2023
DOI: 10.1088/1674-1056/acb75f
|View full text |Cite
|
Sign up to set email alerts
|

Identification of key recovering node for spatial networks

Abstract: Many networks in the real-world have spatial attributes, such as the location of nodes and the length of edges, called spatial networks. When these networks are subject to some random or deliberate attacks, some nodes in the network fail, which causes a decline in the network performance. In order to make the network run normally, some of the failed nodes must be recovered. In the case of limited recovery resources, an effective key node identification method can find the key recovering node in the failed node… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…For each community, the candidate anti-rumor seeds has faster and broader influence propagation than other general nodes. [60][61][62] The higher the propagation capability, the larger probability that a node will be selected as a candidate antirumor seed. Inspired by three degree of separation [63,64] and community structure in networks, we define the potential local centrality (PLC) for calculating the propagation capability of nodes in each community.…”
Section: Selecting Candidate Anti-rumor Seedsmentioning
confidence: 99%
“…For each community, the candidate anti-rumor seeds has faster and broader influence propagation than other general nodes. [60][61][62] The higher the propagation capability, the larger probability that a node will be selected as a candidate antirumor seed. Inspired by three degree of separation [63,64] and community structure in networks, we define the potential local centrality (PLC) for calculating the propagation capability of nodes in each community.…”
Section: Selecting Candidate Anti-rumor Seedsmentioning
confidence: 99%
“…Examples include the rapid spread of false information on social media, [1,2] virus intrusion into computer networks, [3][4][5] the swift spread of negative or potentially harmful speech affecting national security, [6] as well as the emission of industrial pollutants and hazardous substances. [7,8] While much research has focused on studying information diffusion from the perspective of maximizing influence, [9,10] this paper addresses a reverse problem, namely source localization, which aims to accurately and efficiently identify the initial spreader of information.…”
Section: Introductionmentioning
confidence: 99%
“…The stability of the network topology determines the performance of the entire network system, while the key nodes affect stability of the network [3][4][5] . Therefore, designing effective algorithms to identify key nodes in the network topology can significantly improve the stability and robustness of a network [6][7][8] .…”
Section: Introductionmentioning
confidence: 99%