Key node identification in social networks based on topological potential model

被引:7
|
作者
Zhang, Xueqin [1 ,2 ]
Wang, Zhineng [1 ]
Liu, Gang [1 ]
Wang, Yan [1 ]
机构
[1] East China Univ Sci & Technol ECUST, Sch Informat Sci & Engn, Shanghai 200237, Peoples R China
[2] Shanghai Key Lab Comp Software Testing & Evaluatin, Shanghai 201112, Peoples R China
基金
中国国家自然科学基金;
关键词
Social network; Key node; Information entropy; Effective distance; Topological potential model; INFLUENTIAL SPREADERS; COMPLEX NETWORKS;
D O I
10.1016/j.comcom.2023.11.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of social networks, identifying key nodes in social networks plays a crucial role in preventing and controlling the spread of information. However, the current methods for identifying key nodes have problems such as inaccurate measurement of node value, neglect of mining hidden topology information between nodes, and the calculation of node influence range is not accurate enough etc., and results in low accuracy in identifying key nodes. Aiming at these issues of key node identification, this paper proposes a node influence measurement method based on topological potential model. This method uses information entropy to measure the value of nodes, proposes to apply effective distance to express the relationship between nodes, and evaluates the influence range of each node with the effective distance between the node and its farthest node. Finally, topological potential model is used to measure the importance of nodes, thus improving the accuracy of key node identification. Experiments on multiple datasets show that the proposed method has a better ability to identify key nodes than the compared methods.
引用
收藏
页码:158 / 168
页数:11
相关论文
共 50 条
  • [21] A Dynamic Topological Potential and Social Relationship Based Routing Protocol for Mobile Social Delay Tolerant Networks
    Qin, Xuening
    Xie, Gang
    Gao, Jinchun
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS), 2017, : 98 - 102
  • [22] Privacy Risk Identification in Social Networks Based on LDA Model
    Zhang Lina
    Zhou Yipeng
    Fang Deying
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2015, : 595 - 598
  • [23] Community Based Influencer Node Identification using Hybrid Optimisation Algorithm in Social Networks
    Devi, S.
    Rajalakshmi, M.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2023,
  • [24] A node activity and connectivity-based model for influence maximization in social networks
    Bhawna Saxena
    Padam Kumar
    Social Network Analysis and Mining, 2019, 9
  • [25] A node activity and connectivity-based model for influence maximization in social networks
    Saxena, Bhawna
    Kumar, Padam
    SOCIAL NETWORK ANALYSIS AND MINING, 2019, 9 (01)
  • [26] Key Repairing Node Identification in Double-Layer Logistic Networks
    Zhu, Lingzhe
    Xia, Yongxiang
    Bai, Guanghan
    Fang, Yining
    FRONTIERS IN PHYSICS, 2022, 10
  • [27] Node Role Analysis Algorithm Based on Directed Topological Potential
    Yu, Xinglong
    Wu, Bin
    Liu, Yu
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 681 - 685
  • [28] A Key Business Node Identification Model for Internet of Things Security
    Xie, Lixia
    Ni, Huiyu
    Yang, Hongyu
    Zhang, Jiyong
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] Key node identification method for two-layer fusion networks based on improved structural holes
    Chen, Bo
    Zhang, Yulin
    Wang, Yunming
    Tong, Rui
    Chen, Yufeng
    Sun, Lingdong
    Xie, Wenxue
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (02):
  • [30] P2P Networks Monitoring Based On the Social Network Analysis and the Topological Potential
    Ren, Mengyin
    Jiang, Yixin
    Guo, Xiaobin
    Han, Qiyi
    Wen, Hong
    Wu, Bin
    Chen, Zhen
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 492 - 493