Identifying vital nodes based on reverse greedy method
暂无分享,去创建一个
Zhe Li | Yixin Zhang | Tao Zhou | Tao Ren | Simiao Liu | Yanjie Xu | Yi Qi | Tao Zhou | Tao Ren | Zhe Li | Yanjie Xu | Yixin Zhang | Yi Qi | Simiao Liu
[1] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[2] Mônica G. Campiteli,et al. An index to quantify an individual's scientific research valid across disciplines , 2005 .
[3] A Díaz-Guilera,et al. Self-similar community structure in a network of human interactions. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Hernán A. Makse,et al. Collective Influence Algorithm to find influencers via optimal percolation in massively large social media , 2016, Scientific Reports.
[5] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[6] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[7] Lada A. Adamic,et al. The political blogosphere and the 2004 U.S. election: divided they blog , 2005, LinkKDD '05.
[8] R. May,et al. Systemic risk in banking ecosystems , 2011, Nature.
[9] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[10] Tao Zhou,et al. The H-index of a network node and its relation to degree and coreness , 2016, Nature Communications.
[11] Petter Holme,et al. Simulated Epidemics in an Empirical Spatiotemporal Network of 50,185 Sexual Contacts , 2010, PLoS Comput. Biol..
[12] Jon M. Kleinberg,et al. Overview of the 2003 KDD Cup , 2003, SKDD.
[13] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[14] Yunpeng Wang,et al. Percolation transition in dynamical traffic network with evolving critical bottlenecks , 2014, Proceedings of the National Academy of Sciences.
[15] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[16] Yi-Cheng Zhang,et al. Leaders in Social Networks, the Delicious Case , 2011, PloS one.
[17] B. Bollobás. The evolution of random graphs , 1984 .
[18] Lenka Zdeborová,et al. Fast and simple decycling and dismantling of networks , 2016, Scientific Reports.
[19] Eric A. Hansen,et al. Beam-Stack Search: Integrating Backtracking with Beam Search , 2005, ICAPS.
[20] Lev Muchnik,et al. Identifying influential spreaders in complex networks , 2010, 1001.5285.
[21] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[22] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[23] S. Havlin,et al. Breakdown of the internet under intentional attack. , 2000, Physical review letters.
[24] P. Bonacich. Factoring and weighting approaches to status scores and clique identification , 1972 .
[25] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[26] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[27] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[28] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[29] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[30] Guido Caldarelli,et al. Scale-Free Networks , 2007 .
[31] Hai-Jun Zhou,et al. Spin glass approach to the feedback vertex set problem , 2013, 1307.6948.
[32] M E J Newman. Assortative mixing in networks. , 2002, Physical review letters.
[33] Pablo M. Gleiser,et al. Community Structure in Jazz , 2003, Adv. Complex Syst..
[34] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[35] Hai-Jun Zhou,et al. Identifying optimal targets of network attack by belief propagation , 2016, Physical review. E.
[36] P. Erdos,et al. On the evolution of random graphs , 1984 .
[37] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[38] Xiaofan Wang,et al. Unified index to quantifying heterogeneity of complex networks , 2008 .
[39] Adilson E Motter. Cascade control and defense in complex networks. , 2004, Physical review letters.
[40] Duanbing Chen,et al. Vital nodes identification in complex networks , 2016, ArXiv.
[41] Ratul Mahajan,et al. Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.
[42] M. Newman,et al. Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[43] Antonio Politi,et al. Immunization and targeted destruction of networks using explosive percolation , 2016, Physical review letters.