Skip to Content
You are currently on the new version of our website. Access the old version .
EntropyEntropy
  • Article
  • Open Access

15 April 2020

Identifying Influencers in Social Networks

,
,
and
Software College, Northeastern University, Shenyang 110169, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Social Networks and Information Diffusion II

Abstract

Social network analysis is a multidisciplinary research covering informatics, mathematics, sociology, management, psychology, etc. In the last decade, the development of online social media has provided individuals with a fascinating platform of sharing knowledge and interests. The emergence of various social networks has greatly enriched our daily life, and simultaneously, it brings a challenging task to identify influencers among multiple social networks. The key problem lies in the various interactions among individuals and huge data scale. Aiming at solving the problem, this paper employs a general multilayer network model to represent the multiple social networks, and then proposes the node influence indicator merely based on the local neighboring information. Extensive experiments on 21 real-world datasets are conducted to verify the performance of the proposed method, which shows superiority to the competitors. It is of remarkable significance in revealing the evolutions in social networks and we hope this work will shed light for more and more forthcoming researchers to further explore the uncharted part of this promising field.

1. Introduction

The research of network science is experiencing a blossom in the last decade, which provides profound implications in very different fields, from finance to social and biological networks [1]. Considering the enormous data scale, most studies merely focus on a small group of influential nodes rather than the whole network. Take social networks for instance, influential nodes are those that have the most spreading ability, or playing a predominant role in the network evolution. Notably, a popular star in online social media may remarkably accelerate the spreading of rumors, and a few super spreaders [2] could largely expand the epidemic prevalence of a disease (e.g., COVID-19) [3]. The research of influencer identification is beneficial to understanding and controlling the spreading dynamics in social networks with diverse applications such as epidemiology, collective dynamics and viral marketing [4,5].
Nowadays, individuals interact with each other in more complicated patterns than ever. It is a challenging task to identify influencers in social networks for the various kinds of interactions. As we have known, the graph model is widely utilized to represent social networks, however, it is incapable of dealing with the multiple social links. For example, people use Facebook or WeChat to keep communication with family members or friends, use Twitter to post news, use LinkedIn to search for jobs, and use TikTok to create and share short videos [6]. It is easy to represent each social scenario via a graph model separately, in spite of they are belonging to the same group of individuals. The neglect of the multiple relationships between social actors may lead to an incorrect result of the most versatile users [7]. With the proposal of multilayer networks [8,9], we are able to encode the various interactions, which is of great importance and necessity of identifying influencers in multiple social networks.
In this paper, we design a novel node centrality measure for monolayer network, and then apply it to multilayer networks to identify influencers in multiple social networks. This method is solely based on the local knowledge of a network’s topology in order to be fast and scalable due to the huge size of networks, and thus suitable for both real-time applications and offline mining.
The rest of this paper is organized as follows. Section 2 introduces the related works on influencers identification in monolayer network and multilayer networks. Section 3 presents the mathematical model and the method for detecting influencers. Section 4 exhibits the experiments and analysis, including comparison experiments on twenty-one real-world datasets, which verifies the feasibility and veracity of the proposed method. Section 5 summarizes the whole paper and provides concluding remarks.

3. Modeling and Methods

3.1. Network Modeling

The problem of finding influential nodes is described as extracting a small set of nodes that can bring the greatest influence on the network dynamics. With a given network model G = ( V , E ) , where V = { v 1 , v 2 , , v n } is the node set and E = { ( v i , v j ) } , ( v i , v j V ) is the edge set. The identification of influential nodes is to pick a minimum of nodes as the initial seeds, which can achieve the maximum influenced scope, described as
A = arg min A V max { σ ( A ) } ,
where A is the initially infected nodes, σ ( A ) denotes the final influenced node set. This problem is simplified as top-k influencers identification by additional setting | A | = k , which has recently attracted great research interests [40,41,42]. A variety of real-world social networks are, in fact, interconnected by different types of interactions between nodes, forming what is known as multilayer networks. In this paper, we employ a multilayer network model [9], which can represent nodes sharing links in different layers. The multilayer network model is defined as
M = ( G , C ) ,
where G = { G α ; α { 1 , , L } } is a family of (directed or undirected, weighted or unweighted) graphs G α = ( V α , E α ) , which represents layers of M and C depicts the interactions between nodes of any two different layer, given by
C = { E α β V α × V β ; α , β 1 , , L , α β } ,
The corresponding supra-adjacency matrix can be represented as
M = A 1 I 12 I 1 L I 21 A 2 I 2 L I L 1 I L 2 A L R N × N ,
where A 1 , A 2 , , A L are the adjacency matrix of layer 1 , 2 , , L , respectively. N is the total number of the nodes, which can be calculated by N = 1 l L | V l | . The non-diagonal block I α β represents the inter-layer edges of layer α and layer β . Thus, the interlayer edges can be represented as
I = α , β = 1 , α β L I α β .
Take the 9/11 terrorists network [43] for instance, the edges are classified into three categories (i.e., layers) according to the observed interactions which are plotted in Figure 1.
Figure 1. Network of 9/11 terrorists. (a) The monolayer network representation, the size of a node represents its degree; (b) The 9/11 terrorists’ interactions represented by a multilayer network model, where L 1 presents confirmed close contact, L 2 layer shows various recorded interactions, L 3 contains potential or planed or unconfirmed interactions; (c) The super-adjacency matrix representation.

3.2. Methods

We employ the susceptible–infected–recovered (SIR) spreading model [44] as the influence analysis model. It has three possible states:
  • Susceptible (S) state, where a node is vulnerable to infection.
  • Infectious (I) state, where a node tries to infect its susceptible neighbors.
  • Recovered (R) state, where a node has recovered (or isolated) and can no longer infect others.
In a network, if two nodes are connected then they are considered to have “contact”. If one node is “infected”, and the other is susceptible, then with a certain probability the latter may become infected through contact [45]. A node is considered to be recovered if it is isolated or immune to the disease. In detail, to check the spreading influence of one given node, we set this node as an infected node and the other nodes are susceptible nodes. At each time step, each infected node can infect its susceptible neighbors with infection probability β , and then it recovered from the diseases with probability γ , the differential equations are shown in Figure 2. For simplicity, we set γ = 1 . The process of the SIR model is plotted in Figure 3 and Figure 4 with the famous Krackhardt’s Kite network [46].
Figure 2. The illustration of parameters in the susceptible–infected–recovered (SIR) model and corresponding differential equations.
Figure 3. The process of SIR model on Krackhardt’s Kite network. In panel (a), all the nodes are in Susceptible state; while we select one node to be infected, and the neighbors will be infected soon, as shown in panel (b); Finally, the network will reach a stable state, i.e., the number of recovered nodes will reach a maximum, as shown in panel (c).
Figure 4. The varying susceptible, infectious and recovered nodes with the increasing of iterations.
In this paper, we define the node influence (INF, for short) as the energy derived from the neighbors, given as
I N F R ( i ) = d i j r j Γ ( i ) d i j 2 w i j k j ,
where R is the truncation radius, Γ ( i ) is the set of neighbors of node i, d i j is the shortest path length between node i and node j, k j is the degree of node j, w i j is the weight of edge e i j . For unweighted networks, w i j = 1 . Analogously, we apply the proposed INF measure to multilayer networks (represented as I N F R M ) by the following modifications
I N F R M ( i ) = d i j R α < L j Γ α ( i ) d i j 2 w i j k j α ,
where R is the truncation radius, Γ α ( i ) is the set of neighbors of node i at layer α , k j α is the degree of node j at layer α , d i j is the shortest path length between node i and node j. For simplicity, we choose R = 1 , thus d i j = 1 if node i and node j is connected through an intralayer edge or interlayer edge, and 0 otherwise.
To explain the effect, we take the above-mentioned Krackhardt’s Kite network (as plotted in Figure 5) and the 9/11 terrorists network (as plotted in Figure 1) for examples. The nodes centralities in Krackhardt’s Kite network are shown in Table 2.
Figure 5. The network structure of Krackhardt’s Kite network.
Table 2. Classic node centralities comparison of kite network. The maximum centralities are marked in bold.
As shown in Table 2, Node 4 is considered to be the most important node under the Degree, Katz and the proposed INF measure, while Node 8 has greater Betweenness, Node 6 and node 7 has greater Closeness or (Eigenvector). Thus, the node list (i.e., [4, 6, 7, 8]) is considered to be the influencers. Furthermore, to evaluate the nodes’ influence, we set each node as the initially infected and recorded the final recovered nodes, respectively. This process is repeated for 10,000 times and the results are shown in Table 3.
Table 3. Averaging recovered nodes and iterations times of each node as initially infected spreaders under 10,000 times SIR stimulations with parameters setting β = 0.35 , γ  = 1.
As shown in Table 3, Node 4 (i.e., Diane), which is considered to be more influential under Degree, Katz, and INF centrality, shows more recovered nodes (i.e., 5.3182) after 10,000 times SIR stimulations. This experiment is available at https://neusncp.com/api/sir. Analogously, we conduct experiments on the three-layer 9/11 terrorists network. Particularly, we set the infected probability between intralayer edges as β and the probability between interlayer edges as β M = w i j β . The experimental results are plotted in Figure 6.
Figure 6. The comparison of recovered nodes in 9/11 terrorists network by initially setting every node infected separately. The recovered nodes and the corresponding INF values are normalized, which are marked in cyan and red, respectively. The comparison of the nodes in three layers are plotted in facet L 1 , L 2 and L 3 .
By conducting SIR simulations on the three-layer 9/11 terrorists network, we can obtain the influential nodes of each layer by calculating the number of finally recovered nodes. Afterward, we sort the nodes by the averaging recovered nodes, and compare the order with the results computed from the proposed INF indicator. It is shown in Figure 6 that the compared values (i.e., recovered nodes and INF) are in the same tendency, which verifies the feasibility of the proposed INF measure. Notably, several influential nodes, such as “Essid Sami Ben Khemais”, “Mohamed Atta”, and “Marwan Al-Shehhi” are also in the central position of the network, as shown in Figure 1a.
The experimental results on the two sample networks show the feasibility of the proposed measure on monolayer and multilayer networks, respectively. Experiments on more real-world networks will be given in Section 4.

3.3. Complexity Analysis

Suppose m and n are the numbers of edges and nodes, respectively, L is the number of layers, the average degree of nodes is d, R is the truncation radius (commonly setting as R = 1 ). The complexity of INF for monolayer network is O ( n + d R ) . As for multilayer networks, the computational complexity is O ( n + L d R ) , where L is also a small positive integer. Thus, the time complexity is acceptable as O ( n + L d ) . Overall, the proposed measure considers more neighboring information than the degree centrality and has a lower computational complexity than betweenness centrality and closeness centrality (i.e., O ( n m + n 2 log n ) ).

4. Experiments and Discussion

The experimental environment was with Intel(R) Core (TM) i5-7200U CPU @ 2.50 GHz (4 CPUs), 2.7 GHz, the memory was 8 GB DDR3. The operating system was Windows 10 64 bit, the programming language was Python 3.7.1, and the relevant libs were NetworkX 2.2 and Multinetx. The goal of the experiments was to compare the performance of the proposed INF measure with competitive indicators.

4.1. Experimental Datasets

In this paper, 21 real-world datasets were employed to verify the performance of the proposed method, which were classified into two groups. The first group covered 12 monolayer networks, which comprised four social networks (i.e., Club, Dolphins, 911 and Lesmis), three biological networks (i.e., Escherichia, C.elegans and DMLC), collaboration networks (i.e., Jazz and NS), a communication network (i.e., Eron), a power network (i.e., Power) and a transport network (i.e., USAir), as shown in Table 4.
Table 4. Statistics of 12 real-world monolayer networks.
The second group covered nine multilayer networks, which comprised six social networks (i.e., Padgett, Krackhardt, Vickers, Kapferer, Lazega and CS-Aarhus), two transport networks (i.e., LondonTransport and EUAirTransportation) and a biological network (i.e., humanHIV), as shown in Table 5. Data availability: http://www.neusncp.com/user/file?id=12&code=data.
Table 5. Statistics of nine real-world multilayer networks.

4.2. Performance Comparison

To verify the performance of the proposed node influence in networks, this paper carries out a comparison experiment on the above-mentioned datasets: The nodes were removed by a certain indicator in descending order, and the number of subgraphs was recorded. This process repeated until there were not any nodes left. The varying tendency of the subgraphs’ number exhibited the influence of a focal centrality. The experimental results are shown in Figure 7.
Figure 7. The varying subgraphs of 12 monolayer networks with the removal of the most influential nodes repeatedly with each centrality indicator.
As shown in Figure 7, with the nodes removing, the number of subgraphs was increasing and reached a maximum when the network was totally broken up, i.e., there were no edges at this moment. Afterward, the number of subgraphs (i.e., the number of nodes) was decreasing and finally reached zero when all the nodes were removed. The maximum numbers of subgraphs were obtained by the proposed INF measure on all the datasets except C.Elegans. However, the result of C.Elegans obtained by INF was very close to the best situation of BC, which suggests the feasibility of the proposed INF measure.
We applied the SIR model to compare the rankings of influences calculated by each indicator among the above-mentioned networks. Initially, one node was set as “infected” state to infect its neighbors with probability β . Afterward, the infected nodes were recovered and never be infected again with probability γ . This spreading process repeated until there were no more infected nodes in the network. The influence of any node i can be estimated by
P ( i ) = N R N ,
where N R is the number of recovered nodes after the spreading process, and N is the total number of nodes in the network. For simplicity, we set γ = 1 and the epidemic threshold was
β c k k 2 k
After having obtained the standard nodes’ influence sequence via SIR model simulations, we employed the Kendall’s Tau coefficient [65] to compare the performance of each indicator. The Kendall’s Tau coefficient is an index measuring the correlation strength between two sequences. Suppose given the standard sequence X = ( x 1 , x 2 , , x N ) , and we obtained the computational sequence Y = ( y 1 , y 2 , , y N ) by a certain indicator. Any pair of two-tuples ( x i , y i ) and ( x j , y j ) ( x j ) are concordant if both x i > x j and y i > y j or x i < x j and y i < y j . Meanwhile, they are considered as discordant, if x i > x j and y i < y j or x i < x j and y i > y j . If x i = x j or y i = y j , pairs are neither concordant nor discordant. Therefore, Kendall’s Tau coefficient is defined as
τ = N c N d 0.5 n ( n 1 ) ,
where N c and N d indicate the number of concordant and discordant pairs, respectively. The range of τ is [ 1 , 1 ] . Table 6 shows the computational Tau results with the comparison of standard sequence from SIR model simulations.
Table 6. The indicators’ accuracies measured by the Kendall’s Tau ( τ ).
As shown in Table 6, the proposed measure outperformed the competitors in most cases, even in the Escherichia network, the computed Tau result of INF (0.0692) was close to that of CC (0.0971). Thus, it was also competitive in this network.
If setting the limitation of identifying k influencers, we conducted experiments on the real-world datasets with top-k nodes by computational centrality nodes and compared the recovered nodes (i.e., the final number of nodes with recovered states). To compare the varying parameter k with the obtained τ , we conducted experiments on the above-mentioned datasets and set the ratio of β / β c , as shown in Figure 8.
Figure 8. The algorithms’ performance comparison for varying k (ranging from 0 to 20 percent of total nodes), measured by the recovered nodes. The betweenness centrality and the proposed INF measure are very competitive than the others.
As shown in Figure 8, the proposed node influence method is quite competitive in most of the datasets, although second to the performance of betweenness indicator in DMLC and Jazz datasets.
Analogously, we conducted experiments on the nine multilayer networks by removing nodes with maximum centralities; the results are plotted in Figure 9.
Figure 9. The computational time comparison of different indicators. The accumulation of running time on the 12 real-world datasets has exhibited that the proposed INF measure is much more efficient than the competitors.
To compare the time complexity of the proposed INF measure with classic methods, the runtime of 21 networks are recorded and shown in Figure 10.
Figure 10. The runtime comparison of each indicator.
As shown in Figure 10, the runtime accumulated from either group indicated that the proposed INF measure was efficient, which was close to that of DC and superior to BC, CC and LGR.

4.3. Discussion

Influencers identification is a fundamental issue with wide applications in different fields of reality, such as epidemic control, information diffusion, viral marketing, etc. Currently, degree centrality [19] is the simplest method, which considers nodes with larger degrees are more influential. However, for the lack of global information, a node lying in a “bridge” position might be neglected for holding a small degree. The betweenness [22] and closeness [23] centrality consider global information, but they are holding a high complexity, which are not suitable for applications in large-scale networks. Local gravity is a balanced method, however, the determination of parameter R requires computing network diameter, which is also time-consuming. Thus, a novel node influence measure is proposed in this paper, which merely considers the local neighboring information of a focal node with the complexity of O ( n + L d ) . Experimental results on 21 real-world datasets indicate the feasibility of the proposed measure.
Firstly, the experiments of counting subgraphs with removing influential nodes show that the capability of the proposed INF measure. By removing the nodes according to the INF indicator, the networks are more easily broken up, as shown in Figure 7 and Figure 9. Secondly, we apply the SIR model to evaluate the node influence, which suggested the proposed INF measure is competitive to other indicators in most cases. Although inferior to BC on Jazz and DMLC networks, it is also competitive. By analyzing the structures of these two networks, we find that the nodes of Jazz network are densely connected (i.e., the average degree of 27.6970) and most of the nodes are holding the same number of neighbors (approximately 28 neighbors), which brings difficulties to identify which node is more influential. On the contrary, there is only one node (i.e., Node 2) holding a large number of neighbors (i.e., 439 neighbors) and the others only holding few neighbors (approximately four neighbors) in DMLC network, which is also difficult to identify influencers. Overall, the proposed method outperforms the other indicators in most cases. Finally, we compare the running time of each indicator on the 21 real-world datasets. Experimental results show the efficiency of the proposed measure.

5. Conclusions

Aiming at solving the problem of identifying influencers in social networks, this paper proposes a novel node influence indicator. This method merely considers the local neighboring information in order to be fast and suitable for applications in large-scale networks. Extensive experiments on 21 real-world datasets are conducted, and the experimental results show that the proposed method outperforms competitors. Afterwards, the time complexity is compared, and we verify the efficiency of the proposed indicator. Overall, the proposed node influence indicator is capable of identifying influencers in social networks. The contribution of this work is likely to benefit many real-world social applications, such as promoting network evolutions, preventing the spreading of rumors, etc.
As part of future works, the influencers in dynamic networks can be further studied by applying the proposed INF measure into a multilayer network model with numerous ordinal layers. The node’s influence can be calculated by accumulating the local neighbors across all the layers. Besides, the effect of layers needs to be taken into consideration. In a word, we hope the findings in this work will help to improve the researches in this promising field.

Author Contributions

X.H. designed the method and wrote the original draft; D.C. revised the manuscript; T.R. and D.W. checked the manuscript and made some modifications. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by Liaoning Natural Science Foundation under Grant No. 20170540320, the Doctoral Scientific Research Foundation of Liaoning Province under Grant No. 20170520358, the National Natural Science Foundation of China under Grant No. 61473073, and the Fundamental Research Funds for the Central Universities under Grant Nos. N161702001, N2017010 and N172410005-2.

Acknowledgments

We would like to thank the anonymous reviewers for their careful reading and useful comments that helped us to improve the final version of this paper.

Conflicts of Interest

The authors declare that there are no conflict of interest regarding the publication of this paper.

References

  1. Aldecoa, R.; Marín, I. Surprise maximization reveals the community structure of complex networks. Sci. Rep. 2013, 3, 1–9. [Google Scholar] [CrossRef]
  2. Pei, S.; Muchnik, L.; Andrade, J.S., Jr.; Zheng, Z.; Makse, H.A. Searching for superspreaders of information in real-world social media. Sci. Rep. 2014, 4, 5547. [Google Scholar] [CrossRef] [PubMed]
  3. Xu, Z.; Rui, X.; He, J.; Wang, Z.; Hadzibeganovic, T. Superspreaders and superblockers based community evolution tracking in dynamic social networks. Knowl.-Based Syst. 2019, 105377. [Google Scholar] [CrossRef]
  4. Malliaros, F.D.; Rossi, M.E.G.; Vazirgiannis, M. Locating influential nodes in complex networks. Sci. Rep. 2016, 6, 19307. [Google Scholar] [CrossRef] [PubMed]
  5. Salavati, C.; Abdollahpouri, A.; Manbari, Z. BridgeRank: A novel fast centrality measure based on local structure of the network. Phys. A Stat. Mech. Appl. 2018, 496, 635–653. [Google Scholar] [CrossRef]
  6. Huang, X.; Chen, D.; Ren, T. Social network coalescence based on multilayer network model. J. Nonlinear Convex Anal. 2019, 20, 1465–1474. [Google Scholar]
  7. Wang, D.; Wang, H.; Zou, X. Identifying key nodes in multilayer networks based on tensor decomposition. Chaos Interdiscip. J. Nonlinear Sci. 2017, 27, 063108. [Google Scholar] [CrossRef]
  8. Kivelä, M.; Arenas, A.; Barthelemy, M.; Gleeson, J.P.; Moreno, Y.; Porter, M.A. Multilayer networks. J. Complex Netw. 2014, 2, 203–271. [Google Scholar] [CrossRef]
  9. Boccaletti, S.; Bianconi, G.; Criado, R.; Del Genio, C.I.; Gómez-Gardenes, J.; Romance, M.; Sendina-Nadal, I.; Wang, Z.; Zanin, M. The structure and dynamics of multilayer networks. Phys. Rep. 2014, 544, 1–122. [Google Scholar] [CrossRef]
  10. Rodrigues, F.A. Network centrality: an introduction. In A Mathematical Modeling Approach from Nonlinear Dynamics to Complex Systems; Springer: Berlin, Germany, 2019; pp. 177–196. [Google Scholar]
  11. Peng, S.; Zhou, Y.; Cao, L.; Yu, S.; Niu, J.; Jia, W. Influence analysis in social networks: A survey. J. Netw. Comput. Appl. 2018, 106, 17–32. [Google Scholar] [CrossRef]
  12. Grover, A.; Leskovec, J. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 855–864. [Google Scholar]
  13. Jeong, H.; Mason, S.P.; Barabási, A.L.; Oltvai, Z.N. Lethality and centrality in protein networks. Nature 2001, 411, 41. [Google Scholar] [CrossRef] [PubMed]
  14. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888. [Google Scholar] [CrossRef]
  15. Albert, R.; Albert, I.; Nakarado, G.L. Structural vulnerability of the North American power grid. Phys. Rev. E 2004, 69, 025103. [Google Scholar] [CrossRef] [PubMed]
  16. Liu, Y.Y.; Slotine, J.J.; Barabási, A.L. Controllability of complex networks. Nature 2011, 473, 167. [Google Scholar] [CrossRef]
  17. Yan, G.; Zhou, T.; Hu, B.; Fu, Z.Q.; Wang, B.H. Efficient routing on complex networks. Phys. Rev. E 2006, 73, 046108. [Google Scholar] [CrossRef]
  18. Xie, W.; Yu, W.; Zou, X. Diversity-maintained differential evolution embedded with gradient-based local search. Soft Comput. 2013, 17, 1511–1535. [Google Scholar] [CrossRef]
  19. Bonacich, P. Factoring and weighting approaches to status scores and clique identification. J. Math. Sociol. 1972, 2, 113–120. [Google Scholar] [CrossRef]
  20. McPherson, M.; Smith-Lovin, L.; Cook, J.M. Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 2001, 27, 415–444. [Google Scholar] [CrossRef]
  21. Borgatti, S.P. Centrality and network flow. Soc. Netw. 2005, 27, 55–71. [Google Scholar] [CrossRef]
  22. Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  23. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  24. Bonacich, P. Power and centrality: A family of measures. Am. J. Sociol. 1987, 92, 1170–1182. [Google Scholar] [CrossRef]
  25. Brin, S.; Page, L. The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 1998, 30, 107–117. [Google Scholar] [CrossRef]
  26. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’networks. Nature 1998, 393, 440. [Google Scholar] [CrossRef] [PubMed]
  27. Barrat, A.; Barthelemy, M.; Pastor-Satorras, R.; Vespignani, A. The architecture of complex weighted networks. Proc. Natl. Acad. Sci. USA 2004, 101, 3747–3752. [Google Scholar] [CrossRef] [PubMed]
  28. Chen, D.B.; Gao, H.; Lü, L.; Zhou, T. Identifying influential nodes in large-scale directed networks: The role of clustering. PLoS ONE 2013, 8, e77455. [Google Scholar] [CrossRef] [PubMed]
  29. Ma, L.l.; Ma, C.; Zhang, H.F.; Wang, B.H. Identifying influential spreaders in complex networks based on gravity formula. Phys. A Stat. Mech. Appl. 2016, 451, 205–212. [Google Scholar] [CrossRef]
  30. Gleiser, P.M.; Danon, L. Community structure in jazz. Adv. Complex Syst. 2003, 6, 565–573. [Google Scholar] [CrossRef]
  31. Newman, M.E. Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 2006, 103, 8577–8582. [Google Scholar] [CrossRef]
  32. Colizza, V.; Pastor-Satorras, R.; Vespignani, A. Reaction-diffusion processes and metapopulation models in heterogeneous networks. Nat. Phys. 2007, 3, 276–282. [Google Scholar] [CrossRef]
  33. Li, Z.; Ren, T.; Ma, X.; Liu, S.; Zhang, Y.; Zhou, T. Identifying influential spreaders by gravity model. Sci. Rep. 2019, 9, 8387. [Google Scholar] [CrossRef] [PubMed]
  34. Hirsch, J.E. An index to quantify an individual’s scientific research output. Proc. Natl. Acad. Sci. USA 2005, 102, 16569–16572. [Google Scholar] [CrossRef] [PubMed]
  35. Lü, L.; Zhang, Y.C.; Yeung, C.H.; Zhou, T. Leaders in social networks, the delicious case. PLoS ONE 2011, 6, e21202. [Google Scholar] [CrossRef] [PubMed]
  36. Zhuang, Y.; Yağan, O. Information propagation in clustered multilayer networks. IEEE Trans. Netw. Sci. Eng. 2016, 3, 211–224. [Google Scholar] [CrossRef]
  37. Basaras, P.; Iosifidis, G.; Katsaros, D.; Tassiulas, L. Identifying influential spreaders in complex multilayer networks: A centrality perspective. IEEE Trans. Netw. Sci. Eng. 2017, 6, 31–45. [Google Scholar] [CrossRef]
  38. Cozzo, E.; Kivelä, M.; De Domenico, M.; Solé, A.; Arenas, A.; Gómez, S.; Porter, M.A.; Moreno, Y. Clustering coefficients in multiplex networks. arXiv 2013, arXiv:1307.6780. [Google Scholar]
  39. Rahmede, C.; Iacovacci, J.; Arenas, A.; Bianconi, G. Centralities of nodes and influences of layers in large multiplex networks. J. Complex Netw. 2018, 6, 733–752. [Google Scholar] [CrossRef]
  40. Paidar, M.; Chaharborj, S.S.; Harounabadi, A. Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks. Network 2017, 4, 5. [Google Scholar] [CrossRef]
  41. Ohara, K.; Saito, K.; Kimura, M.; Motoda, H. Resampling-based predictive simulation framework of stochastic diffusion model for identifying top-K influential nodes. Int. J. Data Sci. Anal. 2020, 9, 175–195. [Google Scholar] [CrossRef]
  42. Tang, J.; Zhang, R.; Yao, Y.; Yang, F.; Zhao, Z.; Hu, R.; Yuan, Y. Identification of top-k influential nodes based on enhanced discrete particle swarm optimization for influence maximization. Phys. A Stat. Mech. Appl. 2019, 513, 477–496. [Google Scholar] [CrossRef]
  43. Silber, M.D. The Al Qaeda Factor: Plots against the West; University of Pennsylvania Press: Philadelphia, PA, USA, 2011. [Google Scholar]
  44. Hethcote, H.W. The mathematics of infectious diseases. SIAM Rev. 2000, 42, 599–653. [Google Scholar] [CrossRef]
  45. Guan-Rong, C.; Xiao-Fan, W.; Xiang, L. Introduction to Complex Networks: Models, Structures and Dynamics; Higher Education Press: Beijing, China, 2012. [Google Scholar]
  46. Krackhardt, D. Assessing the political landscape: Structure, cognition, and power in organizations. Adm. Sci. Q. 1990, 35, 342–369. [Google Scholar] [CrossRef]
  47. Zachary, W.W. An information flow model for conflict and fission in small groups. J. Anthropol. Res. 1977, 33, 452–473. [Google Scholar] [CrossRef]
  48. Lusseau, D.; Schneider, K.; Boisseau, O.J.; Haase, P.; Slooten, E.; Dawson, S.M. The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behav. Ecol. Sociobiol. 2003, 54, 396–405. [Google Scholar] [CrossRef]
  49. Tsvetovat, M.; Kouznetsov, A. Social Network Analysis for Startups: Finding Connections on the Social Web; OŔeilly Media, Inc.: Sebastopol, CA, USA, 2011. [Google Scholar]
  50. Knuth, D.E. The Stanford GraphBase: A Platform for Combinatorial Algorithms; SODA: Austin, TX, USA, 1993; Volume 93, pp. 41–43. [Google Scholar]
  51. Shen-Orr, S.S.; Milo, R.; Mangan, S.; Alon, U. Network motifs in the transcriptional regulation network of Escherichia coli. Nat. Genet. 2002, 31, 64–68. [Google Scholar] [CrossRef] [PubMed]
  52. Rossi, R.; Ahmed, N. The network data repository with interactive graph analytics and visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015. [Google Scholar]
  53. Duch, J.; Arenas, A. Community detection in complex networks using extremal optimization. Phys. Rev. E 2005, 72, 027104. [Google Scholar] [CrossRef] [PubMed]
  54. Cho, A.; Shin, J.; Hwang, S.; Kim, C.; Shim, H.; Kim, H.; Kim, H.; Lee, I. WormNet v3: A network-assisted hypothesis-generating server for Caenorhabditis elegans. Nucleic Acids Res. 2014, 42, W76–W82. [Google Scholar] [CrossRef]
  55. Action, R. The Rise of the Medici. Am. J. Sociol. 1993, 98, 1259–1319. [Google Scholar]
  56. Krackhardt, D. Cognitive social structures. Soc. Netw. 1987, 9, 109–134. [Google Scholar] [CrossRef]
  57. Vickers, M.; Chan, S. Representing Classroom Social Structure; Victoria Institute of Secondary Education: Melbourne, Australia, 1981. [Google Scholar]
  58. Kapferer, B. Strategy and Transaction in an African Factory: African Workers and Indian Management in a Zambian Town; Manchester University Press: Manchester, UK, 1972. [Google Scholar]
  59. Lazega, E. The Collegial Phenomenon: The Social Mechanisms of Cooperation Among Peers in a Corporate Law Partnership; Oxford University Press on Demand: Oxford, UK, 2001. [Google Scholar]
  60. Snijders, T.A.; Pattison, P.E.; Robins, G.L.; Handcock, M.S. New specifications for exponential random graph models. Sociol. Methodol. 2006, 36, 99–153. [Google Scholar] [CrossRef]
  61. Stark, C.; Breitkreutz, B.J.; Reguly, T.; Boucher, L.; Breitkreutz, A.; Tyers, M. BioGRID: a general repository for interaction datasets. Nucleic Acids Res. 2006, 34, D535–D539. [Google Scholar] [CrossRef] [PubMed]
  62. Magnani, M.; Micenkova, B.; Rossi, L. Combinatorial analysis of multiple networks. arXiv 2013, arXiv:1303.4986. [Google Scholar]
  63. De Domenico, M.; Solé-Ribalta, A.; Gómez, S.; Arenas, A. Navigability of interconnected networks under random failures. Proc. Natl. Acad. Sci. USA 2014, 111, 8351–8356. [Google Scholar] [CrossRef] [PubMed]
  64. Cardillo, A.; Gómez-Gardenes, J.; Zanin, M.; Romance, M.; Papo, D.; Del Pozo, F.; Boccaletti, S. Emergence of network features from multiplexity. Sci. Rep. 2013, 3, 1344. [Google Scholar] [CrossRef] [PubMed]
  65. Kendall, M.G. A new measure of rank correlation. Biometrika 1938, 30, 81–93. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.