1
|
Zhang S, Liu F, Huang Y, Luo Z, Sun K, Mao H. Identification of Important Nodes Based on Local Effective Distance-Integrated Gravity Model. ENTROPY (BASEL, SWITZERLAND) 2025; 27:408. [PMID: 40282643 PMCID: PMC12026317 DOI: 10.3390/e27040408] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/10/2025] [Revised: 04/06/2025] [Accepted: 04/09/2025] [Indexed: 04/29/2025]
Abstract
The research into complex networks has consistently attracted significant attention, with the identification of important nodes within these networks being one of the central challenges in this field of study. Existing methods for identifying key nodes based on effective distance commonly suffer from high time complexity and often overlook the impact of nodes' multi-attribute characteristics on the identification outcomes. To identify important nodes in complex networks more efficiently and accurately, we propose a novel method that leverages an improved effective distance fusion model to identify important nodes. This method effectively reduces redundant calculations of effective distances by employing an effective-influence node set. Furthermore, it incorporates the multi-attribute characteristics of the nodes, characterizing their propagation capabilities by considering local, global, positional, and clustering information and thereby providing a more comprehensive assessment of node importance within complex networks.
Collapse
Affiliation(s)
- Sheng Zhang
- School of Information Engineering, Nanchang Hangkong University, Nanchang 330063, China; (F.L.); (Y.H.); (Z.L.); (K.S.); (H.M.)
| | | | | | | | | | | |
Collapse
|
2
|
Zhao M, Ye J, Li J, Dai Y, Zhao T, Zhang G. HA: An Influential Node Identification Algorithm Based on Hub-Triggered Neighborhood Decomposition and Asymmetric Order-by-Order Recurrence Model. ENTROPY (BASEL, SWITZERLAND) 2025; 27:298. [PMID: 40149222 PMCID: PMC11941631 DOI: 10.3390/e27030298] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/09/2025] [Revised: 03/04/2025] [Accepted: 03/11/2025] [Indexed: 03/29/2025]
Abstract
In recent years, the rise of power network security incidents caused by malicious attacks has drawn considerable attention to identifying influential nodes in power networks. Power networks are a special class of complex networks characterized by a high relative clustering coefficient, which reflects a more intricate connection between nodes. This paper proposes a novel node influence evaluation algorithm based on hub-triggered neighborhood decomposition and asymmetric order-by-order recurrence model. First, the concepts of network directionalization strategy and hub-triggered neighborhood decomposition are introduced to distinguish the functional differences among nodes in the virus-spreading process. Second, this paper proposes the concepts of infected and infecting potential, then constructs a calculation model with asymmetric characteristics based on the order-by-order recurrence method to fully use the information in the connection structure of the adjacent neighborhood. Finally, the influence of the hub node is evaluated by integrating the infected potential and infecting potential of neighbors of multiple orders. We compare our method with the traditional and state-of-the-art algorithms on six power networks regarding Susceptible-Infected-Recovered (SIR) correlation coefficients, imprecision functions, and algorithmic resolution. The experimental results show that the algorithm proposed in this paper is superior in the above aspects.
Collapse
Affiliation(s)
| | - Junhan Ye
- Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing 100876, China; (M.Z.); (J.L.); (Y.D.); (T.Z.); (G.Z.)
| | | | | | | | | |
Collapse
|
3
|
Li H, Wang X, Chen Y, Cheng S, Lu D. A novel voting measure for identifying influential nodes in complex networks based on local structure. Sci Rep 2025; 15:1693. [PMID: 39799212 PMCID: PMC11724906 DOI: 10.1038/s41598-025-85332-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2024] [Accepted: 01/02/2025] [Indexed: 01/15/2025] Open
Abstract
Identifying influential nodes in real networks is significant in studying and analyzing the structural as well as functional aspects of networks. VoteRank is a simple and effective algorithm to identify high-spreading nodes. The accuracy and monotonicity of the VoteRank algorithm are poor as the network topology fails to be taken into account.Given the nodes' attributes and neighborhood structure, this paper put forward an algorithm based on the Edge Weighted VoteRank (EWV) for identifying influential nodes in the network. The proposed algorithm draws inspiration from human voting behavior and expresses the attractiveness of nodes to their first-order neighborhood using the weights of connecting edges. Similarity between nodes is introduced into the voting process, further enhancing the accuracy of the method. Additionally, this EWV algorithm addresses the problem of influential node clustering by reducing the voting ability of nodes in the second-order neighborhood of the most influential nodes. The validity of the presented algorithm is verified through experiments conducted on 12 different real networks of various sizes and structures, directly comparing it with 7 competing algorithms.Empirical results indicate a superiority of the presented algorithm over the remaining seven competing algorithms with respect to node differentiation ability, effectiveness, and ranked list accuracy.
Collapse
Affiliation(s)
- Haoyang Li
- Air Force Engineering University, Xi'an, 710038, Shaanxi, China
| | - Xing Wang
- Air Force Engineering University, Xi'an, 710038, Shaanxi, China
| | - You Chen
- Air Force Engineering University, Xi'an, 710038, Shaanxi, China
| | - Siyi Cheng
- Air Force Engineering University, Xi'an, 710038, Shaanxi, China.
| | - Dejiang Lu
- Air Force Engineering University, Xi'an, 710038, Shaanxi, China
| |
Collapse
|
4
|
Bouyer A, Beni HA, Oskouei AG, Rouhi A, Arasteh B, Liu X. Maximizing Influence in Social Networks Using Combined Local Features and Deep Learning-Based Node Embedding. BIG DATA 2024. [PMID: 39435527 DOI: 10.1089/big.2023.0117] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2024]
Abstract
The influence maximization problem has several issues, including low infection rates and high time complexity. Many proposed methods are not suitable for large-scale networks due to their time complexity or free parameter usage. To address these challenges, this article proposes a local heuristic called Embedding Technique for Influence Maximization (ETIM) that uses shell decomposition, graph embedding, and reduction, as well as combined local structural features. The algorithm selects candidate nodes based on their connections among network shells and topological features, reducing the search space and computational overhead. It uses a deep learning-based node embedding technique to create a multidimensional vector of candidate nodes and calculates the dependency on spreading for each node based on local topological features. Finally, influential nodes are identified using the results of the previous phases and newly defined local features. The proposed algorithm is evaluated using the independent cascade model, showing its competitiveness and ability to achieve the best performance in terms of solution quality. Compared with the collective influence global algorithm, ETIM is significantly faster and improves the infection rate by an average of 12%.
Collapse
Affiliation(s)
- Asgarali Bouyer
- Department of Software Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran
- Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, İstanbul, Turkey
| | | | - Amin Golzari Oskouei
- Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, İstanbul, Turkey
| | - Alireza Rouhi
- Department of Software Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran
| | - Bahman Arasteh
- Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, İstanbul, Turkey
- Department of Computer Science, Khazar University, Baku, Azerbaijan
| | - Xiaoyang Liu
- School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China
| |
Collapse
|
5
|
Yang JX, Wang H, Li X, Tan Y, Ma Y, Zeng M. A control measure for epidemic spread based on the susceptible-infectious-susceptible (SIS) model. Biosystems 2024; 246:105341. [PMID: 39332804 DOI: 10.1016/j.biosystems.2024.105341] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/18/2024] [Revised: 09/14/2024] [Accepted: 09/22/2024] [Indexed: 09/29/2024]
Abstract
When an epidemic occurs in a network, finding the important links and cutting them off is an effective measure for preventing the spread of the epidemic. Traditional methods that remove important links easily lead to a disconnected network, inevitably incurring high costs arising from quarantining individuals or communities in a real-world network. In this study, we combine the clustering coefficient and the eigenvector to identify the important links using the susceptible-infectious-susceptible (SIS) model. The results show that our approach can improve the epidemic threshold while maintaining the connectivity of the network to control the spread of the epidemic. Experiments on multiple real-world and synthetic networks of varying sizes, demonstrate the effectiveness and scalability of our approach.
Collapse
Affiliation(s)
- Jin-Xuan Yang
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China.
| | - Haiyan Wang
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Xin Li
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Ying Tan
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Yongjuan Ma
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| | - Min Zeng
- School of Statistics and Mathematics, Yunnan University of Finance and Economics, Kunming, 650221, PR China
| |
Collapse
|
6
|
Zhang K, Shen J, He G, Sun Y, Ling H, Zha H, Li H, Zhang J. A Transformative Topological Representation for Link Modeling, Prediction and Cross-Domain Network Analysis. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2024; 46:6126-6138. [PMID: 38502624 DOI: 10.1109/tpami.2024.3378729] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/21/2024]
Abstract
Many complex social, biological, or physical systems are characterized as networks, and recovering the missing links of a network could shed important lights on its structure and dynamics. A good topological representation is crucial to accurate link modeling and prediction, yet how to account for the kaleidoscopic changes in link formation patterns remains a challenge, especially for analysis in cross-domain studies. We propose a new link representation scheme by projecting the local environment of a link into a "dipole plane", where neighboring nodes of the link are positioned via their relative proximity to the two anchors of the link, like a dipole. By doing this, complex and discrete topology arising from link formation is turned to differentiable point-cloud distribution, opening up new possibilities for topological feature-engineering with desired expressiveness, interpretability and generalization. Our approach has comparable or even superior results against state-of-the-art GNNs, meanwhile with a model up to hundreds of times smaller and running much faster. Furthermore, it provides a universal platform to systematically profile, study, and compare link-patterns from miscellaneous real-world networks. This allows building a global link-pattern atlas, based on which we have uncovered interesting common patterns of link formation, i.e., the bridge-style, the radiation-style, and the community-style across a wide collection of networks with highly different nature.
Collapse
|
7
|
Sergio AR, Schimit PHT. Optimizing Contact Network Topological Parameters of Urban Populations Using the Genetic Algorithm. ENTROPY (BASEL, SWITZERLAND) 2024; 26:661. [PMID: 39202131 PMCID: PMC11353388 DOI: 10.3390/e26080661] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2024] [Revised: 07/11/2024] [Accepted: 07/26/2024] [Indexed: 09/03/2024]
Abstract
This paper explores the application of complex network models and genetic algorithms in epidemiological modeling. By considering the small-world and Barabási-Albert network models, we aim to replicate the dynamics of disease spread in urban environments. This study emphasizes the importance of accurately mapping individual contacts and social networks to forecast disease progression. Using a genetic algorithm, we estimate the input parameters for network construction, thereby simulating disease transmission within these networks. Our results demonstrate the networks' resemblance to real social interactions, highlighting their potential in predicting disease spread. This study underscores the significance of complex network models and genetic algorithms in understanding and managing public health crises.
Collapse
|
8
|
Wang Z, Huang R, Yang D, Peng Y, Zhou B, Chen Z. Identifying influential nodes based on the disassortativity and community structure of complex network. Sci Rep 2024; 14:8453. [PMID: 38605134 PMCID: PMC11009344 DOI: 10.1038/s41598-024-59071-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/26/2023] [Accepted: 04/07/2024] [Indexed: 04/13/2024] Open
Abstract
The complex networks exhibit significant heterogeneity in node connections, resulting in a few nodes playing critical roles in various scenarios, including decision-making, disease control, and population immunity. Therefore, accurately identifying these influential nodes that play crucial roles in networks is very important. Many methods have been proposed in different fields to solve this issue. This paper focuses on the different types of disassortativity existing in networks and innovatively introduces the concept of disassortativity of the node, namely, the inconsistency between the degree of a node and the degrees of its neighboring nodes, and proposes a measure of disassortativity of the node (DoN) by a step function. Furthermore, the paper analyzes and indicates that in many real-world network applications, such as online social networks, the influence of nodes within the network is often associated with disassortativity of the node and the community boundary structure of the network. Thus, the influential metric of node based on disassortativity and community structure (mDC) is proposed. Extensive experiments are conducted in synthetic and real networks, and the performance of the DoN and mDC is validated through network robustness experiments and immune experiment of disease infection. Experimental and analytical results demonstrate that compared to other state-of-the-art centrality measures, the proposed methods (DoN and mDC) exhibits superior identification performance and efficiency, particularly in non-disassortative networks and networks with clear community structures. Furthermore, we find that the DoN and mDC exhibit high stability to network noise and inaccuracies of the network data.
Collapse
Affiliation(s)
- Zuxi Wang
- School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, 430074, People's Republic of China
- National Key Laboratory of Multispectral Information Intelligent Processing Technology, Wuhan, 430074, People's Republic of China
- Key Laboratory of Image Information Processing and Intelligent Control, Ministry of Education of China, Wuhan, 430074, People's Republic of China
| | - Ruixiang Huang
- School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, 430074, People's Republic of China
- National Key Laboratory of Multispectral Information Intelligent Processing Technology, Wuhan, 430074, People's Republic of China
- Key Laboratory of Image Information Processing and Intelligent Control, Ministry of Education of China, Wuhan, 430074, People's Republic of China
| | - Dian Yang
- School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, 430074, People's Republic of China
- National Key Laboratory of Multispectral Information Intelligent Processing Technology, Wuhan, 430074, People's Republic of China
- Key Laboratory of Image Information Processing and Intelligent Control, Ministry of Education of China, Wuhan, 430074, People's Republic of China
| | - Yuqiang Peng
- School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, 430074, People's Republic of China
| | - Boyun Zhou
- School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, People's Republic of China
| | - Zhong Chen
- School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, 430074, People's Republic of China.
- National Key Laboratory of Multispectral Information Intelligent Processing Technology, Wuhan, 430074, People's Republic of China.
- Key Laboratory of Image Information Processing and Intelligent Control, Ministry of Education of China, Wuhan, 430074, People's Republic of China.
| |
Collapse
|
9
|
Xia X, Klishin AA, Stiso J, Lynn CW, Kahn AE, Caciagli L, Bassett DS. Human learning of hierarchical graphs. Phys Rev E 2024; 109:044305. [PMID: 38755869 DOI: 10.1103/physreve.109.044305] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/28/2023] [Accepted: 02/16/2024] [Indexed: 05/18/2024]
Abstract
Humans are exposed to sequences of events in the environment, and the interevent transition probabilities in these sequences can be modeled as a graph or network. Many real-world networks are organized hierarchically and while much is known about how humans learn basic transition graph topology, whether and to what degree humans can learn hierarchical structures in such graphs remains unknown. We probe the mental estimates of transition probabilities via the surprisal effect phenomenon: humans react more slowly to less expected transitions. Using mean-field predictions and numerical simulations, we show that surprisal effects are stronger for finer-level than coarser-level hierarchical transitions, and that surprisal effects at coarser levels are difficult to detect for limited learning times or in small samples. Using a serial response experiment with human participants (n=100), we replicate our predictions by detecting a surprisal effect at the finer level of the hierarchy but not at the coarser level of the hierarchy. We then evaluate the presence of a trade-off in learning, whereby humans who learned the finer level of the hierarchy better also tended to learn the coarser level worse, and vice versa. This study elucidates the processes by which humans learn sequential events in hierarchical contexts. More broadly, our work charts a road map for future investigation of the neural underpinnings and behavioral manifestations of graph learning.
Collapse
Affiliation(s)
- Xiaohuan Xia
- Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
| | - Andrei A Klishin
- Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
| | - Jennifer Stiso
- Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
| | - Christopher W Lynn
- Department of Physics, Quantitative Biology Institute, and Wu Tsai Institute, Yale University, New Haven, Connecticut 06520, USA
- Joseph Henry Laboratories of Physics, Princeton University, Princeton, New Jersey 08544, USA
- Initiative for the Theoretical Sciences, Graduate Center, City University of New York, New York, New York 10016, USA
| | - Ari E Kahn
- Princeton Neuroscience Institute, Princeton University, Princeton, New Jersey 08544, USA
| | - Lorenzo Caciagli
- Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
| | - Dani S Bassett
- Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
- Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
- Department of Electrical & Systems Engineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
- Department of Neurology, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
- Department of Psychiatry, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA
- Santa Fe Institute, Santa Fe, New Mexico 87501, USA
| |
Collapse
|
10
|
Yang R, Zhou F, Liu B, Lü L. A generalized simplicial model and its application. CHAOS (WOODBURY, N.Y.) 2024; 34:043113. [PMID: 38572946 DOI: 10.1063/5.0195423] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/02/2024] [Accepted: 03/07/2024] [Indexed: 04/05/2024]
Abstract
Higher-order structures, consisting of more than two individuals, provide a new perspective to reveal the missed non-trivial characteristics under pairwise networks. Prior works have researched various higher-order networks, but research for evaluating the effects of higher-order structures on network functions is still scarce. In this paper, we propose a framework to quantify the effects of higher-order structures (e.g., 2-simplex) and vital functions of complex networks by comparing the original network with its simplicial model. We provide a simplicial model that can regulate the quantity of 2-simplices and simultaneously fix the degree sequence. Although the algorithm is proposed to control the quantity of 2-simplices, results indicate it can also indirectly control simplexes more than 2-order. Experiments on spreading dynamics, pinning control, network robustness, and community detection have shown that regulating the quantity of 2-simplices changes network performance significantly. In conclusion, the proposed framework is a general and effective tool for linking higher-order structures with network functions. It can be regarded as a reference object in other applications and can deepen our understanding of the correlation between micro-level network structures and global network functions.
Collapse
Affiliation(s)
- Rongmei Yang
- Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, People's Republic of China
| | - Fang Zhou
- Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, People's Republic of China
- Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China, Huzhou 313001, People's Republic of China
| | - Bo Liu
- Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, People's Republic of China
- Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China, Huzhou 313001, People's Republic of China
| | - Linyuan Lü
- Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, People's Republic of China
- School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, People's Republic of China
| |
Collapse
|
11
|
Ding X, Kong LW, Zhang HF, Lai YC. Deep-learning reconstruction of complex dynamical networks from incomplete data. CHAOS (WOODBURY, N.Y.) 2024; 34:043115. [PMID: 38574280 DOI: 10.1063/5.0201557] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/31/2024] [Accepted: 03/19/2024] [Indexed: 04/06/2024]
Abstract
Reconstructing complex networks and predicting the dynamics are particularly challenging in real-world applications because the available information and data are incomplete. We develop a unified collaborative deep-learning framework consisting of three modules: network inference, state estimation, and dynamical learning. The complete network structure is first inferred and the states of the unobserved nodes are estimated, based on which the dynamical learning module is activated to determine the dynamical evolution rules. An alternating parameter updating strategy is deployed to improve the inference and prediction accuracy. Our framework outperforms baseline methods for synthetic and empirical networks hosting a variety of dynamical processes. A reciprocity emerges between network inference and dynamical prediction: better inference of network structure improves the accuracy of dynamical prediction, and vice versa. We demonstrate the superior performance of our framework on an influenza dataset consisting of 37 US States and a PM2.5 dataset covering 184 cities in China.
Collapse
Affiliation(s)
- Xiao Ding
- The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Mathematical Science, Anhui University, Hefei 230601, China
| | - Ling-Wei Kong
- School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, Arizona 85287, USA
| | - Hai-Feng Zhang
- The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Mathematical Science, Anhui University, Hefei 230601, China
| | - Ying-Cheng Lai
- School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, Arizona 85287, USA
| |
Collapse
|
12
|
Ding Y, Gao J, Magdon-Ismail M. Efficient parameter inference in networked dynamical systems via steady states: A surrogate objective function approach integrating mean-field and nonlinear least squares. Phys Rev E 2024; 109:034301. [PMID: 38632807 DOI: 10.1103/physreve.109.034301] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/29/2023] [Accepted: 01/08/2024] [Indexed: 04/19/2024]
Abstract
In networked dynamical systems, inferring governing parameters is crucial for predicting nodal dynamics, such as gene expression levels, species abundance, or population density. While many parameter estimation techniques rely on time-series data, particularly systems that converge over extreme time ranges, only noisy steady-state data is available, requiring a new approach to infer dynamical parameters from noisy observations of steady states. However, the traditional optimization process is computationally demanding, requiring repeated simulation of coupled ordinary differential equations. To overcome these limitations, we introduce a surrogate objective function that leverages decoupled equations to compute steady states, significantly reducing computational complexity. Furthermore, by optimizing the surrogate objective function, we obtain steady states that more accurately approximate the ground truth than noisy observations and predict future equilibria when topology changes. We empirically demonstrate the effectiveness of the proposed method across ecological, gene regulatory, and epidemic networks. Our approach provides an efficient and effective way to estimate parameters from steady-state data and has the potential to improve predictions in networked dynamical systems.
Collapse
Affiliation(s)
- Yanna Ding
- Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York 12180, USA
| | - Jianxi Gao
- Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York 12180, USA
| | - Malik Magdon-Ismail
- Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York 12180, USA
| |
Collapse
|
13
|
Tian M, Moriano P. Robustness of community structure under edge addition. Phys Rev E 2023; 108:054302. [PMID: 38115408 DOI: 10.1103/physreve.108.054302] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/17/2023] [Accepted: 09/08/2023] [Indexed: 12/21/2023]
Abstract
Communities often represent key structural and functional clusters in networks. To preserve such communities, it is important to understand their robustness under network perturbations. Previous work in community robustness analysis has focused on studying changes in the community structure as a response of edge rewiring and node or edge removal. However, the impact of increasing connectivity on the robustness of communities in networked systems is relatively unexplored. Studying the limits of community robustness under edge addition is crucial to better understanding the cases in which density expands or false edges erroneously appear. In this paper, we analyze the effect of edge addition on community robustness in synthetic and empirical temporal networks. We study two scenarios of edge addition: random and targeted. We use four community detection algorithms, Infomap, Label Propagation, Leiden, and Louvain, and demonstrate the results in community similarity metrics. The experiments on synthetic networks show that communities are more robust when the initial partition is stronger or the edge addition is random, and the experiments on empirical data also indicate that robustness performance can be affected by the community similarity metric. Overall, our results suggest that the communities identified by the different types of community detection algorithms exhibit different levels of robustness, and so the robustness of communities depends strongly on the choice of detection method.
Collapse
Affiliation(s)
- Moyi Tian
- Division of Applied Mathematics, Brown University, Providence, Rhode Island 02912, USA
| | - Pablo Moriano
- Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37830, USA
| |
Collapse
|
14
|
Zhu S, Zhan J, Li X. Identifying influential nodes in complex networks using a gravity model based on the H-index method. Sci Rep 2023; 13:16404. [PMID: 37775622 PMCID: PMC10541911 DOI: 10.1038/s41598-023-43585-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/14/2023] [Accepted: 09/26/2023] [Indexed: 10/01/2023] Open
Abstract
Identifying influential spreaders in complex networks is a widely discussed topic in the field of network science. Numerous methods have been proposed to rank key nodes in the network, and while gravity-based models often perform well, most existing gravity-based methods either rely on node degree, k-shell values, or a combination of both to differentiate node importance without considering the overall impact of neighboring nodes. Relying solely on a node's individual characteristics to identify influential spreaders has proven to be insufficient. To address this issue, we propose a new gravity centrality method called HVGC, based on the H-index. Our approach considers the impact of neighboring nodes, path information between nodes, and the positional information of nodes within the network. Additionally, it is better able to identify nodes with smaller k-shell values that act as bridges between different parts of the network, making it a more reasonable measure compared to previous gravity centrality methods. We conducted several experiments on 10 real networks and observed that our method outperformed previously proposed methods in evaluating the importance of nodes in complex networks.
Collapse
Affiliation(s)
- Siqi Zhu
- Physical and Electronic Sciences College, Hunan University of Science and Technology of China, Xiangtan, 411100, People's Republic of China.
| | - Jie Zhan
- Physical and Electronic Sciences College, Hunan University of Science and Technology of China, Xiangtan, 411100, People's Republic of China.
| | - Xing Li
- Physical and Electronic Sciences College, Hunan University of Science and Technology of China, Xiangtan, 411100, People's Republic of China
| |
Collapse
|
15
|
Aziz F, Slater LT, Bravo-Merodio L, Acharjee A, Gkoutos GV. Link prediction in complex network using information flow. Sci Rep 2023; 13:14660. [PMID: 37669983 PMCID: PMC10480459 DOI: 10.1038/s41598-023-41476-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/06/2023] [Accepted: 08/27/2023] [Indexed: 09/07/2023] Open
Abstract
Link prediction in complex networks has recently attracted a great deal of attraction in diverse scientific domains, including social and biological sciences. Given a snapshot of a network, the goal is to predict links that are missing in the network or that are likely to occur in the near future. This problem has both theoretical and practical significance; it not only helps us to identify missing links in a network more efficiently by avoiding the expensive and time consuming experimental processes, but also allows us to study the evolution of a network with time. To address the problem of link prediction, numerous attempts have been made over the recent years that exploit the local and the global topological properties of the network to predict missing links in the network. In this paper, we use parametrised matrix forest index (PMFI) to predict missing links in a network. We show that, for small parameter values, this index is linked to a heat diffusion process on a graph and therefore encodes geometric properties of the network. We then develop a framework that combines the PMFI with a local similarity index to predict missing links in the network. The framework is applied to numerous networks obtained from diverse domains such as social network, biological network, and transport network. The results show that the proposed method can predict missing links with higher accuracy when compared to other state-of-the-art link prediction methods.
Collapse
Affiliation(s)
- Furqan Aziz
- School of Computing and Mathematical Sciences, University of Leicester, University Rd, Leicester, LE1 7RH, UK.
- Centre for Health Data Science, Birmingham, B15 2WB, UK.
| | - Luke T Slater
- Institute of Cancer and Genomic Sciences, University of Birmingham, Birmingham, B15 2TT, UK
- Institute of Translational Medicine, University of Birmingham, Birmingham, B15 2TT, UK
- Centre for Health Data Science, Birmingham, B15 2WB, UK
| | - Laura Bravo-Merodio
- Institute of Cancer and Genomic Sciences, University of Birmingham, Birmingham, B15 2TT, UK
- Institute of Translational Medicine, University of Birmingham, Birmingham, B15 2TT, UK
- Centre for Health Data Science, Birmingham, B15 2WB, UK
| | - Animesh Acharjee
- Institute of Cancer and Genomic Sciences, University of Birmingham, Birmingham, B15 2TT, UK
- Institute of Translational Medicine, University of Birmingham, Birmingham, B15 2TT, UK
- MRC Health Data Research UK (HDR UK), London, UK
- Centre for Health Data Science, Birmingham, B15 2WB, UK
| | - Georgios V Gkoutos
- Institute of Cancer and Genomic Sciences, University of Birmingham, Birmingham, B15 2TT, UK
- Institute of Translational Medicine, University of Birmingham, Birmingham, B15 2TT, UK
- NIHR Surgical Reconstruction and Microbiology Research Centre, University Hospital Birmingham, Birmingham, B15 2WB, UK
- MRC Health Data Research UK (HDR UK), London, UK
- NIHR Experimental Cancer Medicine Centre, Birmingham, B15 2TT, UK
- Centre for Health Data Science, Birmingham, B15 2WB, UK
- Centre for Environmental Research & Advocacy, University of Birmingham, Birmingham, B15 2TT, UK
| |
Collapse
|
16
|
Cantwell GT, Kirkley A, Radicchi F. Heterogeneous message passing for heterogeneous networks. Phys Rev E 2023; 108:034310. [PMID: 37849099 DOI: 10.1103/physreve.108.034310] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2023] [Accepted: 09/01/2023] [Indexed: 10/19/2023]
Abstract
Message passing (MP) is a computational technique used to find approximate solutions to a variety of problems defined on networks. MP approximations are generally accurate in locally treelike networks but require corrections to maintain their accuracy level in networks rich with short cycles. However, MP may already be computationally challenging on very large networks and additional costs incurred by correcting for cycles could be prohibitive. We show how the issue can be addressed. By allowing each node in the network to have its own level of approximation, one can focus on improving the accuracy of MP approaches in a targeted manner. We perform a systematic analysis of 109 real-world networks and show that our node-based MP approximation is able to increase both the accuracy and speed of traditional MP approaches. We find that, compared to conventional MP, a heterogeneous approach based on a simple heuristic is more accurate in 81% of tested networks, faster in 64% of cases, and both more accurate and faster in 49% of cases.
Collapse
Affiliation(s)
- George T Cantwell
- Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, New Mexico 87501, USA
- Department of Engineering, University of Cambridge, Cambridge CB2 1PZ, United Kingdom
| | - Alec Kirkley
- Institute of Data Science, University of Hong Kong, Hong Kong
- Department of Urban Planning and Design, University of Hong Kong, Hong Kong
- Urban Systems Institute, University of Hong Kong, Hong Kong
| | - Filippo Radicchi
- Center for Complex Networks and Systems Research, School of Informatics, Computing, and Engineering, Indiana University, Bloomington, Indiana 47408, USA
| |
Collapse
|
17
|
Liu P, Li L, Wen Y, Fang S. Identifying Influential Nodes in Social Networks: Exploiting Self-Voting Mechanism. BIG DATA 2023; 11:296-306. [PMID: 37083427 DOI: 10.1089/big.2022.0165] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/03/2023]
Abstract
The influence maximization (IM) problem is defined as identifying a group of influential nodes in a network such that these nodes can affect as many nodes as possible. Due to its great significance in viral marketing, disease control, social recommendation, and so on, considerable efforts have been devoted to the development of methods to solve the IM problem. In the literature, VoteRank and its improved algorithms have been proposed to select influential nodes based on voting approaches. However, in the voting process of these algorithms, a node cannot vote for itself. We argue that this voting schema runs counter to many real scenarios. To address this issue, we designed the VoteRank* algorithm, in which we first introduce the self-voting mechanism into the voting process. In addition, we also take into consideration the diversities of nodes. More explicitly, we measure the voting ability of nodes and the amount of a node voting for its neighbors based on the H-index of nodes. The effectiveness of the proposed algorithm is experimentally verified on 12 benchmark networks. The results demonstrate that VoteRank* is superior to the baseline methods in most cases.
Collapse
Affiliation(s)
- Panfeng Liu
- School of Information Science and Engineering, Lanzhou University, Lanzhou, China
| | - Longjie Li
- School of Information Science and Engineering, Lanzhou University, Lanzhou, China
- Key Laboratory of Media Convergence Technology and Communication, Lanzhou, China
| | - Yanhong Wen
- School of Information Science and Engineering, Lanzhou University, Lanzhou, China
| | - Shiyu Fang
- School of Information Science and Engineering, Lanzhou University, Lanzhou, China
| |
Collapse
|
18
|
Peng SL, Wang HJ, Peng H, Zhu XB, Li X, Han J, Zhao D, Hu ZL. NLSI: An innovative method to locate epidemic sources on the SEIR propagation model. CHAOS (WOODBURY, N.Y.) 2023; 33:083125. [PMID: 37549113 DOI: 10.1063/5.0152859] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/02/2023] [Accepted: 07/12/2023] [Indexed: 08/09/2023]
Abstract
Epidemics pose a significant threat to societal development. Accurately and swiftly identifying the source of an outbreak is crucial for controlling the spread of an epidemic and minimizing its impact. However, existing research on locating epidemic sources often overlooks the fact that epidemics have an incubation period and fails to consider social behaviors like self-isolation during the spread of the epidemic. In this study, we first take into account isolation behavior and introduce the Susceptible-Exposed-Infected-Recovered (SEIR) propagation model to simulate the spread of epidemics. As the epidemic reaches a certain threshold, government agencies or hospitals will report the IDs of some infected individuals and the time when symptoms first appear. The reported individuals, along with their first and second-order neighbors, are then isolated. Using the moment of symptom onset reported by the isolated individuals, we propose a node-level classification method and subsequently develop the node-level-based source identification (NLSI) algorithm. Extensive experiments demonstrate that the NLSI algorithm is capable of solving the source identification problem for single and multiple sources under the SEIR propagation model. We find that the source identification accuracy is higher when the infection rate is lower, and a sparse network structure is beneficial to source localization. Furthermore, we discover that the length of the isolation period has little impact on source localization, while the length of the incubation period significantly affects the accuracy of source localization. This research offers a novel approach for identifying the origin of the epidemic associated with our defined SEIR model.
Collapse
Affiliation(s)
- Shui-Lin Peng
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| | - Hong-Jue Wang
- School of Information, Beijing Wuzi University, Beijing 101149, China
| | - Hao Peng
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| | - Xiang-Bin Zhu
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| | - Xiang Li
- College of Science, National University of Defense Technology, Changsha 410073, China
| | - Jianmin Han
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| | - Dandan Zhao
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| | - Zhao-Long Hu
- College of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China
| |
Collapse
|
19
|
Li W, Guo C, Liu Y, Zhou X, Jin Q, Xin M. Rumor source localization in social networks based on infection potential energy. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.03.098] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/08/2023]
|
20
|
Patwardhan S, Radicchi F, Fortunato S. Influence maximization: Divide and conquer. Phys Rev E 2023; 107:054306. [PMID: 37329077 DOI: 10.1103/physreve.107.054306] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/03/2022] [Accepted: 05/03/2023] [Indexed: 06/18/2023]
Abstract
The problem of influence maximization, i.e., finding the set of nodes having maximal influence on a network, is of great importance for several applications. In the past two decades, many heuristic metrics to spot influencers have been proposed. Here, we introduce a framework to boost the performance of such metrics. The framework consists in dividing the network into sectors of influence, and then selecting the most influential nodes within these sectors. We explore three different methodologies to find sectors in a network: graph partitioning, graph hyperbolic embedding, and community structure. The framework is validated with a systematic analysis of real and synthetic networks. We show that the gain in performance generated by dividing a network into sectors before selecting the influential spreaders increases as the modularity and heterogeneity of the network increase. Also, we show that the division of the network into sectors can be efficiently performed in a time that scales linearly with the network size, thus making the framework applicable to large-scale influence maximization problems.
Collapse
Affiliation(s)
- Siddharth Patwardhan
- Center for Complex Networks and Systems Research, Luddy School of Informatics, Computing, and Engineering, Indiana University, Bloomington, Indiana 47408, USA
| | - Filippo Radicchi
- Center for Complex Networks and Systems Research, Luddy School of Informatics, Computing, and Engineering, Indiana University, Bloomington, Indiana 47408, USA
| | - Santo Fortunato
- Center for Complex Networks and Systems Research, Luddy School of Informatics, Computing, and Engineering, Indiana University, Bloomington, Indiana 47408, USA
- Indiana University Network Science Institute (IUNI), Indiana Univeristy, Bloomington, Indiana 47408, USA
| |
Collapse
|
21
|
Wang HJ, Hu ZL, Tao L, Shao S, Wang SZ. The locatability of Pearson algorithm for multi-source location in complex networks. Sci Rep 2023; 13:5692. [PMID: 37029261 PMCID: PMC10082217 DOI: 10.1038/s41598-023-32832-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/29/2023] [Accepted: 04/03/2023] [Indexed: 04/09/2023] Open
Abstract
We study locating propagation sources in complex networks. We proposed an multi-source location algorithm for different propagation dynamics by using sparse observations. Without knowing the propagation dynamics and any dynamic parameters, we can calculate node centrality based on the character that positive correlation between inform time of nodes and geodesic distance between nodes and sources. The algorithm is robust and have high location accuracy for any number of sources. We study locatability of the proposed source location algorithm and present a corresponding strategy to select observer nodes based on greedy algorithm. All simulations on both model and real-world networks proved the feasibility and validity of this algorithm.
Collapse
Affiliation(s)
- Hong-Jue Wang
- School of Information, Beijing Wuzi University, Beijing, 101149, People's Republic of China
| | - Zhao-Long Hu
- College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, 321004, People's Republic of China
| | - Li Tao
- School of Information, Beijing Wuzi University, Beijing, 101149, People's Republic of China.
| | - Shuyu Shao
- School of Information, Beijing Wuzi University, Beijing, 101149, People's Republic of China
| | - Shi-Zhe Wang
- School of Economics, Liaoning University, Shenyang, 110000, People's Republic of China
| |
Collapse
|
22
|
Wen T, Cao J, Cheong KH. Gravity-Based Community Vulnerability Evaluation Model in Social Networks: GBCVE. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:2467-2479. [PMID: 34793311 DOI: 10.1109/tcyb.2021.3123081] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
The usage of social media around the world is ever-increasing. Social media statistics from 2019 show that there are 3.5 billion social media users worldwide. However, the existence of community structure renders the network vulnerable to attacks and large-scale losses. How does one comprehensively consider the multiple information sources and effectively evaluate the vulnerability of the community? To answer this question, we design a gravity-based community vulnerability evaluation (GBCVE) model for multiple information considerations. Specifically, we construct the community network by the Jensen-Shannon divergence and log-sigmoid transition function to show the relationship between communities. The number of edges inside community and outside of each community, as well as the gravity index are the three important factors used in this model for evaluating the community vulnerability. These three factors correspond to the interior information of the community, small-scale interaction relationship, and large-scale interaction relationship, respectively. A fuzzy ranking algorithm is then used to describe the vulnerability relationship between different communities, and the sensitivity of different weighting parameters is then analyzed by Sobol' indices. We validate and demonstrate the applicability of our proposed community vulnerability evaluation method via three real-world complex network test examples. Our proposed model can be applied to find vulnerable components in a network to mitigate the influence of public opinions or natural disasters in real time. The community vulnerability evaluation results from our proposed model are expected to shed light on other properties of communities within social networks and have real-world applications across network science.
Collapse
|
23
|
Fast approach for link prediction in complex networks based on graph decomposition. EVOLVING SYSTEMS 2023. [DOI: 10.1007/s12530-023-09492-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/17/2023]
|
24
|
Feng Z, Cao Z, Qi X. Generalized network dismantling via a novel spectral partition algorithm. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.03.017] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/11/2023]
|
25
|
Liu J, Zheng J. Identifying important nodes in complex networks based on extended degree and E-shell hierarchy decomposition. Sci Rep 2023; 13:3197. [PMID: 36823254 PMCID: PMC9950367 DOI: 10.1038/s41598-023-30308-5] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/12/2022] [Accepted: 02/21/2023] [Indexed: 02/25/2023] Open
Abstract
The identification of important nodes is a hot topic in complex networks. Many methods have been proposed in different fields for solving this problem. Most previous work emphasized the role of a single feature and, as a result, rarely made full use of multiple items. This paper proposes a new method that utilizes multiple characteristics of nodes for the evaluation of their importance. First, an extended degree is defined to improve the classical degree. And E-shell hierarchy decomposition is put forward for determining nodes' position through the network's hierarchical structure. Then, based on the combination of these two components, a hybrid characteristic centrality and its extended version are proposed for evaluating the importance of nodes. Extensive experiments are conducted in six real networks, and the susceptible-infected-recovered model and monotonicity criterion are introduced to test the performance of the new approach. The comparison results demonstrate that the proposed new approach exposes more competitive advantages in both accuracy and resolution compared to the other five approaches.
Collapse
Affiliation(s)
- Jun Liu
- School of Science, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
| | - Jiming Zheng
- Key Lab of Intelligent Analysis and Decision on Complex System, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China.
| |
Collapse
|
26
|
Li S, Xiao F. A mechanics model based on information entropy for identifying influencers in complex networks. APPL INTELL 2023; 53:1-20. [PMID: 36741743 PMCID: PMC9885924 DOI: 10.1007/s10489-023-04457-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 01/05/2023] [Indexed: 01/31/2023]
Abstract
The network, with some or all characteristics of scale-free, self-similarity, self-organization, attractor and small world, is defined as a complex network. The identification of significant spreaders is an indispensable research direction in complex networks, which aims to discover nodes that play a crucial role in the structure and function of the network. Since influencers are essential for studying the security of the network and controlling the propagation process of the network, their assessment methods are of great significance and practical value to solve many problems. However, how to effectively combine global information with local information is still an open problem. To solve this problem, the generalized mechanics model is further improved in this paper. A generalized mechanics model based on information entropy is proposed to discover crucial spreaders in complex networks. The influence of each neighbor node on local information is quantified by information entropy, and the interaction between each node on global information is considered by calculating the shortest distance. Extensive tests on eleven real networks indicate the proposed approach is much faster and more precise than traditional ways and state-of-the-art benchmarks. At the same time, it is effective to use our approach to identify influencers in complex networks.
Collapse
Affiliation(s)
- Shuyu Li
- Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai, 200092 China
- School of Big Data and Software Engineering, Chongqing University, Chongqing, 401331 China
| | - Fuyuan Xiao
- School of Big Data and Software Engineering, Chongqing University, Chongqing, 401331 China
| |
Collapse
|
27
|
Yagoub I, Lou Z, Qiu B, Abdul Wahid J, Saad T. Density and node closeness based clustering method for community detection. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-220224] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
Abstract
In a real-world, networked system, the ability to detect communities or clusters has piqued the concern of researchers in a wide range of fields. Many existing methods are simply meant to detect the membership of communities, not the structures of those groups, which is a limitation. We contend that community structures at the local level can also provide valuable insight into their detection. In this study, we developed a simple yet prosperous way of uncovering communities and their cores at the same time while keeping things simple. Essentially, the concept is founded on the theory that the structure of a community may be thought of as a high-density node surrounded by neighbors of minor densities and that community centers are located at a significant distance from one another. We propose a concept termed “community centrality” based on finding motifs to measure the probability of a node becoming the community center in a setting like this and then disseminate multiple, substantial center probabilities all over the network through a node closeness score mechanism. The experimental results show that the proposed method is more efficient than many other already used methods.
Collapse
Affiliation(s)
- Imam Yagoub
- School of Computer and Artificial Intelligence, Zhengzhou University, 450001, China
| | - Zhengzheng Lou
- School of Computer and Artificial Intelligence, Zhengzhou University, 450001, China
| | - Baozhi Qiu
- School of Computer and Artificial Intelligence, Zhengzhou University, 450001, China
| | - Junaid Abdul Wahid
- School of Computer and Artificial Intelligence, Zhengzhou University, 450001, China
| | - Tahir Saad
- Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
| |
Collapse
|
28
|
Link predictability classes in large node-attributed networks. SOCIAL NETWORK ANALYSIS AND MINING 2022. [DOI: 10.1007/s13278-022-00912-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
29
|
Zhang Q, Shuai B, Lü M. A novel method to identify influential nodes in complex networks based on gravity centrality. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.10.070] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
|
30
|
Chujyo M, Hayashi Y. Adding links on minimum degree and longest distance strategies for improving network robustness and efficiency. PLoS One 2022; 17:e0276733. [PMID: 36288333 PMCID: PMC9605036 DOI: 10.1371/journal.pone.0276733] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/05/2022] [Accepted: 10/12/2022] [Indexed: 11/06/2022] Open
Abstract
Many real-world networks characterized by power-law degree distributions are extremely vulnerable against malicious attacks. Therefore, it is important to obtain effective methods for strengthening the robustness of the existing networks. Previous studies have been discussed some link addition methods for improving the robustness. In particular, two effective strategies for selecting nodes to add links have been proposed: the minimum degree and longest distance strategies. However, it is unclear whether the effects of these strategies on the robustness are independent or not. In this paper, we investigate the contributions of these strategies to improving the robustness by adding links in distinguishing the effects of degrees and distances as much as possible. Through numerical simulation, we find that the robustness is effectively improved by adding links on the minimum degree strategy for both synthetic trees and real networks. As an exception, only when the number of added links is small, the longest distance strategy is the best. Conversely, the robustness is only slightly improved by adding links on the shortest distance strategy in many cases, even combined with the minimum degree strategy. Therefore, enhancing global loops is essential for improving the robustness rather than local loops.
Collapse
Affiliation(s)
- Masaki Chujyo
- Graduate School of Advanced Science and Technology, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan
- * E-mail:
| | - Yukio Hayashi
- Graduate School of Advanced Science and Technology, Japan Advanced Institute of Science and Technology, Nomi, Ishikawa, Japan
| |
Collapse
|
31
|
Şimşek A. Lexical sorting centrality to distinguish spreading abilities of nodes in complex networks under the Susceptible-Infectious-Recovered (SIR) model. JOURNAL OF KING SAUD UNIVERSITY. COMPUTER AND INFORMATION SCIENCES 2022; 34:4810-4820. [PMID: 38620758 PMCID: PMC8223111 DOI: 10.1016/j.jksuci.2021.06.010] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/31/2021] [Revised: 05/12/2021] [Accepted: 06/10/2021] [Indexed: 11/22/2022]
Abstract
Epidemic modeling in complex networks is a hot research topic in recent years. The spreading of a virus (such as SARS-CoV-2) in a community, spreading computer viruses in communication networks, or spreading gossip on a social network is the subject of epidemic modeling. The Susceptible-Infectious-Recovered (SIR) is one of the most popular epidemic models. One crucial issue in epidemic modeling is the determination of the spreading ability of the nodes. Thus, for example, super spreaders can be detected in the early stages. However, the SIR is a stochastic model, and it needs heavy Monte-Carlo simulations. Hence, the researchers focused on combining several centrality measures to distinguish the spreading capabilities of nodes. In this study, we proposed a new method called Lexical Sorting Centrality (LSC), which combines multiple centrality measures. The LSC uses a sorting mechanism similar to lexical sorting to combine various centrality measures for ranking nodes. We conducted experiments on six datasets using SIR to evaluate the performance of LSC and compared LSC with degree centrality (DC), eigenvector centrality (EC), closeness centrality (CC), betweenness centrality (BC), and Gravitational Centrality (GC). Experimental results show that LSC distinguishes the spreading ability of nodes more accurately, more decisively, and faster.
Collapse
Affiliation(s)
- Aybike Şimşek
- Düzce University, Department of Computer Engineering, Faculty of Engineering, Düzce 81620, Turkey
| |
Collapse
|
32
|
Zhong S, Zhang H, Deng Y. Identification of influential nodes in complex networks: A local degree dimension approach. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.172] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
33
|
Wang T, Jiao M, Wang X. Link Prediction in Complex Networks Using Recursive Feature Elimination and Stacking Ensemble Learning. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1124. [PMID: 36010793 PMCID: PMC9407261 DOI: 10.3390/e24081124] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/12/2022] [Revised: 08/11/2022] [Accepted: 08/12/2022] [Indexed: 06/15/2023]
Abstract
Link prediction is an important task in the field of network analysis and modeling, and predicts missing links in current networks and new links in future networks. In order to improve the performance of link prediction, we integrate global, local, and quasi-local topological information of networks. Here, a novel stacking ensemble framework is proposed for link prediction in this paper. Our approach employs random forest-based recursive feature elimination to select relevant structural features associated with networks and constructs a two-level stacking ensemble model involving various machine learning methods for link prediction. The lower level is composed of three base classifiers, i.e., logistic regression, gradient boosting decision tree, and XGBoost, and their outputs are then integrated with an XGBoost model in the upper level. Extensive experiments were conducted on six networks. Comparison results show that the proposed method can obtain better prediction results and applicability robustness.
Collapse
Affiliation(s)
- Tao Wang
- School of Mathematics and Physics, North China Electric Power University, Baoding 071003, China
- Hebei Key Laboratory of Physics and Energy Technology, North China Electric Power University, Baoding 071000, China
| | - Mengyu Jiao
- School of Mathematics and Physics, North China Electric Power University, Baoding 071003, China
| | - Xiaoxia Wang
- School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China
| |
Collapse
|
34
|
Peixoto TP. Ordered community detection in directed networks. Phys Rev E 2022; 106:024305. [PMID: 36109944 DOI: 10.1103/physreve.106.024305] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/13/2022] [Accepted: 08/02/2022] [Indexed: 06/15/2023]
Abstract
We develop a method to infer community structure in directed networks where the groups are ordered in a latent one-dimensional hierarchy that determines the preferred edge direction. Our nonparametric Bayesian approach is based on a modification of the stochastic block model (SBM), which can take advantage of rank alignment and coherence to produce parsimonious descriptions of networks that combine ordered hierarchies with arbitrary mixing patterns between groups. Since our model also includes directed degree correction, we can use it to distinguish nonlocal hierarchical structure from local in- and out-degree imbalance-thus, removing a source of conflation present in most ranking methods. We also demonstrate how we can reliably compare with the results obtained with the unordered SBM variant to determine whether a hierarchical ordering is statistically warranted in the first place. We illustrate the application of our method on a wide variety of empirical networks across several domains.
Collapse
Affiliation(s)
- Tiago P Peixoto
- Department of Network and Data Science, Central European University, 1100 Vienna, Austria
| |
Collapse
|
35
|
Vega-Oliveros DA, Zhao L, Rocha A, Berton L. Link Prediction Based on Stochastic Information Diffusion. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2022; 33:3522-3532. [PMID: 33539304 DOI: 10.1109/tnnls.2021.3053263] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
Link prediction (LP) in networks aims at determining future interactions among elements; it is a critical machine-learning tool in different domains, ranging from genomics to social networks to marketing, especially in e-commerce recommender systems. Although many LP techniques have been developed in the prior art, most of them consider only static structures of the underlying networks, rarely incorporating the network's information flow. Exploiting the impact of dynamic streams, such as information diffusion, is still an open research topic for LP. Information diffusion allows nodes to receive information beyond their social circles, which, in turn, can influence the creation of new links. In this work, we analyze the LP effects through two diffusion approaches, susceptible-infected-recovered and independent cascade. As a result, we propose the progressive-diffusion (PD) method for LP based on nodes' propagation dynamics. The proposed model leverages a stochastic discrete-time rumor model centered on each node's propagation dynamics. It presents low-memory and low-processing footprints and is amenable to parallel and distributed processing implementation. Finally, we also introduce an evaluation metric for LP methods considering both the information diffusion capacity and the LP accuracy. Experimental results on a series of benchmarks attest to the proposed method's effectiveness compared with the prior art in both criteria.
Collapse
|
36
|
Chowdhury A, Srinivasan S, Bhowmick S, Mukherjee A, Ghosh K. Constant community identification in million-scale networks. SOCIAL NETWORK ANALYSIS AND MINING 2022; 12:70. [PMID: 35789889 PMCID: PMC9243870 DOI: 10.1007/s13278-022-00895-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/20/2022] [Revised: 05/27/2022] [Accepted: 06/01/2022] [Indexed: 10/29/2022]
Abstract
The inherently stochastic nature of community detection in real-world complex networks poses an important challenge in assessing the accuracy of the results. In order to eliminate the algorithmic and implementation artifacts, it is necessary to identify the groups of vertices that are always clustered together, independent of the community detection algorithm used. Such groups of vertices are called constant communities. Current approaches for finding constant communities are very expensive and do not scale to large networks. In this paper, we use binary edge classification to find constant communities. The key idea is to classify edges based on whether they form a constant community or not. We present two methods for edge classification. The first is a GCN-based semi-supervised approach that we term Line-GCN. The second is an unsupervised approach based on image thresholding methods. Neither of these methods requires explicit detection of communities and can thus scale to very large networks of the order of millions of vertices. Both of our semi-supervised and unsupervised results on real-world graphs demonstrate that the constant communities obtained by our method have higher F1-scores and comparable or higher NMI scores than other state-of-the-art baseline methods for constant community detection. While the training step of Line-GCN can be expensive, the unsupervised algorithm is 10 times faster than the baseline methods. For larger networks, the baseline methods cannot complete, whereas all of our algorithms can find constant communities in a reasonable amount of time. Finally, we also demonstrate that our methods are robust under noisy conditions. We use three different, well-studied noise models to add noise to the networks and show that our results are mostly stable.
Collapse
Affiliation(s)
- Anjan Chowdhury
- Center for Soft Computing Research, Indian Statistical Institute, Kolkata, India
| | - Sriram Srinivasan
- Department of Radiation Oncology, Virginia Commonwealth University, Richmond, USA
| | - Sanjukta Bhowmick
- Department of Computer Science, University of North Texas, Denton, USA
| | - Animesh Mukherjee
- Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India
| | - Kuntal Ghosh
- Machine Intelligence Unit, Indian Statistical Institute, Kolkata, India
| |
Collapse
|
37
|
Li Z, Huang X. Identifying influential spreaders by gravity model considering multi-characteristics of nodes. Sci Rep 2022; 12:9879. [PMID: 35701528 PMCID: PMC9197977 DOI: 10.1038/s41598-022-14005-3] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/14/2022] [Accepted: 05/31/2022] [Indexed: 11/09/2022] Open
Abstract
How to identify influential spreaders in complex networks is a topic of general interest in the field of network science. Therefore, it wins an increasing attention and many influential spreaders identification methods have been proposed so far. A significant number of experiments indicate that depending on a single characteristic of nodes to reliably identify influential spreaders is inadequate. As a result, a series of methods integrating multi-characteristics of nodes have been proposed. In this paper, we propose a gravity model that effectively integrates multi-characteristics of nodes. The number of neighbors, the influence of neighbors, the location of nodes, and the path information between nodes are all taken into consideration in our model. Compared with well-known state-of-the-art methods, empirical analyses of the Susceptible-Infected-Recovered (SIR) spreading dynamics on ten real networks suggest that our model generally performs best. Furthermore, the empirical results suggest that even if our model only considers the second-order neighborhood of nodes, it still performs very competitively.
Collapse
Affiliation(s)
- Zhe Li
- Software College, Shenyang University of Technology of China, Shenyang, 110870, People's Republic of China.
| | - Xinyu Huang
- Software College, Northeastern University of China, Shenyang, 110819, People's Republic of China.
| |
Collapse
|
38
|
Kanwar K, Kaushal S, Kumar H, Gupta G, Khari M. $$\text {BC}_{\mathrm {DCN}}$$: a new edge centrality measure to identify and rank critical edges pertaining to SIR diffusion in complex networks. SOCIAL NETWORK ANALYSIS AND MINING 2022. [DOI: 10.1007/s13278-022-00876-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
39
|
Qiang R, Yang J. Influential Spreader Identification in Complex Networks Based on Network Connectivity and Efficiency. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING 2022. [DOI: https://doi.org/10.1155/2022/7896380] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
Abstract
Influential spreader identification is a vital research area in complex network theory, which has important influence on application and popularization. Each of the existing methods has its own advantages and disadvantages, and there are still various methods proposed to solve this issue. In this paper, we come up with a new centrality of influential spreader identification based on network connectivity and efficiency (CEC). The consequences of spreader deletion can be generally divided into two parts, one is that the connectivity of network topology is destroyed, and the other is that network’s performance is degraded, which makes the network unable to meet the functional requirement. Therefore, the relative changes of connectivity and efficiency of network before and after removing spreaders are used to present the influence of spreaders. We adopt susceptible-infected (SI) model, a well-known infectious disease model, to verify the effectiveness of CEC through the spreading ability simulation of spreaders in actual networks. And the simulation results demonstrate the superiority of CEC.
Collapse
Affiliation(s)
- Rong Qiang
- School of Computer and Information Science, Southwest University, Chongqing 400715, China
| | - Jianshe Yang
- Basic Medical School, Gansu Medical College, Pingliang 744000, China
| |
Collapse
|
40
|
Wei X, Zhao J, Liu S, Wang Y. Identifying influential spreaders in complex networks for disease spread and control. Sci Rep 2022; 12:5550. [PMID: 35365715 PMCID: PMC8973685 DOI: 10.1038/s41598-022-09341-3] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/03/2021] [Accepted: 02/23/2022] [Indexed: 11/09/2022] Open
Abstract
Identifying influential spreaders is an important task in controlling the spread of information and epidemic diseases in complex networks. Many recent studies have indicated that the identification of influential spreaders is dependent on the spreading dynamics. Finding a general optimal order of node importance ranking is difficult because of the complexity of network structures and the physical background of dynamics. In this paper, we use four metrics, namely, betweenness, degree, H-index, and coreness, to measure the central attributes of nodes for constructing the disease spreading models and target immunization strategies. Numerical simulations show that spreading processes based on betweenness centrality lead to the widest range of propagation and the smallest epidemic threshold for all six networks (including four real networks and two BA scale-free networks generated according to Barabasi–Albert algorithm). The target immunization strategy based on the betweenness centrality of nodes is the most effective for BA scale-free networks but displays poor immune effect for real networks in identifying the most important spreaders for disease control. The immunization strategy based on node degrees is the most effective for the four real networks. Findings show that the target immune strategy based on the betweenness centrality of nodes works best for standard scale-free networks, whereas that based on node degrees works best for other nonstandard scale-free networks. The results can provide insights into understanding the different metrics of measuring node importance in disease transmission and control.
Collapse
Affiliation(s)
- Xiang Wei
- Department of Engineering, Honghe University, Honghe, 661100, People's Republic of China.
| | - Junchan Zhao
- School of Science, Hunan University of Technology and Business, Changsha, 410205, People's Republic of China
| | - Shuai Liu
- Department of Engineering, Honghe University, Honghe, 661100, People's Republic of China
| | - Yisi Wang
- School of Big Data Science and Application, Chongqing Wenli University, Chongqing, 402160, People's Republic of China
| |
Collapse
|
41
|
Liu Y, Li W, Yang C, Wang J. Multi-source detection based on neighborhood entropy in social networks. Sci Rep 2022; 12:5467. [PMID: 35361801 PMCID: PMC8971423 DOI: 10.1038/s41598-022-09229-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/15/2021] [Accepted: 03/16/2022] [Indexed: 11/17/2022] Open
Abstract
The rapid development of social networking platforms has accelerated the spread of false information. Effective source location methods are essential to control the spread of false information. Most existing methods fail to make full use of the infection of neighborhood information in nodes, resulting in a poor source localization effect. In addition, most existing methods ignore the existence of multiple source nodes in the infected cluster and hard to identify the source nodes comprehensively. To solve these problems, we propose a new method about the multiple sources location with the neighborhood entropy. The method first defines the two kinds of entropy, i.e. infection adjacency entropy and infection intensity entropy, depending on whether neighbor nodes are infected or not. Then, the possibility of a node is evaluated by the neighborhood entropy. To locate the source nodes comprehensively, we propose a source location algorithm with the infected clusters. Other unrecognized source nodes in the infection cluster are identified by the cohesion of nodes, which can deal with the situation in the multiple source nodes in an infected cluster. We conduct experiments on various network topologies. Experimental results show that the two proposed algorithms outperform the existing methods.
Collapse
Affiliation(s)
- YanXia Liu
- School of Computer Engineering and Science, Shanghai University, Shanghai, 200444, China
| | - WeiMin Li
- School of Computer Engineering and Science, Shanghai University, Shanghai, 200444, China
| | - Chao Yang
- Shanghai Lixin University of Accounting and Finance, Shanghai, 201209, China.
| | - JianJia Wang
- School of Computer Engineering and Science, Shanghai University, Shanghai, 200444, China
| |
Collapse
|
42
|
Comparison of observer based methods for source localisation in complex networks. Sci Rep 2022; 12:5079. [PMID: 35332184 PMCID: PMC8948209 DOI: 10.1038/s41598-022-09031-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/27/2021] [Accepted: 03/09/2022] [Indexed: 11/09/2022] Open
Abstract
In recent years, research on methods for locating a source of spreading phenomena in complex networks has seen numerous advances. Such methods can be applied not only to searching for the "patient zero" in epidemics, but also finding the true sources of false or malicious messages circulating in the online social networks. Many methods for solving this problem have been established and tested in various circumstances. Yet, we still lack reviews that would include a direct comparison of efficiency of these methods. In this paper, we provide a thorough comparison of several observer-based methods for source localisation on complex networks. All methods use information about the exact time of spread arrival at a pre-selected group of vertices called observers. We investigate how the precision of the studied methods depends on the network topology, density of observers, infection rate, and observers' placement strategy. The direct comparison between methods allows for an informed choice of the methods for applications or further research. We find that the Pearson correlation based method and the method based on the analysis of multiple paths are the most effective in networks with synthetic or real topologies. The former method dominates when the infection rate is low; otherwise, the latter method takes over.
Collapse
|
43
|
Chen WT, Zeng A, Cui XH. Preserving the topological properties of complex networks in network sampling. CHAOS (WOODBURY, N.Y.) 2022; 32:033122. [PMID: 35364830 DOI: 10.1063/5.0076854] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/28/2021] [Accepted: 03/04/2022] [Indexed: 06/14/2023]
Abstract
Extremely large-scale networks have received increasing attention in recent years. The development of big data and network science provides an unprecedented opportunity for research on these networks. However, it is difficult to perform analysis directly on numerous real networks due to their large size. A solution is to sample a subnetwork instead for detailed research. Unfortunately, the properties of the subnetworks could be substantially different from those of the original networks. In this context, a comprehensive understanding of the sampling methods would be crucial for network-based big data analysis. In our work, we find that the sampling deviation is the collective effect of both the network heterogeneity and the biases caused by the sampling methods themselves. Here, we study the widely used random node sampling (RNS), breadth-first search, and a hybrid method that falls between these two. We empirically and analytically investigate the differences in topological properties between the sampled network and the original network under these sampling methods. Empirically, the hybrid method has the advantage of preserving structural properties in most cases, which suggests that this method performs better with no additional information needed. However, not all the biases caused by sampling methods follow the same pattern. For instance, properties, such as link density, are better preserved by RNS. Finally, models are constructed to explain the biases concerning the size of giant connected components and link density analytically.
Collapse
Affiliation(s)
- Wen-Tao Chen
- School of Systems Science, Beijing Normal University, Beijing 100875, China
| | - An Zeng
- School of Systems Science, Beijing Normal University, Beijing 100875, China
| | - Xiao-Hua Cui
- School of Systems Science, Beijing Normal University, Beijing 100875, China
| |
Collapse
|
44
|
Mauw S, Ramírez-Cruz Y, Trujillo-Rasua R. Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. Knowl Inf Syst 2022. [DOI: 10.1007/s10115-022-01662-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Abstract
AbstractActive re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. Several formal privacy properties have been enunciated with the purpose of characterising the resistance of a graph against active attacks. However, anonymisation methods devised on the basis of these properties have so far been able to address only restricted special cases, where the adversaries are assumed to leverage a very small number of sybil nodes. In this paper, we present a new probabilistic interpretation of active re-identification attacks on social graphs. Unlike the aforementioned privacy properties, which model the protection from active adversaries as the task of making victim nodes indistinguishable in terms of their fingerprints with respect to all potential attackers, our new formulation introduces a more complete view, where the attack is countered by jointly preventing the attacker from retrieving the set of sybil nodes, and from using these sybil nodes for re-identifying the victims. Under the new formulation, we show that k-symmetry, a privacy property introduced in the context of passive attacks, provides a sufficient condition for the protection against active re-identification attacks leveraging an arbitrary number of sybil nodes. Moreover, we show that the algorithm K-Match, originally devised for efficiently enforcing the related notion of k-automorphism, also guarantees k-symmetry. Empirical results on real-life and synthetic graphs demonstrate that our formulation allows, for the first time, to publish anonymised social graphs (with formal privacy guarantees) that effectively resist the strongest active re-identification attack reported in the literature, even when it leverages a large number of sybil nodes.
Collapse
|
45
|
Cheng J, Yang K, Yang Z, Zhang H, Zhang W, Chen X. Influence maximization based on community structure and second-hop neighborhoods. APPL INTELL 2022. [DOI: 10.1007/s10489-021-02880-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
|
46
|
Wang X, Jian S, Lu K, Zhang Y, Liu K. RED: Learning the role embedding in networks via Discrete-time quantum walk. APPL INTELL 2022. [DOI: 10.1007/s10489-021-02342-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
47
|
Ou Y, Guo Q, Liu J. Identifying spreading influence nodes for social networks. FRONTIERS OF ENGINEERING MANAGEMENT 2022; 9:520-549. [PMCID: PMC9430009 DOI: 10.1007/s42524-022-0190-8] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/25/2021] [Accepted: 02/14/2022] [Indexed: 03/18/2025]
Abstract
The identification of spreading influence nodes in social networks, which studies how to detect important individuals in human society, has attracted increasing attention from physical and computer science, social science and economics communities. The identification algorithms of spreading influence nodes can be used to evaluate the spreading influence, describe the node’s position, and identify interaction centralities. This review summarizes the recent progress about the identification algorithms of spreading influence nodes from the viewpoint of social networks, emphasizing the contributions from physical perspectives and approaches, including the microstructure-based algorithms, community structure-based algorithms, macrostructure-based algorithms, and machine learning-based algorithms. We introduce diffusion models and performance evaluation metrics, and outline future challenges of the identification of spreading influence nodes.
Collapse
Affiliation(s)
- Yang Ou
- Research Center of Complex Systems Science, University of Shanghai for Science and Technology, Shanghai, 200093 China
| | - Qiang Guo
- Research Center of Complex Systems Science, University of Shanghai for Science and Technology, Shanghai, 200093 China
| | - Jianguo Liu
- Institute of Accounting and Finance, Shanghai University of Finance and Economics, Shanghai, 200433 China
| |
Collapse
|
48
|
Evolution of trust in the sharing economy with fixed provider and consumer roles under different host network structures. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2021.107496] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
49
|
Maletić S, Andjelković M, Rajković M. Potential grouping of nodes induced by higher-order structures in complex networks. CHAOS (WOODBURY, N.Y.) 2021; 31:123115. [PMID: 34972312 DOI: 10.1063/5.0069444] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/31/2021] [Accepted: 11/18/2021] [Indexed: 06/14/2023]
Abstract
Complex networks display an organization of elements into nontrivial structures at versatile inherent scales, imposing challenges on a more complete understanding of their behavior. The interest of the research presented here is in the characterization of potential mesoscale structures as building blocks of generalized communities in complex networks, with an integrated property that goes beyond the pairwise collections of nodes. For this purpose, a simplicial complex is obtained from a mathematical graph, and indirectly from time series, producing the so-called clique complex from the complex network. As the higher-order organizational structures are naturally embedded in the hierarchical strata of a simplicial complex, the relationships between aggregation of nodes are stored in the higher-order combinatorial Laplacian. Based on the postulate that aggregation of nodes represents integrated configuration of information, the observability parameter is defined for the characterization of potential configurations, computed from the entries of the combinatorial Laplacian matrix. The framework introduced here is used to characterize nontrivial inherent organizational patterns embedded in two real-world complex networks and three complex networks obtained from heart rate time series recordings of three different subject's meditative states.
Collapse
Affiliation(s)
- Slobodan Maletić
- "VINČA" Institute of Nuclear Sciences, National Institute of the Republic of Serbia, University of Belgrade, Mike Alasa 12-14, 11351 Vinča, Belgrade, Serbia
| | - Miroslav Andjelković
- "VINČA" Institute of Nuclear Sciences, National Institute of the Republic of Serbia, University of Belgrade, Mike Alasa 12-14, 11351 Vinča, Belgrade, Serbia
| | - Milan Rajković
- "VINČA" Institute of Nuclear Sciences, National Institute of the Republic of Serbia, University of Belgrade, Mike Alasa 12-14, 11351 Vinča, Belgrade, Serbia
| |
Collapse
|
50
|
Role-Aware Information Spread in Online Social Networks. ENTROPY 2021; 23:e23111542. [PMID: 34828240 PMCID: PMC8618065 DOI: 10.3390/e23111542] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/02/2021] [Revised: 11/10/2021] [Accepted: 11/15/2021] [Indexed: 12/29/2022]
Abstract
Understanding the complex process of information spread in online social networks (OSNs) enables the efficient maximization/minimization of the spread of useful/harmful information. Users assume various roles based on their behaviors while engaging with information in these OSNs. Recent reviews on information spread in OSNs have focused on algorithms and challenges for modeling the local node-to-node cascading paths of viral information. However, they neglected to analyze non-viral information with low reach size that can also spread globally beyond OSN edges (links) via non-neighbors through, for example, pushed information via content recommendation algorithms. Previous reviews have also not fully considered user roles in the spread of information. To address these gaps, we: (i) provide a comprehensive survey of the latest studies on role-aware information spread in OSNs, also addressing the different temporal spreading patterns of viral and non-viral information; (ii) survey modeling approaches that consider structural, non-structural, and hybrid features, and provide a taxonomy of these approaches; (iii) review software platforms for the analysis and visualization of role-aware information spread in OSNs; and (iv) describe how information spread models enable useful applications in OSNs such as detecting influential users. We conclude by highlighting future research directions for studying information spread in OSNs, accounting for dynamic user roles.
Collapse
|