Symmetry, Vol. 16, Pages 193: The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks

2 months ago 16

Symmetry, Vol. 16, Pages 193: The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks

Symmetry doi: 10.3390/sym16020193

Authors: Gehui Liu Yuqi Chen Haichen Chen Jiehao Dai Wenjie Wang Senbin Yu

Identifying influential nodes, with pivotal roles in practical domains like epidemic management, social information dissemination optimization, and transportation network security enhancement, is a critical research focus in complex network analysis. Researchers have long strived for rapid and precise identification approaches for these influential nodes that are significantly shaping network structures and functions. The recently developed SPON (sum of proportion of neighbors) method integrates information from the three-hop neighborhood of each node, proving more efficient and accurate in identifying influential nodes than traditional methods. However, SPON overlooks the heterogeneity of neighbor information, derived from the asymmetry properties of natural networks, leading to its lower accuracy in identifying essential nodes. To sustain the efficiency of the SPON method pertaining to the local method, as opposed to global approaches, we propose an improved local approach, called the SSPN (sum of the structural proportion of neighbors), adapted from the SPON method. The SSPN method classifies neighbors based on the h-index values of nodes, emphasizing the diversity of asymmetric neighbor structure information by considering the local clustering coefficient and addressing the accuracy limitations of the SPON method. To test the performance of the SSPN, we conducted simulation experiments on six real networks using the Susceptible–Infected–Removed (SIR) model. Our method demonstrates superior monotonicity, ranking accuracy, and robustness compared to seven benchmarks. These findings are valuable for developing effective methods to discover and safeguard influential nodes within complex networked systems.

Read Entire Article