Skip to main content

Thank you for visiting You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Systematic comparison between methods for the detection of influential spreaders in complex networks


Influence maximization is the problem of finding the set of nodes of a network that maximizes the size of the outbreak of a spreading process occurring on the network. Solutions to this problem are important for strategic decisions in marketing and political campaigns. The typical setting consists in the identification of small sets of initial spreaders in very large networks. This setting makes the optimization problem computationally infeasible for standard greedy optimization algorithms that account simultaneously for information about network topology and spreading dynamics, leaving space only to heuristic methods based on the drastic approximation of relying on the geometry of the network alone. The literature on the subject is plenty of purely topological methods for the identification of influential spreaders in networks. However, it is unclear how far these methods are from being optimal. Here, we perform a systematic test of the performance of a multitude of heuristic methods for the identification of influential spreaders. We quantify the performance of the various methods on a corpus of 100 real-world networks; the corpus consists of networks small enough for the application of greedy optimization so that results from this algorithm are used as the baseline needed for the analysis of the performance of the other methods on the same corpus of networks. We find that relatively simple network metrics, such as adaptive degree or closeness centralities, are able to achieve performances very close to the baseline value, thus providing good support for the use of these metrics in large-scale problem settings. Also, we show that a further 2–5% improvement towards the baseline performance is achievable by hybrid algorithms that combine two or more topological metrics together. This final result is validated on a small collection of large graphs where greedy optimization is not applicable.


Every day, we witness the dissemination of new pieces of information in social networks1,2,3,4,5. Few of them become widespread; the vast majority, however, diffuse only over a vanishing portion of the network. Are there a priori identifiable features that allow for the early prediction of the outcome of a spreading process in a network? Many studies have pointed out that the “quality” or “attractiveness” of the information might have an effect on how far it may spread1,6. In mathematical models of information spreading, the notion of quality is typically quantified in terms of the probability of spreading events along individual edges in the social network. However, the spreading probability of individual edges is not the only key factor that determines the fate of a piece of information spreading in a network. The nodes that act as seeds for the spreading process may play a role that is more important than the actual probability to spread information along social contacts. Intuitively, if the diffusion process is seeded by central nodes, then the piece of information may reach large popularity; on the other hand, a piece of information originated from peripheral nodes is much less likely to become widespread.

The problem of selecting the best set of seed nodes for a spreading process in a network has been traditionally named as the problem of influence maximization. The problem is generally considered under the strong assumption of having full and exact knowledge of both the network topology and the spreading dynamics. We will adopt this line here too, although we remark that such an assumption is at least optimistic and may potentially lead, if not satisfied, to significant mistakes in the identification of the true influential spreaders7. The function that is optimized in influence maximization is the average value of the outbreak size. The optimization problem is solved for a given size of the seed set, generally much smaller than the network size. The problem was first formulated by Domingos and Richardson8, and later generalized by Kempe et al.9. In particular, Kempe et al. showed that influence maximization is a NP-hard problem, exactly solvable for very small networks only. Also, Kempe et al. demonstrated that for specific models of opinion spreading, such as the independent cascade and the linear threshold models, the average outbreak size is a submodular function, and thus greedy optimization algorithms allow to find, in polynomial time, approximate solutions that are less than a factor \((1-1/e)\) away from the true optimum10. The greedy algorithm actively uses information about the topology of the network and the dynamical rules of the spreading model. After the seminal work by Kempe et al., other similar greedy techniques for approximating solutions to the influence maximization problem have been proposed11,12,13,14. As all these algorithms require knowledge of the model at the basis of the spreading process, often obtained through numerical simulations, they all suffer from the limitation of being applicable to small-medium sized networks only. We remark that some attempts of greedy-like algorithms applicable to large networks have been made15,16. Those attempts, however, rely on approximate estimations of the outcome of numerical simulations, thus leading to solutions to the influence maximization problem that are generally inferior to the solutions obtained with straight greedy optimization.

On large networks, like those of interest in practical applications, solutions to the influence maximization problem are generally obtained via heuristic methods. The literature is full of examples17,18,19,20,21,22,23. Heuristic methods use complete information about the network structure, but they completely neglect information about the dynamical model of spreading. They are generally much faster than greedy algorithms, but clearly less effective. Their main limitations are two-fold. On the one hand, heuristic methods are characterized by the inability to account for the combined effect that seeds may have in a complex spreading process, as the set of influential nodes is built combining the best individual spreaders and their influence sets may be strongly overlapping. On the other hand, being based on purely topological properties, heuristic methods lack sensitivity to the features of the spreading dynamics and the variation of the associated parameters. Given the wealth of heuristic methods that have been proposed to identify influential nodes in networks, how different these methods are in terms of performance? Even more important, how far is the performance of the best heuristic methods from optimality, at least the achievable optimality provided by greedy algorithms? We realized that no clear answer to these fundamental questions can be found in current literature, and we decided to fill this gap of knowledge here.

The present paper reports on a systematic test of 16 heuristic methods that have been proposed to approximate solutions to the influence maximization problem. Our analysis is based on a corpus of 100 real-world networks, and performance of the various heuristic methods is quantified for SIR-like spreading processes. Despite the various methods rely on rather different centrality metrics, we find that many of them are able to achieve comparable performances. When used to select the top 5% initial seeds of spreading in real-networks, the best performing methods show levels of performance that are within 90% from those achievable by greedy optimization, so that the room for potential improvement appears small. We show that one way to achieve better performances is relying on hybrid methods that combine two or more centrality metrics together. We validate this final result on a small set of large-scale networks.



In this study, we focus most of our attention on a corpus of 100, undirected and unweighted, real-world networks. Sizes of these networks range from 100 to 30,000 nodes, and their density varies between 0.0001 and 0.25. The corpus is composed of networks of small to medium size on purpose, as these allow for the application of greedy optimization in the solution of the influence maximization problem. We consider networks from different domains. Specifically, our corpus of networks include 63 social, 16 technological, 10 information, 8 biological, and 3 transportation networks. Details about the analyzed networks can be found in the SM1. In the final part of the paper, we validate some of our findings on 9 large real-world social and information networks with sizes ranging from 50,000 to slightly more than 1,000,000. Details are provided in Table 3.

Spreading dynamics

We concentrate our attention on the Independent Cascade Model (ICM)9. This is a very popular model in studies focusing on the influence maximization problem. The ICM is a simplified version of the Susceptible-Infected-Recovered (SIR) model24. Nodes can be in either one of the three states S, I, or R. At the beginning of the dynamics, all nodes start in the S state except for those who are selected to be the initial spreaders, which are assigned to the I state. At each step of the model, all nodes in state I try to infect their neighbors in state S with probability p; then, they recover immediately, by changing their states from I to R. Nodes in state R never change their state and no longer participate to the spreading dynamics. The dynamics continue until there are no nodes left in state I. The size of the outbreak is calculated by counting the number of nodes that ended up in state R at the end of the spreading dynamics. As the spreading from one node to another happens with probability p, the model has a stochastic nature. To properly account for the stochastic nature of the model, all our results are obtained as average values over 50 independent numerical simulations for every given initial condition.

Methods for the selection of influential spreaders

In total, we consider 18 methods for the identification of influential spreaders in networks (see Table 1). Each method outputs a list of nodes in a specific order from the most influential node to the least influential node. We use this rank to construct, in a sequential manner, the set of the top spreaders according to a particular method. The various methods take as input different type/amount of information, and make use of rather different types of rankings. As a consequence, the computational complexity of the various methods may be significantly different. For illustrative purposes, we decided to group the 18 methods for the selection of influential spreaders into four main groups.

Table 1 Methods for the selection of influential spreaders.

The group of baseline methods is formed by the methods greedy and random. The greedy algorithm is the best performing method available on the market, thus providing an upper bound for the performance of all other methods. The greedy algorithm uses all available information about network topology and spreading dynamics. For instance, the algorithm provides different solutions depending on the value of the spreading probability p. For the greedy method applied to the ICM, we rely on the Chen et al.’s12 algorithm, which makes use of the mapping between ICM and bond percolation to obtain faster results regarding the simulations of the spreading process. The random method instead represents a lower bound for the performances of other methods. The method just outputs nodes of the network in random order, de facto neglecting any prior information regarding system topology and dynamics.

The remaining 16 of the 18 methods are purely topological methods in the sense that they rely on heuristics that are calculated using full knowledge of the network structure, but no information at all about spreading dynamics. According to these methods the influence of a node is proportional to a network centrality metric. Depending on the nature of the centrality metric used, we classify the topological methods into three groups.

First, methods that use local topological information, in the sense that values of the centrality metric associated to every node are computed using information about their nearest neighbors only. For example, degree centrality, which consists of counting the number of neighbors of a node, belongs to this category. A variant of the degree method, called adaptive degree method, which was proposed by Chen et al.12 is classified as a local method too.

Second, methods that are based on global centrality metrics whose computation, at the level of the individual nodes, requires complete knowledge about the whole network structure. This group consists of methods relying on betweenness25, closeness26, eigenvector27, Katz28, non-backtracking29,30, and pagerank31 centralities. As a part of this group we also considered the method based on an adaptive variant of the non-backtracking centrality32.

Finally, we consider several methods that rely on intermediate topological information (e.g., nearest neighbors, next-nearest neighbors) for the computation of node centrality metrics. This group consists of the methods that rely on the metrics k-shell33, localrank34, and h-index35. We classify in the intermediate group also methods that are based on collective influence36, coreHD37, and explosive immunization score38. These are methods introduced with the goal of approximating solutions to the optimal percolation problem36, an optimization problem that has similarities with, but is different from the one considered in influence maximization39. We stress that we consider two variations of the CI method. Specifically, we consider CI1 and CI2, where the numerical value indicates the value of the parameter that defines the centrality metric36.

Evaluating the performance of methods for the selection of influential spreaders

Potentially all selection methods described above are subjected to statistical fluctuations in the sense that they may generate a different ranking for the nodes at each run. This is due to the presence of ties in the ranking of nodes, and the fact that we break ties by randomly selecting nodes with the same rank position. To account for statistical fluctuations, we apply every method R = 10 independent times to generate R rankings for the nodes. We consider each of these rankings to sequentially construct sets of top spreaders. Specifically, we indicate as \({{\mathscr{S}}}_{m}^{(t,r)}\) the set of top tN spreaders identified by method m in instance r of the method and for a given network with N nodes. For every set \({{\mathscr{S}}}_{m}^{(t,r)}\), we run 50 different times the ICM model, and measure the average value of the outbreak size \(O[{{\mathscr{S}}}_{m}^{(t,r)}]\). We then repeat the operation for every instance r of the method, and take the average over the R potentially different sets, namely

$${V}_{m}^{(t)}=\frac{1}{R}\,\mathop{\sum }\limits_{r=1}^{R}\,O[{{\mathscr{S}}}_{m}^{(t,r)}].$$

Figure 1 displays how the relative size of the outbreak \({V}_{m}^{(t)}/N\) grows as function of the relative seed set size t for some of the methods for the identification of top spreaders considered in this paper. Given the amount of simulations performed, the standard error associated with the average value of the outbreak size of Eq. (1) is always very small. We therefore neglect it in all the considerations and analyses below. Figure 1 clearly shows that the greedy and random algorithms are good baselines for the performances of the other methods. For instance, the greedy algorithm outperforms all other methods. This result is confirmed across the entire corpus of networks we analyzed in this paper (see SM1 and SM2). In a few networks, some heuristic methods are able to slightly outperform the greedy algorithm. This seems to happen only in the case of relatively small networks, composed of hundreds or less nodes. Similarly, all methods perform better than the random selection method, although there are quite a few cases where randomly selecting seeds perform as well as selecting seeds according to some topological heuristic.

Figure 1

Relative size of the outbreak as a function of the relative size of the seed set for the email communication network of ref.43. To obtain relative values, we divide outbreak size and seed set size by the total number of nodes in the network. Relative measures allow for an immediate comparison across networks with different sizes. We compare the performance of different methods for the selection of influential nodes. Outbreak size is calculated for ICM dynamics at critical threshold \({p}_{c}=0.056\). To avoid overcrowding, we display results only for a subset of the methods considered in the paper.

As a measure for the performance of method m in the identification of the top TN influential spreaders of a given network, we evaluate the area under the curves of Fig. 1 up to a pre-imposed T value

$${q}_{m}^{(T)}=\frac{1}{N}\,{\int }_{0}^{T}\,dt\,{V}_{m}^{(t)}.$$

As the size of set of top spreaders are linearly dependent from the size of the network N, we can easily aggregate results obtained over the entire corpus of real-world networks at our disposal. Specifically, results in the main paper are obtained for \(T=0.05\). We report results for \(T=0.1\) in the SM2. No significant differences between the two cases are apparent. As some of the methods considered in the paper are characterized by large computational complexity (see Table 1), we couldn’t consider \(T > 0.1\). We note, however, that studying the performance of methods for the identification of influential spreaders has a meaning only for small T values, given that in practical applications the seeding is generally performed on a vanishing portion of the system. Also, we test the validity of all results using \({V}_{m}^{(T)}\) as a main metric of performance, instead of its integral of Eq. (2). Results are reported in the SM2. No significant changes with respect to the results presented here in the main paper are apparent.

As the greedy algorithm provides an upper bound for the performance of the other methods, we use it as a term of comparison for all other methods in our systematic analysis. We consider two main metrics of performance. The first measure is based on a comparison between the outbreak size obtainable by a method compared to the one obtained using the greedy identification method. Specifically, given a network, we first compute


where we used the abbreviation \({q}_{G}^{(T)}\) to indicate the expression of Eq. (2) for the greedy algorithm, i.e., \(m=G\). Then, we evaluate the performance relative to greedy for all networks in our dataset, and summarize the results in Fig. 2 where we display the cumulative distribution of this quantity for some of the methods. To obtain a single number for the performance of the method over the entire corpus of networks, we define the overall performance \(\langle {g}_{m}^{(T)}\rangle \) given by the average value of the metric defined in Eq. (3) over all real networks in the dataset. We remark that statistical errors associated to the metrics of Eqs (1), (2) and (3) are negligible given the large number of independent numerical simulations used to determine their average values. A similar statement, however, doesn’t hold for the overall performance \(\langle {g}_{m}^{(T)}\rangle \) due to the relatively small size of the corpus of networks analyzed. In the following, we associate the standard error of the mean to any estimate of the average value \(\langle {g}_{m}^{(T)}\rangle \) obtained on samples of real-world networks.

Figure 2

Cumulative distribution of the relative performance \({g}_{m}^{(T)}\) (for \(T=0.05\)) obtained by using a method for the identification of influential spreaders different from the greedy algorithm. The metric of relative performance is defined in Eq. 3. The distribution is obtained considering all networks in our dataset. For every network, the outbreak size is calculated for ICM dynamics at critical threshold pc. See details in the SM1. To avoid overcrowding, we display results only for the same subset of the methods as already considered in Fig. 1.

The second metric of performance instead neglects the size of the outbreak, and focuses only on the identity of the nodes identified by the method m. For the actual solution of the problem of influence maximization, this second metric is clearly much less important than the one previously considered. However, the metric can tell us something more about the topological properties of the set of top spreaders in networks. Given a network, we evaluate the frequency \({f}_{m}^{(T,i)}\) of every node i to be in the set of top TN spreaders according to method m over \(R=10\) runs of the algorithm. We then compute the precision of the method relative to the greedy algorithm as

$${r}_{m}^{(T)}=\frac{1}{T\,N}\,\mathop{\sum }\limits_{i=1}^{N}\,{f}_{m}^{(T,i)}\,{f}_{G}^{(T,i)}.$$

We note that Eq. (4) can be used to measure the self-consistency of the greedy method by setting \(m=G\). The cumulative distribution of the precision metric defined in Eq. (4) across the entire network dataset is displayed in Fig. 3. The plot shows high level of precision between some methods and the greedy algorithm. The random selection method generates a distribution well peaked around the value T. We characterize the generic method m with a metric of overall precision \(\langle {r}_{m}^{(T)}\rangle \) as the average value of the precision defined in Eq. (4) over the entire corpus of real networks. Statistical errors associated to measure of \(\langle {r}_{m}^{(T)}\rangle \) are quantified in terms of standard error of the mean. The value of \(\langle {r}_{m}^{(T)}\rangle \) tells us how much the method m is similar to the baseline provided by the greedy algorithm in the identification of the top spreaders across the entire corpus of networks at our disposal.

Figure 3

Cumulative distribution of the precision metric \({r}_{m}^{(T)}\) defined in Eq. (4) for \(T=0.05\). The distribution is obtained considering all networks in our dataset. Results for the greedy algorithm used in the comparison are those obtained for ICM dynamics at critical threshold pc. See details in the SM1. To avoid overcrowding, we display results only for the same subset of the methods as already considered in Fig. 1.


Individual methods

Armed with the metrics defined in the section above, we test the various methods for the identification of influential spreaders for ICM dynamics over the entire corpus of real networks at our disposal. We remark that both the identity and performance of the true set of influential spreaders may be dependent on the actual value of the spreading probability p in the ICM model, so that the performance of the various seed selection methods needs to be evaluated at different values of the spreading probability p. For instance, for the extreme cases \(p=0\) and \(p=1\), predictions are trivial in the sense that all methods have exactly the same performance in terms of outbreak size. The prediction of methods performance is instead non trivial when the uncertainty of the spreading outcome is maximal. For this reason, we focus our attention on ICM dynamics around the critical threshold \(p={p}_{c}\). To perform the analysis, we first evaluate the critical threshold values pc for every network in the database. Specifically, we rely on mapping between bond percolation and the ICM, and we apply the Newman-Ziff algorithm to evaluate pc40,41. pc values for the various networks are reported in the SM1. We then consider ICM dynamics for three distinct values of p: (i) subcritical regime at \(p={p}_{c}/2\); (ii) critical regime at \(p={p}_{c}\); (iii) supercritical regime at \(p=2{p}_{c}\).

Results of our analysis are summarized in Fig. 4. Every method is used to identify the set of top TN nodes in the networks, with \(T=0.05\). In the figure, we represent results for each method m in the plane \((\langle {g}_{m}\rangle ,\langle {r}_{m}\rangle )\). Numerical values of \(\langle {g}_{m}\rangle \) and \(\langle {r}_{m}\rangle \), as well as their associated statistical errors, are reported in SM2. Please note that we dropped the suffix T to simplify the notation. We remark that the performance of every method m is measured in relation to the performance of the greedy method, i.e., \(m=G\). By definition, we have \(\langle {g}_{G}\rangle =1\); we find instead that the self-consistency score is \(\langle {r}_{G}\rangle < 1\) meaning that optimal sets identified by the greedy algorithm have some degree of variability. Such a variability seems due to the existence of (quasi)degenerate solutions to the influence maximization problem, i.e., different seed sets corresponding to similar outbreak sizes. The presence of statistical fluctuations in the numerical estimates of the outbreak size may be an additional confounding factor that exacerbates the degeneracy of greedy solutions. An interesting finding is the absence of a strong dependence of \(\langle {r}_{G}\rangle \) from the dynamical regimes of the ICM. The other important reference point in the plane is given by the random method (\(m=R\)). By definition, we have that \(\langle {r}_{R}\rangle \simeq T=0.05\). \(\langle {g}_{R}\rangle \) values instead strongly depend on the dynamical regime.

Figure 4

Performance and precision of methods for the identification of influential spreaders in real networks. Results are based on the systematic analysis of 100 real-world networks. For each network, we first evaluate the critical value of the spreading probability pc for ICM dynamics. Then, we consider the analysis for three distinct phases of spreading: (a) \(p={p}_{c}/2\), (b) \(p={p}_{c}\), (c) \(p=2{p}_{c}\). Each point in the various panels corresponds to one method. Every method is used to identify the top TN, with \(T=0.05\), spreaders in the networks. For clarity of the figure, methods are identified by the same abbreviations as those defined in Table 1. Methods are characterized by the metrics of performance defined in the paper. Both these metrics relate the performance of a generic method m to the one of the greedy algorithm. Overall performance \(\langle {g}_{m}\rangle \) is a metric of performance that relies on the size of the outbreak associated with the set of influential spreaders identified by the method compared to the typical outbreak obtained with the greedy algorithm. Overall precision \(\langle {r}_{m}\rangle \) instead quantifies the overlap between the sets of spreaders identified by a method and those identified by the greedy algorithm. Error bars (not shown) quantifying the standard errors of the mean associated with the numerical estimates of \(\langle {g}_{m}\rangle \) and \(\langle {r}_{m}\rangle \) are of the same size as of the symbols used in the visualization.

In the subcritical regime (see Fig. 4a), the two metrics \(\langle {g}_{m}\rangle \) and \(\langle {r}_{m}\rangle \) are tightly related one to the other. Adaptive degree (\(m=AD\)) outperforms all other methods in both metrics. Other methods that perform very well are those based on algorithms relying on the Degree (\(m=D\)), Adaptive Non-Backtracking (\(m=ANB\)) and PageRank (\(m=PR\)) centralities, as well as those based on the CoreHD (\(m=CD\)) and Collective Influence (\(m=CI\)) algorithms. Similar considerations apply to the critical regime (Fig. 4b). The most significant change with respect to the subcritical regime is a slight decrease of range of values for the performance metric of the algorithms. In the supercritical regime (Fig. 4c), there is no longer a proper distinction between the various methods in terms of performance.

A remarkable feature emerging from Fig. 4 is that the overall performance is rather high. For most of the methods values are above 0.9 for all values of p, and even random selection provides a performance always larger than 0.6. This observation somehow helps to properly weigh the importance of greedy algorithms for influence maximization: while their solutions are guaranteed to be not too far from the true optimum, their performance can be almost achieved by simple and much more easily implemented purely topological methods.

The similarity in the performance between the various methods can be deduced by a straight pair-wise comparison between the sets of top influential nodes identified by the various methods across the entire corpus of real networks at our disposal. The results of this analysis are summarized in Fig. 5. Top-performing methods provide sets of influential nodes very similar to each other; methods with low performance instead generally identify influential nodes that are rarely selected by any other method.

Figure 5

Pairwise comparison among methods for the identification of influential spreaders. For every pair of methods m1 and m2, we evaluated the overlap \({r}_{{m}_{1},{m}_{2}}^{(T)}\) among the two sets of top TN influential spreaders found by the methods in the network using a precision metric similar to the one of Eq. (4), i.e., \({r}_{{m}_{1},{m}_{2}}^{(T)}=\frac{1}{TN}\,{\sum }_{i=1}^{N}\,{f}_{{m}_{1}}^{(T,i)}\,{f}_{{m}_{2}}^{(T,i)}\). We then estimated the average value of the precision over the entire corpus of real networks at our disposal. In the figure, dark colors corresponds to high values of precision; low precision values are represented with light colors. Acronyms of the methods are defined in Table 1. Methods are listed in the table according to the same order as they appear in Table 1.

In the SM2, we repeat the same exercise by computing the performance scores restricted to different subsets of the whole corpus of networks. The subsets correspond to networks from the same domain (e.g., social, technological, transportation); we do not find any significant change in the main outcome of the analysis.

We further consider artificial networks created with the Barabasi-Albert (BA) model42. Results are very similar to those obtained on real-world networks (see SM2). In summary, it seems that the main results of the paper are unchanged by the nature/type of the network substrate where spreading is occurring.

Hybrid methods

In this section, we report on the performance of hybrid methods for the identification of top spreaders in the network obtained from linear combinations of the individual methods considered so far. Specifically, we first select a certain number of individual methods to form a hybrid method \( {\mathcal H} =\{{m}_{1},{m}_{2},\ldots ,{m}_{| {\mathcal H} |}\}\). We associate to every node i in a given network a score \({s}_{i}^{( {\mathcal H} )}\) that is a linear combination of the scores associated with individual methods, namely

$${s}_{ {\mathcal H} }^{(i)}=\sum _{m\in {\mathcal H} }\,{c}_{m}\,{s}_{m}^{(i)}.$$

In Eq. (5), \({s}_{m}^{(i)}\) is the normalized score of node i in the network according to the topological metric used by method m. The normalization (L2-norm) has the purpose of making scores of comparable magnitude across methods. The best estimates of the linear coefficients cm are then obtained using information from the greedy algorithm. We use linear regression to find the best linear fit between \({s}_{ {\mathcal H} }^{(i)}\) and \({f}_{G}^{(T,i)}\), i.e., the probability that node i is identified by the greedy algorithm in the set of top TN influential nodes in the network. Best estimates of the coefficients are obtained relying on a training set composed of 80% of networks randomly chosen out of the corpus of real networks at our disposal. We then test the hybrid method \( {\mathcal H} \) on the remaining 20% of the corpus, where we measure overall performance and overall precision. We replicate the entire procedure 1,000 times to quantify uncertainty associated with both the best estimates of the linear coefficients as well as the measured values of the performance metrics.

We consider several hybrid methods consisting in the combination of two and three individual centrality metrics. In general, we combine together centrality methods that differ on the basis of their classification in local, global and intermediate methods (see Table 1). Results for some hybrid methods are reported in Table 2. Several remarks are in order. First, with respect to the case of individual methods, there is an increase in the measured values of the overall precision \(\langle {r}_{m}\rangle \). This tells us that the coefficients learned from the training set can be meaningfully used on other networks to mimic greedy optimization in terms of topological features only. The overall performance \(\langle {g}_{m}\rangle \) of hybrid methods increases too; improvements beat even by 2–5% the best individual methods. Second, when similar individual methods are combined together into an hybrid method, one of the two gets the biggest part of the weight compared to the other. For example, the hybrid method \( {\mathcal H} =\{AD,B\}\) learned from data is almost a pure AD method in both the subcritical and critical regimes. Third, the coefficients of the linear combination of Eq. (5) can also be negative. For example, for the hybrid method \( {\mathcal H} =\{AD,PR,LR\}\) in the critical regime, \({c}_{LR} < 0\). Thanks to this fact, the method outperforms in both the critical and subcritical regimes all other methods considered in this paper. We stress that the finding \({c}_{LR} < 0\) doesn’t mean that LR centrality is anticorrelated with node influence. \({c}_{LR} < 0\), in fact, is observed only when LR is used in combination with other metrics. Indeed, LR centrality is positively correlated with node influence when LR is used as the only method for the identification of spreaders, as Fig. 4 clearly shows.

Table 2 Hybrid methods for the identification of influential spreaders in networks.

To validate the use of hybrid methods for the identification of influential spreaders, we apply the top-performing hybrid method \( {\mathcal H} =\{AD,PR,LR\}\) to large social and information networks. Results are reported in Table 3. These networks are too big for the application of greedy optimization, thus the performance of the hybrid method is compared to the one of the method AD by taking the ratio \(\langle {g}_{ {\mathcal H} }\rangle /\langle {g}_{AD}\rangle \). Please note that AD is one of the best individual methods for the identification of influential spreaders according to our analysis on the corpus of small/medium networks. When applying the hybrid method to large networks, we use the same values of the linear coefficients learned from small/medium networks and listed in Table 2. Overall, we see that the hybrid method generates improvements in the detection of influential spreaders compared to the simple AD method. Improvements are almost negligible in the subcritical regime. They are instead significant in both the critical and supercritical dynamical regimes, although in the latter case there are wide variations, with striking performance decrease for some networks. On average, we register improvements of 2–5%. These values are in line to those that can be measured in the corpus of small/medium networks, thus providing additional support to the robustness and generality of our finding. It should be stressed that the hybrid method uses a slightly larger amount of information than the one at disposal of the individual AD method. This might be at the root of the observed performance increase. As a matter of fact, linear coefficients change their value depending on the dynamical regime, so the ranking of the nodes. On the other hand, the improvement in effectiveness doesn’t cause drawbacks in efficiency. Linear coefficients of the various dynamical regimes are given. Also, the computational complexity of estimating numerically the critical threshold pc scales linearly with system size. De facto, the computational complexity of the overall hybrid method is the same as the one of the individual methods, making it applicable to very large networks.

Table 3 Identification of influential spreaders in large networks.


The goal of this paper was to comparatively analyze the performances of heuristic methods aimed at the identification of influential spreaders in networks. We focused our attention on the spreading dynamics modeled by the independent cascade model, and studied a total of 16 methods for the identification of the influential spreaders that are being used widely in influence maximization studies. We performed a systematic comparison between the various methods by means of extensive numerical experiments on a large corpus of 100 real-world networks. We further drew upper- and lower-bounds for the performance values achievable in the problem by using respectively results from greedy optimization and random selection. We found that the performance of many simple heuristic methods is not far from that of the more computationally costly greedy algorithm. In this framework, the simplest and most effective strategy among those already on the market that can be used to identify top spreaders in large networks is the adaptive degree centrality. The method based on adaptive degree centrality displays an overall performance score that is 96% of the upper-baseline value in the critical regime of spreading, if used to select a set of top spreaders with size equal to 5% of the entire network. Several other methods have comparable performances to adaptive degree centrality. The overlap between influential spreaders selected by heuristic methods and by the greedy algorithm is considerably lower, but this is not surprising given the NP-complete nature of the optimization problem. We finally found that a potential way to get closer to optimality consists in combining different centrality metrics to create hybrid methods. We found that some combinations of three metrics are able to achieve 98% of the upper-baseline value in the critical regime of spreading.

Data availability

The datasets used in this article are all publicly available from the cited sources.


  1. 1.

    Ratkiewicz, J. et al. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web, pp. 249–252 (ACM, 2011).

  2. 2.

    Acemoglu, D., Ozdaglar, A. & ParandehGheibi, A. Spread of (mis) information in social networks. Games and Economic Behavior 70(2), 194–227 (2010).

    MathSciNet  Article  Google Scholar 

  3. 3.

    Del Vicario, M. et al. The spreading of misinformation online. Proceedings of the National Academy of Sciences 113(3), 554–559 (2016).

    ADS  Article  Google Scholar 

  4. 4.

    Centola, D. The spread of behavior in an online social network experiment. Science 329(5996), 1194–1197 (2010).

    ADS  CAS  Article  Google Scholar 

  5. 5.

    Lerman, K. & Ghosh, R. Information contagion: An empirical study of the spread of news on digg and twitter social networks. Icwsm 10, 90–97 (2010).

    Google Scholar 

  6. 6.

    Notarmuzi, D. & Castellano, C. Analytical study of quality-biased competition dynamics for memes in social media. EPL (Europhysics Letters) 122(2), 28002 (2018).

    ADS  Article  Google Scholar 

  7. 7.

    Erkol, Ş., Faqeeh, A. & Radicchi, F. Influence maximization in noisy networks. EPL (Europhysics Letters) 123(5), 58007 (2018).

    ADS  Article  Google Scholar 

  8. 8.

    Domingos, P. & Richardson, M. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 57–66 (ACM, 2001).

  9. 9.

    Kempe, D., Kleinberg, J. & Tardos, É. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137–146 (ACM, 2003).

  10. 10.

    Nemhauser, G. L., Wolsey, L. A. & Fisher, M. L. An analysis of approximations for maximizing submodular set functions—i. Mathematical Programming 14(1), 265–294 (1978).

    MathSciNet  Article  Google Scholar 

  11. 11.

    Leskovec, J. et al. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420–429 (ACM, 2007).

  12. 12.

    Chen, W., Wang, Y. & Yang, S. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 199–208 (ACM, 2009).

  13. 13.

    Goyal, A., Lu, W. & Lakshmanan, L. V. Celf++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web, pp. 47–48 (ACM, 2011).

  14. 14.

    Cheng, S., Shen, H., Huang, J., Zhang, G. & Cheng, X. Staticgreedy: solving the scalability-accuracy dilemma in influence maximization. In Proceedings of the 22nd ACM international conference on Information & Knowledge Management, pp. 509–518 (ACM, 2013).

  15. 15.

    Nguyen, H. T., Thai, M. T. & Dinh, T. N. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In Proceedings of the 2016 International Conference on Management of Data, pp. 695–710 (ACM, 2016).

  16. 16.

    Hu, Y. et al. Local structure can identify and quantify influential global spreaders in large scale social networks. Proceedings of the National Academy of Sciences USA 115(29), 7468–7472 (2018).

    ADS  MathSciNet  CAS  Article  Google Scholar 

  17. 17.

    Lu, L. et al. Vital nodes identification in complex networks. Physics Reports 650, 1–63 (2016).

    ADS  MathSciNet  Article  Google Scholar 

  18. 18.

    Zhang, J.-X., Chen, D.-B., Dong, Q. & Zhao, Z.-D. Identifying a set of influential spreaders in complex networks. Scientific reports 6, 27823 (2016).

    ADS  CAS  Article  Google Scholar 

  19. 19.

    Lu, L., Zhang, Y.-C., Yeung, C. H. & Zhou, T. Leaders in social networks, the delicious case. PloS one 6(6), e21202 (2011).

    ADS  CAS  Article  Google Scholar 

  20. 20.

    Estrada, E. & Rodriguez-Velazquez, J. A. Subgraph centrality in complex networks. Physical Review E 71(5), 056103 (2005).

    ADS  MathSciNet  Article  Google Scholar 

  21. 21.

    Chen, D.-B., Gao, H., Lu, L. & Zhou, T. Identifying influential nodes in large-scale directed networks: the role of clustering. PloS one 8(10), e77455 (2013).

    ADS  CAS  Article  Google Scholar 

  22. 22.

    De Arruda, G. F. et al. Costa, “Role of centrality for the identification of influential spreaders in complex networks. Physical Review E 90(3), 032812 (2014).

    ADS  Article  Google Scholar 

  23. 23.

    Klemm, K., Serrano, M. Á., Eguluz, V. M. & San, M. Miguel, “A measure of individual role in collective dynamics. Scientific reports 2, 292 (2012).

    Article  Google Scholar 

  24. 24.

    Pastor-Satorras, R., Castellano, C., Van Mieghem, P. & Vespignani, A. Epidemic processes in complex networks. Reviews of modern physics 87(3), 925 (2015).

    ADS  MathSciNet  Article  Google Scholar 

  25. 25.

    Freeman, L. C. A set of measures of centrality based on betweenness. Sociometry, pp. 35–41 (1977).

  26. 26.

    Sabidussi, G. The centrality index of a graph. Psychometrika 31(4), 581–603 (1966).

    MathSciNet  CAS  Article  Google Scholar 

  27. 27.

    Bonacich, P. Factoring and weighting approaches to status scores and clique identification. Journal of mathematical sociology 2(1), 113–120 (1972).

    Article  Google Scholar 

  28. 28.

    Katz, L. A new status index derived from sociometric analysis. Psychometrika 18(1), 39–43 (1953).

    Article  Google Scholar 

  29. 29.

    Martin, T., Zhang, X. & Newman, M. Localization and centrality in networks. Physical review E 90(5), 052808 (2014).

    ADS  Article  Google Scholar 

  30. 30.

    Radicchi, F. & Castellano, C. Leveraging percolation theory to single out influential spreaders in networks. Physical Review E 93(6), 062314 (2016).

    ADS  Article  Google Scholar 

  31. 31.

    Brin, S. & Page, L. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30(1–7), 107–117 (1998).

    Article  Google Scholar 

  32. 32.

    Braunstein, A., Dall’Asta, L., Semerjian, G. & Zdeborová, L. Network dismantling. Proceedings of the National Academy of Sciences 113(44), 12368–12373 (2016).

    CAS  Article  Google Scholar 

  33. 33.

    Kitsak, M. et al. Identification of influential spreaders in complex networks. Nature physics 6(11), 888 (2010).

    ADS  CAS  Article  Google Scholar 

  34. 34.

    Chen, D., Lu, L., Shang, M.-S., Zhang, Y.-C. & Zhou, T. Identifying influential nodes in complex networks. Physica a: Statistical mechanics and its applications 391(4), 1777–1787 (2012).

    ADS  Article  Google Scholar 

  35. 35.

    Lu, L., Zhou, T., Zhang, Q.-M. & Stanley, H. E. The h-index of a network node and its relation to degree and coreness. Nature communications 7, 10168 (2016).

    ADS  CAS  Article  Google Scholar 

  36. 36.

    Morone, F. & Makse, H. A. Influence maximization in complex networks through optimal percolation. Nature 524(7563), 65 (2015).

    ADS  CAS  Article  Google Scholar 

  37. 37.

    Zdeborová, L., Zhang, P. & Zhou, H.-J. Fast and simple decycling and dismantling of networks. Scientific reports 6, 37954 (2016).

    ADS  Article  Google Scholar 

  38. 38.

    Clusella, P., Grassberger, P., Pérez-Reche, F. J. & Politi, A. Immunization and targeted destruction of networks using explosive percolation. Physical review letters 117(20), 208301 (2016).

    ADS  Article  Google Scholar 

  39. 39.

    Radicchi, F. & Castellano, C. Fundamental difference between superblockers and superspreaders in networks. Physical Review E 95(1), 012318 (2017).

    ADS  Article  Google Scholar 

  40. 40.

    Newman, M. & Ziff, R. Efficient monte carlo algorithm and high-precision results for percolation. Physical Review Letters 85(19), 4104 (2000).

    ADS  CAS  Article  Google Scholar 

  41. 41.

    Radicchi, F. Predicting percolation thresholds in networks. Physical Review E 91(1), 010801 (2015).

    ADS  Article  Google Scholar 

  42. 42.

    Barabási, A.-L. & Albert, R. Emergence of scaling in random networks. science 286(5439), 509–512 (1999).

    ADS  MathSciNet  Article  Google Scholar 

  43. 43.

    Guimera, R., Danon, L., Diaz-Guilera, A., Giralt, F. & Arenas, A. Self-similar community structure in a network of human interactions. Physical review E 68(6), 065103 (2003).

    ADS  CAS  Article  Google Scholar 

  44. 44.

    Gómez, V., Kaltenbrunner, A. & López, V. Statistical analysis of the social network and discussion threads in slashdot. In Proceedings of the 17th international conference on World Wide Web, pp. 645–654 (ACM, 2008).

  45. 45.

    Kunegis, J. KONECT – The Koblenz Network Collection. In Proc. Int. Conf. on World Wide Web Companion, pp. 1343–1350 (2013).

  46. 46.

    Ripeanu, M., Foster, I. & Iamnitchi, A. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. arXiv preprint cs/0209028 (2002).

  47. 47.

    Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD) 1(1), 2 (2007).

    Article  Google Scholar 

  48. 48.

    Richardson, M., Agrawal, R. & Domingos, P. Trust management for the semantic web. In The Semantic Web-ISWC 2003, pp. 351–368 (Springer, 2003).

  49. 49.

    McAuley, J. & Leskovec, J. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems, pp. 548–556 (2012).

  50. 50.

    Cho, E., Myers, S. A. & Leskovec, J. Friendship and mobility: user movement in location-based social networks. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1082–1090 (ACM, 2011).

  51. 51.

    Leskovec, J., Lang, K. J., Dasgupta, A. & Mahoney, M. W. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics 6(1), 29–123 (2009).

    MathSciNet  Article  Google Scholar 

  52. 52.

    Leskovec, J., Adamic, L. A. & Huberman, B. A. The dynamics of viral marketing. ACM Transactions on the Web (TWEB) 1(1), 5 (2007).

    Article  Google Scholar 

  53. 53.

    Yang, J. & Leskovec, J. Defining and Evaluating Network Communities based on Ground-truth. In Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, p. 3 (ACM, 2012).

Download references


Ş.E. and F.R. acknowledge support from the National Science Foundation (CMMI-1552487). F.R. acknowledges support from the US Army Research Office (W911NF-16-1-0104).

Author information




Ş.E., C.C. and F.R. designed the research and wrote the manuscript. Ş.E. performed the research and analyzed data.

Corresponding author

Correspondence to Filippo Radicchi.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Erkol, Ş., Castellano, C. & Radicchi, F. Systematic comparison between methods for the detection of influential spreaders in complex networks. Sci Rep 9, 15095 (2019).

Download citation

Further reading


By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.


Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing