Next Article in Journal
Typhoon Intensity Forecasting Based on LSTM Using the Rolling Forecast Method
Previous Article in Journal
DynASP2.5: Dynamic Programming on Tree Decompositions in Action
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identifying and Ranking Influential Nodes in Complex Networks Based on Dynamic Node Strength

1
Applied Economics, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Management Science and Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Algorithms 2021, 14(3), 82; https://doi.org/10.3390/a14030082 (registering DOI)
Submission received: 28 January 2021 / Revised: 21 February 2021 / Accepted: 25 February 2021 / Published: 2 March 2021

Abstract

:
Identifying and ranking the node influence in complex networks is an important issue. It helps to understand the dynamics of spreading process for designing efficient strategies to hinder or accelerate information spreading. The idea of decomposing network to rank node influence is adopted widely because of low computational complexity. Of this type, decomposition is a dynamic process, and each iteration could be regarded as an inverse process of spreading. In this paper, we propose a new ranking method, Dynamic Node Strength Decomposition, based on decomposing network. The spreading paths are distinguished by weighting the edges according to the nodes at both ends. The change of local structure in the process of decomposition is considered. Our experimental results on four real networks with different sizes show that the proposed method can generate a more monotonic ranking list and identify node influence more effectively.

1. Introduction

Spreading phenomenon generally exists in various fields including physics [1], ecology [2], biology [3] and so on, which is studied in the framework of complex network appropriately. Identifying and ranking the influential spreaders in the complex network is significant for understanding the spreading mechanism. Many works focus on how to measure the influence of nodes in a sufficiently large and complex network [4,5,6,7,8,9,10,11]. As is known, there are numerous classic topology metrics, including degree centrality [12], betweenness centrality [13], closeness centrality [14], Katz centrality [15] and so on, which can be adopted to distinguish which nodes are more important. However, the methods of ranking influential nodes are constantly improved.
In recent years, various efficient ranking methods to identify influential nodes in the complex network are proposed, such as LeaderRank [16], PageRank [17], semi-local centrality [18], TOPSIS [19,20], HybridRank [21] and so on. Among these methods, the k-shell method proposed by Kitsak et al. [22] is the most well-known. It has been found that the location of spreader has a great impact on spreading, and the most influential spreaders are often located in the core of the network. Based on this feature, they proposed the method named k-shell to decompose network according to degree. In this method, each node is assigned to an index k s and nodes with large k s are influential. There is an obvious drawback of decomposing networks according to the classical k-shell method: too many nodes are assigned to the same rank which leads to the coarse ranking. This is caused by a variety of factors: First, the standard for a node to be removed is only its degree, which does not take local influence of its neighbors into account [23]. Second, the process of removing nodes is recursive, and the order of nodes removed will affect the ranking result. Third, the global characteristics of the network are considered insufficiently [24].
The idea of ranking influential spreaders based on decomposing network is desirable because this kind of method generally has low computational complexity. The process of decomposing networks could be regarded as the recurrence of spreading process in some sense [25]. Joonhyun et al. [26] presented that the locations of node neighbors should not be ignored and proposed a novel method based on decomposing networks, coreness centrality ( C nc ), to evaluate spreading capability of a node by considering the coreness of its neighbors. Zeng et al. [25] considered the residual edges when decomposing the network, whereas the information contained in the exhausted nodes and edges is ignored, and proposed the mixed degree decomposition (MDD) to consider both the residual degree and the exhausted degree. Liu et al. [27] proposed a method to generate a more distinguishable ranking list based on distance from the target node to the core of network. Wang et al. [28] utilized neighborhood attributes and entropy method to weight the node position based on iteration information in the k-shell decomposition. Overall, decomposing networks to identify the node influence is advisable.
Based on decomposing networks dynamically, we propose a method named Dynamic Node Strength Decomposition (DNSD) to identify and rank node influence: both the difference of edges and the influence of decomposition order on the node ranking are also taken into account. To evaluate the effectiveness of the proposed method, we apply the Susceptible–Infected–Recovered (SIR) model to simulate spreading process in four real networks and measure the Kendall’s τ between the ranking and spreading capacity of nodes. Experimental results show that our method has good advantage in resolution ratio and performs more effective in identifying influential spreaders than other methods.

2. Methods

Decomposing a network to identify node influence is known as the k-shell method [22], which partitions a network into hierarchical sub-structures related to centrality. After decomposition, each node is assigned an index, k s , which represents the location of the node in the network. Nodes with high/low values of k s are located to the center/periphery of the network. The innermost nodes constitute the core of the network, while other nodes constitute external layers (k-shells). An example network is given to illustrate how k-shell method works (see Figure 1). First, the nodes with degree k = 1 in the network are removed. This process is repeated recursively until the degree of the remaining nodes is greater than 1, and these nodes are assigned to k s = 1 . Then, nodes with k = 2 in the network are removed recursively until the degree of the nodes remaining in the network is greater than 2. The nodes removed in this process are assigned to k s = 2 . This routine runs until all nodes of the network have been assigned to corresponding k s . Finally, nodes with the same k s are assigned to the corresponding k-shell.
The Mixed Degree Decomposition (MDD) method notes that the dynamic process of decomposing network have influence on the resulting result [25]. Some nodes are removed at each decomposition step and the edges linked to these nodes are removed too, which changes the degree of the remaining nodes. MDD defines an index named as the mixed degree that is the weighted sum of the residual degree (number of edges linked to the remaining nodes) and the exhausted degree (number of edges linked to the removed nodes). The nodes are removed according to the mixed degree in each step of MDD procedure. The effect of MDD method to the sample network in Figure 1 is shown in Table 1. This idea that considers the influence of the removed edge is also adapted in our method. However, the edges are weighted based on the nodes at both ends.
The neighborhood coreness centrality method ( C nc ) considers that the k s of each node generated by the k-shell method reflects the information of location, and a spreader with more neighbors located in the core of the network is more influential [26]. C nc adopts the k-shell method to obtain the k s of each node first. Then, the neighborhood coreness centrality of the target node is equal to the sum of its neighbors’ k s . The ranking list of node influence is generated based on the C nc . There is an improved C nc method named as the extended neighborhood coreness C nc + , which denotes the k s of neighbors and two-step neighbors as the metric of node influence.
Inspired by these methods, we propose our method, Dynamic Node Strength Decomposition (DNSD). This method also applies the idea of dynamically decomposing network dynamically, but it is based on an alternative standard for removing the node. In many works, the edges in unweighted networks are treated equally. This means that, for different nodes, there are only differences in the number of edges, but no differences in features of edges. If there is only one edge between two nodes with a large number of edges, the importance of this edge is obviously vital. In this moment, it is unreasonable that this edge and other edges are treated equally. Actually, edges are spreading paths, which are different in the spreading process. Information could spread more widely through some specific paths. Thus, the importance of different edges should be distinguished, which depends on the nodes connected by the edges. To reflect this potential difference, we define the edge weight as
w i j = k i + k j .
According to Equation (1), if an edge connects two nodes with large degree, it is assigned a large weight.
In the process of decomposing network, the local characteristics of the network change at each step of decomposition as the nodes are removed [29,30]. This means that the order of node removal affects the final result. In DNSD method, this effect is taken into account. We define the edges linked to the nodes that have been removed as vanishing edges and the edges linked to the existing nodes as existing edges. The dynamic weight of node i in the decomposition process is composed of the existing weight, w i j e , and the vanishing weight, w i j v , as follows:
w i j d = w i j e + α · w i j v ,
where α is the variable parameter in the range of 0–1. If α is set to 1, the dynamic weight is equal to the normal weight. When α is set to 0, it means that the vanishing weight is not considered.
Consequently, we encounter the decomposition criteria by taking the edges weights and two-step weights into account. Each node is assigned to a node strength by the following measure:
S i = j γ ( i ) l γ ( j ) w i j d · ( w j l d ) β ,
where γ ( i ) and γ ( j ) are the set of neighbors of node i and node j, respectively. β is is the attenuation coefficient in the range between 0 and 1. The farther an edge is from the target node, the smaller the β is. because the effect of information spreading in the network is gradually attenuated. In the measure of node strength, not only the weight of the node’s edges but also those of its neighbors are considered. Actually, the wider is the neighborhood considered, the more accurately is the spreading outcome of a node predicted. However, the computations increase as more neighbors are considered [23,31]. Usually, it is a choice between efficiency and accuracy.
In this way, the detailed decomposition according to DNSD can be conducted in the following procedure:
Step 1. Initially, calculate the S i of each node in the network. At this moment, w i j d of each node is equal to w i j e because there is no node that has been removed.
Step 2. Remove nodes with the lowest S i (denoted as S), and these nodes are assigned to the S- s h e l l . Update k d of each remaining node by k i d = k i e + α · k i v . Then, calculate the S i of each node in the network again. Remove all the nodes with S i lower than or equal to S and assign them to the S- s h e l l too. Repeat this routine until the S i of the remaining nodes in the network is greater than S.
Step 3. Execute Step 2 recursively until each node has been placed into one S- s h e l l . For the nodes removed in the final decomposition, they are placed in the S- s h e l l according to the S i in the last decomposition.
Through the above procedure, DNSD method can rank nodes according to the S and assign them in the corresponding S- s h e l l . The most influential nodes are assigned to the maximal S. To illustrate the procedure of DNSD in detail, an example is shown in Figure 2, in which α in Equation (2) is set to 0.5 and β in Equation (3) is set to 0 simply.
To further improve the accuracy of DNSD, the S of the target node and its neighbors are also considered. This is based on the idea that crucial nodes not only are located at crucial locations in the network but also have more edges with other nodes located at crucial locations [24,32]. In this way, the improved node strength is defined as:
S i + = S i + j γ ( i ) S j ,
where γ ( i ) is the set of neighbors of node i. The improved method is called DNSD + .
We simply compare the effect of our methods with several methods in the sample network of Figure 1. The results are shown in Table 1. It can be seen there are many nodes with the same rank in the first three methods, among which the k-shell method simply divides the nodes into three ranks. Obviously, DNSD and DNSD + can distinguish nodes more precisely, even though there are still several ranks greater than 12 that are not displayed.

3. Experimental Results

In this section, we compare the performance of our methods with state-of-the-art methods in four real networks with different sizes: Zacharys Karate Club [33], Email-Eu-core [34], Co-authors [35] and US Power Grid [36] networks. The Susceptible–Infected–Recovered (SIR) model [37,38,39,40] is applied to stimulate spreading influence of nodes. The resolution ratio and effectiveness of all methods are computed.

3.1. Evaluation Methodologies

First, we apply the monotonicity index, M ( R ) , in [26] to evaluate resolution ratio of different ranking methods, as follows:
M ( R ) = 1 r R n r ( n r 1 ) n ( n 1 ) 2 ,
where R is ranking vector ranking method, n is the size of R and n r is the number of nodes in ties with the same rank r. This index quantifies proportion of ties in R. The M ( R ) is 0 if all nodes are assigned to one rank, while it is 1 if each node is assigned to a different rank. The closer the M ( R ) is to 1, the better the resolution ratio of the ranking method is.
We remark that there are various spreading processes on networks such as epidemic, rumor, information spreading and so on. In the previous works, the method of decomposing network is proved to be suitable for the epidemic spreading process [31,40]. In this article, we apply SIR to simulate spreading capacity of nodes. In the SIR model, there are three kinds of individuals: (S) susceptible individuals can be infected; (I) infected individuals have the ability to infect susceptible individuals; and infected individuals are likely to recover with the probability η and become (R) recovered individuals who have immunity to disease and no ability to infect others. Initially, the spreading process starts with only one seed individual infected, and all other individuals are susceptible. At each time step, each infected individual attempts to infect its neighbors with the probability θ and then recover with the possibility η . The epidemic spreading process terminates when there is no infected individual in the network and the disease cannot spread anymore. In this paper, the recovery possibility η is set to 1. We take the average range of recovered population, μ ( i ) , over a sufficiently large number of simulations, which are set to be 1000, as the indicator to evaluate the influence of node i.
To evaluate the effectiveness of the ranking methods, the ranking results by the methods are compared with spreading capacity simulated by SIR model. Kendall’s τ [41] is adopted to judge the correlation between the two ranking lists. The spreading capacity ranking list, R 1 , simulated by SIR model is denoted as X, and the ranking list, R 2 , measured by ranking methods is denoted as Y. They have the same number of elements, all of which are n. Let ( x 1 , y 1 ) , ( x 2 , y 2 ) , ( x 3 , y 3 ) , , ( x n , y n ) be a series of sequence pairs. For any pair of ( x i , y i ) and ( x j , y j ) , if x i > x j and y i > y j or if x i < x j and y i < y j , it is said to be concordant; if x i > x j and y i < y j or if x i < x j and y i > y j , the pair is said to be discordant; and if x i = x j or y i = y j , the pair is neither concordant nor discordant. The Kendall’s τ of R 1 and R 2 is defined as:
τ ( X , Y ) = n c n d 1 2 n ( n 1 ) ,
where n c and n d are the numbers of concordant and discordant pairs, respectively. The higher the τ is, the more accurate the method is.

3.2. Applications to the Real Networks

The monotonicity M of different methods is summarized in Table 2, where the basic characteristics of the real networks containing the mount of nodes and edges are shown in the first two columns. The value of α is set to 0.5, because the performances of our methods are best when the value of α is between 0.45 and 0.6, and the better choice only accounts for 1 % . Meanwhile, β is set to 0, which is further considered in subsequent experiments, although it is enough to show the superiority of our methods in monotonicity. Note that the monotonic indexes of DNSD and DNSD + are more than 0.9 in four networks, which outperform the other four methods. The C nc is also competitive, but there is still a gap compared with our methods. The performance of the DC is not much different from MDD, because the two are equivalent when the coefficient before the exhausted degree in MDD equals to 1. The performance of k-shell is the worst in any case, especially in Power Grid and Karate Club. This result shows that the ranking lists generated by our methods have strong monotonicity.
To more clearly show the advantage of our methods in resolution ratio, we plot complementary cumulative distribution functions (CCDF) of the rankings, as shown in Figure 3. Note that the curves of DNSD and DNSD + always descend slowly, which means that our methods can distribute nodes in more ranks compared with other methods. Specifically, DNSD generates 27 ranks in Karate Club, 136 ranks in Email, 141 ranks in Co-authors and 102 ranks in Power Grid, while DNSD + generates 27 ranks in Karate Club, 153 ranks in Email, 362 ranks in Co-authors and 391 ranks in Power Grid. Obviously, DNSD + is much better than DNSD, because the former considers the location of neighbor nodes. This reflects that the influential nodes always have neighbors close to the core of network. The curve of k-shell descends quickly because the mount of ranks obtained by the k-shell method is limited while the number of nodes in each rank is quite large, which indicates that the node influence is not well identified by the k-shell method. The performances of MDD in Email, Co-authors and Power Grid are much better than those of the other methods, except ours.
Next, we investigate the effectiveness of different ranking methods by comparing the ranking results with the spreading capacity μ ( i ) obtained from the SIR simulation, which are shown as Figure 4. The θ is set to 1/<k>, where <k> denotes average degree of the network. Two comparison methods and the proposed methods for each network are shown. The number of nodes in the Karate Club is limited, and the difference among methods is not obvious. In Email, the μ ( i ) fluctuates greatly at each rank by C nc and k-shell. The correlation between μ ( i ) and ranking measured by DNSD is much higher, and DNSD + is even better. In Co-authors, the distributions of points by methods concentrate at low ranks. Some nodes with low ranks have high μ ( i ) and few nodes with high ranks only have below average μ ( i ) by DC and k-shell. Note that the distribution of the points is very diffuse for DC and MDD in Power Grid. On the contrary, the points gather on the trend that slants upward to the right for DNSD and DNSD + . There is a long tail phenomenon in the (p), which shows that the effect of DNSD + is not very good at high ranks in Power Grid. The reason may be that the structure of Power Grid is simple. In other words, it is obvious that our methods outperform the other methods by showing that rankings by DNSD and DNSD + are highly correlated with the spreading capacity μ ( i ) by SIR simulation in most cases.
Based on above observation, we measure the Kendall’s τ of these methods, as shown in Figure 5, where the θ is between 0.06 and 0.2 with an interval of 0.1. If the infection possibility is large enough, the range of infection will cover almost the whole network; thus, the spreading origin is no longer important. In Figure 5a–d, the α in Equation (2) is set to 0.5. The effect of DNSD and DNSD + are shown in Figure 5e–l when α is set between 0.3 and 0.7 with an interval of 0.1. Note that the τ is very volatile in the Karate Club, because homogeneous nodes could have very different ranks when many measurement factors are considered. When α is set to 0.5 or 0.6, the effect of DNSD and DNSD + is better than those with other α in the corresponding network. We compare DNSD and DNSD + with other methods in each network when α is 0.5. One can observe that the superiority of our methods is not obvious when the infection possibility is lower than 0.1 because it is hard to spread infection far away when the infection possibility is low. However, the τ of our methods exceeds 0.8 in most cases with the increase of infection probability. Although the k-shell method is considered to be able to identify influential nodes, our experimental results show that there is weak correlation between the k s measured by k-shell and the influence of spreaders. These results show that our methods are more effective for identifying node influence.
In the above experiments, β is set to 0 simply, which denotes the influence of two-step neighbors is not considered temporarily. Here, we set β to 0–1 with the interval 0.1 and measure the Kendall’s τ between the rankings obtained by our methods and node influence simulated by the SIR model again. The results of the τ under different infection possibility and β are shown in Figure 6 in the form of heat map, where Figure 6a–d shows the ones measured by DNSD and Figure 6e–h those measured by DNSD + . Note that the influence of β in Karate Club is not obvious (there is no obvious concentration trend of red spots) because of small network size. In Email, When β is set close to 0.6 the performance of DNSD is better (the areas are almost red in the middle right part of the heat map), while the performance of DNSD + is better with β between 0.3 and 0.6. In Co-authors, τ is higher than others when β is set between 0.4 and 0.6 for our methods. In Power Grid, DNSD is not sensitive to β , and it is improved a little when β is close to 0.3. For DNSD + , β close to 0.7 outperforms others. One can observe τ become higher (the color of the areas changes from cyan to orange) with the increase of β in most cases. However, it is not that the larger β is, the higher τ is. It is obvious that the network structure and network scale have impacts on the role of neighbors. When the network is small, such as Karate Club, too much consideration of neighbors may result that nodes with similar spreading capability are attached to very different ranks. When the network structure is simple, such as Power Grid, there are many nodes with similar local structure. It is not enough to only take the close neighbors into account. Meanwhile, too many neighbors being considered means a lot of computation, which is a choice between efficiency and accuracy. However, neighbors deserve consideration in our methods. Because our methods are based on decomposing network. Of this type, each iteration in dynamic decomposition process could be regarded as an inverse process of spreading. In theory, the more neighbors are considered, the more accurately the spreading could be predicted.

4. Conclusions

In this paper, we propose an efficient ranking method based on decomposing networks, Dynamic Node Strength Decomposition, to identify and rank the node influence in complex networks. The effect of decomposition process on ranking result is reflected by dynamic degree, which is evaluated the degree vanished in the decomposing process and the existing degree [25]. The spreading paths are distinguished by the dynamic degree of nodes at both ends of edge, and dynamic node strength is composed of edge weight of nodes and neighbors. Our methods have better monotonic than degree centrality, k-shell, MDD and C nc by monotonicity index. We evaluated the effectiveness of ranking methods by Kendall’s τ of the ranking obtained by the ranking methods and the size of infected scale of SIR simulation. The experimental results show that the ranking result of our method are highly correlated with the spreading capacity simulated by SIR. We can draw the conclusion that the proposed methods are better than degree centrality, k-shell, MDD and C nc methods in the specific types of networks, such as email, co-authors and power grid networks [31], when SIR simulation is applied.
Our methods still have much room for improvement in some way. Some works show that the influence of nodes cloud be affected by the size of their community [42,43]. As long as neighbors considered are wide enough, there is not much deviation between rank measured by our method and real influence of node. This is not advisable because of the large amount of calculation. Moreover, finding the set of influential spreaders in complex networks is something our method cannot deal with [44,45], where node influence, the distance between nodes in the influential set and size of influential set need to be considered. Therefore, some more effective and efficient improvements will still be sought in further investigation.

Author Contributions

Conceptualization, X.L. and Q.S.; methodology, X.L. and Q.S.; software, X.L.; validation, X.L.; formal analysis, X.L. and Q.S.; investigation, X.L. and Q.S.;resources, X.L. and Q.S.; writing—original draft preparation, X.L.; writing—review and editing, X.L. and Q.S.; visualization, X.L.; supervision, Q.S.; project administration, Q.S.; and funding acquisition, Q.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Beijing Social Science Fund No. 11JGB063. and Social Science Research Project of Ministry of Education No. 11YJA630109.

Acknowledgments

This work was supported in part by the Beijing Social Science Fund No. 11JGB063. and Social Science Research Project of Ministry of Education No. 11YJA630109.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Buldyrev, S.V.; Roni, P.; Gerald, P.; H Eugene, S.; Shlomo, H. Catastrophic Cascade of Failures in Interdependent Networks. Nature 2010, 464, 1025. [Google Scholar] [CrossRef] [Green Version]
  2. Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B. Ecological network analysis: Network construction. Ecol. Model. 2017, 208, 49–55. [Google Scholar] [CrossRef]
  3. Marigo, A.; Piccoli, B. A model for biological dynamic networks. Netw. Heterog. Media 2017, 6, 647–663. [Google Scholar] [CrossRef]
  4. Guo, Q.T.; Lei, Y.J.; Jiang, X.; Ma, Y.F.; Huo, G.Y.; Zheng, Z.M. Epidemic spreading with activity-driven awareness diffusion on multiplex network. Chaos 2016, 26, 043110. [Google Scholar] [CrossRef]
  5. Zhang, J.X.; Chen, D.B.; Wang, G.; Xing, G. Ranking the spreading ability of nodes in complex networks based on local structure. Phys. Stat. Mech. Its Appl. 2014, 403, 130–147. [Google Scholar]
  6. Li, C.; Wang, L.; Sun, S.; Xia, C. Identification of influential spreaders based on classified neighbors in real-world complex networks. Appl. Math. Comput. 2017, 320, 512–523. [Google Scholar] [CrossRef]
  7. Li, J.; Xiong, Q.; Shi, W.; Shi, X.; Wang, K. Evaluating the importance of nodes in complex networks. Phys. Stat. Mech. Its Appl. 2016, 452, 209–219. [Google Scholar] [CrossRef] [Green Version]
  8. Al-Garadi, M.A.; Varathan, K.D.; Ravana, S.D.; Ahmed, E.; Chang, V.; Lv, Z. Identifying the influential spreaders in multilayer interactions of online social networks. J. Intell. Fuzzy Syst. 2016, 31, 2721–2735. [Google Scholar] [CrossRef] [Green Version]
  9. Xia, Y.; Ren, X.; Peng, Z.; Zhang, J.; She, L. Effectively identifying the influential spreaders in large-scale social networks. Multimed. Tools Appl. 2016, 75, 8829–8841. [Google Scholar] [CrossRef]
  10. Gomez, S.; Diaz-Guilera, A.; Gomez-Gardenes, J.; Perez-Vicente, C.J.; Moreno, Y.; Arenas, A. Diffusion dynamics on multiplex networks. Phys. Rev. Lett. 2013, 110, 028701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Chen, D.B.; Sun, H.L.; Tang, Q. Identifying influential spreaders in complex networks by propagation probability dynamics. Chaos 2019, 29, 033120. [Google Scholar] [CrossRef] [PubMed]
  12. Sabidussi, G. The centrality index of a graph. Psychometrika 1966, 31, 581–603. [Google Scholar] [CrossRef]
  13. Newman, M.E.J. A measure of betweenness centrality based on random walks. Soc. Netw. 2005, 27, 39–54. [Google Scholar] [CrossRef] [Green Version]
  14. Burt, R.S. Applied Network Analysis. Sociol. Methods Res. 1978, 7, 123–130. [Google Scholar] [CrossRef]
  15. Katz, L. A new status index derived from sociometric analysis. Psychometrika 1953, 18, 39–43. [Google Scholar] [CrossRef]
  16. Lü, L.; Zhang, Y.C.; Yeung, C.H.; Zhou, T. Leaders in Social Networks, the Delicious Case. PLoS ONE 2011, 6, 21202. [Google Scholar] [CrossRef] [Green Version]
  17. Ding, Y.; Yan, E.; Frazho, A.; Caverlee, J. PageRank for ranking authors in co-citation networks. J. Am. Soc. Inf. Sci. Technol. 2014, 60, 2229–2243. [Google Scholar] [CrossRef] [Green Version]
  18. Chen, D.B.; Lü, L.Y.; Shang, M.S. Identifying influential nodes in complex networks. Phys. Stat. Mech. Its Appl. 2012, 391. [Google Scholar] [CrossRef] [Green Version]
  19. Hu, J.; Du, Y.; Mo, H.; Wei, D.; Deng, Y. A modified weighted topsis to identify influential nodes in complex networks. Phys. Stat. Mech. Its Appl. 2016, 444, 73–85. [Google Scholar] [CrossRef]
  20. Du, Y.X.; Gao, C.; Hu, Y.; Mahadevan, S.; Deng, Y. A new method of identifying influential nodes in complex networks based on topsis. Phys. Stat. Mech. Its Appl. 2014, 399, 57–69. [Google Scholar] [CrossRef]
  21. Sara, A.; Hassan, B. Identification of influential spreaders in complex networks using HybridRank algorithm. Sci. Rep. 2018, 8, 11932. [Google Scholar]
  22. Kitsak, L.K.; Gallos, S.; Havlin, F.; Liljeros, L.; Muchnik, H.E.; Stanley, H.A.; Makse. Identification of influential spreaders in complex. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef] [Green Version]
  23. Liu, Y.; Tang, M.; Zhou, T.; Do, Y.H. Identify influential spreaders in complex networks, the role of neighborhood. Phys. Stat. Mech. Its Appl. 2016, 289–298. [Google Scholar] [CrossRef] [Green Version]
  24. Zhao, X.Y.; Huang, B.; Tang, M. Identifying effective multiple spreaders by coloring complex networks. Epl 2014, 108, 68005. [Google Scholar] [CrossRef] [Green Version]
  25. Zeng, A.; Zhang, C.J. Ranking spreaders by decomposing complex networks. Phys. Lett. A 2012, 377, 1031–1035. [Google Scholar] [CrossRef] [Green Version]
  26. Joonhyun, B.; Sangwook. Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Phys. Stat. Mech. Its Appl. 2014, 395, 549–559. [Google Scholar]
  27. Liu, J.G.; Ren, Z.M.; Guo, Q. Ranking the spreading influence in complex networks. Phys. Stat. Mech. Its Appl. 2013, 392, 4154–4159. [Google Scholar] [CrossRef] [Green Version]
  28. Wang, Z.; Du, C.; Fan, J.; Xing, Y. Ranking Influential Nodes in Social Networks Based on Node Position and Neighborhood. Neurocomputing 2017, 10, 466–477. [Google Scholar] [CrossRef]
  29. Byungjoon, M. Identifying an influential spreader from a single seed in complex networks via a message-passing approach. Eur. Phys. J. B 2018, 91, 18. [Google Scholar]
  30. Maji, G. Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method. J. Comput. Sci. 2020, 39, 101055.1–101055.9. [Google Scholar] [CrossRef]
  31. De Arruda, G.F.; Barbieri, A.L.; Rodriguez, P.M.; Moreno, Y.; Costa, L.D.F.; Rodrigues, F.A. Role of centrality for the identification of influential spreaders in complex networks. Phys. Rev. E Stat. Nonlin Soft. Matter. Phys. 2014, 90, 032812. [Google Scholar] [CrossRef] [Green Version]
  32. Li, M.; Zhang, R.; Hu, R.; Yang, F.; Yao, Y.; Yuan, Y. Identifying and ranking influential spreaders in complex networks by combining a local-degree sum and the clustering coefficient. Int. J. Mod. Phys. B 2018, 32, 1850118. [Google Scholar] [CrossRef]
  33. Zachary, W.W. An information flow model for conflict and fission in small groups. J. Anthropol. Res. 1977, 33, 452–473. [Google Scholar] [CrossRef] [Green Version]
  34. Paranjape, A.; Benson, A.R.; Leskovec, J. Motifs in Temporal Networks. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, Cambridge, UK, 6–10 February 2017; Volume 33. [Google Scholar]
  35. Newman, M.E.J. Finding community structure in networks using the eigenvectors of matrices. Prepr. Phys. 2006, 74, 0605087. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. Rossi, R.A.; Ahmed, N.K. The Network Data Repository with Interactive Graph Analytics and Visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015. [Google Scholar]
  37. Saeedian, M.; Khalighi, M.; Azimi-Tafreshi, N.; Jafari, G.R.; Ausloos, M. Memory effects on epidemic evolution: The susceptible-infected-recovered epidemic model. Phys. Rev. 2017, 95, 022409. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  38. Omata, K. Nonequilibrium statistical mechanics of a susceptible-infected-recovered epidemic model. Phys. Rev. 2017, 96, 022404. [Google Scholar] [CrossRef]
  39. Wang, W.; Liu, Q.H.; Zhong, L.F.; Tang, M.; Gao, H.; Stanley, H.E. Predicting the epidemic threshold of the susceptible-infected-recovered model. Sci. Rep. 2016, 6, 24676. [Google Scholar] [CrossRef] [Green Version]
  40. Miller, J.C.; Kiss, I.Z. Epidemic Spread in Networks: Existing Methods and Current Challenges. Math. Model. Nat. Phenom. 2014, 9, 4–42. [Google Scholar] [CrossRef] [Green Version]
  41. Kendall, M.G. The treatment of ties in ranking problems. Biometrika 1945, 33, 239–251. [Google Scholar] [CrossRef]
  42. Zhao, Z.Y.; Wang, X.F.; Zhang, W.W.; Zhang, Z.L. A Community-Based Approach to Identifying Influential Spreaders. Entropy 2015, 17, 2228–2252. [Google Scholar] [CrossRef] [Green Version]
  43. Girvan, M.; Newman, M.E.J. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA 2002, 99, 7821–7826. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  44. Jiang, L.; Zhao, X.; Ge, B. An efficient algorithm for mining a set of influential spreaders in complex networks. Phys. A Stat. Mech. Its Appl. 2019, 516, 58–65. [Google Scholar] [CrossRef]
  45. Yang, X.; Huang, D.C.; Zhang, Z.K. Neighborhood coreness algorithm for identifying a set of influential spreaders in complex networks. KSII Trans. Internet Inf. Syst. 2017, 11, 2979–2995. [Google Scholar]
Figure 1. A sample network with 26 nodes. The results of different methods in the sample network are shown in Table 1.
Figure 1. A sample network with 26 nodes. The results of different methods in the sample network are shown in Table 1.
Algorithms 14 00082 g001
Figure 2. A sample to illustrate the procedure of DNSD. The nodes with dashed nodes are the removed nodes and the edges with dashed line are the vanishing edges and weight.
Figure 2. A sample to illustrate the procedure of DNSD. The nodes with dashed nodes are the removed nodes and the edges with dashed line are the vanishing edges and weight.
Algorithms 14 00082 g002
Figure 3. The complementary cumulative distribution functions (CCDF) of the rankings obtained by different methods in Karate Club, Email, Co-authors and Power Grid α is set to 0.5 and β is set to 0.
Figure 3. The complementary cumulative distribution functions (CCDF) of the rankings obtained by different methods in Karate Club, Email, Co-authors and Power Grid α is set to 0.5 and β is set to 0.
Algorithms 14 00082 g003
Figure 4. The spreading capacity measured by the SIR simulation in the different networks plotted with the different ranking methods: Karate Club (ad); Email (eh); Co-authors (il); and Power Grid (mp). α is set to 0.5 and β is set to 0.
Figure 4. The spreading capacity measured by the SIR simulation in the different networks plotted with the different ranking methods: Karate Club (ad); Email (eh); Co-authors (il); and Power Grid (mp). α is set to 0.5 and β is set to 0.
Algorithms 14 00082 g004
Figure 5. The Kendall’s τ between the rankings obtained by different methods and the spreading capacity simulated by the SIR model: α is set to 0.5 and β is set to 0 (ad); the τ of DNSD with α set between 0.3 and 0.7 with an an interval of 0.1 (eh); and the τ of DNSD + with α set between 0.3 and 0.7 with an an interval of 0.1 (il).
Figure 5. The Kendall’s τ between the rankings obtained by different methods and the spreading capacity simulated by the SIR model: α is set to 0.5 and β is set to 0 (ad); the τ of DNSD with α set between 0.3 and 0.7 with an an interval of 0.1 (eh); and the τ of DNSD + with α set between 0.3 and 0.7 with an an interval of 0.1 (il).
Algorithms 14 00082 g005
Figure 6. The Kendall’s τ between the rankings obtained by our methods and node influence simulated by the SIR model: (ad) measured by DNSD; and (eh) measured by DNSD + . α is set to 0.5. β is set to 0–1 with the interval 0.1.
Figure 6. The Kendall’s τ between the rankings obtained by our methods and node influence simulated by the SIR model: (ad) measured by DNSD; and (eh) measured by DNSD + . α is set to 0.5. β is set to 0–1 with the interval 0.1.
Algorithms 14 00082 g006
Table 1. The ranking lists of the sample network in Figure 1 measured by different methods. α is set to 0.5 and β is set to 0 simply. The ranks greater than 12 are not shown.
Table 1. The ranking lists of the sample network in Figure 1 measured by different methods. α is set to 0.5 and β is set to 0 simply. The ranks greater than 12 are not shown.
RankDCk-shellMDD C nc DNSD DNSD +
12,7,81,2,1,2,3,212
3,44,7,8
245,6,75,6,10,3,443
11,22
31,3others19,21171
411,22 others724
55,6,10, 837
19,21
6others 5,688
7 222222
8 11,235,65,6
9 14,15,16,1010
17,10,19,21
10 others1114,15,
16,17
11 9,14,15,23
16,17,24,
25,26
12 19,219,24,
25,26
>12 othersothers
Table 2. The Monotonicity of ranking lists generated by different methods. N is the number of nodes and E is the number of edges in the network. M(DC) represents the monotonicity of ranking obtained by Degree Centrality method and others have the similar meaning.
Table 2. The Monotonicity of ranking lists generated by different methods. N is the number of nodes and E is the number of edges in the network. M(DC) represents the monotonicity of ranking obtained by Degree Centrality method and others have the similar meaning.
NetworksNEM(DC)M(k-Shell)M(MDD)M( C nc )M(DNSD)M( DNSD + )
Karate Club34780.7080.4960.7080.8390.9540.954
Email16217720.9220.7760.9160.9870.9950.998
Co-authors158927420.7070.6630.7090.8440.9040.915
Power Grid370665940.5930.2460.5870.7400.9200.984
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, X.; Sun, Q. Identifying and Ranking Influential Nodes in Complex Networks Based on Dynamic Node Strength. Algorithms 2021, 14, 82. https://doi.org/10.3390/a14030082

AMA Style

Li X, Sun Q. Identifying and Ranking Influential Nodes in Complex Networks Based on Dynamic Node Strength. Algorithms. 2021; 14(3):82. https://doi.org/10.3390/a14030082

Chicago/Turabian Style

Li, Xu, and Qiming Sun. 2021. "Identifying and Ranking Influential Nodes in Complex Networks Based on Dynamic Node Strength" Algorithms 14, no. 3: 82. https://doi.org/10.3390/a14030082

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop