Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2020 Apr;8(2):cnz029.
doi: 10.1093/comnet/cnz029. Epub 2019 Aug 5.

Influencer identification in dynamical complex systems

Affiliations
Review

Influencer identification in dynamical complex systems

Sen Pei et al. J Complex Netw. 2020 Apr.

Abstract

The integrity and functionality of many real-world complex systems hinge on a small set of pivotal nodes, or influencers. In different contexts, these influencers are defined as either structurally important nodes that maintain the connectivity of networks, or dynamically crucial units that can disproportionately impact certain dynamical processes. In practice, identification of the optimal set of influencers in a given system has profound implications in a variety of disciplines. In this review, we survey recent advances in the study of influencer identification developed from different perspectives, and present state-of-the-art solutions designed for different objectives. In particular, we first discuss the problem of finding the minimal number of nodes whose removal would breakdown the network (i.e. the optimal percolation or network dismantle problem), and then survey methods to locate the essential nodes that are capable of shaping global dynamics with either continuous (e.g. independent cascading models) or discontinuous phase transitions (e.g. threshold models). We conclude the review with a summary and an outlook.

Keywords: influencer identification; k-core percolation; optimal percolation; spreading dynamics; threshold models.

PubMed Disclaimer

Figures

Fig. 1.
Fig. 1.
Simulations of epidemic processes initiated from different origins. We use a susceptible-infected-removed (SIR) model to simulate epidemic outbreaks in a patient-to-patient contact network from multiple Swedish hospitals [18]. Given the same set of epidemiological parameters (infectious rate formula image and recover rate formula image), outbreaks initiated from two origins have dramatically different outcomes. In (a) and (b), the epidemic sources have the same number of connections, but the source in (a) locates in a more central region with a higher k-core index. The colour of each node indicates the probability of infection during 1,000 independent realizations of the SIR model.
Fig. 2.
Fig. 2.
Phase transition in percolation process. (a) The continuous transition of the GC size formula image after the removal of formula image fraction of nodes. formula image and formula image are the critical values for random and optimal percolation, respectively. Insets show illustrations of a connected formula image and fragmented clusters. Red nodes are removed influencers. (b) The discontinuous transition of k-core size formula image after the removal of formula image fraction of nodes. The critical values for random and optimal k-core percolation are marked by formula image and formula image. Left inset shows the k-core of formula image. After the removal of the red node, 3-core collapses and only 2-core is left, as shown in the right inset.
Fig. 3.
Fig. 3.
An example of k-core decomposition. The highlighted blue and yellow nodes have the same degree formula image, but with different formula image values. Figure is adapted from [17] under permission from Springer Nature.
Fig. 4.
Fig. 4.
Performance of CI in large-scale real social networks. GCs formula image for a Twitter network (a) and a social network of mobile phone users in Mexico (b) computed using CI, HDA (high degree adaptive), PR (PageRank), HD (high degree) and k-core strategies are compared. Figure is reused from [20] permitted by Springer Nature.
Fig. 5.
Fig. 5.
Performance of the BPD algorithm in ER and RR networks. Fraction of removed nodes formula image to break ER random networks of mean degree formula image (a) and regular random networks of degree formula image (b). Diamonds show the results obtained from CI. Crosses represent results of the replica-symmetric (RS) mean-field theory. Plus symbols in (b) show the mathematical lower bound (LB) on the minimum size of target nodes. Figure reuse from [48] is permitted by American Physical Society.
Fig. 6.
Fig. 6.
Performance of the Min-Sum algorithm in an ER network. Relative size of the largest component formula image as a function of the fraction of nodes formula image removed from an ER network (size formula image = 78,125 and average degree formula image). Comparisons are performed for the Min-Sum algorithm (MS), random (RND), adaptive largest degree (DEG), adaptive eigenvector centrality (EC), adaptive CI and simulated annealing (SA). Figure reuse from [21] is permitted by National Academy of Sciences.
Fig. 7.
Fig. 7.
Performance of the EI algorithm in an ER network. Relative size of the largest clusters formula image after formula image fraction of nodes are removed from ER networks with size formula image and average degree formula image. The red dashed curve is obtained by EI with score formula image. The black continuous curve is obtained with formula image for formula image (formula image). The blue dotted line is the result of CI. The inset shows the relationship between formula image and formula image. The dotted line is the result for random strategy. Figure reuse from [49] is permitted by American Physical Society.
Fig. 8.
Fig. 8.
Performance of the CI-TM algorithm in ER and SF networks. (a) Size of active GC formula image as a function of the fraction of seed formula image for ER networks (formula image, formula image). The CI-TM algorithm is compared with high degree adaptive (HDA), high degree (HD), PageRank (PR), k-core adaptive (KsA), Random and the Max-Sum (MS) algorithm. Inset shows the critical values formula image identified by HDA and CI-TM for different mean degrees. (b) Results for scale-free networks (formula image, formula image). Inset presents the critical values formula image for different power-law exponents formula image. Figure reuse from [188] is permitted by Springer Nature.

Similar articles

Cited by

References

    1. Pastor-Satorras, R., Castellano, C., Van Mieghem, P. & Vespignani, A. (2015) Epidemic processes in complex networks. Rev. Mod. Phys., 87, 925.
    1. Zhang, Z.-K., Liu, C., Zhan, X.-X., Lu, X., Zhang, C.-X. & Zhang, Y.-C. (2016) Dynamics of information diffusion and its applications on complex networks. Phys. Rep., 651, 1–34.
    1. Bullmore, E. & Sporns, O. (2009) Complex brain networks: graph theoretical analysis of structural and functional systems. Nat. Rev. Neurosci., 10, 186. - PubMed
    1. Montoya, J. M., Pimm, S. L. & Solé, R. V. (2006) Ecological networks and their fragility. Nature, 442, 259. - PubMed
    1. Newman, M. E. J. (2003) The structure and function of complex networks. SIAM Rev., 45, 167–256.