{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:57:14Z","timestamp":1762325834804,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&amp;D Program of China","doi-asserted-by":"publisher","award":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"],"award-info":[{"award-number":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Zhejiang Province","award":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"],"award-info":[{"award-number":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"]}]},{"name":"Science and Technology Planning Project of Jinhua","award":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"],"award-info":[{"award-number":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"]}]},{"name":"Science and Technology Plan Project of Zhejiang Highway and Transportation Management Center","award":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"],"award-info":[{"award-number":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"]}]},{"name":"National College Students Innovation and Entrepreneurship Training Program","award":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"],"award-info":[{"award-number":["2022YFB4300500","2022YFB4300603","ZCLQ24E0802","2023-4-023","2020H07","S202310345095","X202310345011"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Identifying influential nodes, with pivotal roles in practical domains like epidemic management, social information dissemination optimization, and transportation network security enhancement, is a critical research focus in complex network analysis. Researchers have long strived for rapid and precise identification approaches for these influential nodes that are significantly shaping network structures and functions. The recently developed SPON (sum of proportion of neighbors) method integrates information from the three-hop neighborhood of each node, proving more efficient and accurate in identifying influential nodes than traditional methods. However, SPON overlooks the heterogeneity of neighbor information, derived from the asymmetry properties of natural networks, leading to its lower accuracy in identifying essential nodes. To sustain the efficiency of the SPON method pertaining to the local method, as opposed to global approaches, we propose an improved local approach, called the SSPN (sum of the structural proportion of neighbors), adapted from the SPON method. The SSPN method classifies neighbors based on the h-index values of nodes, emphasizing the diversity of asymmetric neighbor structure information by considering the local clustering coefficient and addressing the accuracy limitations of the SPON method. To test the performance of the SSPN, we conducted simulation experiments on six real networks using the Susceptible\u2013Infected\u2013Removed (SIR) model. Our method demonstrates superior monotonicity, ranking accuracy, and robustness compared to seven benchmarks. These findings are valuable for developing effective methods to discover and safeguard influential nodes within complex networked systems.<\/jats:p>","DOI":"10.3390\/sym16020193","type":"journal-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T07:50:12Z","timestamp":1707205812000},"page":"193","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks"],"prefix":"10.3390","volume":"16","author":[{"given":"Gehui","family":"Liu","sequence":"first","affiliation":[{"name":"School of Transportation and Logistics, Southwest Jiaotong University, Chengdu 611756, China"},{"name":"Beijing National Railway Research & Design Institute of Signal & Communication Group Co., Ltd., Beijing 100070, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Engineering, Zhejiang Normal University, Jinhua 321004, China"}]},{"given":"Haichen","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Engineering, Zhejiang Normal University, Jinhua 321004, China"}]},{"given":"Jiehao","family":"Dai","sequence":"additional","affiliation":[{"name":"Lanxi Road and Traffic Supervision Center, Jinhua 321102, China"}]},{"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Engineering, Zhejiang Normal University, Jinhua 321004, China"}]},{"given":"Senbin","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Engineering, Zhejiang Normal University, Jinhua 321004, China"},{"name":"Key Laboratory of Urban Rail Transit Intelligent Operation and Maintenance Technology & Equipment of Zhejiang Province, Zhejiang Normal University, Jinhua 321004, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1126\/science.1185231","article-title":"The Spread of Behavior in an Online Social Network Experiment","volume":"329","author":"Centola","year":"2010","journal-title":"Science"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1038\/s41467-021-21483-y","article-title":"Percolation of heterogeneous flows uncovers the bottlenecks of infrastructure networks","volume":"12","author":"Hamedmoghadam","year":"2021","journal-title":"Nat. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1926","DOI":"10.1109\/TIFS.2023.3256706","article-title":"Human and Social Capital Strategies for Mafia Network Disruption","volume":"18","author":"Ficara","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2016.06.007","article-title":"Vital nodes identification in complex networks","volume":"650","author":"Lu","year":"2016","journal-title":"Phys. Rep."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1037\/0022-3514.77.5.967","article-title":"Mutual enhancement: Toward an understanding of the collective preference for shared information","volume":"77","author":"Wittenbaum","year":"1999","journal-title":"J. Personal. Soc. Psychol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","article-title":"The anatomy of a large-scale hypertextual Web search engine","volume":"30","author":"Brin","year":"1998","journal-title":"Comput. Netw. ISDN Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"15095","DOI":"10.1038\/s41598-019-51209-6","article-title":"Systematic comparison between methods for the detection of influential spreaders in complex networks","volume":"9","author":"Claudio","year":"2019","journal-title":"Sci. Rep."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1080\/0022250X.1972.9989806","article-title":"Factoring and weighting approaches to status scores and clique identification","volume":"2","author":"Bonacich","year":"1972","journal-title":"J. Math. Sociol."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lu, L., Zhang, Y.-C., Yeung, C.H., and Zhou, T. (2011). Leaders in social networks, the Delicious case. PLoS ONE, 6.","DOI":"10.1371\/journal.pone.0021202"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1038\/nature14604","article-title":"Influence maximization in complex networks through optimal percolation","volume":"524","author":"Morone","year":"2015","journal-title":"Nature"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kanhabua, N., and N\u00f8rv\u00e5g, K. (2011, January 25\u201329). A comparison of time-aware ranking methods. Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, Beijing, China.","DOI":"10.1145\/2009916.2010147"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kirigin, T.B., Babi\u0107, S.B., and Perak, B. (2022). Semi-Local Integration Measure of Node Importance. Mathematics, 10.","DOI":"10.3390\/math10030405"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/BF02289527","article-title":"The centrality index of a graph","volume":"31","author":"Sabidussi","year":"1966","journal-title":"Psychometrika"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","article-title":"A Set of Measures of Centrality Based on Betweenness","volume":"40","author":"Freeman","year":"1977","journal-title":"Sociometry"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identification of influential spreaders in complex networks","volume":"6","author":"Kitsak","year":"2010","journal-title":"Nat. Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"10168","DOI":"10.1038\/ncomms10168","article-title":"The H-index of a network node and its relation to degree and coreness","volume":"7","author":"Lu","year":"2016","journal-title":"Nat. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.physa.2018.08.053","article-title":"Leveraging local h-index to identify and rank influential spreaders in networks","volume":"512","author":"Liu","year":"2018","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.physa.2018.09.064","article-title":"EHC: Extended H-index Centrality measure for identification of users\u2019 spreading influence in complex networks","volume":"514","author":"Zareie","year":"2019","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gao, L., Yu, S., Li, M., Shen, Z., and Gao, Z. (2019). Weighted h-index for Identifying Influential Spreaders. Symmetry, 11.","DOI":"10.3390\/sym11101263"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"18001","DOI":"10.1209\/0295-5075\/119\/18001","article-title":"Identifying multiple influential spreaders via local structural similarity","volume":"119","author":"Liu","year":"2017","journal-title":"EPL Europhys. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.physa.2014.02.032","article-title":"Ranking the spreading ability of nodes in complex networks based on local structure","volume":"403","author":"Gao","year":"2014","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhu, J., and Wang, L. (2021). Identifying Influential Nodes in Complex Networks Based on Node Itself and Neighbor Layer Information. Symmetry, 13.","DOI":"10.3390\/sym13091570"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.chaos.2017.09.010","article-title":"Influential nodes ranking in complex networks: An entropy-based approach","volume":"104","author":"Zareie","year":"2017","journal-title":"Chaos Solitons Fractals"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"105580","DOI":"10.1016\/j.knosys.2020.105580","article-title":"Finding influential nodes in social networks based on neighborhood correlation coefficient","volume":"194","author":"Zareie","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"083020","DOI":"10.1088\/1367-2630\/ace843","article-title":"Identifying critical nodes in complex networks based on neighborhood information","volume":"25","author":"Zhao","year":"2023","journal-title":"New J. Phys."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","article-title":"Centrality in social networks conceptual clarification","volume":"1","author":"Freeman","year":"1978","journal-title":"Soc. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.cnsns.2019.01.032","article-title":"Fast influencers in complex networks","volume":"74","author":"Zhou","year":"2019","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/j.physa.2013.10.047","article-title":"Identifying and ranking influential spreaders in complex networks by neighborhood coreness","volume":"395","author":"Bae","year":"2014","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"22323","DOI":"10.1103\/PhysRevE.96.022323","article-title":"Accurate ranking of influential spreaders in networks based on dynamically asymmetric link weights","volume":"96","author":"Liu","year":"2017","journal-title":"Phys. Rev. E"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.physa.2019.02.010","article-title":"Identifying influential spreaders based on indirect spreading in neighborhood","volume":"523","author":"Yu","year":"2019","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1140\/epjb\/e20020122","article-title":"Epidemic outbreaks in complex heterogeneous networks","volume":"26","author":"Moreno","year":"2002","journal-title":"Eur. Phys. J. B"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/S0951-8320(96)00072-5","article-title":"Probability, conditional probability and complementary cumulative distribution functions in performance assessment for radioactive waste disposal","volume":"54","author":"Helton","year":"1996","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1093\/biomet\/30.1-2.81","article-title":"A New Measure of Rank Correlation","volume":"30","author":"Kendall","year":"1938","journal-title":"Biometrika"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","article-title":"Mitigation of malicious attacks on networks","volume":"108","author":"Schneider","year":"2011","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/s00265-003-0651-y","article-title":"The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations","volume":"54","author":"Lusseau","year":"2003","journal-title":"Behav. Ecol. Sociobiol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"36104","DOI":"10.1103\/PhysRevE.74.036104","article-title":"Finding community structure in networks using the eigenvectors of matrices","volume":"74","author":"Newman","year":"2006","journal-title":"Phys. Rev. E"},{"key":"ref_37","first-page":"9277","article-title":"The Network Data Repository with Interactive Graph Analytics and Visualization","volume":"29","author":"Rossi","year":"2015","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1140\/epjb\/e2011-10979-2","article-title":"Robust network community detection using balanced propagation","volume":"81","author":"Bajec","year":"2011","journal-title":"Eur. Phys. J. B"},{"key":"ref_39","first-page":"539","article-title":"Learning to discover social circles in ego networks","volume":"Volume 1","author":"McAuley","year":"2012","journal-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"129302","DOI":"10.1016\/j.physa.2023.129302","article-title":"Identify influential nodes in complex networks: A k-orders entropy-based method","volume":"632","author":"Wu","year":"2023","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"129101","DOI":"10.1016\/j.physa.2023.129101","article-title":"Identifying influential nodes in complex networks based on resource allocation similarity","volume":"627","author":"Ai","year":"2023","journal-title":"Phys. A Stat. Mech. Appl."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/2\/193\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:55:56Z","timestamp":1760104556000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/2\/193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":42,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["sym16020193"],"URL":"https:\/\/doi.org\/10.3390\/sym16020193","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2024,2,6]]}}}