[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Leveraging neighborhood and path information for influential spreaders recognition in complex networks

  • Research
  • Published:
Journal of Intelligent Information Systems Aims and scope Submit manuscript

Abstract

The study of influential spreaders has become a growing area of interest within network sciences due to its critical implications in understanding the robustness and vulnerability of complex networks. There is a significant degree of focus on the factors that dictate the decision-making process for identifying these influential spreaders in highly complex networks, given their crucial role in network performance and security. Previous research methodologies have offered a deep understanding of the importance of spreaders, also referred to as nodes. These methods, however, have primarily depended on either neighborhood or path information to identify these spreaders. They have often studied local network data, or adopted a more broad-based, global view of the network. Such an approach may not provide a comprehensive understanding of the overall network structure and the relationships between nodes. Addressing this limitation, our research introduces Neighborhood and Path Information-based Centrality (NPIC) algorithm. This innovative centrality algorithm combines both neighborhood and path information to identify influential spreaders in a complex network. By incorporating these two significant aspects, NPIC provides a more holistic analysis of network centrality, enabling a more accurate identification of influential spreaders. We have subjected NPIC to rigorous testing using numerous simulations on both real and artificially-created datasets. These simulations applied an epidemic model to calculate the spreading efficiency of each node within its given environment. Our simulations, conducted across a wide range of synthetic and real-world datasets, demonstrated that NPIC outperforms existing methodologies in identifying influential spreaders in corresponding networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability of data and materials/Availability of supporting data

The datasets generated during and/or analyzed during the current study are publicly available at the following http://networkrepository.com/.

Code Availability

The code will be made available upon request.

Notes

  1. https://snap.stanford.edu/data/

  2. http://networkrepository.com/

References

Download references

Acknowledgements

This work is supported by the National Key Research and Development Program of China under grant No.2018YFB1003602.

Funding

This work is supported by the National Key Research and Development Program of China under grant No.2018YFB1003602.

Author information

Authors and Affiliations

Authors

Contributions

Aman Ullah: Method, Writing, original draft, conceptualization, investigation, software. Bin Wang: Supervision. JinFang Sheng: Supervision. Salah Ud Din: Visualization. NasrUlla Khan: Visualization.

Corresponding author

Correspondence to Aman Ullah.

Ethics declarations

Conflict of interest/Competing interests

The authors declare that they have no conflicts of interest.

Ethics approval

Our study did not include any human and/ or animal studies. All datasets used in the paper are publicly available for research purposes. Details related to all datasets can be found in Section 4.2.

Consent to participate

This study did not involve any human or animal subjects; therefore, issues related to consent to participate are not applicable.

Consent for publication

As our study did not involve human or animal subjects, there were no related issues concerning consent for publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, A., Sheng, J., Wang, B. et al. Leveraging neighborhood and path information for influential spreaders recognition in complex networks. J Intell Inf Syst 62, 377–401 (2024). https://doi.org/10.1007/s10844-023-00822-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10844-023-00822-z

Keywords

Navigation