2017
DOI: 10.7498/aps.66.038902
|View full text |Cite
|
Sign up to set email alerts
|

Node importance measurement based on neighborhood similarity in complex network

Abstract: Ranking node importance is of great significance for studying the robustness and vulnerability of complex network. Over the recent years, various centrality indices such as degree, semilocal, K-shell, betweenness and closeness centrality have been employed to measure node importance in the network. Among them, some well-known global measures such as betweenness centrality and closeness centrality can achieve generally higher accuracy in ranking nodes, while their computation complexity is relatively high, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…2) Topology-based Attack Strategies: Beside degree and betweenness, commonly-used measures of importance include closeness [99], Katz centrality [100], neighborhood similarity [101], branch weighting [102], structural holes [103], and so on. However, ranking the importance of nodes or edges is practically intractable for large-scale networks, since most measures cannot guarantee that removing the targeted object will globally and consistently cause the greatest damage to the network.…”
Section: Attack Strategiesmentioning
confidence: 99%
“…2) Topology-based Attack Strategies: Beside degree and betweenness, commonly-used measures of importance include closeness [99], Katz centrality [100], neighborhood similarity [101], branch weighting [102], structural holes [103], and so on. However, ranking the importance of nodes or edges is practically intractable for large-scale networks, since most measures cannot guarantee that removing the targeted object will globally and consistently cause the greatest damage to the network.…”
Section: Attack Strategiesmentioning
confidence: 99%
“…The identification of influential spreaders in complex networks is of great significance in both theory and application in such domains as social network analysis (Purevsuren and Cui, 2019; Yang et al, 2018), efficient dissemination of information (Lü et al, 2011; Medo et al, 2009), containment of disease spread (Wang et al, 2015b; Wei et al, 2022), control of rumors (Gu and Xia, 2012) and virus spread (Morone et al, 2016; Pinheiro et al, 2021; Wang et al, 2015a), and so on. At present, many influential spreaders identification methods have been proposed (Bonacich, 1972; Freeman, 1977, 1978; Kitsak et al, 2010; Li et al, 2019, 2020; Lü et al, 2016; Ren et al, 2023; Ruan et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…For example, the node with the highest degree is attacked firstly or the edge with the highest betweenness is preferentially removed. Besides degree and betweenness, commonly used measures of node importance include closeness [ 9 ], Katz centrality [ 10 ], neighborhood similarity [ 11 ], branch weighting [ 12 ], structural holes [ 13 ], and so on. Many malicious attack models have been proposed; the hierarchical structure of a directed network enables a random upstream (or downstream) attack on the network controllability, which results in a more destructive attack strategy than random attacks [ 14 ].…”
Section: Introductionmentioning
confidence: 99%