Abstract
Identification of Influential nodes in complex networks is challenging due to the largely scaled data and network sizes, and frequently changing behaviors of the current topologies. Various application scenarios like disease transmission and immunization, software virus infection and disinfection, increased product exposure and rumor suppression, etc., are applicable domains in the corresponding networks where identification of influential nodes is crucial. Though a lot of approaches are proposed to address the challenges, most of the relevant research concentrates only on single and limited aspects of the problem. Therefore, we propose Global Structure Model (GSM) for influential nodes identification that considers self-influence as well as emphasizes on global influence of the node in the network. We applied GSM and utilized Susceptible Infected Recovered model to evaluate its efficiency. Moreover, various standard algorithms such as Betweenness Centrality, Profit Leader, H-Index, Closeness Centrality, Hyperlink Induced Topic Search, Improved K-shell Hybrid, Density Centrality, Extended Cluster Coefficient Ranking Measure, and Gravity Index Centrality are employed as baseline benchmarks to evaluate the performance of GSM. Similarly, we used seven real-world and two synthetic multi-typed complex networks along-with different well-known datasets for experiments. Results analysis indicates that GSM outperformed the baseline algorithms in identification of influential node(s).
Similar content being viewed by others
The concepts of complex networks are abstracted from real-world system networks1,2,3, like transport system networks, human friendship, web hyperlink and protein networks, etc. Such networks have common characteristics, i.e., heterogeneous topologies, that make it impossible to assign the same importance to each node in the network. Therefore, it is essential to identify the influential nodes via quantitative approaches to examine their properties and to practice their proper usage. For example, in infectious diseases network, preventing the spread of rumors and viruses4,5, in criminal networks, quickly identifying a terrorist organization’s leader6. Similarly, in the traffic system network7, food chain network8, drug network9, and so on. There are a good number of studies have been proposed and deployed in the field of complex network on the identification of influential nodes10,11,12,12,13,14,15,16,17,18,19,20 where identification of most important nodes from local and global perspectives is worth mentioning21. Although closeness centrality (CC) and betweenness centrality (BC)22 are path-based indicators that consider the global structure of the network to identify the influence of nodes. However, due to their high computational complexity, they may not be applicable to many networks. It’s common that degree centrality (DC)23 is the simplest method to identify the influential nodes, but it fails to consider the global structure of networks. Kitsak et al.24 proposed the k-shell method for locating influential nodes, but it is too coarse to identify the required influential nodes. Besides these, iterative-based centralities such as eigenvector centrality (EC)25, page rank (PR)26, hypertext induced topic search (HITS)27, and son on are not appropriate for networks with tight connections.
Recently, some approaches have put efforts forward for the identification of influential nodes such as profit leader28, inverse square law29 and gravity index model30. The profit leader method considers the set of important nodes on the basis of the profit leader concept analysis. In the paper by L.-l. Ma et al.30 proposed gravity formula-based algorithm, which considers both neighbour’s nodes influences and path information. However, in some cases, it is also important to combine the global as well as local structure of nodes in the entire network. Similarly, the inverse square model is based on node interactions and is not suitable for large network. Furthermore, in view of propagation probability, Ma et al.31 proposed hybrid degree centrality (HC), which combines local indicators and degree centrality measures. All in all, these approaches have their own shortcomings and limitations. Still, the identification of influential nodes is a challenge.
From the above discussion, to address these changeling problems, inspired from literature10,29,30, in this study, we design a new mechanism called GSM that not only considers the self-influence of the node in the network but also concentrates on the global influence of nodes. To analyze the algorithmic performance, we employed GSM on different kinds of real as well as synthetic networks where we used the susceptible-infected-recovered (SIR) and kendall’s \(\tau\) coefficient models to examine the effectiveness of GSM. In addition, we compared the experimental results of the baseline algorithms and with recently proposed approaches, where simulation results on seven different types of real and two synthetic networks showed that GSM effectively identifies influential nodes.
The framework of the paper is organized as follows: We present preliminaries and a brief introduction of baseline algorithms, including BC, PL, GIC, HI, CC, ECRM, DNC, IKH and HITS in Preliminaries section. The proposed GSM model is presented in Proposed method. Results and discussion to illustrate the effectiveness of the GSM are discussed in Results and discussion section, and finally, some conclusion and future recommendations are given in Conclusion and future recommendations section.
Preliminaries
A network can be denoted by G, equated as G = (V, E), where V and E represent nodes and edges, respectively. Moreover, Betweenness Centrality (BC)32, Closeness Centrality (CC)33, HITS34, H-Index (HI)35, Profit Leader (PL)28, Improved k-shell hybrid method (IKSh)12, Extended Cluster Coefficient Ranking Measure (ECRM)36, Gravity Index Centrality (GIC)30 and Density centrality (DNC)37 are introduced in this section.
-
1.
Betweenness Centrality (BC): BC calculates influential nodes based on global information32. \(BC_(i)\) is defined as:
$$\begin{aligned} BC_(i)=\sum _{j,k\ne 1} \frac{g_{jk}(i)}{g_{jk}}, \end{aligned}$$(1)where \(g_{jk}\) indicates number of paths between nodes j and k, and \(g_{jk}(i)\) represents the shortest paths between nodes j and k, that pass through node i.
-
2.
Closeness Centrality (CC): CC also calculates influential nodes based on global information. It uses the shortest distance between each pair of nodes to identify the influence of each node33. CC of node i is defined as:
$$\begin{aligned} CC_(i)=\frac{N-1}{\sum _{j\ne 1} d_{ij}}, \end{aligned}$$(2) -
3.
Hyperlink Induced Topic Search (HITS): This algorithm is based on two factors i-e., Authority Update, and Hub Update. Authority update is computed by considering the number of hub edges associated with the authority website, and Hub Update is computed by considering the number of authority websites linked by the Hub website34.
-
4.
H-Index (HI): This algorithm identifies the influential node’s by taking into account the node’s neighbor and using H-index notation. A high H-index represents that the node has more important than other connected nodes35.
-
5.
Profit Leader (PL): This algorithm is based on profit leader concept analysis and suitable for any network i.e., directed or undirected28.
-
6.
Improved K-shell Hybrid (IKH): This algorithm considers the k-shell, shortest distance between the nodes and parameter \(\lambda\) (in range between 0 and 1) to identify the most influential nodes12.
-
7.
Gravity Index Centrality (GIC): This algorithm basis on universal gravity concept; that considers both neighbor’s nodes influences and path information30. GIC(i) is defined as:
$$\begin{aligned} GIC(i)= \sum _{j\epsilon \theta _i}\frac{kshell(i)\times kshell(j)}{dist_{i,j}^2}, \end{aligned}$$(3)where \(\theta _i\) is the set of neighbors node i.
-
8.
Extended Cluster Coefficient Ranking Measure (ECRM): This algorithm is working on the basis of local clustering coefficients and uses link similarity between adjacent nodes36.
-
9.
Density centrality (DNC): It is inspired by the area density formula to identify the influence of nodes in the spreading dynamics37. DNC(i) is defined as:
$$\begin{aligned} DNC(i)= \sum _{j\epsilon \xi _i}\frac{degree_i}{\pi d_{i,j}^2}, \end{aligned}$$(4)
Proposed method
Several approaches based on the global structure of the network to identify the influence of nodes have been developed and deployed, but better utilization of self as well as global structure influence is still a challenge, needs to be addressed. Inspired from literature37,38,39 , a Global Structure Model (GSM) was proposed, which consists of self and global influences.
Self-influence
In this context, we used e (natural logarithm) and take k-shell \(Ks(v_i)\), and nodes number (N) in the network as power parameters to minimize the overestimation of the self-influence.
where N shows the number of all nodes in the network.
Global-influence
The node influence also considers the influence of the other connected nodes to it. Normally, the node influence is increased if its neighborhoods have a high value of k-shell; however, the contact distance between the two nodes cannot be ignored, which is inversely proportional to the influence of the nodes.
where \(d_{ij}\) is the shortest distance between node i and node j.
Node influence
The node \(V_i\) influence is not only on its own influence but also on the nodes around it. Therefore, the proposed GSM simultaneously considers these two aspects, self and global influence, which can be defined as,
We can also express GSM of the node \(v_i\),
where \({Ks(v_i)}\) and \({Ks(v_j)}\) denote the k-shell of node i and node j,
Computation process
The proposed GSM model is divided into four parts; first, construction of corresponding network; second, calculation of the network’s global influence and the k-shell of node and the distance between nodes. In the third step, we consider the self-influence of the network, the self influence of the node itself is computed. Finally, the influence of each node on the entire network is calculated. To further demonstrate GSM method, as shown in Fig. 1, for a specific calculation process, here we consider a simple network to clarify it in detail. In Fig. 2, consists of 13 nodes and 17 edges. As shown in the network, we consider GSM method by taking the node V4 influence as an example. First, we calculate the k-shell and the shortest distance between each node; we have
\(KS1=3, KS2=3, KS3=3 KS4=3, KS5=2, Ks6= 1, KS7=2, KS8=2, KS9=1, KS10=1, KS11=1, KS12=1, KS13=1,\) d4-1 = 1 d4-2 = 1,d4-3 = 1, d4-5 = 2, d4-6 = 3, d4-7 = 1, d4-8 = 1, d4-9 = 2, d4-10 = 1, d4-11 = 2, d4-12 = 2, d4-13 = 2.
To calculate the self influence and global influence, here we apply Eqs. (6) and (7); we have, \(S(4)=e^{\frac{3}{13}}=1.25956\), and \(GI(4-1)={\frac{3}{1}}=3\) \(GI(4-2)=3\), \(GI(4-3)=3\), \(GI(4-5)=1\), \(GI(4-6)=0.3333\), \(GI(4-7)=2\), \(GI(4-8)=2\), \(GI(4-9)=0.5\), \(GI(4-10)=1\), \(GI(4-11)=0.5\), \(GI(4-12)=0.5\), \(GI(4-13)=0.5\), we have added all these values based on Eq. (7), we have, \(GI(4-1)+GI(4-2)+GI(4-3)+GI(4-5)+GI(4-6)+G(4-7)+GI(4-8)+GI(4-9)+GI(4-10)+GI(4-11)+GI(4-12)+GI(4-13)=17.333333\), Finally, the influence of node V4 can be calculated, we have \(GSM_4= 1.25956 \times 17.333333= 21.833\). Table 1 shows the ranking influence of each node in the given simple network.
Experiments
Experimental setup is performed on system with configuration as: CPU: Feiteng 1500A (1, 16-core, 1.5 ghz), Operating system: galaxy kirin server os Bios: China-made Kunlun firmware Memory: 3 GB and Hard disk: 2 TB (Fig. 2).
Evaluation metrics
SIR model
We used the SIR model to investigate the spreading dynamic of each node40,41 to quantify the performance of GSM and other benchmark centralities. In the SIR model, there are three states, (i) Susceptible (S), (ii) Infected (I), (iii) Recovered (R). Susceptible (S) refers to a healthy state and can be infected by others. Infected (I) refers infected state and can infect other individuals. Recovered (R) denotes a recovered state, which cannot be infected by other individuals again. For the first time, all the seed nodes are in a susceptible form. At each time step, the seed node can infect its nearest and next-nearest neighbor nodes (in the susceptible state) with a probability \(\beta\), then each node (the node which was infected) enters into the recovered state with a probability \(\mu\). This process continued till there are no more infected nodes. Finally, all the recovered nodes are used to simulate the actual node impact. Here, S(t), I(t), and R(t) indicate the nodes numbers in susceptible, infected, and recovered states, respectively. Therefore,
The spreading influence \(K_i\) of the node \(V_i\) follows as
where \(N_{ite}\) indicates iteration numbers, nI and nR are the number of infected and recovered nodes, respectively. Where we set \(N_{ite}\)= 1000 independent run.
Kendall’s Tau \((\tau )\)
We used kendall’s \((\tau )\)42,43 to calculate the performance of GSM further. Let suppose, two-node sequences \((X \& Y)\) are correlated with similar nodes number (n), \(X=(x_1,x_2,\ldots ,x_n)\) and \(Y=(y_1,y_2,\ldots ,yn)\). One pair of two annotations \((x_i, y_i)\) and \((x_j, y_j)\) \((i\ne j)\) are said to be concordant if the ranking of both component agree, i-e. if both \(xi > xj\) and \(y_i > y_j\) or \(x_i < x_j\) and \(y_i < y_j\). They are said to be discordant if \(x_i > x_j\) and \(y_i < y_j\) or \(xi < x_j\) and \(y_i > y_j\) or if \(x_i = x_j\) or \(y_i = y_j\) , the pair is neither concordant nor discordant. The kendall’s \((\tau )\) is defined as:
where \(n_c\), and \(n_d\) denote the number of concordant and discordant pairs, respectively.
Datasets description
Real-world networks
We evaluated GSM on seven different real-world networks to validate its efficiency. The seven real networks are publicly available and can be obtained from (http://networkrepository.com). The datasets are, e.g., (i) Jazz44: this is a communication network , consist of 198 nodes and 2472 edges. (ii) H-friendship network45: this network reflects user friendship and contains 12534 edges and 1858 nodes. (iii) E-mail network46: this is a communication network of the Roviraa Virgilli University of Spain, where nodes are e-mail user, and edges represent at least one e-mail was sent. (iv) Crime network47: this network consists of 829 nodes and 1476 edges . (v) Dolphin48: it is a social network with 62 nodes and 159 edges. (vi) Web-spam49: this is a famous social netwok provided by Purdue University, which consists of 4767 nodes and 37375 edges. (vii) Astroph-e50: this network consists of 18771 nodes and 198,050 edges. The topological characteristics of the seven real-world multi-typed complex networks are shown in Table 2.
Synthetic networks
There is a bulk of exemplary complex networks exist in the real world and we do not know the details of ground realities about all of them because it’s not even possible to conceal such a large number of information about a matter that is so widely being exploited. Therefore in order to evaluate GSM and the baseline methodologies, we applied the benchmark generator model51,52 to generate different synthetic networks for the process of experimentations. (i) Random network: it is an synthetic random network in which we set the number of nodes as V= 1000, probability 0.01, the average degree as \(<k>= 3\), and it consists of E = 4852 edges. (ii) BA network: this synthetic network consists of V = 2000 nodes and E = 7984 edges and 4 edges added are each time.
Results and discussion
To measure the influence of nodes in different real and synthetic networks and to validate the applicability and effectiveness of the GSM, we used two evaluation metrics i-e., SIR, and Kendall’s models. First, we used a simple graph containing 13 nodes and 17 edges, as shown in Fig. 2, applied GSM to find the influential nodes and, results are compared and analyzed with the outcomes of the rest of the benchmark algorithms such as BC, CC, HITS, HI, GIC, DNC, IKH, ECRM and PL.
Kendall’s \((\tau )\) of the proposed GSM and other algorithms are shown in Fig. 3. As, it can be seen that in terms Kendall \((\tau )\), GSM achieves higher values, i.e., the values in range from 0.9 to 1 for \(\beta =0.01-0.1\), shows that GSM is performance-wise better on different networks, such as Dolphin, H-friendships, Jazz, Crime, E-mail, Web-spam, Astroph-e, BA, and Random networks.
In order to further examine the propagation effect of GSM, we analyzed the spreading impact of the ranked nodes in the SIR model. To better distinguish the influential nodes, the infection probability \(\lambda\) needed to be set in the range between 0.01 and 0.1. For big networks (Astroph-e, Web-spam, BA and H-friendship), we set \(\lambda = 0.01\) because, in case of bigger values, propagation will occur across the whole network24. Where it is not easy to differentiate the importance of distinct nodes. For small networks (Dolphin, Jazz, Crime, Random, and E-mail), we set \(\lambda =0.1\), and also we set the recovery probability \(\epsilon = 1\) and the time t = 1000. First, the influence of each node is computed using different algorithms, and then sorted in descending order. Tables 3 and 4 shows the top ten ranked nodes; due to the limited space, only we present the top ten nodes of two networks Dolphin and Crime. We observed that most of the top-10 nodes of our algorithm are also exist in other algorithms. Hence, the proposed GSM validity is verified. Second, each ranked node is treated as a seed node to impacting other ranked nodes. Finally, we computed the infected numbers of nodes for each seed node through an average of over 1000 turns. Figure 4 indicates the results of the average infected number of nodes using ten algorithms. In general, more influential nodes can infect more nodes, so an efficient and effective method can create a curve that decreases from left to right. As shown in Fig. 4, our proposed GSM gets a better infection effect than other methods on different networks.
Moreover, we compared the top ten nodes’ effects selected by our proposed GSM and the corresponding baseline centrality measures for different networks. All top ten nodes are considered as seed nodes and the time t in the range between 1 and 25. Figure 5 illustrates the influence of the top ten nodes in nine different networks; as can be seen, the proposed GSM gets the highest spreading efficiency than other centralities. In addition, It clearly shows that when the infection F(t) increases as time t increases and finally gets a steady value at a time t after consecutive time point. Since there are ten seed nodes, and most network propagation arrives in a steady state on time t=25, where we analyzed the spreading effects of GSM and the rest of other centralities measures.
Computational complexity of GSM
There are two main components of the proposed GSM. In the first stage, the time complexity of the node’s global influence is calculated. We used Dijkstra to calculate the shortest distance, and its complexity is \(O(n^2)\). In the second stage, the time of complexity is O(n). Therefore, the total computational complexity of GSM is \(O(n^2)\). Table 5 lists the computational complexity of the proposed GSM and other benchmarks, as we can see that the computational complexity of GSM is not very low, but its accuracy is better than other benchmarks, and also GSM can automatically measure nodes influence without any parameters (shown in Figs. 3, 4 and 5). In future work, we plan to enhance GSM as paralleling computations.
Conclusion and Future Recommendations
We studied the problem of identification of nodes influence in complex networks. Several approaches have been developed and deployed in this area but still, it is a big issue for scientists and researchers. In this regard, we proposed an algorithm called GSM to identify influential nodes, which considers both self as well as global influence of nodes in the networks. We applied the proposed GSM on different real as well as synthetic networks and employed two evaluation metrics (SIR and Kendall \(\tau\)) to verify its efficiency. Experimental results demonstrated that our algorithm performed better than the benchmarks. For further work, the proposed GSM algorithm can be extended to many forms for better results. For instance, adding some parameters to control the intensity among various nodes to yield better performance. Furthermore, we also plan to combine the profit leader algorithm concept with the proposed algorithm to enhance the performance.
Data availability
All the real networks are available publicly and can be accessed from http://networkrepository.com.
References
Zhong, J., Zhang, F. & Li, Z. Identification of vital nodes in complex network via belief propagation and node reinsertion. IEEE Access 6, 29200–29210 (2018).
Li, C., Wang, L., Sun, S. & Xia, C. Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 320, 512–523 (2018).
Zareie, A., Sheikhahmadi, A. & Jalili, M. Identification of influential users in social network using gray wolf optimization algorithm. Exp. Syst. Appl. 142, 112971 (2020).
Curado, M., Tortosa, L., Vicent, J. F. & Yeghikyan, G. Analysis and comparison of centrality measures applied to urban networks with data. J. Comput. Sci. 43, 101127 (2020).
Barabási, A.-L. & Bonabeau, E. Scale-free networks. Sci. Am. 288, 60–69 (2003).
Yang, Y., Wang, X., Chen, Y. & Hu, M. Identifying key nodes in complex networks based on global structure. IEEE Access 8, 32904–32913 (2020).
Rosvall, M., Esquivel, A. V., Lancichinetti, A., West, J. D. & Lambiotte, R. Memory in network flows and its effects on spreading dynamics and community detection. Nat. Commun. 5, 1–13 (2014).
Zagenczyk, T. J., Scott, K. D., Gibney, R., Murrell, A. J. & Thatcher, J. B. Social influence and perceived organizational support: a social networks analysis. Org. Behav. Human Decis. Process. 111, 127–138 (2010).
Sidders, B. et al. Network-based drug discovery: coupling network pharmacology with phenotypic screening for neuronal excitability. J. Mol. Biol. 430, 3005–3015 (2018).
Li, Z. et al. Identifying influential spreaders by gravity model. Sci. Rep. 9, 1–7 (2019).
Xing, Y. et al. A node influence based label propagation algorithm for community detection in networks. Sci. World J. https://doi.org/10.1155/2014/627581 (2014).
Maji, G., Namtirtha, A., Dutta, A. & Malta, M. C. Influential spreaders identification in complex networks with improved k-shell hybrid method. Exp. Syst. Appl. 144, 113092 (2020).
Yi, Z., Wu, X. & Li, F. Ranking spreaders in complex networks based on the most influential neighbors. Discrete Dyn. Nat. Soc. https://doi.org/10.1155/2018/3649079 (2018).
Zareie, A., Sheikhahmadi, A. & Jalili, M. Identification of influential users in social networks based on users’ interest. Inf. Sci. 493, 217–231 (2019).
Zhao, G., Jia, P., Zhou, A. & Zhang, B. Infgcn: identifying influential nodes in complex networks with graph convolutional networks. Neurocomputing 414, 18–26 (2020).
Yang, H. & An, S. Critical nodes identification in complex networks. Symmetry 12, 123 (2020).
Guo, C. et al. Influential nodes identification in complex networks via information entropy. Entropy 22, 242 (2020).
Ediger, D. et al. Massive social network analysis: mining twitter for social good. In 2010 39th International Conference on Parallel Processing, 583–593 (IEEE, 2010).
Zekun, W., Xiangxi, W. & Minggong, W. Identification of key nodes in aircraft state network based on complex network theory. IEEE Access 7, 60957–60967 (2019).
Yang, Y.-Z., Hu, M. & Huang, T.-Y. Influential nodes identification in complex networks based on global and local information. Chin. Phys. B 29, 088903 (2020).
Sheng, J. et al. Identifying influential nodes in complex networks based on global and local structure. Phys. A Stat. Mech. Its Appl. 541, 123262 (2020).
Sabidussi, G. The centrality index of a graph. Psychometrika 31, 581–603 (1966).
Koschützki, D. et al. Centrality indices. In Network analysis, 16–61 (Springer, 2005).
Kitsak, M. et al. Identification of influential spreaders in complex networks. Nat. Phys. 6, 888–893 (2010).
Solá, L. et al. Eigenvector centrality of nodes in multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 23, 033131 (2013).
Kun, Z., Peipei, L., Baoping, Z. & Manyu, H. Evaluation method for node importance in directed-weighted complex networks based on pagerank [j]. J. Nanjing Univ. Aeronaut. Astron. 45, 429–434 (2013).
Zhao, B., Hu, S., Zhang, Z., Xu, C. & Tang, X. Hyperlink induced topic search-based method to predict essential proteins. Int. J. Data Min. Bioinform. 22, 250–264 (2019).
Yu, Z., Shao, J., Yang, Q. & Sun, Z. Profitleader: identifying leaders in networks with profit capacity. World Wide Web 22, 533–553 (2019).
Fei, L., Zhang, Q. & Deng, Y. Identifying influential nodes in complex networks based on the inverse-square law. Phys. A Stat. Mech. Its Appl. 512, 1044–1059 (2018).
Ma, L.-L., Ma, C., Zhang, H.-F. & Wang, B.-H. Identifying influential spreaders in complex networks based on gravity formula. Phys. A Stat. Mech. Its Appl. 451, 205–212 (2016).
Ma, Q. & Ma, J. Identifying and ranking influential spreaders in complex networks with consideration of spreading probability. Phys. A Stat. Mech. Its Appl. 465, 312–330 (2017).
Freeman, L. C. A set of measures of centrality based on betweenness. Sociometry 40(1), 35–41 (1977).
Freeman, L. C. Centrality in social networks conceptual clarification. Soc. Netw. 1, 215–239 (1978).
Liu, B., Jiang, S. & Zou, Q. Hits-pr-hhblits: protein remote homology detection by combining pagerank and hyperlink-induced topic search. Brief. Bioinform. 21, 298–308 (2020).
Lü, L., Zhou, T., Zhang, Q.-M. & Stanley, H. E. The h-index of a network node and its relation to degree and coreness. Nat. Commun. 7, 1–7 (2016).
Zareie, A., Sheikhahmadi, A., Jalili, M. & Fasaei, M. S. K. Finding influential nodes in social networks based on neighborhood correlation coefficient. Knowl. Based Syst. 194, 105580 (2020).
Ibnoulouafi, A. & El Haziti, M. Density centrality: identifying influential nodes based on area density formula. Chaos Solit. Fract. 114, 69–80 (2018).
Koyré, A. An unpublished letter of robert hooke to isaac newton. Isis 43, 312–337 (1952).
Kang, B., Chhipi-Shrestha, G., Deng, Y., Hewage, K. & Sadiq, R. Stable strategies analysis based on the utility of z-number in the evolutionary games. Appl. Math. Comput. 324, 202–217 (2018).
Allen, L. J. Some discrete-time si, sir, and sis epidemic models. Math. Biosci. 124, 83–105 (1994).
Gang, Y., Tao, Z., Jie, W., Zhong-Qian, F. & Bing-Hong, W. Epidemic spread in weighted scale-free networks. Chin. Phys. Lett. 22, 510 (2005).
Kendall, M. G. The treatment of ties in ranking problems. Biometrika 33, 239–251 (1945).
Knight, W. R. A computer method for calculating kendall’s tau with ungrouped data. J. Am. Stat. Assoc. 61, 436–439 (1966).
Gleiser, P. M. & Danon, L. Community structure in jazz. Adv. Complex Syst. 6, 565–573 (2003).
Hamsterster friendships network dataset – KONECT (2017). http://konect.uni-koblenz.de/networks/petster-friendships-hamster.
Guimera, R., Danon, L., Diaz-Guilera, A., Giralt, F. & Arenas, A. Self-similar community structure in a network of human interactions. Phys. Rev. E 68, 065103 (2003).
Rossi, R.A. & Ahmed, N. K. The network data repository with interactive graph analytics and visualization. In AAAI (2015). http://networkrepository.com.
Lusseau, D. et al. The bottlenose dolphin community of doubtful sound features a large proportion of long-lasting associations. Behav. Ecol. Sociobiol. 54, 396–405 (2003).
Castillo, C., Chellapilla, K. & Denoyer, L. Web spam challenge 2008. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb) (2008).
Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data (TKDD) 1, 2-es (2007).
Barabási, A.-L. Emergence of scaling in complex networks. Handbook of Graphs and Networks: From the Genome to the Internet. Berlin: Wiley-VCH (2003).
Newman, M. E. et al. Random graphs as models of networks. Handb. Gr. Netw. 1, 35–68 (2003).
Acknowledgements
This work is supported by the National Key Research and Development Program of China under Grant No. 2018YFB1003602.
Author information
Authors and Affiliations
Contributions
Conceptualization, B.W., J.S. and J.L.; Analysis, A.U., J.L.; Methodology, A.U. and B.W.; Supervision, J.L., B.W. and J.S.; Validation, A.U., N.K., Z.S.; Writing, A.U. and J.S.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Ullah, A., Wang, B., Sheng, J. et al. Identification of nodes influence based on global structure model in complex networks. Sci Rep 11, 6173 (2021). https://doi.org/10.1038/s41598-021-84684-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-021-84684-x
This article is cited by
-
Excavating important nodes in complex networks based on the heat conduction model
Scientific Reports (2024)
-
Learning to rank influential nodes in complex networks via convolutional neural networks
Applied Intelligence (2024)
-
Integrating local and global information to identify influential nodes in complex networks
Scientific Reports (2023)
-
Detecting influential nodes with topological structure via Graph Neural Network approach in social networks
International Journal of Information Technology (2023)
-
Leveraging neighborhood and path information for influential spreaders recognition in complex networks
Journal of Intelligent Information Systems (2023)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.