Title: Identifying influential spreaders in complex networks using neighbourhood coreness and path diversity

Authors: Xiong Yang; Guangqian Xie; Xiaofang Li

Addresses: School of Computer and Information Engineering, Changzhou Institute of Technology, Changzhou 213002, China ' School of Computer and Information Engineering, Changzhou Institute of Technology, Changzhou 213002, China ' School of Computer and Information Engineering, Coordination and Innovation Center of Digital Information Technology, Changzhou Institute of Technology, Changzhou 213002, China

Abstract: The k-shell decomposition method dividing a great deal of nodes with different propagation capabilities into the same k-shell layer is unable to identify the influential spreaders accurately. Previous works improving the k-shell centrality were promising but inadequate, due to local neighbourhood and spreading dynamics of information. To solve this problem, the path diversity based on information entropy is proposed. We have investigated the spreading dynamics using susceptible-infected model and independent cascade model to reveal the behaviour of influential spreaders on the basis of topological location and neighbourhood information. Accordingly, a novel neighbourhood coreness method using path diversity to identify the influential spreaders from the point of information dissemination is proposed in this work. The simulation is evaluated with two real network datasets. The experimental results show that the neighbourhood coreness centrality with the spreading diversity is capable of identifying the influential spreaders more effectively and rank the spreading influence in a more fine-grained level. The nodes found by our method can produce a wider spreading scope in independent cascade model and can take less time to achieve the saturation point in susceptible-infected model.

Keywords: spreading capability; neighbourhood coreness centrality; path diversity; k-shell decomposition; influential spreaders.

DOI: 10.1504/IJSN.2021.117866

International Journal of Security and Networks, 2021 Vol.16 No.3, pp.174 - 182

Received: 14 Sep 2020
Accepted: 04 Oct 2020

Published online: 04 Oct 2021 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article