Finding the key nodes to minimize the victims of the malicious information in complex network