Skip to main content

The Analysis of Key Nodes in Complex Social Networks

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

Key nodes play really important roles in the complex socail networks. It’s worthy of analysis on them so that the social network is more intelligible. After analyzing several classic algorithms such as degree centrality, betweenness centrality, PageRank and so forth, there indeed exist some deficiencies such as ignorance of edge weights, less consideration on topology and high time complexity in the research on this area. This paper makes three contributions to address these problems. Firstly, a new idea, divide and conquer, is introduced to analyze directed-weighted social networks in different scales. Secondly, the improved degree centrality algorithm is proposed to analyze small-scale social networks. Thirdly, an algorithm named NodeRank is proposed to address large-scale social networks based on PageRank. Subsequently, the effectiveness and feasibility of these two algorithms are demonstrated respectively with case and theory. Finally, two representative basesets with respect to the social networks are adopted to mine key nodes in contrast to other algorithms. And experiment results show that the algorithms presented in this paper can preferably mine key nodes in directed-weighted complex social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Oliveira, M., Gama, J.: An overview of social network analysis. Wiley Interdisc. Rev. Data Min. Knowl. Discov. 2(2), 99–115 (2012)

    Article  Google Scholar 

  2. Xu, H., Yang, Y., Wang, L., Liu, W.: Node classification in social network via a factor graph model. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS, vol. 7818, pp. 213–224. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37453-1_18

    Chapter  Google Scholar 

  3. Dwivedi, A., Dwivedi, A., Kumar, S., Pandey, S.K., Dabra, P.: A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) ACIT. AISC, pp. 367–379. Springer, Heidelberg (2013). doi:10.1007/978-3-642-31600-5_36

    Chapter  Google Scholar 

  4. Qu, Z., Keeney, J., et al.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13(7), 108–116 (2016)

    Article  Google Scholar 

  5. Li, L., Wang, X., Zhang, Q., Lei, P., Ma, M., Chen, X.: A quick and effective method for ranking authors in academic social network. In: Park, J.J.J.H., Chen, S.-C., Gil, J.-M., Yen, N.Y. (eds.) Multimedia and Ubiquitous Engineering. LNEE, vol. 308, pp. 179–185. Springer, Heidelberg (2014). doi:10.1007/978-3-642-54900-7_26

    Chapter  Google Scholar 

  6. Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)

    Article  Google Scholar 

  7. Kimura, M., Saito, K., Motoda, H.: Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discov. Data 3(2), 60–61 (2009)

    Article  Google Scholar 

  8. Jacob, R., Koschützki, D., Lehmann, K.A., Peeters, L., Tenfelde-Podehl, D.: Algorithms for centrality indices. In: Brandes, U., Erlebach, T. (eds.) Network Analysis. LNCS, vol. 3418, pp. 62–82. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31955-9_4

    Chapter  Google Scholar 

  9. Brandes, U.: A faster algorithm for betweenness centrality. J. Math. Sociol. 25(2), 163–177 (2004)

    Article  MATH  Google Scholar 

  10. Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 13(7), 16–23 (2016)

    Article  Google Scholar 

  11. Page, L.: The PageRank citation ranking : bringing order to the web. Stanford InfoLab, vol. 9, no. 1, pp. 1–14 (1998)

    Google Scholar 

  12. Hlebec, V.: Recall versus recognition: comparison of the two alternative procedures for collecting social network data. In: Developments in Statistics and Methodology, pp. 121–129 (1993)

    Google Scholar 

  13. Viswanath, B., Mislove, A., Cha, M., et al.: On the evolution of user interaction in facebook. ACM Workshop Online Soc. Netw. 39(4), 37–42 (2009)

    Google Scholar 

Download references

Acknowledgements

This work is supported in part by the Foundation of Graduate Innovation Center in Nanjing University of Aeronautics and Astronautics under Grant No. kfjj20161601, the National Natural Science Foundation of China under Grant No. 61672022, Key Disciplines of Computer Science and Technology of Shanghai Polytechnic University under Grant No. XXKZD1604, the Fundamental Research Funds for the Central Universities and Foundation of Graduate Innovation of Shanghai Polytechnic University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yibo Pan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pan, Y., Tan, W., Chen, Y. (2017). The Analysis of Key Nodes in Complex Social Networks. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_74

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics