<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Node Identification in Complex Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>T Seshu Chakravarthy</string-name>
          <email>tseshuchakravarthy@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S. Lokesh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Associate Professor, Dept. of CSE, PSG Institute of Technology and Applied Research</institution>
          ,
          <addr-line>Coimbatore - 641062</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dept. of Information and Communication Engineering, Anna University</institution>
          ,
          <addr-line>Chennai</addr-line>
        </aff>
      </contrib-group>
      <fpage>11</fpage>
      <lpage>26</lpage>
      <abstract>
        <p>Recognizing the most effective' propagators' in a network is a critical step toward maximizing the use of prevailing resources and ensuring that information is spread more effectively. Spreading is a term that encompasses a wide range of significant societal actions. Understanding how wrong information spreads across a network of social contacts is critical for finding practical approaches to slow or speed up information dissemination spread. Indeed, people are connected in society based on how they connect. The wide variety of the resulting network has a significant impact on the efficiency and speed information spreads. The most connected persons are seen as essential participants in networks with a broad degree distribution as they are responsible for the enormous scale of the course of infection. Furthermore, in social network theory, the value of a node for spreading is frequently linked to its betweenness centrality, which is a measurement of how many shortest paths pass through this node and is thought to define who has more significant 'interpersonal influence' on others. One of the areas of research in network evidence mining is identifying the influential nodes. Many closeness centralities used to assess node influence abilities struggle to balance accuracy and temporal complication. One of the research areas in network mining is identifying influential nodes. Because of the enormous scaled data and network sizes and the regularly changing behaviors of contemporary topologies, identifying influential nodes in multifaceted networks is difficult. Identifying essential nodes in compliant networks is critical in a variety of application scenarios, such as the spread of illness and immunization, disinfection and software virus infection, and greater product awareness and rumour destruction. Even though several ways to address the issues have been presented, most relevant research has focused on only a few specific areas of the problem. In this research, we conducted a brief review of recently published studies to identify various approaches that are useful in identifying prominent nodes in a complex network that are primarily responsible for the transmission of incorrect or correct information. Betweenness Centrality (BC), Closeness Centrality (CC), Community Question Answering (CQA), Degree Centrality (DC), Edge Ant triangle Centrality method (EACH), Effective Distance-Based Centrality (EDBC), Eigenvector Centrality (EC), Gravity Index Centrality (GIC), H Index (HI), K- Structural Diversity Anonymization (k-SDA), Label Propagation Algorithm (LPA), Profit Leader (PL), Susceptible Infected Recovered (SIR).</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        As the ideal spreaders of information in social networks, [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] the crucial breakers in power grids,
extremely persuasive individuals have an essential role in complex system dynamics, such as target
population immunization
decisions.
      </p>
      <p>Complex
networks
necessitate the identification of the
furthermost influential nodes along with the development of practical algorithms for rating node</p>
      <p>
        2022 Copyright for this paper by its authors.
influence. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ][
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. If you are only interested in finding a few of the most potent nodes, it does not
make sense to rank all of them. A small number of influential individuals influences the dynamics of
complex systems. Because of the rapid expansion of social networks in recent years, a new possibility
for worldwide message dissemination and successful news broadcasting has emerged. The identifying
of influential nodes inside such a network is increasingly viewed as a critical component in realizing
this potential. K-shell is a node effect detection metric that has already been employed in several
successful techniques in this field. On the other side, K-shell does not provide adequate information
on the nodes' topological placements. Theoretically and practically, figuring out which nodes in a
network are most influential is perilous. Topology and network scale and the timing of energetic
behavior in a real network must be considered. The fundamental purpose of network information
mining is to identify the most critical nodes in the network. According to several centrality
measurements, it is impossible to balance accuracy and complexity. As a result of its universality,
networks became an essential topic in complex systems research [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ][
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Based on the notion that a
network graph can describe a complicated system with a set of components and connections between
them, nodes signify individual components, and links indicate the relationships between them. The
particular nodes that can substantially influence the network's operation and structure are known as
critical nodes. Protecting the network's most critical nodes is critical to the network's long-term
viability and resilience [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The identification of influential nodes in complicated systems has been frequently utilized to
restrict the spread of outbreaks and diseases and to suppress rumour transmission. However, obtaining
a node inspiration rating with high accuracy and completeness requires time and can be challenging if
multiple measurements are performed on the same subject. In order to maintain the integrity and
stability of a network, it is essential to identify the nodes that have a significant influence. Many
clustering methods used to assess node influence capacities cannot strike a balance between accuracy
and temporal complexity. Because of their growing popularity, many businesses are turning to social
media for viral marketing. Identifying essential people to distribute news and advertising in viral
marketing is a crucial difficulty. It is one of the most difficult research problems in the world of
complex networks to identify the most influential nodes. Many existing approaches for identifying
prominent nodes rely on node attributes, but in unweighted networks, most of them treat edges
identically.</p>
      <p>
        Complex networks are abstractions of complex systems that can be used to describe and
investigate interactions between things in the real world. The node influence of complex networks is
determined by their topology [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Complicated network mining has recently received a lot of attention
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ][
        <xref ref-type="bibr" rid="ref11">11</xref>
        ][
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Various studies consider a node with a higher transmission capacity significant because
it can distribute a message to a group of network users [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. When compared to other nodes,
influential nodes have more local or global network information. For successful message transmission
in social networks, evaluating the propagation capabilities of nodes and identifying prominent nodes
is critical [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Influential node mining in complicated systems offers a variety of practical uses in
addition to its theoretical significance. For example, when the national electricity grid grows in size,
its structure becomes much more complex, and the failure of many essential trunks might collapse the
entire network [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        The study of network topologies, functions, and relationships has recently gotten a lot of attention
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Many mechanisms, including spreading, cascading, and synchronization, are heavily influenced
by a small number of prominent nodes [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ][
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. It is essential to figure out how to locate these key
nodes theoretically. Furthermore, identifying influential nodes is helpful for disease propagation and
rumour management, as well as for the development of new marketing strategies. Dispersion can be
accelerated and spread more widely in complicated networks if crucial nodes are identified.
Approaching degree centrality in this manner is a no-brainer. A complete waste of resources. It is
possible to identify influential nodes using global measures such as closeness and betweenness
centrality. However, these measurements are computationally prohibitive for use in vast networks.
Only a few people have a significant impact on the workings of complicated systems. Theoretically
and practically, it is essential to identify the most important nodes in a network. In the context of
network size, topology, and erratic behavior, Degree centrality is a simple and efficient statistic.
However, it is less significant, whereas a location with a few highly influential neighbors can have a
lot more influence than a node with many less influential neighbors. Connectedness and betweenness
centrality are well-known structures, but their computational cost makes them challenging to handle
in large online social networks. When selecting the most influential social network users, Lü et al.
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] have developed an algorithm that surpasses PageRank in terms of determining which people are
most likely to spread their opinions and defend against spammers. PageRank [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] performs better in
directed networks than Leader Rank [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] does, but neither performs well in undirected ones. Making
an effective ranking system for essential variables is, thus, an ongoing endeavor.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Various approaches for influencing node detection</title>
    </sec>
    <sec id="sec-3">
      <title>Influential node detection based on networks</title>
      <p>Static Network: A static social media platform resembles a graph structure made up of nodes and
edges, with nodes representing social entities and edges representing relationships, or interactions,
between connected nodes. A graph G= {V, E}, which consists of a collection of a set of edges E and
nodes V linking them, can be used to model a static social network.</p>
      <p>Snapshot Networks: snapshot networks are static networks that represent the nodes and edges
that were engaged at a certain period in dynamic social networks. In order to gain an overall picture of
how a social media site is doing at any particular time, you can take a series of pictures. In many
proposed methodologies, the social network is represented as a series of snapshot graphs {G1, G2, ..
Gm}.</p>
      <p>Temporal Networks: A sequence of static networks is used in modeling a temporal network.
Assumed has three sorts of procedures to perform on dynamic social networks based on what has
been reported in previous research. The study of dynamic networks is becoming more common as
data collection tools improve. How to identify central nodes in socially constructed networks is an
important research topic. Categories are listed in Table 1.
2.2</p>
      <p>Classification based on users’ content</p>
      <p>Identifying influential nodes helps establish who is most likely to help spread information far and
wide in a network. Prediction-based methods (number of friends and follows) and observation-based
methods can both be used to identify influential users. Using (1) Network topology features, various
models, methodologies, and algorithms are proposed based on the methodology. (2) The network's
user features, and (3) the network's user-generated content features.</p>
    </sec>
    <sec id="sec-4">
      <title>Centrality measure for node influence</title>
      <sec id="sec-4-1">
        <title>User-based</title>
      </sec>
      <sec id="sec-4-2">
        <title>User-generated content</title>
      </sec>
      <sec id="sec-4-3">
        <title>Influence</title>
      </sec>
      <sec id="sec-4-4">
        <title>Intensification</title>
      </sec>
      <sec id="sec-4-5">
        <title>Explanation</title>
      </sec>
      <sec id="sec-4-6">
        <title>Online social networks depend on their influence spreader/node selection solely on the current nodes and edges of the system. The selection of nodes with influence is unaffected by time because the nodes being examined are in a static network.</title>
      </sec>
      <sec id="sec-4-7">
        <title>Spreader detection in online social networks is also based on user behaviour. User behaviour is regarded as a characteristic for node selection in certain instances.</title>
      </sec>
      <sec id="sec-4-8">
        <title>In order to progress the success rate of the current influence selection,</title>
        <p>user-generated content-based influence node identification in online
social networks is required. This approach leverages topic-based,
usergenerated information for an in-depth investigation of emotion
recognition.</p>
      </sec>
      <sec id="sec-4-9">
        <title>The challenge of impact maximization can be defined as follows: To optimize the network's impact spreaders, take an integer k and a networking graph as inputs.</title>
        <p>
          Some of the most widely used network data indices are those based on centrality. Most often they
indicate a unit's prominence as a result of its structural power or position in a given context. Studies
typically utilize network-based centrality measures to account for differences in behavior or opinions
between divisions. Because of its applications in a variety of disciplines, such as disease control,
community discovery, data mining, and network system control, to mention a few, the identification
of critical nodes in complicated systems is a rapidly growing field. Many measurements have been
devised so far, all dependent on the specific nodes or the network's overall impact. Euclidean Distance
is typically used in these methods, which only considers the localized static distances between nodes
and ignores the interconnectedness of the nodes. However, a range of characteristics, such as edge,
degree, weight and direction, should be considered when determining influential nodes. Some
evidence theory-based approaches have also been suggested. Another viewpoint is that pathways in
the network primarily determine that node influence. CC [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ] and BC [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] are two algorithms that fall
under this category. To put it another way, a node closer to the network's core has greater sway due to
the obvious shorter distances between nodes in this region. According to BC, a node's effect is heavily
influenced by the number of shortest routes that pass through it. The complexity of BC and CC
algorithms and their sensitivity to network structure make them less effective than other algorithms in
many cases [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ]. Local approaches based on the immediate vicinity or global methods is based on the
journey are represented in the preceding list.
        </p>
        <p>Centrality: The term "centrality" refers to indicators that reflect how essential a node is. There are
several methods for calculating centrality, but they well concentrate on four of the most common
ones: BC, CC, DC, and EC.</p>
        <p>When a node has ten social connections, its DC is ten as well. If a node has only one edge, then its
degree of central1ity is a faultless one (or 1). Sometimes, an SNA application will transform the
numbers to zeroes. A network's most prominent node will also have a degree centrality of 1, or any
other node will have a degree centrality proportional to its degree relative to that most popular node.
A node with 10 edges has a degree centrality of 0.50 (10/20) while the best node in the network has
20 edges. A node's degree of centrality tells us how important it is.</p>
        <p>Each centrality metric, as previously established, reflects a different amount of relevance. The
number of connections a person has is measured by their degree of centrality. People at the network's
core may be connected to them, although they may also be spread over its boundaries. For example, in
figure 5, "Bob" nodes have the same degree, but vastly different roles. One is located in the heart of
downtown, the other on the periphery. Degree centrality correctly indicates who has many social
connections, but it may not always suggest who’s in the network's "center," as these data show.</p>
        <p>Figure 3 and 4 displays the centrality of the four criteria evaluated in the graph. Nodes in red are
considered to be highly central, while nodes in blue are not. Observe how the identical network
appears to have changed dramatically in each of the four images below. Anyone with a strong
centrality score on any of the other factors should be studied further. It's essential to know what each
centrality measure includes.</p>
        <p>Bob is an essential method for knowledge to go from the right-hand clusters to those he knows on
the left. Bob is the only one who can get information about the comments on the left to and from
anyone else. As a result, Bob's role in this network is essential. This is what the idea of "betweenness
centrality" means. This method determines the percentage of shortest paths that pass through a node
in question. Despite its complexity, any hierarchical clustering software package can perform this
calculation for you. Betweenness is an important statistic to keep in mind since it reveals the relative
importance of a node in terms of the information flow it facilitates via a network. Nodes with a high
degree of proximity are expected to be well-versed in a wide range of social circles at all times during
an investigation. A large blue node in the upper right corner joins the blue and purple clusters in
Figure 3 and 4. One node of the system is capable of this. This sizeable blue node, which has a high
degree of betweenness, can be a good source of information about the activities of both groups.</p>
      </sec>
      <sec id="sec-4-10">
        <title>Measures one's ability to facilitate data movement between different network segments. BC CC</title>
        <p>DC</p>
      </sec>
      <sec id="sec-4-11">
        <title>Nodes search for the node with the most connections to other</title>
        <p>nodes. Paths are defined as a series of actions that lead to a
destination. a node's proximity centrality is based on the average
latencies of all the shortest paths that lead from it to another
node.</p>
      </sec>
      <sec id="sec-4-12">
        <title>In terms of centrality metrics, this is the simplest one to calculate.</title>
      </sec>
      <sec id="sec-4-13">
        <title>Remember that a node's degree is defined by the range of social</title>
      </sec>
      <sec id="sec-4-14">
        <title>K-Shell C PL [37] HI [38] GIC [39]</title>
        <p>relationships it has. The degree of a node determines its degree
centrality.</p>
      </sec>
      <sec id="sec-4-15">
        <title>It is a crucial determinant of a node's overall network power.</title>
        <p>Despite its complexity, any software program can handle the
computation. Google utilizes a similar metric for determining the
importance of online sites, which is surprising given the
similarities. However, a node with a low degree centrality,
closeness centrality, or even betweenness centrality might still
impact the system. It is not uncommon for a node at the center of
one measure to also be at the center of another.</p>
      </sec>
      <sec id="sec-4-16">
        <title>When computing the k-shell centrality of nodes, the proximity to the network core is factored. K-shell indices represent the proximity from the network core of each node. The closer a node is to the graph core, the more influential it is.</title>
      </sec>
      <sec id="sec-4-17">
        <title>Which looks at the problem of identifying crucial nodes from a new</title>
        <p>angle. A node's profit capacity is used to rank its impact in the</p>
      </sec>
      <sec id="sec-4-18">
        <title>Profit Leader system.</title>
      </sec>
      <sec id="sec-4-19">
        <title>In this approach, influential nodes are determined using H-index notation and the node's neighboring nodes. Nodes with a high Hindex are more vital to a network's overall health than their lessvital counterparts.</title>
      </sec>
      <sec id="sec-4-20">
        <title>This technique is based on the universal gravitation notion, which considers the effects of nearby nodes and path information.</title>
      </sec>
      <sec id="sec-4-21">
        <title>It is based on the area density formula, which is used to determine the role of nodes in spreading dynamics. The following is the formula.</title>
      </sec>
      <sec id="sec-4-22">
        <title>This strategy is based on the Hub Update and Authority Update</title>
        <p>requirements. Authority updates are determined by the number of</p>
      </sec>
      <sec id="sec-4-23">
        <title>Hub edges connected to authority websites, while Hub updates are</title>
        <p>determined by the number of authoritative websites associated
with the Hub website.</p>
      </sec>
      <sec id="sec-4-24">
        <title>Community question answering</title>
      </sec>
      <sec id="sec-4-25">
        <title>Facebook</title>
        <p>
          In the CQA area, odes recognition has also been extensively explored,
with several models offered. On Q&amp;A sites like "Stack Overflow" and
"Yahoo! Answers," users can frequently discover extensive information
from subject-matter experts. According to [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ], CQA is an expertise
graph that may be used to identify high-expertise users in various
network structures. Following Zhang, [
          <xref ref-type="bibr" rid="ref44">44</xref>
          ] offered topic-based models
to select certain people who could answer a given question using
        </p>
      </sec>
      <sec id="sec-4-26">
        <title>Zhang's technique. [45] Presented an investigation of a general</title>
        <p>purpose Q&amp;A community's link structure to identify authoritative users.</p>
      </sec>
      <sec id="sec-4-27">
        <title>Individuals' relevance can be evaluated using graph-based metrics such</title>
        <p>
          as degree distribution, PageRank, and hub scores collected from a
massive community question-answering portal. Based on the number
of best responses users submit, [
          <xref ref-type="bibr" rid="ref46">46</xref>
          ] identify authoritative actors.
        </p>
      </sec>
      <sec id="sec-4-28">
        <title>With over 400 million active users and an average of 130 friends,</title>
      </sec>
      <sec id="sec-4-29">
        <title>Facebook is the largest social networking site. Various top-k node</title>
        <p>identification studies have made use of the Facebook dataset.
According to activity links, [47] suggested an updated PageRank
method to identify significant members in a social network. It was
found that drawing on users' earlier communication methods, including
such degree centrality, can identify more engaged users who are
retained when evaluated on a Facebook dataset. [48] Calculates degree
centrality based on social ties before generating an activity index to
identify influential individuals in a network graph. The proposed
strategy was tested by looking at the influence spread in a Facebook
game. According to the findings of their experiment, focusing on the
most critical users might increase game rates of growth and the
number of new players.</p>
        <p>It's crucial to note that, despite the many benefits of online social
networks, there are also disadvantages, such as the spread of false
information, which can lead to undesirable repercussions such as public
panic. [49] Designated the misrepresentation control problem as
"identifying a subset of individuals that need to be convinced to adopt
the good campaign to minimize the number of people who adopt the
bad campaign". The authors also included efficient solutions for a
greedy strategy in their description, which they formulated as an
optimized NP-hard problem. By discovering the most prominent nodes
that can be decontaminated with good information, [50] aims to
reduce viral propagation of disinformation in OSNs by limiting the
spread of rumors.</p>
        <p>So far, there has been a lot of research that has focused on an
unweighted network with superficial characteristics and interactions
between nodes. Relationship aspects such as duration and intensity are
frequently obscured by these simple network topologies, When it
comes to heterogeneous networks, nodes and edges can represent a
wide variety of things, whereas inhomogeneous networks, all represent
the same thing. When it comes to heterogeneous networks, nodes and
edges can represent a wide variety of things, whereas inhomogeneous
networks all represent the same thing. As evidenced by [51] [52], this is
likely due to the greater accessibility and ease of evaluation of
homogeneous network data. There has been a lack of effort to identify
the most important network nodes in heterogeneous networks. The</p>
      </sec>
      <sec id="sec-4-30">
        <title>Twitter</title>
        <p>study by [53]. is one of the examples given in this survey. As a result of
the heterogeneous nature of the network, the Algorithm has to deal
with two random walks in order to rank authors and their articles,
which adds complexity.</p>
      </sec>
      <sec id="sec-4-31">
        <title>Only a few scholars have studied the issue of forecasting prominent</title>
        <p>members in online social networks and [54] is one among them. A
nonconservative influence dispersion is one in which the network structure
and the dynamical processes that take place on it are both taken into
account.</p>
        <p>In the recent decade, online social networking media have exploded in
popularity and usage, and it has become costly for many firms trying to
sell their products and services to comprehend how data is conveyed
and disseminated to customers on these platforms. Among these social
networking services, Twitter is the most widely used. As one of the
most well-known microblogging sites, Twitter relies on its community
of "Twitterers" to disseminate information to their respective
networks. Influence and information spread might be significantly more
significant if a small number of notable and well-known Twitterers
were to communicate information. These essential and influential
tweeters are being sought from various perspectives, including (but not
limited to) [55].</p>
        <p>The network depicted in the below figure can be used as an example to show how it works: a; look
at the CC of node D and node A on their own. To begin, find the average length of the shortest path to
node D. It is then necessary to know the distance between D and any other node in the network. A
distance of one separates each of its three closest friends: C, E, and H. All of D's shortest paths are
shown below. Closeness centrality is perhaps the most accurate portrayal of what we see in the world
around us. This statistic places the most critical nodes in the network's core. Nodes with a high
proximity centrality are likely to be within easy reach of the bulk of the network's users. This means
that in the event of an investigation, the subject is likely to hear from much of their friends' friends.
As a result, they will be an excellent source of second-hand knowledge.</p>
        <p>A node's EC is a measure of its network power. Despite its complexity, any software program can
handle the computation. Google utilizes a similar metric for determining the importance of online
sites, which is surprising given the similarities. However, a node with a low degree of centrality,
closeness centrality, or even betweenness centrality might still impact the system. It is not uncommon
for a node at the center of one measure to also be at the center of another.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>3. Related Work</title>
      <p>Online social network marketing's end goal is to promote marketing content rapidly and cheaply
while increasing sales, as per Zhiguo Zhu et al., The biggest issue in this process is pinpointing the
most influential people. This research proposes a novel strategy [56] for assisting organizations in
identifying such users as seeds in viral marketing to enhance knowledge dispersion. To begin, the
major website security infrastructure for marketing and the collective interest levels of users, even
isolated persons, are thoroughly documented. Once this framework has been created, we'll be able to
emulate viral marketing's information dissemination process by incorporating a dynamic algorithm
definition. Finally, real data from the prominent social networking site Opinions is used in the testing.
According to the results of the testing, the proposed method is more scalable and requires less time to
complete. In the four sub-datasets involving communication time and range rate consumption, the
new approach outperformed the standard method.</p>
      <p>In general, node or edge centrality features, or both, are used in centrality-based community
detection. Sun et al. (2014) [57] suggested a novel approach based on link weights to distinguish
between a community's internal linkages and the external links of connected communities.
Unweighted networks are turned into weighted networks by assigning connection weights. Finally,
depending on weak and active relationships, community detection is achievable.</p>
      <p>Clustering and power-law distribution are among the characteristics that characterize networks
with high complexity, as per Shuyu et al. One of the key goals of study in the field is to discover the
spreaders, which are used to identify nodes that play a critical role in the construction and function of
complex networks. The gravity model is a one-of-a-kind method of identifying influencers. The topic
of how to determine the contact range remains unanswered. Moreover, in traditional ways, the mass is
solely expressed by the degrees of nodes, which is likewise an assumed subject at first. In an attempt
to face the two issues above, the research proposal [58] employs an appropriate gravity system based
on specific value and radius data. Precision is used to calculate the rough truncation radius. The value
data is converted to mass, indicating the node's capacity to convey information. In a nutshell, every
node's impact range and quality score are determined by its properties and network interactions. On
eleven real-world networks, six studies show that the proposed methodology is both reasonable and
preferable to other equivalent methodologies and current state of the art measurements."</p>
      <p>Edge centrality-based creation awareness among the people is a revolutionary approach that was
presented under the centrality-based approach (Jia et al. 2014). Clustering methods can be improved
by using the EACH, a proposed technique [59] that examines the importance and aspects of edge
centrality. The centrality score for each node in the system is recursively calculated using the
antitriangle property until it reaches zero. After there, it's up to the network to come up with its own
structure.</p>
      <p>Edge centrality-built community identifying is critical to the diffusion of information in OSNs
since it relies on a good initial selection of nodes for its propagation. The initial collection of nodes,
known as impact nodes, is determined by the network's topology's edge centrality (Salton centrality)
[60] (Ahajjam et al. 2016). The community structure is built from the consequent influence node, and
the approach does not require prior acquaintance of the collection of communities to be formed in an
assumed network.</p>
      <p>Tai et al. (2014) presented vertex degree-dependent community discovery for user confidentiality
in OSNs as a centrality technique [61]. The vertex degree exploits anonymity's structural variety to
detect communities. The k-SDA ensures that the number of vertices and their degrees remains
consistent when forming multiple groups of societies in social networks. At last, large-scale societies
emerge as a result of intricate social networks.</p>
      <p>In the centrality approach, community discovery is adapted to determine network topology
commonality. Hui et al. (2017) proposed combining CC with signal transmission [62]. The ultimate
rank of resemblance amid nodes and proximity centrality, estimated using signal communication, is
used to select a center node for community formation. Finally, with an iteratively updated community
center node, tiny groups of communities are adaptively joined to produce a resultant community.</p>
      <p>As part of their research on centrality-based community detection, Chang et al. (2018) moved
community discovery from an undirected network to a directed graph with preconceived concepts.
For node collection in the community building procedure, the method [63] incorporates node
centrality, modularity and relative centrality properties. Partitional, fast-unfolding, and agglomerative
algorithms are used in undirected graph-based community discovery. However, due to the directional
aspect in the network topology, the partitional technique produces better results than the other two.</p>
      <p>Understanding a network's structural properties in terms of centrality measurements is critical in
the process of community discovery. In an effort to discover overlaying Twitter groups, Wang et al.
(2017) devised a structural centrality-based approach [64]. Using a weighted approach and a local
exploratory procedure, structural centrality can be used to find the network's center nodes for
fostering a sense of community. After the densely connected detection is completed, promising
findings are obtained.</p>
      <p>Given the significant time spent on social networking sites to collect various, large-sized datasets,
for social networking sites, centrality-based community finding is becoming a significant
requirement. To decrease running time complexity in community detection, Rani et al. (2017)
employed LPA [65] with influence centrality. With the LPA, you have the option of using a graph
algorithm that employs either unsupervised or semi-supervised learning techniques. In some
instances, the LPA fails due to a lack of influencing centrality, leading in either a large community to
transact with or no community at all. LPA performance is improved using influential centrality with
hybrid method.</p>
      <p>The most influential nodes, as according Kitsak et al. [66] main members of the network after the
k-shell decomposition, each node is assigned a specific shell value. However, k-shell deconstruction
prefers to give the very same shell value to thousands of nodes, which makes it difficult to detect the
influence of these nodes. On the basis of the aforementioned foundation, numerous approaches to
boosting the effectiveness of the k-shell method have been proposed.</p>
      <p>Zeng and Zhang [67] present a diverse degree decomposition approach for updating nodes that
include residual and depletion degrees. The nodes are eliminated and dissected depending on the
mixed degree in each phase of the decomposition. The parameter, on the other hand, is challenging to
enhance.</p>
      <p>To produce a more distinct list, Liu et al. [68] offer an improved ranking approach. The suggested
method determines the shortest path between the destination and the network's core k-shell
decomposition nodes correlated with a node set with the greatest shell value. Because the approach
identifies the quickest connections to the core nodes, its computational cost is significant.</p>
      <p>It is proposed by Kim and Bae [69] that a new initiative of neighborhood coarseness centrality is
calculated by combining all neighborhood shell values. The location differential of nodes in the
network can be used to further distinguish the influence of nodes with much the same ks value.</p>
      <p>By including iteration statistics and node degree into the decomposition, the degree decomposition
approach based on the iteration factor [70] enhances the performance of the old method. In addition,
specific new node-sorting techniques were developed to boost sporting performance.</p>
      <p>Aman et al. have shown that one of the most significant issues in the subject of composite
networks is the efficient identification of influential nodes, which has both practical and theoretical
implications in the actual world. In these areas, a significant number of ways have been created and
applied, but only a few have used centrality metrics in their studies, which have serious flaws and
limits. As a result, the proposed unique EDBC technique [71] for identifying prominent nodes in
relevant networks to address these difficult difficulties. In order to observe the dynamics of the spread
of each node, the suggested method has been evaluated on nine real-world networks through using
SIR epidemic model. According to simulation results, the proposed approach outperforms
methodological approaches such as betweenness, hyperlink-induced topic search, eigenvector,
closeness centralities, Page rank, K-shell, H-index, gravity, and profit leader by a large margin.</p>
      <p>Evaluating and quantifying the importance of a network's nodes cannot be overstated from a
theoretical and practical standpoint, according to Hui et al. [72], for enhancing system resilience as
well as for constructing an efficient system structure. The number of node neighbors is taken into
account in traditional local centrality metrics of important nodes, but topological links and
interactions between neighbors are ignored. The global centrality metric will not be used to analyze
large base scale complicated networks since of the Algorithm's complexity. Nodes that are located in
the network's core are regarded as the most important by k-shell decomposition even though the
approach only deliberates residual degree and overlooks topological, structure and interaction, with
neighboring nodes. In order to quickly and accurately locate the most critical nodes in a network, this
study uses a method of local centrality measurement depending on the interactions and structure based
on topological properties of nodes and their neighbors. Based on the k-shell reduction method, two
components of the structural hole and degree centrality are presented, which synthesize information
about the network location, scale features, topological structure and interaction between distinct
nuclear layers of nodes and associated neighbors. Real-world four different networks were targeted
for assault in the study. The suggested method compares network efficiency to seven other indices
with an averagely decreasing ratio. Validity and practicality have been demonstrated in the
experiments.</p>
    </sec>
    <sec id="sec-6">
      <title>4. Conclusion</title>
      <p>We surveyed the existing literature on this topic and split it into three categories dependent on
network models: static and snapshot networks and dynamic networks. We then understand the issues
and future directions of the influential node revelation issues in social networks. Numerous studies
have provided an answer to the identification method for influential nodes by presenting various
algorithms, methodologies, and frameworks. Finally, we discovered several issues with recognizing
prominent nodes that have yet to be addressed. As a first step, it could be worthwhile to investigate
the subtle differences in the importance of nodes across different fields of study. The Constantly Time
Diffusion Model, for example, is being studied by academics who want to extend their methodologies
to other diffusion models in order to identify influential nodes. There are several interesting future
directions for huge distributed systems, including existing parallelizing techniques.
5. References
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’08).</p>
      <p>ACM, New York, NY, 866–874. DOI:http://dx.doi.org/10.1145/1401890.1401994
[47] Julia Heidemann, Mathias Klier, and Florian Probst. 2010. Identifying key users in online social
networks: A PageRank based approach. In Proceedings of the International Conference on
Information Systems
[48] E. S. Kim and S. S. Han. 2009. An analytical way to find influencers on social networks and
validate their effects in disseminating social games. In Proceedings of the 2009 International
Conference on Advances in Social Network Analysis and Mining. 41–46.</p>
      <p>DOI:http://dx.doi.org/10.1109/ASONAM.2009.59.
[49] Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of
misinformation in social networks. In Proceedings of the 20th International Conference on World
Wide Web (WWW’11). ACM, New York, NY, 665–674. DOI:
http://dx.doi.org/10.1145/1963405.1963499.
[50] Nam P. Nguyen, Guanhua Yan, My T. Thai, and Stephan Eidenbenz. 2012. Containment of
misinformation spread in online social networks. In Proceedings of the 4th Annual ACM Web
Science Conference (WebSci’12). ACM, New York, NY, 213– 222.</p>
      <p>DOI:http://dx.doi.org/10.1145/2380718.2380746.
[51] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence
through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining (KDD’03). ACM, New York, NY, 137–146.</p>
      <p>DOI:http://dx.doi.org/10.1145/956750.956769.
[52] Jianshu Weng, Ee-Peng Lim, Jing Jiang, and Qi He. 2010. TwitterRank: Finding topic-sensitive
influential twitterers. In Proceedings of the 3rd ACM International Conference on Web Search
and Data Mining (WSDM’10). ACM, New York, NY, 261–270.</p>
      <p>DOI:http://dx.doi.org/10.1145/1718487.1718520.
[53] Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, and C. Lee Giles. 2007. Co-ranking authors
and documents in a heterogeneous network. In Proceedings of the 7th IEEE International
Conference on Data Mining (ICDM’07). 739–744.</p>
      <p>DOI:http://dx.doi.org/10.1109/ICDM.2007.57.
[54] Rumi Ghosh and Kristina Lerman. 2010. Predicting influential users in online social networks. In</p>
      <p>Proceedings of the Fourth SNA-KDD Workshop. http://arxiv.org/abs/1005.4882.
[55] Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. 2011. Everyone’s an
influencer: Quantifying influence on twitter. In Proceedings of the 4th ACM International
Conference on Web Search and Data Mining (WSDM’11). ACM, New York, NY, 65–74.</p>
      <p>DOI:http://dx.doi.org/10.1145/1935826.1935845.
[56] Zhiguo Zhu, Discovering the influential users oriented to viral marketing based on online social
networks, Physica A: Statistical Mechanics and its Applications, Volume 392, Issue 16,2013,
Pages 3459-3469, ISSN 0378-4371, https://doi.org/10.1016/j.physa.2013.03.035.
[57] Sun, PG 2014, ‗Weighting links based on edge centrality for community detection, Physica A:</p>
      <p>Statistical Mechanics and Its Applications, vol. 394, pp. 346-357.
[58] Shuyu Li, Fuyuan Xiao, The identification of crucial spreaders in complex networks by effective
gravity model, Information Sciences, Volume 578, 2021, Pages 725-749, ISSN 0020-0255,
https://doi.org/10.1016/j.ins. 2021.08.026.
[59] Jia, S, Gao, L, Gao, Y &amp; Wang, H 2014, ‗Anti-triangle centrality-based community detection in
complex networks, IET Systems Biology, vol. 8, no. 3, pp. 116-125.
[60] Ahajjam, S, El Haddad, M &amp; Badir, H 2016, Influential identification for community detection in
complex networks, In Information Science and Technology (CiSt) 4th IEEE International
Colloquium, pp. 111-115.
[61] Tai, CH, Philip, SY, Yang, DN &amp; Chen, MS 2014, ‗Structural diversity for resisting community
identification in published social networks‘, IEEE Transactions on Knowledge and Data
Engineering, vol. 26, no. 1, pp. 235-252.
[62] Hui, L, Tao, L, Xianglin, H &amp; Hongxiao, G 2017, ‗Detection Algorithm Based on Closeness
Rank and Signal Transmission, IEEE 2 nd Advanced Information Technology, Electronic and
Automation Control Conference (IAEAC), pp. 443 - 447
[63] Chang, CS, Lee, DS, Liou, LH, Lu, SM &amp; Wu, MH 2018, ‗A Probabilistic Framework for
Structural Analysis and Community Detection in Directed Networks‘, IEEE/ACM Transactions
on Networking(TON), vol. 26, no. 1, pp. 31-46.
[64] Wang, C, Tang, W, Wang, Y, Fang, J &amp; Yao, S 2017, ‗Local Community Detection Algorithm
Based on Links and Content‘,IEEE 2 nd Advanced Information Technology, Electronic and
Automation Control Conference (IAEAC), pp. 1805-1808
[65] Rani, S &amp; Mehrotra, M 2017, ‗Hybrid influential centrality based label propagation algorithm
for community detection, In Computing, Communication and Automation (ICCCA),
International Conference, pp. 11-16.
[66] M. Kitsak, L. K. Gallos, S. Havlin et al., “Identification of influential spreaders in complex
networks,” Nature Physics, vol. 6, no. 11, pp. 888–893, 2010.
[67] A. Zeng and C.-J. Zhang, “Ranking spreaders by decomposing complex networks,” Physics</p>
      <p>Letters A, vol. 377, no. 14, pp. 1031–1035, 2013.
[68] J.-G. Liu, Z.-M. Ren, and Q. Guo, “Ranking the spreading influence in complex networks,”</p>
      <p>Physica A: Statistical Mechanics and Its Applications, vol. 392, no. 18, pp. 4154–4159, 2013.
[69] J. Bae and S. Kim, “Identifying and ranking influential spreaders in complex networks by
neighborhood coreness,” Physica A: Statistical Mechanics and Its Applications, vol. 395, no. 4,
pp. 549–559, 2014.
[70] Z. Wang, Y. Zhao, J. Xi, and C. Du, “Fast ranking influential nodes in complex networks using a
k-shell iteration factor,” Physica A: Statistical Mechanics and Its Applications, vol. 461, pp. 171–
181, 2016.
[71] Aman Ullah, Bin wang, Jinfang Sheng, Jun Long, Nasrullah Khan, "Identification of Influential
Nodes via Effective Distance-based Centrality Mechanism in Complex Networks", Complexity,
vol. 2021, Article ID 8403738, 16 pages, 2021. https://doi.org/10.1155/2021/8403738.
[72] Hui Xu, Jianpei Zhang, Jing Yang, Lijun Lun, "Identifying Important Nodes in Complex
Networks Based on Multiattribute Evaluation", Mathematical Problems in Engineering, vol.
2018, Article ID 8268436, 11 pages, 2018. https://doi.org/10.1155/2018/8268436.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Wu</surname>
            <given-names>X D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>Y</given-names>
          </string-name>
          and
          <string-name>
            <surname>Li L 2014 Chin. J. Comput</surname>
          </string-name>
          .
          <volume>37</volume>
          735 (in Chinese)
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Wang</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen H W and Cheng</surname>
            <given-names>X Q</given-names>
          </string-name>
          <year>2013</year>
          Chin.
          <source>Phys. B 22 108903</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Konstantin</surname>
            <given-names>K</given-names>
          </string-name>
          , ́
          <string-name>
            <surname>Angeles S M and San M M 2012</surname>
          </string-name>
          <article-title>Sci</article-title>
          .
          <year>Rep</year>
          .
          <volume>2</volume>
          <fpage>292</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Yıldırım</surname>
            <given-names>M A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goh</surname>
            <given-names>K I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cusick</surname>
            <given-names>M E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barab</surname>
          </string-name>
          <article-title>ási A L and Vidal M 2007 Nat</article-title>
          . Biotechnol.
          <volume>25</volume>
          <fpage>1119</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Lü</surname>
            ,
            <given-names>LY</given-names>
          </string-name>
          ; Chen,
          <string-name>
            <given-names>D.B.</given-names>
            ;
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.L.</given-names>
            ;
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.M.</given-names>
            ;
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <article-title>Vital nodes identification in complex networks</article-title>
          .
          <source>Phys. Rep</source>
          .
          <year>2016</year>
          ,
          <volume>650</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>63</lpage>
          . [CrossRef].
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Albert</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Barabási</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          <article-title>Statistical mechanics of complex networks</article-title>
          .
          <source>Rev. Mod. Phys</source>
          .
          <year>2002</year>
          ,
          <volume>74</volume>
          ,
          <fpage>47</fpage>
          -
          <lpage>97</lpage>
          . [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Amini</surname>
            ,
            <given-names>M.H.</given-names>
          </string-name>
          ; Arasteh,
          <string-name>
            <surname>H.</surname>
          </string-name>
          ; Siano,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>Sustainable smart cities through the lens of complex interdependent infrastructures: Panorama and state-of-the-art</article-title>
          .
          <source>In Sustainable Interdependent Networks II; Springer: Cham, Switzerland</source>
          ,
          <year>2019</year>
          ; pp.
          <fpage>45</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ruan</surname>
            ,
            <given-names>Y.R.</given-names>
          </string-name>
          ; Lao, S.Y.;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bai</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.D.</given-names>
          </string-name>
          <article-title>Node importance measurement based on neighbourhood similarity in a complex network</article-title>
          .
          <source>Acta Phys. Sin</source>
          .
          <year>2017</year>
          ,
          <volume>66</volume>
          ,
          <fpage>38902</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Shao</surname>
          </string-name>
          ,
          <article-title>"Identifying influential nodes in complex networks based on weighted formal concept analysis"</article-title>
          ,
          <source>IEEE Access</source>
          , vol.
          <volume>5</volume>
          , pp.
          <fpage>3777</fpage>
          -
          <lpage>3789</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Yang</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>"Community detection based on distance dynamics"</article-title>
          ,
          <source>Proc. ACM 21th SIGKDD Int. Conf. Knowl. Discovery Data Mining</source>
          , pp.
          <fpage>1075</fpage>
          -
          <lpage>1084</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Girvan</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. E. J.</given-names>
            <surname>Newman</surname>
          </string-name>
          ,
          <article-title>"Community structure in social and biological networks"</article-title>
          ,
          <source>Proc. Nat. Acad. Sci. USA</source>
          , vol.
          <volume>99</volume>
          , pp.
          <fpage>7821</fpage>
          -
          <lpage>7826</lpage>
          , Apr.
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Lü</surname>
          </string-name>
          , M.-
          <string-name>
            <given-names>S.</given-names>
            <surname>Shang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>"Identifying influential nodes in complex networks"</article-title>
          ,
          <source>Phys. A Stat. Mech. Appl.</source>
          , vol.
          <volume>391</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1777</fpage>
          -
          <lpage>1787</lpage>
          ,
          <year>2012</year>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zareie</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Sheikhahmadi</surname>
          </string-name>
          ,
          <article-title>"A hierarchical approach for influential node ranking in complex social networks"</article-title>
          ,
          <source>Expert Syst. Appl.</source>
          , vol.
          <volume>93</volume>
          , pp.
          <fpage>200</fpage>
          -
          <lpage>211</lpage>
          , Mar.
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Do</surname>
          </string-name>
          ,
          <article-title>"Identify influential spreaders in complex networks the role of neighbourhood"</article-title>
          ,
          <source>Phys. A Stat. Mech. Appl.</source>
          , vol.
          <volume>452</volume>
          , pp.
          <fpage>289</fpage>
          -
          <lpage>298</lpage>
          , Jun.
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>"Identification of vital nodes in the complex network via belief propagation and node reinsertion"</article-title>
          ,
          <source>IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>29200</fpage>
          -
          <lpage>29210</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Small, Mapping from structure to dynamics: a unified view of dynamical processes on networks</article-title>
          ,
          <source>Phys. Rev. E</source>
          <volume>82</volume>
          (
          <year>2010</year>
          )
          <fpage>026116</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zeng</surname>
          </string-name>
          , L. Lü,
          <article-title>Coarse graining for synchronization in directed networks</article-title>
          ,
          <source>Phys. Rev. E</source>
          <volume>83</volume>
          (
          <year>2011</year>
          )
          <fpage>056123</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.-H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Catastrophes in scale-free networks</article-title>
          ,
          <source>Chin. Phys. Lett</source>
          .
          <volume>22</volume>
          (
          <year>2005</year>
          )
          <fpage>1072</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zamora-López</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kurths</surname>
          </string-name>
          ,
          <article-title>Cortical hubs form a module for multisensory integration on top of the hierarchy of cortical networks</article-title>
          ,
          <source>Front Neuro inform. 4</source>
          (
          <issue>2010</issue>
          )
          <article-title>1</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lü</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.H.</given-names>
            <surname>Yeung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Leaders in social networks, the delicious case</article-title>
          ,
          <source>PLoS ONE 6</source>
          (
          <year>2011</year>
          )
          <article-title>e21202</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Zhuang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Zhang, J., and
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Influence maximization in dynamic social networks</article-title>
          .
          <source>IEEE 13th International Conference on Data Mining</source>
          pages
          <fpage>1313</fpage>
          -
          <lpage>131</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Ming</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          (
          <year>2017b</year>
          ).
          <article-title>Incremental influence maximization for dynamic social networks</article-title>
          .
          <source>International Conference of Pioneering Computer Scientists, Engineers and Educators</source>
          , pages
          <fpage>13</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Identify influential spreaders in complex networks based on potential edge weights</article-title>
          .
          <source>International Journal of Innovative Computing, Information and Control</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ):
          <fpage>581</fpage>
          -
          <lpage>590</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Bae</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Identifying and ranking influential spreaders in complex networks by neighborhood coreness</article-title>
          .
          <source>Physica A: Statistical Mechanics and its Applications</source>
          ,
          <volume>395</volume>
          :
          <fpage>549</fpage>
          -
          <lpage>559</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Narayanam</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Narahari</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>A Shapley value-based approach to discover influential nodes in social networks</article-title>
          .
          <source>IEEE Transactions on Automation Science and Engineering</source>
          ,
          <volume>8</volume>
          (
          <issue>1</issue>
          ):
          <fpage>130</fpage>
          -
          <lpage>147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Pozveh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamanifar</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Naghsh-Nilchi</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>A community-based approach to identifying the most influential nodes in social networks</article-title>
          .
          <source>Journal of Information Science</source>
          ,
          <volume>43</volume>
          (
          <issue>2</issue>
          ):
          <fpage>204</fpage>
          -
          <lpage>22</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Identify influential spreaders in complex networks based on potential edge weights</article-title>
          .
          <source>International Journal of Innovative Computing, Information and Control</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ):
          <fpage>581</fpage>
          -
          <lpage>590</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Maximizing influence spread in modular social networks by optimal resource allocation</article-title>
          .
          <source>Expert Systems with Applications</source>
          ,
          <volume>38</volume>
          (
          <issue>10</issue>
          ):
          <fpage>13128</fpage>
          -
          <lpage>13135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Tong</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Du</surname>
            , D.-
            <given-names>Z.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Adaptive influence maximization in dynamic social networks</article-title>
          .
          <source>IEEE/ACM Transactions on Networking (TON)</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ):
          <fpage>112</fpage>
          -
          <lpage>125</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Yalavarthi</surname>
            ,
            <given-names>V. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Fast influence maximization in dynamic graphs: A local updating approach</article-title>
          . arXiv preprint arXiv:
          <year>1802</year>
          .00574.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Bhowmick</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gueuning</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delvenne</surname>
            ,
            <given-names>J.-C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lambiotte</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Mitra</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Temporal sequence of retweets help to detect influential nodes in social networks</article-title>
          .
          <source>IEEE Transactions on Computational Social Systems</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          ):
          <fpage>441</fpage>
          -
          <lpage>455</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>C. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>P. S.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>On influential node discovery in dynamic social networks</article-title>
          .
          <source>Proceedings of the 2012 SIAM International Conference on Data Mining</source>
          , pages
          <fpage>636</fpage>
          -
          <lpage>647</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Shao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Xiao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>On the shoulders of giants: incremental influence maximization in evolving social networks</article-title>
          .
          <source>Complexity</source>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Zhuang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Zhang, J., and
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Influence maximization in dynamic social networks</article-title>
          .
          <source>IE</source>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Deng</surname>
          </string-name>
          ,
          <article-title>A modified efficiency centrality to identify influential nodes in weighted networks</article-title>
          ,
          <source>Pramana</source>
          <volume>92</volume>
          (
          <issue>4</issue>
          ) (
          <year>2019</year>
          )
          <fpage>68</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ma</surname>
          </string-name>
          , S. Liu,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , T. Zhou,
          <article-title>Identifying influential spreaders by gravity model</article-title>
          ,
          <source>Scientific Reports</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shao</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <article-title>Profit leader: identifying leaders in networks with profit capacity</article-title>
          .
          <source>World Wide Web</source>
          <volume>22</volume>
          ,
          <fpage>533</fpage>
          -
          <lpage>553</lpage>
          (
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <surname>Lü</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Q.-M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Stanley</surname>
            ,
            <given-names>H. E.</given-names>
          </string-name>
          <article-title>The h-index of a network node and its relation to degree and coreness</article-title>
          .
          <source>Nat. Communication</source>
          .
          <volume>7</volume>
          ,
          <issue>1</issue>
          -
          <fpage>7</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Ma</surname>
          </string-name>
          , L.-L.,
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , H.-F. &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.-H.</given-names>
          </string-name>
          <article-title>Identifying influential spreaders in complex networks based on gravity formula</article-title>
          .
          <source>Phys. A Stat. Mech. Its Appl</source>
          .
          <volume>451</volume>
          ,
          <fpage>205</fpage>
          -
          <lpage>212</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Ibnoulouafi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>El Haiti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Density centrality: identifying influential nodes based on area density formula</article-title>
          .
          <source>Chaos Solti. Fract</source>
          .
          <volume>114</volume>
          ,
          <fpage>69</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Zou</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <article-title>Hits-prohibits: protein remote homology detection by combining PageRank and hyperlink-induced topic search</article-title>
          .
          <source>Brief. Bio inform</source>
          .
          <volume>21</volume>
          ,
          <fpage>298</fpage>
          -
          <lpage>308</lpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Gruhl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Guha</surname>
          </string-name>
          , David Liben-Nowell, and
          <string-name>
            <given-names>Andrew</given-names>
            <surname>Tomkins</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>Information diffusion through blog space</article-title>
          .
          <source>In Proceedings of the 13th International Conference on World Wide Web (WWW'04)</source>
          . ACM, New York, NY,
          <fpage>491</fpage>
          -
          <lpage>501</lpage>
          . DOI:HTTP:// dx.doi.org/10.1145/988672.988739
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Scalable influence maximization in social networks under the linear threshold model</article-title>
          .
          <source>In Proceedings of the 2010 IEEE International Conference on Data Mining</source>
          .
          <fpage>88</fpage>
          -
          <lpage>97</lpage>
          . DOI:http://dx.doi.org/10.1109/ ICDM.
          <year>2010</year>
          .
          <volume>118</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <surname>Jinwen</surname>
            <given-names>Guo</given-names>
          </string-name>
          , Shengliang Xu,
          <string-name>
            <given-names>Shenghua</given-names>
            <surname>Bao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Yong</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Tapping on the potential of q&amp;a community by recommending answer providers</article-title>
          .
          <source>In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM'08)</source>
          . ACM, New York, NY,
          <fpage>921</fpage>
          -
          <lpage>930</lpage>
          . DOI:http://dx.doi.org/10.1145/ 1458082.1458204
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>Pawel</given-names>
            <surname>Jurczyk</surname>
          </string-name>
          and
          <string-name>
            <given-names>Eugene</given-names>
            <surname>Agichtein</surname>
          </string-name>
          . 2007a.
          <article-title>Discovering authorities in question answer communities by using link analysis</article-title>
          .
          <source>In Proceedings of the 16th ACM Conference on Conference on Information and Knowledge Management (CIKM'07)</source>
          . ACM, New York, NY,
          <fpage>919</fpage>
          -
          <lpage>922</lpage>
          . DOI:http://dx.doi.org/10.1145/1321440.1321575
          <string-name>
            <given-names>Pawel</given-names>
            <surname>Jurczyk</surname>
          </string-name>
          and
          <string-name>
            <given-names>Eugene</given-names>
            <surname>Agichtein</surname>
          </string-name>
          . 2007b.
          <article-title>Hits on question-answer portals: Exploration</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <surname>Mohamed</surname>
            <given-names>Bouguessa</given-names>
          </string-name>
          , Benoît Dumoulin, and
          <string-name>
            <given-names>Shengrui</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Identifying authoritative actors in question-answering forums: The case of yahoo! answers</article-title>
          .
          <source>In Proceedings of the 14th</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>