{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T19:06:53Z","timestamp":1778267213097,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61972133"],"award-info":[{"award-number":["No. 61972133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yunnan Key Laboratory of Smart City in Cyberspace Security","award":["No. 202105AG070010"],"award-info":[{"award-number":["No. 202105AG070010"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00500-023-08510-4","type":"journal-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T09:02:46Z","timestamp":1685091766000},"page":"2501-2516","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A multiple features fusion-based social network node importance measure for rumor control"],"prefix":"10.1007","volume":"28","author":[{"given":"Yu-Cui","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3279-9948","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meng-Jie","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Gui-Ming","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhang-Quan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shi-Yuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,26]]},"reference":[{"key":"8510_CR1","doi-asserted-by":"publisher","unstructured":"Bo S, Wenfeng G, Yan L (2020) Discovery of Key Nodes in Social Networks Premised on PageRank Algorithm. In: 2020 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), pp 26\u201328, https:\/\/doi.org\/10.1109\/IPEC49694.2020.9115190","DOI":"10.1109\/IPEC49694.2020.9115190"},{"key":"8510_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.socnet.2015.08.003","volume":"44","author":"U Brandes","year":"2016","unstructured":"Brandes U, Borgatti SP, Freeman LC (2016) Maintaining the duality of closeness and betweenness centrality. Soc Netw 44:153\u2013159. https:\/\/doi.org\/10.1016\/j.socnet.2015.08.003","journal-title":"Soc Netw"},{"issue":"1","key":"8510_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin S, Page L (1998) The anatomy of a large-scale hypertextual Web search engine. Comput Netw ISDN Syst 30(1):107\u2013117. https:\/\/doi.org\/10.1016\/S0169-7552(98)00110-X","journal-title":"Comput Netw ISDN Syst"},{"key":"8510_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.neucom.2018.08.091","volume":"389","author":"Z Cao","year":"2020","unstructured":"Cao Z, Ding W, Wang YK et al (2020) Effects of repetitive SSVEPs on EEG complexity using multiscale inherent fuzzy entropy. Neurocomputing 389:198\u2013206. https:\/\/doi.org\/10.1016\/j.neucom.2018.08.091","journal-title":"Neurocomputing"},{"key":"8510_CR5","doi-asserted-by":"publisher","unstructured":"Dempster AP (2008) Upper and Lower Probabilities Induced by a Multivalued Mapping. In: Yager RR, Liu L (eds) Classic works of the Dempster-Shafer theory of belief functions. Studies in Fuzziness and Soft Computing, Springer, Berlin, Heidelberg, p 57\u201372, https:\/\/doi.org\/10.1007\/978-3-540-44792-4_3","DOI":"10.1007\/978-3-540-44792-4_3"},{"key":"8510_CR6","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.chaos.2016.07.014","volume":"91","author":"Y Deng","year":"2016","unstructured":"Deng Y (2016) Deng entropy. Chaos, Solitons & Fractals 91:549\u2013553. https:\/\/doi.org\/10.1016\/j.chaos.2016.07.014","journal-title":"Chaos, Solitons & Fractals"},{"key":"8510_CR7","doi-asserted-by":"publisher","unstructured":"Deng Y (2020a) Information volume of mass function. Int J Comput Commun Control. https:\/\/doi.org\/10.15837\/ijccc.2020.6.3983","DOI":"10.15837\/ijccc.2020.6.3983"},{"key":"8510_CR8","doi-asserted-by":"crossref","unstructured":"Deng Y (2020) Uncertainty measure in evidence theory. Sci China Inf Sci. DOIurlhttps:\/\/doi.org\/10.1007\/s11432-020-3006-9","DOI":"10.1007\/s11432-020-3006-9"},{"key":"8510_CR9","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1016\/j.ins.2021.04.081","volume":"570","author":"Y Du","year":"2021","unstructured":"Du Y, Zhou Q, Luo J et al (2021) Detection of key figures in social networks by combining harmonic modularity with community structure-regulated network embedding. Inf Sci 570:722\u2013743. https:\/\/doi.org\/10.1016\/j.ins.2021.04.081","journal-title":"Inf Sci"},{"issue":"4","key":"8510_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/03081078508934893","volume":"10","author":"D Dubois","year":"1985","unstructured":"Dubois D, Prade H (1985) A note on measures of specificity for fuzzy sets. Int J Gen Syst 10(4):279\u2013283. https:\/\/doi.org\/10.1080\/03081078508934893","journal-title":"Int J Gen Syst"},{"issue":"1","key":"8510_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40(1):35\u201341. https:\/\/doi.org\/10.2307\/3033543","journal-title":"Sociometry"},{"issue":"2","key":"8510_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0378-8733(91)90017-N","volume":"13","author":"LC Freeman","year":"1991","unstructured":"Freeman LC, Borgatti SP, White DR (1991) Centrality in valued graphs: a measure of betweenness based on network flow. Soc Netw 13(2):141\u2013154. https:\/\/doi.org\/10.1016\/0378-8733(91)90017-N","journal-title":"Soc Netw"},{"key":"8510_CR13","doi-asserted-by":"publisher","first-page":"82,979","DOI":"10.1109\/ACCESS.2021.3086232","volume":"9","author":"B Fu","year":"2021","unstructured":"Fu B, Fang JW, Zhao XL et al (2021) A belief Coulomb force in D-S evidence theory. IEEE Access 9:82,979-82,988. https:\/\/doi.org\/10.1109\/ACCESS.2021.3086232","journal-title":"IEEE Access"},{"issue":"21","key":"8510_CR14","doi-asserted-by":"publisher","first-page":"5490","DOI":"10.1016\/j.physa.2013.06.059","volume":"392","author":"C Gao","year":"2013","unstructured":"Gao C, Wei D, Hu Y et al (2013) A modified evidential methodology of identifying influential nodes in weighted networks. Physica A: Statist Mech Appl 392(21):5490\u20135500. https:\/\/doi.org\/10.1016\/j.physa.2013.06.059","journal-title":"Physica A: Statist Mech Appl"},{"key":"8510_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.physa.2014.02.032","volume":"403","author":"S Gao","year":"2014","unstructured":"Gao S, Ma J, Chen Z et al (2014) Ranking the spreading ability of nodes in complex networks based on local structure. Physica A: Statist Mech Appl 403:130\u2013147. https:\/\/doi.org\/10.1016\/j.physa.2014.02.032","journal-title":"Physica A: Statist Mech Appl"},{"key":"8510_CR16","doi-asserted-by":"publisher","unstructured":"Han Q, Miao F, You L (2018) Rumor Spreading Model Considering Iterative Spread on Social Networks. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT). IEEE, Chongqing, pp 1363\u20131367, https:\/\/doi.org\/10.1109\/ICCT.2018.8599956,","DOI":"10.1109\/ICCT.2018.8599956"},{"issue":"12","key":"8510_CR17","first-page":"2402","volume":"48","author":"G Hu","year":"2020","unstructured":"Hu G, Gao H, Xu X et al (2020) Importance identification method of complex network nodes based on importance transfer matrix. Acta Electron Sinica 48(12):2402\u20132408","journal-title":"Acta Electron Sinica"},{"issue":"2","key":"8510_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/S1566-2535(01)00026-4","volume":"2","author":"AL Jousselme","year":"2001","unstructured":"Jousselme AL, Grenier D, Boss\u00e9 \u00c9 (2001) A new distance between two bodies of evidence. Inf Fus 2(2):91\u2013101. https:\/\/doi.org\/10.1016\/S1566-2535(01)00026-4","journal-title":"Inf Fus"},{"key":"8510_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.physa.2014.02.041","volume":"404","author":"Q Li","year":"2014","unstructured":"Li Q, Zhou T, L\u00fc L et al (2014) Identifying influential spreaders by weighted LeaderRank. Physica A: Statist Mech Appl 404:47\u201355. https:\/\/doi.org\/10.1016\/j.physa.2014.02.041","journal-title":"Physica A: Statist Mech Appl"},{"key":"8510_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1956356","volume":"2021","author":"X Li","year":"2021","unstructured":"Li X, Tang Y, Du Y et al (2021) Key node discovery algorithm based on multiple relationships and multiple features in social networks. Math Prob Eng 2021:1\u201312. https:\/\/doi.org\/10.1155\/2021\/1956356","journal-title":"Math Prob Eng"},{"issue":"8","key":"8510_CR21","first-page":"2071","volume":"34","author":"Y Li","year":"2014","unstructured":"Li Y, Yj Guo, Yl Yang (2014) Identification and application of the evidence conflict based on K-L information distance. Syst Eng Theory Pract 34(8):2071\u20132077","journal-title":"Syst Eng Theory Pract"},{"issue":"7","key":"8510_CR22","doi-asserted-by":"publisher","first-page":"2874","DOI":"10.1007\/s11227-016-1681-3","volume":"72","author":"Y Lin","year":"2016","unstructured":"Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):2874\u20132890. https:\/\/doi.org\/10.1007\/s11227-016-1681-3","journal-title":"J Supercomput"},{"key":"8510_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0021202","author":"L L\u00fc","year":"2011","unstructured":"L\u00fc L, Zhang YC, Yeung CH et al (2011) Leaders in social networks, the delicious case. PLOS one. https:\/\/doi.org\/10.1371\/journal.pone.0021202","journal-title":"PLOS one"},{"issue":"12","key":"8510_CR24","first-page":"2398","volume":"43","author":"H Luo","year":"2020","unstructured":"Luo H, Yan G, Zhang M et al (2020) Identifying important nodes in multi-relational networks based on evidence theory. Chin J Comput 43(12):2398\u20132413","journal-title":"Chin J Comput"},{"issue":"05","key":"8510_CR25","first-page":"954","volume":"57","author":"H Luo","year":"2020","unstructured":"Luo H, Yan G, Zhang M et al (2020) Research on node importance fused multi-information for multi-relational social networks. J Comput Res Devel 57(05):954\u2013970","journal-title":"J Comput Res Devel"},{"key":"8510_CR26","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1948\/1\/012025","author":"S Ma","year":"2021","unstructured":"Ma S, Ma YH (2021) Identify important users on social networks-cases from Sina Weibo. J Phys Conf Ser 1948. https:\/\/doi.org\/10.1088\/1742-6596\/1948\/1\/012025","journal-title":"J Phys Conf Ser 1948"},{"key":"8510_CR27","doi-asserted-by":"publisher","unstructured":"Ma W, Shu J, Liu L (2021) Key Nodes Evaluation in Social Networks Based on Multi-indicators. In: 2021 13th International Conference on Communication Software and Networks (ICCSN), pp 123\u2013127, https:\/\/doi.org\/10.1109\/ICCSN52437.2021.9463635","DOI":"10.1109\/ICCSN52437.2021.9463635"},{"key":"8510_CR28","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.physa.2018.02.016","volume":"499","author":"A Namtirtha","year":"2018","unstructured":"Namtirtha A, Dutta A, Dutta B (2018) Identifying influential spreaders in complex networks based on kshell hybrid method. Physica A: Statist Mech Appl 499:310\u2013324. https:\/\/doi.org\/10.1016\/j.physa.2018.02.016","journal-title":"Physica A: Statist Mech Appl"},{"key":"8510_CR29","doi-asserted-by":"publisher","unstructured":"Pan Y, Tan W, Chen Y (2017) The Analysis of Key Nodes in Complex Social Networks. In: Sun X, Chao HC, You X, et\u00a0al (eds) Cloud Computing and Security. Springer International Publishing, Cham, Lecture Notes in Computer Science, pp 829\u2013836, https:\/\/doi.org\/10.1007\/978-3-319-68542-7_74","DOI":"10.1007\/978-3-319-68542-7_74"},{"key":"8510_CR30","doi-asserted-by":"publisher","unstructured":"Prountzos D, Pingali K (2013) Betweenness centrality: algorithms and implementations. In: Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of parallel programming. Association for Computing Machinery, New York, NY, USA, PPoPP \u201913, pp 35\u201346, https:\/\/doi.org\/10.1145\/2442516.2442521","DOI":"10.1145\/2442516.2442521"},{"issue":"12","key":"8510_CR31","first-page":"522","volume":"62","author":"Z Ren","year":"2013","unstructured":"Ren Z, Shao F, Liu J et al (2013) Node importance measurement based on the degree and clustering coefficient information. Acta Phys Sin 62(12):522\u2013526","journal-title":"Acta Phys Sin"},{"key":"8510_CR32","unstructured":"R\u00e9nyi A (1961) On measures of entropy and information. In: Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics. University of California Press, pp 547\u2013561"},{"key":"8510_CR33","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) A Mathematical Theory of Evidence. Princeton University Press, New Jersey"},{"key":"8510_CR34","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2021.4.4413","author":"Y Song","year":"2021","unstructured":"Song Y, Deng Y (2021) Entropic explanation of power set. Int J Comput Commun Control. https:\/\/doi.org\/10.15837\/ijccc.2021.4.4413","journal-title":"Int J Comput Commun Control"},{"issue":"1","key":"8510_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0378-8733(89)90016-6","volume":"11","author":"K Stephenson","year":"1989","unstructured":"Stephenson K, Zelen M (1989) Rethinking centrality: methods and examples. Soc Netw 11(1):1\u201337. https:\/\/doi.org\/10.1016\/0378-8733(89)90016-6","journal-title":"Soc Netw"},{"issue":"10","key":"8510_CR36","doi-asserted-by":"publisher","first-page":"2794","DOI":"10.11772\/j.issn.1001-9081.2018030532","volume":"38","author":"J Wang","year":"2018","unstructured":"Wang J, Zy Zhang, Ky Qiao (2018) Evidence combination rule with similarity collision reduced. J Comput Appl 38(10):2794\u20132800. https:\/\/doi.org\/10.11772\/j.issn.1001-9081.2018030532","journal-title":"J Comput Appl"},{"key":"8510_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2018.08.010","volume":"91","author":"J Wang","year":"2019","unstructured":"Wang J, Qiao K, Zhang Z (2019) An improvement for combination rule in evidence theory. Fut Gen Comput Syst 91:1\u20139. https:\/\/doi.org\/10.1016\/j.future.2018.08.010","journal-title":"Fut Gen Comput Syst"},{"issue":"12","key":"8510_CR38","first-page":"2128","volume":"23","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang H, Zhou Y et al (2021) Multi-scale model of point group elements in network space combined with Blondel and k-shell decomposition hybrid algorithm. J Geo-inf Sci 23(12):2128\u20132138","journal-title":"J Geo-inf Sci"},{"key":"8510_CR39","doi-asserted-by":"publisher","unstructured":"Wang Y, Yan G, Ma Q, et\u00a0al (2017) Identifying Influential Spreaders on Weighted Networks Based on ClusterRank. In: 2017 10th International Symposium on Computational Intelligence and Design (ISCID), pp 476\u2013479, https:\/\/doi.org\/10.1109\/ISCID.2017.222","DOI":"10.1109\/ISCID.2017.222"},{"issue":"15","key":"8510_CR40","doi-asserted-by":"publisher","first-page":"7123","DOI":"10.1007\/s00500-022-07160-2","volume":"26","author":"YC Wang","year":"2022","unstructured":"Wang YC, Wang J, Huang MJ et al (2022) An evidence combination rule based on a new weight assignment scheme. Soft Comput 26(15):7123\u20137137. https:\/\/doi.org\/10.1007\/s00500-022-07160-2","journal-title":"Soft Comput"},{"key":"8510_CR41","doi-asserted-by":"publisher","unstructured":"Wei YC (2011) An improved D-S evidence combination method based on K-L distance. Telecommun Eng 51(1):27\u201330. https:\/\/doi.org\/10.3969\/j.issn.1001-893x.2011.01.006","DOI":"10.3969\/j.issn.1001-893x.2011.01.006"},{"key":"8510_CR42","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.inffus.2018.04.003","volume":"46","author":"F Xiao","year":"2019","unstructured":"Xiao F (2019) Multi-sensor data fusion based on the belief divergence measure of evidences and the belief entropy. Inf Fus 46:23\u201332. https:\/\/doi.org\/10.1016\/j.inffus.2018.04.003","journal-title":"Inf Fus"},{"key":"8510_CR43","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.ins.2019.11.022","volume":"514","author":"F Xiao","year":"2020","unstructured":"Xiao F (2020) A new divergence measure for belief functions in D-S evidence theory for multisensor data fusion. Inf Sci 514:462\u2013483. https:\/\/doi.org\/10.1016\/j.ins.2019.11.022","journal-title":"Inf Sci"},{"issue":"05","key":"8510_CR44","doi-asserted-by":"publisher","first-page":"849","DOI":"10.16511\/j.cnki.qhdxxb.2022.25.041","volume":"62","author":"L Xie","year":"2022","unstructured":"Xie L, Sun H, Yang H et al (2022) Key node recognition in complex networks based on the K-shell method. J Tsinghua Univ Sci Technol 62(05):849\u2013861. https:\/\/doi.org\/10.16511\/j.cnki.qhdxxb.2022.25.041","journal-title":"J Tsinghua Univ Sci Technol"},{"issue":"4","key":"8510_CR45","doi-asserted-by":"publisher","first-page":"046,108","DOI":"10.1103\/PhysRevE.73.046108","volume":"73","author":"G Yan","year":"2006","unstructured":"Yan G, Zhou T, Hu B et al (2006) Efficient routing on complex networks. Phys Rev E 73(4):046,108. https:\/\/doi.org\/10.1103\/PhysRevE.73.046108","journal-title":"Phys Rev E"},{"key":"8510_CR46","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2019.07.055","volume":"506","author":"L Yang","year":"2020","unstructured":"Yang L, Li Z, Giua A (2020) Containment of rumor spread in complex social networks. Inf Sci 506:113\u2013130. https:\/\/doi.org\/10.1016\/j.ins.2019.07.055","journal-title":"Inf Sci"},{"issue":"1","key":"8510_CR47","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1186\/s13662-020-03081-2","volume":"2020","author":"S Yang","year":"2020","unstructured":"Yang S, Jiang H, Hu C et al (2020b) Dynamics of the rumor-spreading model with hesitation mechanism in heterogenous networks and bilingual environment. Adv Differ Equ 2020(1):628. https:\/\/doi.org\/10.1186\/s13662-020-03081-2","journal-title":"Adv Differ Equ"},{"issue":"21","key":"8510_CR48","doi-asserted-by":"publisher","first-page":"273","DOI":"10.7498\/aps.70.20210979","volume":"70","author":"S Yang","year":"2021","unstructured":"Yang S, Jiang Y, Tong T et al (2021) A method of evaluating importance of nodes in complex network based on Tsallis entropy*. Acta Phys Sin 70(21):273\u2013284","journal-title":"Acta Phys Sin"},{"issue":"107","key":"8510_CR49","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.knosys.2021.107198","volume":"227","author":"X Yang","year":"2021","unstructured":"Yang X, Xiao F (2021) An improved gravity model to identify influential nodes in complex networks based on k-shell method. Knowl-Based Syst 227(107):198. https:\/\/doi.org\/10.1016\/j.knosys.2021.107198","journal-title":"Knowl-Based Syst"},{"issue":"e9741","key":"8510_CR50","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1155\/2017\/9741824","volume":"2017","author":"Y Yang","year":"2017","unstructured":"Yang Y, Xie G, Xie J (2017) Mining important nodes in directed weighted complex networks. Discrete Dyn Nat Soc 2017(e9741):824. https:\/\/doi.org\/10.1155\/2017\/9741824","journal-title":"Discrete Dyn Nat Soc"},{"key":"8510_CR51","doi-asserted-by":"publisher","unstructured":"Ye F, Chen J, Li Y (2017) Improvement of DS evidence theory for multi-sensor conflicting information. Symmetry 9(5):69. https:\/\/doi.org\/10.3390\/sym9050069","DOI":"10.3390\/sym9050069"},{"issue":"3","key":"8510_CR52","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1609\/aimag.v5i3.452","volume":"5","author":"LA Zadeh","year":"1984","unstructured":"Zadeh LA (1984) Review of A mathematical theory of evidence. AI Magaz 5(3):81\u201381. https:\/\/doi.org\/10.1609\/aimag.v5i3.452","journal-title":"AI Magaz"},{"issue":"2","key":"8510_CR53","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1609\/aimag.v7i2.542","volume":"7","author":"LA Zadeh","year":"1986","unstructured":"Zadeh LA (1986) A simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination. AI Magaz 7(2):85\u201385. https:\/\/doi.org\/10.1609\/aimag.v7i2.542","journal-title":"AI Magaz"},{"key":"8510_CR54","doi-asserted-by":"publisher","unstructured":"Zhang H, Lu JG, Tang XH (2020) An improved DS evidence theory algorithm for conflict evidence. J Beijing Univ Aeronaut Astronaut 46(3):616\u2013623. https:\/\/doi.org\/10.13700\/j.bh.1001-5965.2019.0264","DOI":"10.13700\/j.bh.1001-5965.2019.0264"},{"key":"8510_CR55","doi-asserted-by":"publisher","unstructured":"Zhou J, Yu X, Lu J (2019) Node importance in controlled complex networks. IEEE Trans Circuits Syst II: Express Briefs 66(3):437\u2013441. https:\/\/doi.org\/10.1109\/TCSII.2018.2845940","DOI":"10.1109\/TCSII.2018.2845940"},{"key":"8510_CR56","doi-asserted-by":"crossref","unstructured":"Tao ZHOU, LJG, ZHOU Tao LJG, (2006) Notes on the algorithm for calculating betweenness. Chin Phys Lett 23(8):2327\u20132329","DOI":"10.1088\/0256-307X\/23\/8\/099"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08510-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-08510-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08510-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:16:49Z","timestamp":1706746609000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-08510-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["8510"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-08510-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2413320\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"10 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}