key: cord-034824-eelqmzdx authors: Guo, Chungu; Yang, Liangwei; Chen, Xiao; Chen, Duanbing; Gao, Hui; Ma, Jing title: Influential Nodes Identification in Complex Networks via Information Entropy date: 2020-02-21 journal: Entropy (Basel) DOI: 10.3390/e22020242 sha: doc_id: 34824 cord_uid: eelqmzdx Identifying a set of influential nodes is an important topic in complex networks which plays a crucial role in many applications, such as market advertising, rumor controlling, and predicting valuable scientific publications. In regard to this, researchers have developed algorithms from simple degree methods to all kinds of sophisticated approaches. However, a more robust and practical algorithm is required for the task. In this paper, we propose the EnRenew algorithm aimed to identify a set of influential nodes via information entropy. Firstly, the information entropy of each node is calculated as initial spreading ability. Then, select the node with the largest information entropy and renovate its l-length reachable nodes’ spreading ability by an attenuation factor, repeat this process until specific number of influential nodes are selected. Compared with the best state-of-the-art benchmark methods, the performance of proposed algorithm improved by 21.1%, 7.0%, 30.0%, 5.0%, 2.5%, and 9.0% in final affected scale on CEnew, Email, Hamster, Router, Condmat, and Amazon network, respectively, under the Susceptible-Infected-Recovered (SIR) simulation model. The proposed algorithm measures the importance of nodes based on information entropy and selects a group of important nodes through dynamic update strategy. The impressive results on the SIR simulation model shed light on new method of node mining in complex networks for information spreading and epidemic prevention. Complex networks are common in real life and can be used to represent complex systems in many fields. For example, collaboration networks [1] are used to cover the scientific collaborations between authors, email networks [2] denote the email communications between users, protein-DNA networks [3] help people gain a deep insight on biochemical reaction, railway networks [4] reveal the structure of railway via complex network methods, social networks show interactions between people [5, 6] , and international trade network [7] reflects the products trade between countries. A deep understanding and controlling of different complex networks is of great significance in information spreading and network connectivity. On one hand, by using the influential nodes, we can make successful advertisements for products [8] , discover drug target candidates, assist information weighted networks [54] and social networks [55] . However, the node set built by simply assembling the nodes and sorting them employed by the aforementioned methods may not be comparable to an elaborately selected set of nodes due to the rich club phenomenon [56] , namely, important nodes tend to overlap with each other. Thus, lots of methods aim to directly select a set of nodes are proposed. Kempe et al. defined the problem of identifying a set of influential spreaders in complex networks as influence maximization problem [57] , and they used hill-climbing based greedy algorithm that is within 63% of optimal in several models. Greedy method [58] is usually taken as the approximate solution of influence maximization problem, but it is not efficient for its high computational cost. Chen et al. [58] proposed NewGreedy and MixedGreedy method. Borgatti [59] specified mining influential spreaders in social networks by two classes: KPP-POS and KPP-NEG, based on which he calculated the importance of nodes. Narayanam et al. [60] proposed SPIN algorithm based on Shapley value to deal with information diffusion problem in social networks. Although the above greedy based methods can achieve relatively better result, they would cost lots of time for Monte Carlo simulation. So more heuristic algorithms were proposed. Chen et al. put forward simple and efficient DegreeDiscount algorithm [58] in which if one node is selected, its neighbors' degree would be discounted. Zhang et al. proposed VoteRank [61] which selects the influential node set via a voting strategy. Zhao et al. [62] introduced coloring technology into complex networks to seperate independent node sets, and selected nodes from different node sets, ensuring selected nodes are not closely connected. Hu et al. [63] and Guo et al. [64] further considered the distance between independent sets and achieved a better performance. Bao et al. [65] sought to find dispersive distributed spreaders by a heuristic clustering algorithm. Zhou [66] proposed an algorithm to find a set of influential nodes via message passing theory. Ji el al. [67] considered percolation in the network to obtain a set of distributed and coordinated spreaders. Researchers also seek to maximize the influence by studying communities [68] [69] [70] [71] [72] [73] . Zhang [74] seperated graph nodes into communities by using K-medoid method before selecting nodes. Gong et al. [75] divided graph into communities of different sizes, and selected nodes by using degree centrality and other indicators. Chen et al. [76] detected communities by using SHRINK and Kcut algorithm. Later they selected nodes from different communities as candidate nodes, and used CDH method to find final k influential nodes. Recently, some novel methods based on node dynamics have been proposed which rank nodes to select influential spreaders [77, 78] .Şirag Erkol et al. made a systematic comparison between methods focused on influence maximization problem [79] . They classify multiple algorithms to three classes, and made a detailed explanation and comparison between methods. More algorithms in this domain are described and classified clearly by Lü et al. in their review paper [80] . Most of the non-greedy strategy methods suffer from a possibility that some spreaders are so close that their influence may overlap. DegreeDiscount and VoteRank use iterative selection strategy. After a node is selected, they weaken its neighbors' influence to cope with the rich club phenomenon. However, these two algorithms roughly induce nodes' local information. Besides, they do not further make use of the difference between nodes when weakening nodes' influence. In this paper, we propose a new heuristic algorithm named EnRenew based on node's entropy to select a set of influential nodes. EnRenew also uses iterative selection strategy. It initially calculates the influence of each node by its information entropy (further explained in Section 2.2), and then repeatedly select the node with the largest information entropy and renovate its l-length reachable nodes' information entropy by an attenuation factor until specific number of nodes are selected. Experiments show that the proposed method yields the largest final affected scale on 6 real networks in the Susceptible-Infected-Recovered (SIR) simulation model compared with state-of-the-art benchmark methods. The results reveal that EnRenew could be a promising tool for related work. Besides, to make the algorithm practically more useful, we provide EnRenew's source code and all the experiments details on https://github.com/YangLiangwei/Influential-nodes-identification-in-complex-networksvia-information-entropy, and researchers can download it freely for their convenience. The rest of paper is organized as follows: The identifying method is presented in Section 2. Experiment results are analyzed and discussed in Section 3. Conclusions and future interest research topics are given in Section 4. The best way to measure the influence of a set of nodes in complex networks is through propagation dynamic process on real life network data. A susceptible infected removed model (SIR model) is initially used to simulate the dynamic of disease spreading [23] . It is later widely used to analyze similar spreading process, such as rumor [81] and population [82] . In this paper, the SIR model is adopted to objectively evaluate the spreading ability of nodes selected by algorithms. Each node in the SIR model can be classified into one of three states, namely, Susceptible nodes (S), Infected nodes (I), and Recovered nodes (R). At first, set initial selected nodes to infected status and all others in network to susceptible status. In each propagation iteration, each infected node randomly choose one of its direct neighbors and infect it with probability µ. In the meantime, each infected node will be recovered with probability β and won't be infected again. In this study, λ = µ β is defined as infected rate, which is crucial to the spreading speed in the SIR model. Apparently, the network can reach a steady stage with no infection after enough propagation iterations. To enable information spreads widely in networks, we set µ = 1.5µ c , where µ c = k k 2 − k [83] is the spreading threshold of SIR, k is the average degree of network. When µ is smaller than µ c , spreading in SIR could only affect a small range or even cannot spread at all. When it is much larger than µ c , nearly all methods could affect the whole network, which would be meaningless for comparison. Thus, we select µ around µ c on the experiments. During the SIR propagation mentioned above, enough information can be obtained to evaluate the impact of initial selected nodes in the network and the metrics derived from the procedure is explained in Section 2.4. The influential nodes selecting algorithm proposed in this paper is named EnRenew, deduced from the concept of the algorithm. EnRenew introduces entropy and renews the nodes' entropy through an iterative selection process. EnRenew is inspired by VoteRank algorithm proposed by Zhang et al. [61] , where the influential nodes are selected in an iterative voting procedure. VoteRank assigns each node with voting ability and scores. Initially, each node's voting ability to its neighbors is 1. After a node is selected, the direct neighbors' voting ability will be decreased by 1 k , where k = 2 * m n is the average degree of the network. VoteRank roughly assigns all nodes in graph with the same voting ability and attenuation factor, which ignores node's local information. To overcome this shortcoming, we propose a heuristic algorithm named EnRenew and described as follows. In information theory, information quantity measures the information brought about by a specific event and information entropy is the expectation of the information quantity. These two concepts are introduced into complex network in Reference [44] [45] [46] to calculate the importance of node. Information entropy of any node v can be calculated by: where p uv = d u ∑ l∈Γv d l , ∑ l∈Γ v p lv = 1, Γ v indicates node v's direct neighbors, and d u is the degree of node u. H uv is the spreading ability provided from u to v. E v is node v's information entropy indicating its initial importance which would be renewed as described in Algorithm 1. A detailed calculating of node entropy is shown in Figure 1 . It shows how the red node's (node 1) entropy is calculated in detail. Node 1 has four neighbors from node 2 to node 5. Node 1's information entropy is then calculated by Simply selecting the nodes with a measure of degree as initial spreaders might not achieve good results. Because most real networks have obvious clumping phenomenon, that is, high-impact nodes in the network are often connected closely in a same community. Information cannot be copiously disseminated to the whole network. To manage this situation, after each high impact node is selected, we renovate the information entropy of all nodes in its local scope and then select the node with the highest information entropy, the process of which is shown in Algorithm 1. E k = − k · 1 k · log 1 k and k is the average degree of the network. 1 2 l−1 is the attenuation factor, the farther the node is from node v, the smaller impact on the node will be. E k can be seen as the information entropy of any node in k -regular graph if k is an integer. From Algorithm 1, we can see that after a new node is selected, the renew of its l-length reachable nodes' information entropy is related with H and E k , which reflects local structure information and global network information, respectively. Compared with VoteRank, EnRenew replaces voting ability by H value between connected nodes. It induces more local information than directly set voting ability as 1 in VoteRank. At the same time, EnRenew uses H E k as the attenuate factor instead of 1 k in VoteRank, retaining global information. Computational complexity (usually time complexity) is used to describe the relationship between the input of different scales and the running time of the algorithm. Generally, brute force can solve most problems accurately, but it cannot be applied in most scenarios because of its intolerable time complexity. Time complexity is an extremely important indicator of an algorithm's effectiveness. Through analysis, the algorithm is proved to be able to identify influential nodes in large-scale network in limited time. The computational complexity of EnRenew can be analyzed in three parts, initialization, selection and renewing. n, m and r represent the number of nodes, edges and initial infected nodes, respectively. At start, EnRenew takes O(n · k ) = O(m) for calculating information entropy. Node selection selects the node with the largest information entropy and requires O(n), which can further be decreased to O(log n) if stored in an efficient data structure such as red-black tree. Renewing the l-length reachable nodes' information entropy needs O( k l ) = O( m l n l ). As suggested in Section 3.3, l = 2 yields impressive results with O( m 2 n 2 ). Since selection and renewing parts need to be performed r times to get enough spreaders,the final computational complexity is O(m + n) + O(r log n) + O(r k 2 ) = O(m + n + r log n + rm 2 n 2 ). Especially, when the network is sparse and r n, the complexity will be decreased to O(n). The algorithm's performance is measured by the selected nodes' properties including its spreading ability and location property. Spreading ability can be measured by infected scale at time t F(t) and final infected scale F(t c ), which are obtained from SIR simulation and widely used to measure the spreading ability of nodes [61, [84] [85] [86] [87] [88] . L S is obtained from selected nodes' location property by measuring their dispersion [61] . Infected scale F(t) demonstrates the influence scale at time t and is defined by where n I(t) and n R(t) are the number of infected and recovered nodes at time t, respectively. At the same time step t, larger F(t) indicates more nodes are infected by initial influential nodes, while a shorter time t indicates the initial influential nodes spread faster in the network. F(t c ) is the final affected scale when the spreading reaches stable state. This reflects the final spreading ability of initial spreaders. The larger the value is, the stronger the spreading capacity of initial nodes. F(t c ) is defined by: where t c is the time when SIR propagation procedure reaches its stable state. L S is the average shortest path length of initial infection set S. Usually, with larger L S , the initial spreaders are more dispersed and can influence a larger range. This can be defined by: where l u,v denotes the length of the shortest path from node u to v. If u and v is disconnected, the shortest path is replaced by D GC + 1, where D GC is the largest diameter of connected components. An example network shown in Figure 2 is used to show the rationality of nodes the proposed algorithm chooses. The first three nodes selected by EnRenew is distributed in three communities, while those selected by the other algorithms are not. We further run the SIR simulation on the example network with EnRenew and other five benchmark methods. The detailed result is shown in Table 1 for an in-depth discussion. This result is obtained by averaging 1000 experiments. . This network consists of three communities at different scales. The first nine nodes selected by EnRenew are marked red. The network typically shows the rich club phenomenon, that is, nodes with large degree tend to be connected together. Table 2 shows the experiment results when choosing 9 nodes as the initial spreading set. Greedy method is usually used as the upper bound, but it is not efficient in large networks due to its high time complexity. EnRenew and PageRank distribute 4 nodes in community 1, 3 nodes in community 2, and 1 node in community 3. The distribution matches the size of community. However, the nodes selected by the other algorithms tend to cluster in community 1 except for greedy method. This will induce spreading within high density area, which is not efficient to spread in the entire network. EnRenew and PageRank can adaptively allocate reasonable number of nodes based on the size of the community just as Greedy method. Nodes selected by EnRenew have the second largest average distance except Greedy, which indicates EnRenew tends to distribute nodes sparsely in the graph. It aptly alleviates the adverse effect of spreading caused by the rich club phenomenon. Although EnRenew's average distance is smaller than PageRank, it has a higher final infected scale F(t c ). Test result on PageRank also indicates that just select nodes widely spread across the network may not induce to a larger influence range. EnRenew performs the closest to Greedy with a low computational cost. It shows the proposed algorithm's effectiveness to maximize influence with limited nodes. Note: n and m are the total number of nodes and edges, respectively, and k = 2 * m n stands for average node degree and k max = max v∈V d v is the max degree in the network and Average clustering coefficient c measures the degree of aggregation in the network. c = 1 n ∑ n i=1 2 * I i |Γ i | * (|Γ i |−1) , where I i denotes the number of edges between direct neighbors of node i. Table 2 describes six different networks varying from small to large-scale, which are used to evaluate the performance of the methods. CEnew [89] is a list of edges of the metabolic network of C.elegans. Email [90] is an Email user communication network. Hamster [91] is a network reflecting friendship and family links between users of the website http://www.hamsterster.com, where node and edge demonstrate the web user and relationship between two nodes, respectively. Router network [92] reflects the Internet topology at the router level. Condmat (Condense Matter Physics) [93] is a collaboration network of authors of scientific papers from the arXiv. It shows the author collaboration in papers submitted to Condense Matter Physics. A node in the network represents an author, and an edge between two nodes shows the two authors have collaboratively published papers. In the Amazon network [94] , each node represents a product, and an edge between two nodes represents two products were frequently purchased together. We firstly conduct experiments on the parameter l, which is the influence range when renewing the information entropy. If l = 1, only the direct neighbors' importance of selected node will be renewed, and if l = 2, the importance of 2-length reachable nodes will be renewed and so forth. The results with varying parameter l from 1 to 4 on four networks are shown in Figure 3 . It can be seen from Figure 3 that, when l = 2, the method gets the best performance in four of the six networks. In network Email, although the results when l = 3 and l = 4 are slightly better comparing with the case of l = 2, the running time increases sharply. Besides, the three degrees of influence (TDI) theory [95] also states that a individual's social influence is only within a relatively small range. Based on our experiments, we set the influence range parameter l at 2 in the preceding experiments. With specific ratio of initial infected nodes p, larger final affected scale F(t c ) means more reasonable of the parameter l. The best parameter l differs from different networks. In real life application, l can be used as an tuning parameter. Many factors affect the final propagation scale in networks. A good influential nodes mining algorithm should prove its robustness in networks varying in structure, nodes size, initial infection set size, infection probability, and recovery probability. To evaluate the performance of EnRenew, VoteRank , Adaptive Degree, k-shell, PageRank, and h-index algorithms are selected as benchmark methods for comparing. Furthermore, greedy method is usually taken as upper bound on influence maximization problem, but it is not practical on large networks due to its high time computational complexity. Thus, we added Greedy method as upper bound on the two small networks (CEnew and Email). The final affected scale F(t c ) of each method on different initial infected sizes are shown in Figure 4 . It can be seen that EnRenew achieves an impressing result on the six networks. In the small network, such as CEnew and Email, EnRenew has an apparent better result on the other benchmark methods. Besides, it nearly reaches the upper bound on Email network. In Hamster network, it achieves a F(t c ) of 0.22 only by ratio of 0.03 initial infected nodes, which is a huge improvement than all the other methods. In Condmat network, the number of affected nodes are nearly 20 times more than the initial ones. In a large Amazon network, 11 nodes will be affected on average for one selected initial infected node. But the algorithm performs unsatisfactory on network Router. All the methods did not yield good results due to the high sparsity structure of the network. In this sparse network, the information can hardly spread out with small number of initial spreaders. By comparing the 6 methods from the Figure 4 , EnRenew surpasses all the other methods on five networks with nearly all kinds of p varying from small to large. This result reveals that when the size of initial infected nodes varies, EnRenew also shows its superiority to all the other methods. What is worth noticing is that EnRenew performs about the same as other methods when p is small, but it has a greater improvement with the rise of initial infected ratio p. This phenomenon shows the rationality of the importance renewing process. The renewing process of EnRenew would influence more nodes when p is larger. The better improvement of EnRenew than other methods shows the renewing process reasonability redistributes nodes' importance. Timestep experiment is made to assess the propagation speed when given a fixed number of initial infected nodes. The exact results of F(t) varying with time step t are shown in Figure 5 . From the experiment, it can be seen that with same number of initial infected nodes, EnRenew always reaches a higher peak than the benchmark methods, which indicates a larger final infection rate. In the steady stage, EnRenew surpasses the best benchmark method by 21.1%, 7.0%, 30.0%, 5.0%, 2.5% and 9.0% in final affected scale on CEnew, Email, Hamster, Router, Condmat and Amazon networks, respectively. In view of propagation speed, EnRenew reaches the peak at about 300th time step in CEnew, 200th time step in Email, 400th time step in Hamster, 50th time step in Router, 400th time step in Condmat and 150th time step in Amazon. EnRenew always takes less time to influence the same number of nodes compared with other benchmark methods. From Figure 5 , it can also be seen that k-shell also performs worst from the early stage in all the networks. Nodes with high core value tend to cluster together, which makes information hard to dissipate. Especially in the Amazon network, after 100 timesteps, all other methods reach a F(t) of 0.0028, which is more than twice as large as k-shell. In contrast to k-shell, EnRenew spreads the fastest from early stage to the steady stage. It shows that the proposed method not only achieve a larger final infection scale, but also have a faster infection rate of propagation. In real life situations, the infected rate λ varies greatly and has huge influence on the propagation procedure. Different λ represents virus or information with different spreading ability. The results on different λ and methods are shown in Figure 6 . From the experiments, it can be observed that in most of cases, EnRenew surpasses all other algorithms with λ varying from 0.5 to 2.0 on all networks. Besides, experiment results on CEnew and Email show that EnRenew nearly reaches the upper bound. It shows EnRenew has a stronger generalization ability comparing with other methods. Especially, the EnRenew shows its impressing superiority in strong spreading experiments when λ is large. Generally speaking, if the selected nodes are widely spread in the network, they tend to have an extensive impact influence on information spreading in entire network. L S is used to measure dispersity of initial infected nodes for algorithms. Figure 7 shows the results of L S of nodes selected by different algorithms on 6 different networks. It can be seen that, except for the Amazon network, EnRenew always has the largest L S , indicting the widespread of selected nodes. Especially in CEnew, EnRenew performs far beyond all the other methods as its L S is nearly as large as the upper bound. In regard to the large-scale Amazon network, the network contains lots of small cliques and k-shell selects the dispersed cliques, which makes k-shell has the largest L S . But other experimental results of k-shell show a poor performance. This further confirms that EnRenew does not naively distribute selected nodes widely across the network, but rather based on the potential propagation ability of each node. Figure 5 . This experiment compares different methods regard to spreading speed. Each subfigure shows experiment results on one network. The ratio of initial infected nodes is 3% for CEnew, Email, Hamster and Router, 0.3% for Condmat and 0.03% for Amazon. The results are obtained by averaging on 100 independent runs with spread rate λ = 1.5 in SIR. With the same spreading time t, larger F(t) indicates larger influence scale in network, which reveals a faster spreading speed. It can be seen from the figures that EnRenew spreads apparently faster than other benchmark methods on all networks. On the small network CEnew and Email, EnRenew's spreading speed is close to the upper bound. 0.5 0. 8 Figure 6 . This experiment tests algorithms' effectiveness on different spreading conditions. Each subfigure shows experiment results on one network. The ratio of initial infected nodes is 3% for CEnew, Email, Hamster and Router, 0.3% for Condmat, and 0.03% for Amazon. The results are obtained by averaging on 100 independent runs. Different infected rate λ of SIR can imitate different spreading conditions. EnRenew gets a larger final affected scale F(t c ) on different λ than all the other benchmark methods, which indicates the proposed algorithm has more generalization ability to different spreading conditions. . This experiment analysis average shortest path length L S of nodes selected by different algorithms. Each subfigure shows experiment results on one network. p is the ratio of initial infected nodes. Generally speaking, larger L S indicates the selected nodes are more sparsely distributed in network. It can be seen that nodes selected by EnRenew have the apparent largest L S on five networks. It shows EnRenew tends to select nodes sparsely distributed. The influential nodes identification problem has been widely studied by scientists from computer science through to all disciplines [96] [97] [98] [99] [100] . Various algorithms that have been proposed aim to solve peculiar problems in this field. In this study, we proposed a new method named EnRenew by introducing entropy into a complex network, and the SIR model was adopted to evaluate the algorithms. Experimental results on 6 real networks, varying from small to large in size, show that EnRenew is superior over state-of-the-art benchmark methods in most of cases. Besides, with its low computational complexity, the presented algorithm can be applied to large scale networks. The EnRenew proposed in this paper can also be well applied in rumor controlling, advertise targeting, and many other related areas. But, for influential nodes identification, there still remain many challenges from different perspectives. From the perspective of network size, how to mine influential spreaders in large-scale networks efficiently is a challenging problem. In the area of time-varying networks, most of these networks are constantly changing, which poses the challenge of identifying influential spreaders since they could shift with the changing topology. In the way of multilayer networks, it contains information from different dimensions with interaction between layers and has attracted lots of research interest [101] [102] [103] . To identify influential nodes in multilayer networks, we need to further consider the method to better combine information from different layers and relations between them. The Scientific Collaboration Networks in University Management in Brazil Arenas, A. Self-similar community structure in a network of human interactions Insights into protein-DNA interactions through structure network analysis Statistical analysis of the Indian railway network: A complex network approach Social network analysis Network analysis in the social sciences Prediction in complex systems: The case of the international trade network The dynamics of viral marketing Extracting influential nodes on a social network for information diffusion Structure and dynamics of molecular networks: A novel paradigm of drug discovery: A comprehensive review Efficient immunization strategies for computer networks and populations A Study of Epidemic Spreading and Rumor Spreading over Complex Networks Epidemic processes in complex networks Unification of theoretical approaches for epidemic spreading on complex networks Epidemic spreading in time-varying community networks Suppression of epidemic spreading in complex networks by local information based behavioral responses Efficient allocation of heterogeneous response times in information spreading process Absence of influential spreaders in rumor dynamics A model of spreading of sudden events on social networks Daniel Bernoulli?s epidemiological model revisited Herd immunity: History, theory, practice Epidemic Disease in England: The Evidence of Variability and of Persistency of Type Infectious Diseases of Humans: Dynamics and Control Thermodynamic efficiency of contagions: A statistical mechanical analysis of the SIS epidemic model A rumor spreading model based on information entropy An algorithmic information calculus for causal discovery and reprogramming systems The hidden geometry of complex, network-driven contagion phenomena Extending centrality The H-index of a network node and its relation to degree and coreness Identifying influential nodes in complex networks Identifying influential nodes in large-scale directed networks: The role of clustering Collective dynamics of ?small-world?networks Identification of influential spreaders in complex networks Ranking spreaders by decomposing complex networks Eccentricity and centrality in networks The centrality index of a graph A set of measures of centrality based on betweenness A new status index derived from sociometric analysis Mutual enhancement: Toward an understanding of the collective preference for shared information Factoring and weighting approaches to status scores and clique identification Dynamical systems to define centrality in social networks The anatomy of a large-scale hypertextual web search engine Leaders in social networks, the delicious case Using mapping entropy to identify node centrality in complex networks Path diversity improves the identification of influential spreaders How to identify the most powerful node in complex networks? A novel entropy centrality approach A novel entropy-based centrality approach for identifying vital nodes in weighted networks Node importance ranking of complex networks with entropy variation Key Node Ranking in Complex Networks: A Novel Entropy and Mutual Information-Based Approach A new method to identify influential nodes based on relative entropy Influential nodes ranking in complex networks: An entropy-based approach Discovering important nodes through graph entropy the case of enron email database Identifying node importance based on information entropy in complex networks Ranking influential nodes in complex networks with structural holes Ranking influential nodes in social networks based on node position and neighborhood Detecting rich-club ordering in complex networks Maximizing the spread of influence through a social network Efficient influence maximization in social networks Identifying sets of key players in a social network A shapley value-based approach to discover influential nodes in social networks Identifying a set of influential spreaders in complex networks Identifying effective multiple spreaders by coloring complex networks Effects of the distance among multiple spreaders on the spreading Identifying multiple influential spreaders in term of the distance-based coloring Identifying multiple influential spreaders by a heuristic clustering algorithm Spin glass approach to the feedback vertex set problem Effective spreading from multiple leaders identified by percolation in the susceptible-infected-recovered (SIR) model Finding influential communities in massive networks Community-based influence maximization in social networks under a competitive linear threshold model A community-based algorithm for influence blocking maximization in social networks Detecting community structure in complex networks via node similarity Community structure detection based on the neighbor node degree information Community-based greedy algorithm for mining top-k influential nodes in mobile social networks Identifying influential nodes in complex networks with community structure An efficient memetic algorithm for influence maximization in social networks Efficient algorithms for influence maximization in social networks Local structure can identify and quantify influential global spreaders in large scale social networks Identifying influential spreaders in complex networks by propagation probability dynamics Systematic comparison between methods for the detection of influential spreaders in complex networks Vital nodes identification in complex networks SIR rumor spreading model in the new media age Stochastic SIR epidemics in a population with households and schools Thresholds for epidemic spreading in networks A novel top-k strategy for influence maximization in complex networks with community structure Identifying influential spreaders in complex networks based on kshell hybrid method Identifying key nodes based on improved structural holes in complex networks Ranking nodes in complex networks based on local structure and improving closeness centrality An efficient algorithm for mining a set of influential spreaders in complex networks The large-scale organization of metabolic networks The koblenz network collection The network data repository with interactive graph analytics and visualization Measuring ISP topologies with Rocketfuel Graph evolution: Densification and shrinking diameters Defining and evaluating network communities based on ground-truth The spread of obesity in a large social network over 32 years Identifying the influential nodes via eigen-centrality from the differences and similarities of structure Tracking Influential Individuals in Dynamic Networks Evaluating influential nodes in social networks by local centrality with a coefficient A survey on topological properties, network models and analytical measures in detecting influential nodes in online social networks Identifying influential spreaders in noisy networks Spreading processes in multilayer networks Identifying the influential spreaders in multilayer interactions of online social networks Identifying influential spreaders in complex multilayer networks: A centrality perspective We would also thank Dennis Nii Ayeh Mensah for helping us revising English of this paper. The authors declare no conflict of interest.