{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:33:19Z","timestamp":1772263999807,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Research and Application Center of Intelligent Sensing Technology of Internet of Things","award":["22-KYPT-Z208"],"award-info":[{"award-number":["22-KYPT-Z208"]}]},{"DOI":"10.13039\/100006180","name":"Horizontal Technology Development Project","doi-asserted-by":"publisher","award":["HX2024345"],"award-info":[{"award-number":["HX2024345"]}],"id":[{"id":"10.13039\/100006180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3578331","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:53:00Z","timestamp":1749577980000},"page":"102060-102070","source":"Crossref","is-referenced-by-count":2,"title":["Key Nodes Identification Method in Scale-Free Network Based on Structural Holes"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9910-7382","authenticated-orcid":false,"given":"Weiyan","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Engineering, Jiangsu Open University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183115501168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113185"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08746-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390313"},{"key":"ref7","first-page":"1","article-title":"Resilience of complex networks to targeted attacks: Recent advances","volume-title":"Phys. Rep.","volume":"909","author":"Cohen","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aaf3ea"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2013.02.039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-16656-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/0022250x.2001.9990249"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9024745"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4159\/9780674029095"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-113011-143828"},{"key":"ref20","first-page":"59","article-title":"Mining algorithm of E-burt structural hole based on two-step neighbor","volume":"52","author":"Sui","year":"2017","journal-title":"J. Shandong Univ. (Nat. Sci.)"},{"key":"ref21","first-page":"60","article-title":"Method for key nodes identification in command and control network by considering structural hole","volume":"42","author":"Wang","year":"2017","journal-title":"Fire Control Command Control"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/050623280"},{"key":"ref23","first-page":"12345","article-title":"Tensor-centric hybrid centrality: Multi-scale network analysis via high-order feature fusion","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"36","author":"Phan"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3374513"},{"key":"ref25","first-page":"45","article-title":"Exploring social networks of bottlenose dolphins: Analyzing aggression and cooperation within groups","volume":"199","author":"Ramos","year":"2023","journal-title":"Anim. Behav."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.98.2.404"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2743020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1227161.1402294"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/366622.366644"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3332167"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11029271.pdf?arnumber=11029271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:41:04Z","timestamp":1750268464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11029271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3578331","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}