{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:56:47Z","timestamp":1774627007310,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,18]]},"DOI":"10.1145\/3703323.3703346","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T12:03:28Z","timestamp":1750853008000},"page":"133-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["LPC: A Local Path-Based Centrality Method for Identifying Influential Nodes in Temporal Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3648-8740","authenticated-orcid":false,"given":"Srestha","family":"Sadhu","sequence":"first","affiliation":[{"name":"NIT DURGAPUR, Durgapur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6093-9819","authenticated-orcid":false,"given":"Deepanwita","family":"Mallick","sequence":"additional","affiliation":[{"name":"National Institute of Technology Durgapur, Durgapur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5510-6118","authenticated-orcid":false,"given":"Amrita","family":"Namtirtha","sequence":"additional","affiliation":[{"name":"JIS College of Engineering, Kalyani, Kalyani, IN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-931X","authenticated-orcid":false,"given":"Mariana","family":"Curado Malta","sequence":"additional","affiliation":[{"name":"INESC TEC, Faculty of Engineering, University of Porto, Porto, PT"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4880-6903","authenticated-orcid":false,"given":"Animesh","family":"Dutta","sequence":"additional","affiliation":[{"name":"National Institute of Technology Durgapur, Durgapur, IN"}]}],"member":"320","published-online":{"date-parts":[[2025,6,25]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"R\u00e9ka Albert and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2002. Statistical mechanics of complex networks. Reviews of modern physics 74 1 (2002) 47.","DOI":"10.1103\/RevModPhys.74.47"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Joonhyun Bae and Sangwook Kim. 2014. Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Physica A: Statistical Mechanics and its Applications 395 (2014) 549\u2013559.","DOI":"10.1016\/j.physa.2013.10.047"},{"key":"e_1_3_3_1_4_2","volume-title":"21st International Symposium on Experimental Algorithms (SEA 2023)","author":"Becker Ruben","year":"2023","unstructured":"Ruben Becker, Pierluigi Crescenzi, Antonio Cruciani, and Bojana Kodric. 2023. Proxying Betweenness Centrality Rankings in Temporal Networks. In 21st International Symposium on Experimental Algorithms (SEA 2023). Schloss-Dagstuhl-Leibniz Zentrum f\u00fcr Informatik."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Ferenc B\u00e9res R\u00f3bert P\u00e1lovics Anna Ol\u00e1h and Andr\u00e1s\u00a0A Bencz\u00far. 2018. Temporal walk based centrality metric for graph streams. Applied network science 3 (2018) 1\u201326.","DOI":"10.1007\/s41109-018-0080-5"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Jialin Bi Ji Jin Cunquan Qu Xiuxiu Zhan Guanghui Wang and Guiying Yan. 2021. Temporal gravity model for important node identification in temporal networks. Chaos Solitons & Fractals 147 (2021) 110934.","DOI":"10.1016\/j.chaos.2021.110934"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Phillip Bonacich. 1972. Factoring and weighting approaches to status scores and clique identification. Journal of mathematical sociology 2 1 (1972) 113\u2013120.","DOI":"10.1080\/0022250X.1972.9989806"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30 1-7 (1998) 107\u2013117.","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Claudio Castellano and Romualdo Pastor-Satorras. 2010. Thresholds for epidemic spreading in networks. Physical review letters 105 21 (2010) 218701.","DOI":"10.1103\/PhysRevLett.105.218701"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Steffen Dereich and Peter M\u00f6rters. 2013. Random networks with sublinear preferential attachment: the giant component. (2013).","DOI":"10.1214\/11-AOP697"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Linton\u00a0C Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry (1977) 35\u201341.","DOI":"10.2307\/3033543"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Mathieu G\u00e9nois and Alain Barrat. 2018. Can co-location be used as a proxy for face-to-face contacts? EPJ Data Science 7 1 (2018) 1\u201318.","DOI":"10.1140\/epjds\/s13688-018-0140-1"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Mathieu G\u00e9nois Christian\u00a0L Vestergaard Julie Fournet Andr\u00e9 Panisson Isabelle Bonmarin and Alain Barrat. 2015. Data on face-to-face contacts in an office building suggest a low-cost vaccination strategy based on community linkers. Network Science 3 3 (2015) 326\u2013347.","DOI":"10.1017\/nws.2015.10"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Peter Grindrod Mark\u00a0C Parsons Desmond\u00a0J Higham and Ernesto Estrada. 2011. Communicability across evolving networks. Physical Review E 83 4 (2011) 046120.","DOI":"10.1103\/PhysRevE.83.046120"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Herbert\u00a0W Hethcote. 2000. The mathematics of infectious diseases. SIAM review 42 4 (2000) 599\u2013653.","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Petter Holme. 2016. Temporal network structures controlling disease spreading. Physical Review E 94 2 (2016) 022305.","DOI":"10.1103\/PhysRevE.94.022305"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Petter Holme and Jari Saram\u00e4ki. 2012. Temporal networks. Physics reports 519 3 (2012) 97\u2013125.","DOI":"10.1016\/j.physrep.2012.03.001"},{"key":"e_1_3_3_1_18_2","unstructured":"Petr Hracek. insert year of access. PyCharm Community Edition Spec File. https:\/\/github.com\/phracek\/pycharm-community-edition\/blob\/master\/pycharm-community.spec. Accessed: insert date of access."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Lorenzo Isella Juliette Stehl\u00e9 Alain Barrat Ciro Cattuto Jean-Fran\u00e7ois Pinton and Wouter Van\u00a0den Broeck. 2011. What\u2019s in a crowd? Analysis of face-to-face behavioral networks. Journal of theoretical biology 271 1 (2011) 166\u2013180.","DOI":"10.1016\/j.jtbi.2010.11.033"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Maurice\u00a0G Kendall. 1945. The treatment of ties in ranking problems. Biometrika 33 3 (1945) 239\u2013251.","DOI":"10.1093\/biomet\/33.3.239"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Hyoungshick Kim and Ross Anderson. 2012. Temporal node centrality in complex networks. Physical Review E 85 2 (2012) 026107.","DOI":"10.1103\/PhysRevE.85.026107"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Aming Li Sean\u00a0P Cornelius Y-Y Liu Long Wang and A-L Barab\u00e1si. 2017. The fundamental advantages of temporal networks. Science 358 6366 (2017) 1042\u20131046.","DOI":"10.1126\/science.aai7488"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Ying Liu Ming Tang Tao Zhou and Younghae Do. 2016. Identify influential spreaders in complex networks the role of neighborhood. Physica A: Statistical Mechanics and its Applications 452 (2016) 289\u2013298.","DOI":"10.1016\/j.physa.2016.02.028"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Linyuan L\u00fc Yi-Cheng Zhang Chi\u00a0Ho Yeung and Tao Zhou. 2011. Leaders in social networks the delicious case. PloS one 6 6 (2011) e21202.","DOI":"10.1371\/journal.pone.0021202"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Rossana Mastrandrea Julie Fournet and Alain Barrat. 2015. Contact patterns in a high school: a comparison between data collected using wearable sensors contact diaries and friendship surveys. PloS one 10 9 (2015) e0136497.","DOI":"10.1371\/journal.pone.0136497"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Amrita Namtirtha Biswanath Dutta and Animesh Dutta. 2022. Semi-global triangular centrality measure for identifying the influential spreaders from undirected complex networks. Expert Systems with Applications 206 (2022) 117791.","DOI":"10.1016\/j.eswa.2022.117791"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198805090.001.0001"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018731"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Romualdo Pastor-Satorras and Alessandro Vespignani. 2001. Epidemic spreading in scale-free networks. Physical review letters 86 14 (2001) 3200.","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Binh Phan Kenth Eng\u00f8-Monsen and \u00d8ystein\u00a0D Fjeldstad. 2013. Considering clustering measures: Third ties means and triplets. Social Networks 35 3 (2013) 300\u2013308.","DOI":"10.1016\/j.socnet.2013.02.007"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46227-1_42"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Gert Sabidussi. 1966. The centrality index of a graph. Psychometrika 31 4 (1966) 581\u2013603.","DOI":"10.1007\/BF02289527"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512204"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Christian\u00a0M Schneider Andr\u00e9\u00a0A Moreira Jos\u00e9\u00a0S Andrade\u00a0Jr Shlomo Havlin and Hans\u00a0J Herrmann. 2011. Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences 108 10 (2011) 3838\u20133841.","DOI":"10.1073\/pnas.1009440108"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"John Tang Mirco Musolesi Cecilia Mascolo and Vito Latora. 2010. Characterising temporal distance and reachability in mobile and online social networks. ACM SIGCOMM Computer Communication Review 40 1 (2010) 118\u2013124.","DOI":"10.1145\/1672308.1672329"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/1852658.1852661"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Li Tao Shengzhou Kong Langzhou He Fan Zhang Xianghua Li Tao Jia and Zhen Han. 2022. A sequential-path tree-based centrality for identifying influential spreaders in temporal networks. Chaos Solitons & Fractals 165 (2022) 112766.","DOI":"10.1016\/j.chaos.2022.112766"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Philippe Vanhems Alain Barrat Ciro Cattuto Jean-Fran\u00e7ois Pinton Nagham Khanafer Corinne R\u00e9gis Byeul-a Kim Brigitte Comte and Nicolas Voirin. 2013. Estimating potential infection transmission routes in hospital wards using wearable proximity sensors. PloS one 8 9 (2013) e73970.","DOI":"10.1371\/journal.pone.0073970"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Zhen Wang Michael\u00a0A Andrews Zhi-Xi Wu Lin Wang and Chris\u00a0T Bauch. 2015. Coupled disease\u2013behavior dynamics on complex networks: A review. Physics of life reviews 15 (2015) 1\u201329.","DOI":"10.1016\/j.plrev.2015.07.006"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Xinyi Xie Liming Ying and Xue Cui. 2022. Price Strategy Analysis of Electricity Retailers Based on Evolutionary Game on Complex Networks. Sustainability 14 15 (2022) 9487.","DOI":"10.3390\/su14159487"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Pingle Yang Fanyuan Meng Laijun Zhao and Lixin Zhou. 2023. AOGC: An improved gravity centrality based on an adaptive truncation radius and omni-channel paths for identifying key nodes in complex networks. Chaos Solitons & Fractals 166 (2023) 112974.","DOI":"10.1016\/j.chaos.2022.112974"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645438"}],"event":{"name":"CODS-COMAD 2024: 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)","location":"Jodhpur India","acronym":"CODS-COMAD Dec '24"},"container-title":["Proceedings of the 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703323.3703346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:03:53Z","timestamp":1750856633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703323.3703346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":42,"alternative-id":["10.1145\/3703323.3703346","10.1145\/3703323"],"URL":"https:\/\/doi.org\/10.1145\/3703323.3703346","relation":{},"subject":[],"published":{"date-parts":[[2024,12,18]]},"assertion":[{"value":"2025-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}