Identifying influential nodes is of theoretical significance in many domains. Although lots of methods have been proposed to solve this problem, their evaluations are under single-source attack in scale-free networks. Meanwhile, some researches have speculated that the combinations of some methods may achieve more optimal results. In order to evaluate this speculation and design a universal strategy suitable for different types of networks under the consideration of multi-source attacks, this paper proposes an attribute fusion method with two independent strategies to reveal the correlation of existing ranking methods and indicators. One is based on feature union (FU) and the other is based on feature ranking (FR). Two different propagation...
Computing influential nodes gets a lot of attention from many researchers for information spreading ...
Identifying multiple influential spreaders, which relates to finding k (k > 1) nodes with the most s...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...
Identifying influential nodes is of theoretical significance in network immunization which is one of...
How to identify influential nodes is still an open hot issue in complex networks. Lots of methods (e...
Identifying influential nodes in complex networks has attracted the attention of many researchers in...
One of the issues to be resolved in social recommender systems is the identification of opinion lead...
Abstract Identifying a set of vital nodes to achieve influence maximization is a topic of general in...
The problem of countering the spread of destructive content in social networks is currently relevant...
The ranking of influential nodes in networks is of great significance. Influential nodes play an eno...
© Springer Nature Switzerland AG 2019. Networks portray a multitude of interactions through which pe...
Finding influential spreaders of information and disease in networks is an important theoretical pro...
In the era of big data, social network has become an important reflection of human communications an...
Identifying influential spreaders in a complex network has practical and theoretical significance. I...
Influence Maximization, aiming at selecting a small set of seed users in a social network to maximiz...
Computing influential nodes gets a lot of attention from many researchers for information spreading ...
Identifying multiple influential spreaders, which relates to finding k (k > 1) nodes with the most s...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...
Identifying influential nodes is of theoretical significance in network immunization which is one of...
How to identify influential nodes is still an open hot issue in complex networks. Lots of methods (e...
Identifying influential nodes in complex networks has attracted the attention of many researchers in...
One of the issues to be resolved in social recommender systems is the identification of opinion lead...
Abstract Identifying a set of vital nodes to achieve influence maximization is a topic of general in...
The problem of countering the spread of destructive content in social networks is currently relevant...
The ranking of influential nodes in networks is of great significance. Influential nodes play an eno...
© Springer Nature Switzerland AG 2019. Networks portray a multitude of interactions through which pe...
Finding influential spreaders of information and disease in networks is an important theoretical pro...
In the era of big data, social network has become an important reflection of human communications an...
Identifying influential spreaders in a complex network has practical and theoretical significance. I...
Influence Maximization, aiming at selecting a small set of seed users in a social network to maximiz...
Computing influential nodes gets a lot of attention from many researchers for information spreading ...
Identifying multiple influential spreaders, which relates to finding k (k > 1) nodes with the most s...
© Springer Nature Switzerland AG 2019. Restraining the propagation of malicious attacks in complex n...