Borgatti, D R White, ( 1991). Centrality in valued graphs: A measure of betweenness based on network flow. Social Networks, 13( 2): 141– 154
https://doi.org/10.1016/0378-8733(91)90017-N
37 J Q Fu, M Liu, C Y Deng, J Huang, M Z Jiang, Q Guo, J G Liu, ( 2020). Spreading model of the COVID-19 based on the complex human mobility. Journal of University of Electronic Science and Technology of China, 49( 3): 383– 391 (in Chinese)
38 A Galstyan P Cohen ( 2007). Cascading dynamics in modular networks. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 75(3): 036109
pmid: 17500761
39 V Galvão, J G Miranda, R F Andrade, Jr J S Andrade, L K Gallos, H A Makse, ( 2010). Modularity map of the network of human cell differentiation. Proceedings of the National Academy of Sciences of the United States of America, 107( 13): 5750– 5755
https://doi.org/10.1073/pnas.0914748107
40 S Gao, J Ma, Z M Chen, G H Wang, C M Xing, ( 2014). Ranking the spreading ability of nodes in complex networks based on local structure. Physica A: Statistical Mechanics and Its Applications, 403: 130– 147
https://doi.org/10.1016/j.physa.2014.02.032
41 Z Ghalmane, C Cherifi, H Cherifi, M E Hassouni, ( 2019a). Centrality in complex networks with overlapping community structure. Scientific Reports, 9( 1): 10133
https://doi.org/10.1038/s41598-019-46507-y
42 Z Ghalmane, M El Hassouni, C Cherifi, H Cherifi, ( 2019b). Centrality in modular networks. EPJ Data Science, 8( 1): 15
https://doi.org/10.1140/epjds/s13688-019-0195-7
43 M Girvan, M E J Newman, ( 2002). Community structure in social and biological networks. Proceedings of the National Academy of Sciences of the United States of America, 99( 12): 7821– 7826
https://doi.org/10.1073/pnas.122653799
44 R Guimerà L Danon A Díaz-Guilera F Giralt A Arenas ( 2003). ELF-similar community structure in a network of human interactions. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 68( 6): 065103
pmid: 14754250
45 C Guo, L Yang, X Chen, D Chen, H Gao, J Ma, ( 2020). Influential nodes identification in complex networks via information entropy. Entropy, 22( 2): 242– 260
https://doi.org/10.3390/e22020242
46 Q Guo, R R Yin, J G Liu, ( 2019). Node importance identification for temporal networks via the TOPSIS method. Journal of University of Electronic Science and Technology of China, 48( 2): 296– 300 (in Chinese)
47 M Halappanavar, A V Sathanur, A K Nandi, ( 2016). Accelerating the mining of influential nodes in complex networks through community detection. In: Proceedings of the ACM International Conference on Computing Frontiers. Como, 64– 71
48 M Hall, E Frank, G Holmes, B Pfahringer, P Reutemann, L H Witten, ( 2009). The WEKA data mining software: An update. SIGKDD Explorations, 11( 1): 10– 18
https://doi.org/10.1145/1656274.1656278
49 W L Hamilton R Ying J (2017) Leskovec. Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. Long Beach, CA: Curran Associates Inc., 1025– 1035
50 Z M Han, Y Wu, X S Tan, D G Duan, W J Yang, ( 2015). Ranking key nodes in complex networks by considering structural holes. Acta Physica Sinica, 64( 5): 058902
https://doi.org/10.7498/aps.64.058902
51 H W Hethcote, ( 2000). The mathematics of infectious diseases. SIAM Review, 42( 4): 599– 653
https://doi.org/10.1137/S0036144500371907
52 L Hou, J G Liu, X Pan, B H Wang, ( 2014). A social force evacuation model with the leadership effect. Physica A: Statistical Mechanics and Its Applications, 400: 93– 99
https://doi.org/10.1016/j.physa.2013.12.049
53 G Hu, X Xu, W M Zhang, Y Zhou, ( 2019). Contribution analysis for assessing node importance indices with principal component analysis. Acta Electronica Sinica, 47( 2): 358– 365 (in Chinese)
54 Y Hu, S Ji, Y Jin, L Feng, H E Stanley, S Havlin, ( 2018). Local structure can identify and quantify influential global spreaders in large scale social networks. Proceedings of the National Academy of Sciences of the United States of America, 115( 29): 7468– 7472
https://doi.org/10.1073/pnas.1710547115
55 H Huang, H Shen, Z Meng, H Chang, H He, ( 2019). Community-based influence maximization for viral marketing. Applied Intelligence, 49( 6): 2137– 2150
https://doi.org/10.1007/s10489-018-1387-8
56 S Ivanov, N Durasov, E Burnaev, ( 2018). Learning node embeddings for influence set completion. In: IEEE International Conference on Data Mining Workshops. Singapore, 1034– 1037
57 H Jeong, S P Mason, A L Barabási, Z N Oltvai, ( 2001). Lethality and centrality in protein networks. Nature, 411( 6833): 41– 42
https://doi.org/10.1038/35075138
58 J S Jia, X Lu, Y Yuan, G Xu, J Jia, N A Christakis, ( 2020). Population flow drives spatio–temporal distribution of COVID-19 in China. Nature, 582( 7812): 389– 394
https://doi.org/10.1038/s41586-020-2284-y
59 D Kempe, J Kleinberg, E Tardos, ( 2003). Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. Washington, D.C., 137– 146
60 T N Kipf M Welling ( 2016). Semi-supervised classification with graph convolutional networks. arXiv preprints, arXiv:1609.02907
61 M Kitsak, L K Gallos, S Havlin, F Liljeros, L Muchnik, H E Stanley, H A Makse, ( 2010). Identification of influential spreaders in complex network. Nature Physics, 6( 11): 888– 893
https://doi.org/10.1038/nphys1746
62 J M Kleinberg, ( 1999). Authoritative sources in a hyperlinked environment. Journal of the ACM, 46( 5): 604– 632
https://doi.org/10.1145/324133.324140
63 B Klimt, Y Yang, ( 2004). The Enron Corpus: A new dataset for email classification research. In: Proceedings of the 15th European Conference on Machine Learning. Berlin: Springer, 217– 226
64 W R Knight, ( 1966). A computer method for calculating Kendall’s τ with un-grouped data. Journal of the American Statistical Association, 61( 314): 436– 439
https://doi.org/10.1080/01621459.1966.10480879
65 A Kumar, M Snyder, ( 2002). Protein complexes take the bait. Nature, 415( 6868): 123– 124
https://doi.org/10.1038/415123a
66 S Kumar, B S Panda, ( 2020). Identifying influential nodes in social networks: Neighborhood coreness based voting approach. Physica A: Statistical Mechanics and Its Applications, 553: 124215
https://doi.org/10.1016/j.physa.2020.124215
67 J Kunegis, ( 2016). KONECT: The Koblenz network collection. In: Proceedings of the 22nd International Conference on World Wide Web. Rio de Janeiro: Association for Computing Machinery, 1343– 1350
68 J Leskovec, J Kleinberg, C Faloutsos, ( 2007). Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data, 1( 1): 2
https://doi.org/10.1145/1217299.1217301
69 J Leskovec, K J Lang, A Dasgupta, M W Mahoney, ( 2009). Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6( 1): 29– 123
https://doi.org/10.1080/15427951.2009.10129177
70 D L Liben-Nowell, J Kleinberg, ( 2007). The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology, 58( 7): 1019– 1031
https://doi.org/10.1002/asi.20591
71 C Li, L Wang, S W Sun, C Y Xia, ( 2018). Identification of influential spreaders based on classified neighbors in real-world complex networks. Applied Mathematics and Computation, 320: 512– 523
https://doi.org/10.1016/j.amc.2017.10.001
72 H Li S S Bhowmick A X Sun ( 2013). CINEMA: Conformity-aware greedy algorithm for influence maximization in online social networks. In: Proceedings of the 16th International Conference on Extending Database Technology. Genoa: Association for Computing Machinery, 323– 334
73 Q Li, T Zhou, L Y Lü, D B Chen, ( 2014). Identifying influential spreaders by weighted LeaderRank. Physica A: Statistical Mechanics and Its Applications, 404: 47– 55
https://doi.org/10.1016/j.physa.2014.02.041
74 Z Li, T Ren, X Ma, S Liu, Y Zhang, T Zhou, ( 2019). Identifying influential spreaders by gravity model. Scientific Reports, 9( 1): 8387
https://doi.org/10.1038/s41598-019-44930-9
75 J Lin, ( 1991). Divergence measures based on the Shannon entropy. IEEE Transactions on Information Theory, 37( 1): 145– 151
https://doi.org/10.1109/18.61115
76 J H Lin, Q Guo, W Z Dong, L Y Tang, J G Liu, ( 2014). Identifying node spreading influence with largest k-core values. Physics Letters A, 378( 45): 3279– 3284
https://doi.org/10.1016/j.physleta.2014.09.054
77 J G Liu, J H Lin, Q Guo, T Zhou, ( 2016a). Locating influential nodes via dynamics-sensitive centrality. Scientific Reports, 6( 1): 21380
https://doi.org/10.1038/srep21380
78 J G Liu, Z M Ren, Q Guo, ( 2013a). Ranking the spreading influence in complex networks. Physica A: Statistical Mechanics and Its Applications, 392( 18): 4154– 4159
https://doi.org/10.1016/j.physa.2013.04.037
79 J G Liu, Z M Ren, Q Guo, B H Wang, ( 2013b). Node importance ranking of complex networks. Acta Physica Sinica, 62( 17): 178901
https://doi.org/10.7498/aps.62.178901
80 J G Liu, Z Y Wang, Q Guo, L Guo, Q Chen, Y Z Ni, ( 2017a). Identifying multiple influential spreaders via local structural similarity. Europhysics Letters, 119( 1): 18001
https://doi.org/10.1209/0295-5075/119/18001
81 J Q Liu, X R Li, J C Dong, ( 2021). A survey on network node ranking algorithms: Representative methods, extensions, and applications. Science China Technological Sciences, 64( 3): 451– 461
https://doi.org/10.1007/s11431-020-1683-2
82 X L Liu, J G Liu, K Yang, Q Guo, J T Han, ( 2017b). Identifying online user reputation of user-object bipartite networks. Physica A: Statistical Mechanics and Its Applications, 467: 508– 516
https://doi.org/10.1016/j.physa.2016.10.031
83 Y Liu, M Tang, T Zhou, Y Do, ( 2015a). Core-like groups result in invalidation of identifying super-spreader by k-shell decomposition. Scientific Reports, 5( 1): 9602
https://doi.org/10.1038/srep09602
84 Y Liu, M Tang, T Zhou, Y Do, ( 2015b). Improving the accuracy of the k-shell method by removing redundant links: From a perspective of spreading dynamics. Scientific Reports, 5( 1): 13172
https://doi.org/10.1038/srep13172
85 Y Liu, M Tang, T Zhou, Y Do, ( 2016b). Identify influential spreaders in complex networks, the role of neighborhood. Physica A: Statistical Mechanics and Its Applications, 452: 289– 298
https://doi.org/10.1016/j.physa.2016.02.028
86 Z H Liu, C Jiang, J Y Wang, H Yu, ( 2015c). The node importance in actual complex networks based on a multi-attribute ranking method. Knowledge-Based Systems, 84: 56– 66
https://doi.org/10.1016/j.knosys.2015.03.026
87 T C Lou, J Tang, ( 2013). Mining structural hole spanners through information diffusion in social networks. In: Proceedings of the 22nd International Conference on World Wide Web. Rio de Janeiro: Association for Computing Machinery, 825– 836
88 L Lü, Y C Zhang, C H Yeung, T Zhou, ( 2011). Leaders in social networks, the delicious case. PLoS One, 6( 6): e21202
https://doi.org/10.1371/journal.pone.0021202
89 L Y Lü, D B Chen, X L Ren, Q M Zhang, Y C Zhang, T Zhou, ( 2016). Vital nodes identification in complex networks. Physics Reports, 650: 1– 63
https://doi.org/10.1016/j.physrep.2016.06.007
90 D Lusseau, K Schneider, O J Boisseau, P Haase, E Slooten, S M Dawson, ( 2003). The bottlenose Dolphin community of doubtful sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54( 4): 396– 405
https://doi.org/10.1007/s00265-003-0651-y
91 L L Ma, C Ma, H F Zhang, B H Wang, ( 2016). Identifying influential spreaders in complex networks based on gravity formula. Physica A: Statistical Mechanics and Its Applications, 451: 205– 212
https://doi.org/10.1016/j.physa.2015.12.162
92 S J Ma, Z M Ren, C M Ye, Q Guo, J G Liu, ( 2014). Node influence identification via resource allocation dynamics. International Journal of Modern Physics C, 25( 11): 1450065
https://doi.org/10.1142/S012918311450065X
93 T H Ma, Q Liu, J Cao, Y Tian, A Al-Dhelaan, M Al-Rodhaan, ( 2020). LGIEM: Global and local node influence based community detection. Future Generation Computer Systems, 105: 533– 546
https://doi.org/10.1016/j.future.2019.12.022
94 J (1967) Macqueen. Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability. Berkeley, CA: University of California Press, 281– 297
95 G Maji, ( 2020). Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method. Journal of Computational Science, 39: 101055
https://doi.org/10.1016/j.jocs.2019.101055
96 G Maji, S Mandal, S Sen, ( 2020). A systematic survey on influential spreaders identification in complex networks with a focus on k-shell based techniques. Expert Systems with Applications, 161: 113681
https://doi.org/10.1016/j.eswa.2020.113681
97 P Massa M Salvetti D (2009) Tomasoni. Bowling alone and trust decline in social network sites. In: Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, 658– 663
98 J McAuley J (2012) Leskovec. Learning to discover social circles in ego networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems. Lake Tahoe, NV: Curran Accociates, 539– 547
99 B Moore, ( 1981). Principal component analysis in linear systems: Controllability, observability, and model reduction. IEEE Transactions on Automatic Control, 26( 1): 17– 32
https://doi.org/10.1109/TAC.1981.1102568
100 M Muthukrishna, M Schaller, ( 2020). Are collectivistic cultures more prone to rapid transformation? Computational models of cross-cultural differences, social network structure, dynamic social influence, and cultural change. Personality and Social Psychology Review, 24( 2): 103– 120
https://doi.org/10.1177/1088868319855783
101 A Namtirtha, A Dutta, B Dutta, ( 2018). Weighted k-shell degree neighborhood method: An approach independent of completeness of global network structure for identifying the influential spreaders. In: 10th International Conference on Communication Systems & Networks. Bengaluru: IEEE, 81– 88
102 A Namtirtha, A Dutta, B Dutta, A Sundararajan, Y Simmhan, ( 2021). Best influential spreaders identification using network global structural properties. Scientific Reports, 11( 1): 2254
https://doi.org/10.1038/s41598-021-81614-9
103 A Nargundkar, Y S Rao, ( 2016). InfluenceRank: A machine learning approach to measure influence of Twitter users. In: International Conference on Recent Trends in Information Technology. Chennai: IEEE, 1– 6
104 M E J Newman, ( 2001). The structure of scientific collaboration networks. Proceedings of the National Academy of Sciences of the United States of America, 98( 2): 404– 409
https://doi.org/10.1073/pnas.98.2.404
105 M E J Newman ( 2006). Finding community structure in networks using the eigenvectors of matrices. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 74( 3): 036104
pmid: 17025705
106 M Niepert M Ahmed K (2016) Kutzkov. Learning convolutional neural networks for graphs. In: Proceedings of the 33rd International Conference on Machine Learning. New York, NY: JMLR.org, 2014– 2023
107 Y Ou, Q Guo, J L Xing, J G Liu, ( 2022). Identification of spreading influence nodes via multi-level structural attributes based on the graph convolutional network. Expert Systems with Applications, 203: 117515
https://doi.org/10.1016/j.eswa.2022.117515
108 S K Pal, S Kundu, C A Murthy, ( 2014). Centrality measures, upper bound, and influence maximization in large scale directed social networks. Fundamenta Informaticae, 130( 3): 317– 342
https://doi.org/10.3233/FI-2014-994
109 G Palla, I Derényi, I Farkas, T Vicsek, ( 2005). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435( 7043): 814– 818
https://doi.org/10.1038/nature03607
110 R K Pan, J Saramäki, ( 2012). The strength of strong ties in scientific collaboration networks. Europhysics Letters, 97( 1): 18007
https://doi.org/10.1209/0295-5075/97/18007
111 Y Pan, D H Li, J G Liu, J Z Liang, ( 2010). Detecting community structure in complex networks via node similarity. Physica A: Statistical Mechanics and Its Applications, 389( 14): 2849– 2857
https://doi.org/10.1016/j.physa.2010.03.006
112 C Peng, X Wang, J Pei, W Zhu, ( 2019). A survey on network embedding. IEEE Transactions on Knowledge and Data Engineering, 31( 5): 833– 852
https://doi.org/10.1109/TKDE.2018.2849727
113 X Qi, R D Duval, K Christensen, E Fuller, A Spahiu, Q Wu, Y Wu, W Tang, C Zhang, ( 2013). Terrorist networks, network energy and node removal: A new measure of centrality based on Laplacian energy. Social Networking, 2( 1): 19– 31
https://doi.org/10.4236/sn.2013.21003
114 L Q Qiu, W Jia, J F Yu, X Fan, W W Gao, ( 2019). PHG: A three-phase algorithm for influence maximization based on community structure. IEEE Access, 7: 62511– 62522
https://doi.org/10.1109/ACCESS.2019.2912628
115 X Ren, Y Zhu, S Wang, H Liao, X Han, L Lü, ( 2015). Online social network analysis and the relation with regional economic development. Journal of University of Electronic Science and Technology of China, 44( 5): 643– 651 (in Chinese)
116 X L Ren, L Y Lü, ( 2013). Review of ranking nodes in complex networks. Chinese Science Bulletin, 59( 13): 1175– 1197
https://doi.org/10.1360/972013-1280
117 Z M Ren, ( 2020). Node influence of the dynamic networks. Acta Physica Sinica, 69( 4): 24– 32 (in Chinese)
118 Z M Ren, J G Liu, F Shao, Z L Hu, Q Guo, ( 2013a). Analysis of the spreading influence of the nodes with minimum k-shell value in complex networks. Acta Physica Sinica, 62( 10): 108902
https://doi.org/10.7498/aps.62.108902
119 Z M Ren, F Shao, J G Liu, Q Guo, B H Wang, ( 2013b). Node importance measurement based on the degree and clustering coefficient information. Acta Physica Sinica, 62( 12): 128901
https://doi.org/10.7498/aps.62.128901
120 G Sabidussi, ( 1966). The centrality index of a graph. Psychometrika, 31( 4): 581– 603
https://doi.org/10.1007/BF02289527
121 M D Sacchet, G Prasad, L C Foland-Ross, P M Thompson, I H Gotilb, ( 2014). Elucidating brain connectivity networks in major depressive disorder using classification-based scoring. In: 11th International Symposium on Biomedical Imaging. Beijing: IEEE, 246– 249
122 J X Shang, S B Zhou, X Li, L C Liu, H C Wu, ( 2017). CoFIM: A community-based framework for influence maximization on large-scale networks. Knowledge-Based Systems, 117: 88– 100
https://doi.org/10.1016/j.knosys.2016.09.029
123 Q Shang, Y Deng, K H Cheong, ( 2021). Identifying influential nodes in complex networks: Effective distance gravity model. Information Sciences, 577: 162– 179
https://doi.org/10.1016/j.ins.2021.01.053
124 A Sheikhahmadi, M A Nematbakhsh, A Shokrollahi, ( 2015). Improving detection of influential nodes in complex networks. Physica A: Statistical Mechanics and Its Applications, 436: 833– 845
https://doi.org/10.1016/j.physa.2015.04.035
125 T C Silva, L Zhao, ( 2012). Network-based high level data classification. IEEE Transactions on Neural Networks and Learning Systems, 23( 6): 954– 970
https://doi.org/10.1109/TNNLS.2012.2195027
126 S N Soffer, A Vázquez, ( 2005). Network clustering coefficient without degree-correlation biases. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 71( 5): 057101
https://doi.org/10.1103/PhysRevE.71.057101
127 N Spring, R Mahajan, D Wetherall, ( 2002). Measuring ISP topologies with rocketfuel. ACM SIGCOMM Computer Communication Review, 32( 4): 133– 145
https://doi.org/10.1145/964725.633039
128 X P Su, Y R Song, ( 2015). Leveraging neighborhood “structural holes” to identifying key spreaders in social networks. Acta Physica Sinica, 64( 2): 020101
https://doi.org/10.7498/aps.64.020101
129 H L Sun, D B Chen, J L He, E Chng, ( 2019). A voting approach to uncover multiple influential spreaders on weighted networks. Physica A: Statistical Mechanics and Its Applications, 519: 303– 312
https://doi.org/10.1016/j.physa.2018.12.001
130 L Tang, H Liu, ( 2009). Relational learning via latent social dimensions. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Paris, 817– 826
131 L Y Tang, S N Li, J H Lin, Q Guo, J G Liu, ( 2016). Community structure detection based on the neighbor node degree information. International Journal of Modern Physics C, 27( 4): 1650046
https://doi.org/10.1142/S0129183116500467
132 A J P Tixier, M E G Rossi, F D Malliaros, J Read, M Vazirgiannis, ( 2019). Perturb and combine to identify influential spreaders in real-world networks. In: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Vancouver, 73– 80
133 M M Tulu, R Hou, T Younas, ( 2018). Identifying influential nodes based on community structure to speed up the dissemination of information in complex network. IEEE Access, 6: 7390– 7401
https://doi.org/10.1109/ACCESS.2018.2794324
134 A Ullah, B Wang, J Sheng, J Long, N Khan, Z Sun, ( 2021). Identification of nodes influence based on global structure model in complex networks. Scientific Reports, 11( 1): 6173
https://doi.org/10.1038/s41598-021-84684-x
135 F Wang, J She, Y Ohyama, M Wu, ( 2019). Deep-learning-based identification of influential spreaders in online social networks. In: IECON 45th Annual Conference of the IEEE Industrial Electronics Society. Lisbon, 6854– 6858
136 Y Wang, G Cong, G J Song, K Q Xie, ( 2010). Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington, D.C., 1039– 1048
137 Y F Wang G H Yan Q Q Ma Y Wu M (2018) Zhang. Identifying influential nodes based on vital communities. In: 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress. Athens: IEEE, 314– 317
138 Z X Wang, Y Zhao, J K Xi, C J Du, ( 2016). Fast ranking influential nodes in complex networks using a k-shell iteration factor. Physica A: Statistical Mechanics and Its Applications, 461: 171– 181
https://doi.org/10.1016/j.physa.2016.05.048
139 D J Watts, P S Dodds, ( 2007). Influential, networks, and public opinion formation. Journal of Consumer Research, 34( 4): 441– 458
https://doi.org/10.1086/518527
140 D J Watts, S H Strogatz, ( 1998). Collective dynamics of “small-world” networks. Nature, 393( 6684): 440– 442
https://doi.org/10.1038/30918
141 H Wei, Z Pan, G Hu, L Zhang, H Yang, X Li, X Zhou, ( 2018). Identifying influential nodes based on network representation learning in complex networks. PLoS One, 13( 7): e0200091
https://doi.org/10.1371/journal.pone.0200091
142 Z Wu, S Pan, F Chen, G Long, C Zhang, P S Yu, ( 2021). A comprehensive survey on graph neural networks. IEEE Transactions on Neural Networks and Learning Systems, 32( 1): 4– 24
https://doi.org/10.1109/TNNLS.2020.2978386
143 N Xie ( 2006). Social Network Analysis of Blogs. Dissertation for the Master’s Degree. Bristol: University of Bristol
144 S Yan, S T Tang, S S Pei, J Jiang, X Zhang, W R Ding, M Z Zheng, ( 2013). The spreading of opposite opinions on online social networks with authoritative nodes. Physica A: Statistical Mechanics and Its Applications, 392( 17): 3846– 3855
https://doi.org/10.1016/j.physa.2013.04.018
145 X L Yan, Y P Cui, S J Ni, ( 2020). Identifying influential spreaders in complex networks based on entropy weight method and gravity law. Chinese Physics B, 29( 4): 048902
https://doi.org/10.1088/1674-1056/ab77fe
146 J Yang, J Leskovec, ( 2012). Defining and evaluating network communities based on ground-truth. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. Beijing, 1– 8
147 J Yang, J Leskovec, ( 2013). Overlapping community detection at scale: A nonnegative matrix factorization approach. In: Proceedings of the 6th ACM International Conference on Web Search and Data Mining. Rome, 587– 596
148 J N Yang, J G Liu, Q Guo, ( 2018a). Node importance identification for temporal network based on inter-layer similarity. Acta Physica Sinica, 67( 4): 279– 286 (in Chinese)
149 K Yang, Q Guo, J G Liu, ( 2018b). Community detection via measuring the strength between nodes for dynamics networks. Physica A: Statistical Mechanics and Its Applications, 509: 256– 264
https://doi.org/10.1016/j.physa.2018.06.038
150 X H Yang, S Xiong, ( 2021). Identification of node influence using network representation learning in complex network. Journal of Chinese Computer Systems, 42( 2): 418– 423 (in Chinese)
151 Y Z Yang, X Wang, Y Chen, M Hu, C W Ruan, ( 2020). A novel centrality of influential nodes identification in complex networks. IEEE Access, 8: 58742– 58751
https://doi.org/10.1109/ACCESS.2020.2983053
152 R R Yin, Q Guo, J N Yang, J G Liu, ( 2018). Inter-layer similarity-based eigenvector centrality measures for temporal networks. Physica A: Statistical Mechanics and Its Applications, 512: 165– 173
https://doi.org/10.1016/j.physa.2018.08.018
153 E Y Yu, Y P Wang, Y Fu, D B Chen, M Xie, ( 2020). Identifying critical nodes in complex networks via graph convolutional networks. Knowledge-Based Systems, 198: 105893
https://doi.org/10.1016/j.knosys.2020.105893
154 S B Yu, L Gao, L D Xu, Z Y Gao, ( 2019). Identifying influential spreaders based on indirect spreading in neighborhood. Physica A: Statistical Mechanics and Its Applications, 523: 418– 425
https://doi.org/10.1016/j.physa.2019.02.010
155 W W Zachary, ( 1977). An information flow model for conflict and fission in small groups. Journal of Anthropological Research, 33( 4): 452– 473
https://doi.org/10.1086/jar.33.4.3629752
156 A Zareie, A Sheikhahmadi, M Jalili, ( 2019). Influential node ranking in social networks based on neighborhood diversity. Future Generation Computer Systems, 94: 120– 129
https://doi.org/10.1016/j.future.2018.11.023
157 A C Zeng, J Zhang, ( 2013). Ranking spreaders by decomposing complex networks. Physics Letters A, 377( 14): 1031– 1035
https://doi.org/10.1016/j.physleta.2013.02.039
158 D Zhang, Y Wang, Z Zhang, ( 2019a). Identifying and quantifying potential super-spreaders in social networks. Scientific Reports, 9( 1): 14811
https://doi.org/10.1038/s41598-019-51153-5
159 J X Zhang, D B Chen, Q Dong, Z D Zhao, ( 2016). Identifying a set of influential spreaders in complex networks. Scientific Reports, 6( 1): 27823
https://doi.org/10.1038/srep27823
160 M H Zhang, Y X Chen, ( 2018). Link prediction based on graph neural networks. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems. Montreal: Curran Associates Inc., 5171– 5181
161 W Zhang, J Yang, X Y Ding, X M Zou, H Y Han, Q C Zhao, ( 2019b). Groups make nodes powerful: Identifying influential nodes in social networks based on social conformity theory and community features. Expert Systems with Applications, 125: 249– 258
https://doi.org/10.1016/j.eswa.2019.02.007
162 G H Zhao, P Jia, C Huang, A Zhou, Y Fang, ( 2020a). A machine learning based framework for identifying influential nodes in complex networks. IEEE Access, 8: 65462– 65471
https://doi.org/10.1109/ACCESS.2020.2984286
163 G H Zhao, P Jia, A Zhou, B Zhang, ( 2020b). InfGCN: Identifying influential nodes in complex networks with graph convolutional networks. Neurocomputing, 414: 18– 26
https://doi.org/10.1016/j.neucom.2020.07.028
164 X Y Zhao, B Huang, M Tang, H F Zhang, D B Chen, ( 2014a). Identifying effective multiple spreaders by coloring complex networks. Europhysics Letters, 108( 6): 68005
https://doi.org/10.1209/0295-5075/108/68005
165 Z J Zhao, Q Guo, K Yu, J G Liu, ( 2020c). Identifying influential nodes for the networks with community structure. Physica A: Statistical Mechanics and Its Applications, 551: 123893
https://doi.org/10.1016/j.physa.2019.123893
166 Z Y Zhao, H Yu, Z L Zhu, X F Wang, ( 2014b). Identifying influential spreaders based on network community structure. Chinese Journal of Computers, 37( 4): 753– 766 (in Chinese)
167 Z Y Zhao, X F Wang, W Zhang, Z L Zhu, ( 2015). A community-based approach to identifying influential spreaders. Entropy, 17( 4): 2228– 2252
https://doi.org/10.3390/e17042228
168 M Y Zhou, W M Xiong, X Y Wu, Y X Zhang, H Liao, ( 2018). Overlapping influence inspires the selection of multiple spreaders in complex networks. Physica A: Statistical Mechanics and Its Applications, 508: 76– 83
https://doi.org/10.1016/j.physa.2018.05.022
169 T Zhou, L Y Lü, Y C Zhang, ( 2009). Predicting missing links via local information. European Physical Journal B, 71( 4): 623– 630
https://doi.org/10.1140/epjb/e2009-00335-8
[1] Qian SHI, Chenyu LIU, Chao XIAO. Machine learning in building energy management: A critical review and future directions[J]. Front. Eng, 2022, 9(2): 239-256.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed