Finding the key nodes to minimize the victims of the malicious information in complex network

Published: 01 Jan 2024, Last Modified: 16 May 2025Knowl. Based Syst. 2024EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Highlights•We characterize the influence of node set and influence redundancy among key nodes.•We prove that the objective function satisfies submodular property.•We propose a solution that has 1-1/e approximation ratio and time complexity O(N logN).
Loading