{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T00:38:28Z","timestamp":1777336708066,"version":"3.51.4"},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["RZ2300003745"],"award-info":[{"award-number":["RZ2300003745"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.neucom.2026.133516","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:08:38Z","timestamp":1775099318000},"page":"133516","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A multiscale topological characterization approach for identifying vital nodes in complex networks"],"prefix":"10.1016","volume":"684","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7333-230X","authenticated-orcid":false,"given":"Yubo","family":"Guan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9148-560X","authenticated-orcid":false,"given":"Ailian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bolin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.neucom.2026.133516_bib0005","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1007\/s42524-022-0190-8","article-title":"Identifying spreading influence nodes for social networks","volume":"9","author":"Ou","year":"2022","journal-title":"Front. Eng. Manag."},{"key":"10.1016\/j.neucom.2026.133516_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.cnsns.2024.108574","article-title":"Locating influential nodes in hypergraphs via fuzzy collective influence","volume":"142","author":"Zhang","year":"2025","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10.1016\/j.neucom.2026.133516_bib0015","series-title":"Linking the World\u2019s Information: Essays on Tim Berners-Lee\u2019s Invention of the World Wide Web","first-page":"187","article-title":"Decentralization: the future of online social networking","author":"Yeung","year":"2023"},{"issue":"3","key":"10.1016\/j.neucom.2026.133516_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3441447","article-title":"Predicting influential users in online social network groups","volume":"15","author":"De Salve","year":"2021","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.neucom.2026.133516_bib0025","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1016\/j.ins.2022.12.013","article-title":"Complex dynamic analysis of a reaction-diffusion network information propagation model with non-smooth control","volume":"622","author":"Ma","year":"2023","journal-title":"Inf. Sci."},{"issue":"3","key":"10.1016\/j.neucom.2026.133516_bib0030","doi-asserted-by":"crossref","DOI":"10.3201\/eid2903.221079","article-title":"Interventions to reduce risk for pathogen spillover and early disease spread to prevent outbreaks, epidemics, and pandemics","volume":"29","author":"Vora","year":"2023","journal-title":"Emerg. Infect. Dis."},{"key":"10.1016\/j.neucom.2026.133516_bib0035","article-title":"Optimal control of a rumor propagation model in online social network by considering influential nodes","volume":"14","author":"Myilsamy","year":"2024","journal-title":"Results Control Optim."},{"issue":"2","key":"10.1016\/j.neucom.2026.133516_bib0040","doi-asserted-by":"crossref","first-page":"3282","DOI":"10.1109\/JSYST.2023.3248044","article-title":"Cascading failure propagation and mitigation strategies in power systems","volume":"17","author":"Li","year":"2023","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.neucom.2026.133516_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110163","article-title":"Ranking influential spreaders based on both node k-shell and structural hole","volume":"260","author":"Zhao","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.neucom.2026.133516_bib0050","series-title":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","first-page":"1","article-title":"Degree centrality and eigenvector centrality in Twitter","author":"Maharani","year":"2014"},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0055","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.jet.2007.01.006","article-title":"Structural holes in social networks","volume":"137","author":"Goyal","year":"2007","journal-title":"J. Econ. Theory"},{"key":"10.1016\/j.neucom.2026.133516_bib0060","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2020.124229","article-title":"Identifying influential spreaders in complex networks based on improved k-shell method","volume":"554","author":"Wang","year":"2020","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2019.112859","article-title":"Weighted kshell degree neighborhood: a new method for identifying the influential spreaders from a variety of complex network connectivity structures","volume":"139","author":"Namtirtha","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.jocs.2019.101055","article-title":"Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method","volume":"39","author":"Maji","year":"2020","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.neucom.2026.133516_bib0075","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2020.109637","article-title":"Identifying influential nodes in complex networks from global perspective","volume":"133","author":"Zhao","year":"2020","journal-title":"Chaos Solit. Fractals"},{"issue":"1\u20137","key":"10.1016\/j.neucom.2026.133516_bib0080","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","article-title":"The anatomy of a large-scale hypertextual web search engine","volume":"30","author":"Brin","year":"1998","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"3","key":"10.1016\/j.neucom.2026.133516_bib0085","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3551642","article-title":"Efficient node pagerank improvement via link-building using geometric deep learning","volume":"17","author":"Carchiolo","year":"2023","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"10.1016\/j.neucom.2026.133516_bib0090","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.physa.2015.12.162","article-title":"Identifying influential spreaders in complex networks based on gravity formula","volume":"451","author":"Ma","year":"2016","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0095","series-title":"Companion Proceedings of the ACM on Web Conference 2025","first-page":"3092","article-title":"A multi-attribute model to identify influential nodes in complex networks: addressing the k-shell limitations","author":"Esfandiari","year":"2025"},{"issue":"6","key":"10.1016\/j.neucom.2026.133516_bib0100","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0021202","article-title":"Leaders in social networks, the delicious case","volume":"6","author":"L\u00fc","year":"2011","journal-title":"PloS One"},{"key":"10.1016\/j.neucom.2026.133516_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2024.130256","article-title":"The collaborative role of k-shell and pagerank for identifying influential nodes in complex networks","volume":"658","author":"Esfandiari","year":"2025","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121154","article-title":"CAGM: a communicability-based adaptive gravity model for influential nodes identification in complex networks","volume":"235","author":"Xu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0115","doi-asserted-by":"crossref","first-page":"32904","DOI":"10.1109\/ACCESS.2020.2973241","article-title":"Identifying key nodes in complex networks based on global structure","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133516_bib0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102439","article-title":"Towards investigating influencers in complex social networks using electric potential concept from a centrality perspective","volume":"109","author":"Ullah","year":"2024","journal-title":"Inf. Fusion"},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0125","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.dcan.2020.04.011","article-title":"Identifying influential nodes in social networks via community structure and influence distribution difference","volume":"7","author":"Zhang","year":"2021","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.neucom.2026.133516_bib0130","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.neucom.2017.04.064","article-title":"Ranking influential nodes in social networks based on node position and neighborhood","volume":"260","author":"Wang","year":"2017","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133516_bib0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115778","article-title":"Identifying vital nodes from local and global perspectives in complex networks","volume":"186","author":"Ullah","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2021.111309","article-title":"Identifying influential nodes in social networks: a voting approach","volume":"152","author":"Liu","year":"2021","journal-title":"Chaos Solit. Fractals"},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0145","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s42979-023-02416-6","article-title":"Selecting influential nodes in social networks using neighborhood coreness","volume":"5","author":"Govind","year":"2023","journal-title":"SN Comput. Sci."},{"issue":"4","key":"10.1016\/j.neucom.2026.133516_bib0150","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1109\/TNSE.2024.3388994","article-title":"Vital nodes identification via evolutionary algorithm with percolation optimization in complex networks","volume":"11","author":"Liu","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.neucom.2026.133516_bib0155","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1109\/TIFS.2023.3338423","article-title":"Diffusion containment in complex networks through collective influence of connections","volume":"19","author":"Liu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0160","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1137\/S0036144503424786","article-title":"A survey of eigenvector methods for web information retrieval","volume":"47","author":"Langville","year":"2005","journal-title":"SIAM Rev."},{"issue":"3","key":"10.1016\/j.neucom.2026.133516_bib0165","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3628601","article-title":"Silvan: estimating betweenness centralities with progressive sampling and non-uniform rademacher bounds","volume":"18","author":"Pellegrina","year":"2023","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"2","key":"10.1016\/j.neucom.2026.133516_bib0170","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s10115-021-01639-4","article-title":"Computing top-k temporal closeness in temporal networks","volume":"64","author":"Oettershagen","year":"2022","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.neucom.2026.133516_bib0175","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/j.physa.2013.10.047","article-title":"Identifying and ranking influential spreaders in complex networks by neighborhood coreness","volume":"395","author":"Bae","year":"2014","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0180","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.physa.2016.02.028","article-title":"Identify influential spreaders in complex networks, the role of neighborhood","volume":"452","author":"Liu","year":"2016","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0185","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.123262","article-title":"Identifying influential nodes in complex networks based on global and local structure","volume":"541","author":"Sheng","year":"2020","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0190","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.107198","article-title":"An improved gravity model to identify influential nodes in complex networks based on k-shell method","volume":"227","author":"Yang","year":"2021","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0195","doi-asserted-by":"crossref","first-page":"6173","DOI":"10.1038\/s41598-021-84684-x","article-title":"Identification of nodes influence based on global structure model in complex networks","volume":"11","author":"Ullah","year":"2021","journal-title":"Sci. Rep."},{"issue":"7","key":"10.1016\/j.neucom.2026.133516_bib0200","doi-asserted-by":"crossref","first-page":"4394","DOI":"10.1007\/s10489-020-02132-1","article-title":"Ranking influential nodes in complex networks based on local and global structures","volume":"51","author":"Qiu","year":"2021","journal-title":"Appl. Intell."},{"key":"10.1016\/j.neucom.2026.133516_bib0205","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120927","article-title":"Finding critical nodes in a complex network from information diffusion and matthew effect aggregation","volume":"233","author":"Sun","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"10.1016\/j.neucom.2026.133516_bib0210","doi-asserted-by":"crossref","first-page":"521","DOI":"10.3390\/app14020521","article-title":"A novel method to identify key nodes in complex networks based on degree and neighborhood information","volume":"14","author":"Zhao","year":"2024","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.neucom.2026.133516_bib0215","article-title":"Influential nodes identification for complex networks based on multi-feature fusion","volume":"15","author":"Li","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.neucom.2026.133516_bib0220","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0166-4115(08)60017-5","article-title":"The dynamic pattern approach to coordinated behavior: a tutorial review","volume":"61","author":"Jeka","year":"1989","journal-title":"Adv. Psychol."},{"issue":"9","key":"10.1016\/j.neucom.2026.133516_bib0225","doi-asserted-by":"crossref","DOI":"10.1073\/pnas.2100151119","article-title":"Indirect influence in social networks as an induced percolation phenomenon","volume":"119","author":"Xie","year":"2022","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.neucom.2026.133516_bib0230","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115061","article-title":"Identifying and ranking super spreaders in real world complex networks without influence overlap","volume":"179","author":"Maji","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133516_bib0235","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2021.113608","article-title":"Spreading the information in complex networks: identifying a set of top-n influential nodes using network structure","volume":"149","author":"Gupta","year":"2021","journal-title":"Decis. Support Syst."},{"issue":"1\u20132","key":"10.1016\/j.neucom.2026.133516_bib0240","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1093\/biomet\/30.1-2.81","article-title":"A new measure of rank correlation","volume":"30","author":"Kendall","year":"1938","journal-title":"Biometrika"},{"issue":"11","key":"10.1016\/j.neucom.2026.133516_bib0245","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identification of influential spreaders in complex networks","volume":"6","author":"Kitsak","year":"2010","journal-title":"Nat. Phys."},{"key":"10.1016\/j.neucom.2026.133516_bib0250","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.ins.2022.10.070","article-title":"A novel method to identify influential nodes in complex networks based on gravity centrality","volume":"618","author":"Zhang","year":"2022","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.neucom.2026.133516_bib0255","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1002\/sim.5408","article-title":"Social contagion theory: examining dynamic social networks and human behavior","volume":"32","author":"Christakis","year":"2013","journal-title":"Stat. Med."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226009136?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226009136?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T23:43:28Z","timestamp":1777333408000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226009136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":51,"alternative-id":["S0925231226009136"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133516","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A multiscale topological characterization approach for identifying vital nodes in complex networks","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133516","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133516"}}