1 |
WU X T , DONG H R , TSE C K , et al. Analysis of metro network performance from a complex network perspective[J]. Physica A: Statistical Mechanics and its Applications, 2018, 492, 553- 563.
doi: 10.1016/j.physa.2017.08.074
|
2 |
MAHMOUD S , YUSEF E , AHMED M . Applications of complex network analysis in electric power systems[J]. Energies, 2018, 11 (6): 1381.
doi: 10.3390/en11061381
|
3 |
刘同林, 杨芷柔, 张虎, 等. 基于复杂网络的军事通信网络建模与性能分析[J]. 系统工程与电子技术, 2020, 42 (12): 2892- 2898.
|
|
LIU T L , YANG Z R , ZHANG H , et al. Modeling and performance analysis of military communication network based on complex network[J]. System Engineering and Electronics, 2020, 42 (12): 2892- 2898.
|
4 |
翟慧敏, 张子莺, 赵晓利, 等. 基于网络结构分析的信阳市绿色基础设施优化研究[J]. 信阳师范学院学报(自然科学版), 2021, 34 (2): 260- 266.
|
|
ZHAI H M , ZHANG Z Y , ZHAO X L , et al. Optimization of green infrastructure in Xinyang city based on network structure analysis[J]. Journal of Xinyang Normal University (Natural Science Edition), 2021, 34 (2): 260- 266.
|
5 |
刘德胜. 基于复杂网络分析方法的作战体系评估研究综述[J]. 军事运筹与系统工程, 2020, 34 (3): 66- 73.
doi: 10.3969/j.issn.1672-8211.2020.03.011
|
|
LIU D S . Review on combat system evaluation based on complex network analysis method[J]. Military Operations Research and Systems Engineering, 2020, 34 (3): 66- 73.
doi: 10.3969/j.issn.1672-8211.2020.03.011
|
6 |
LIU F Z , XIAO B , LI H . Finding key node sets in complex networks based on improved discrete fireworks algorithm[J]. Journal of Systems Science and Complexity, 2021, 34, 1014- 1027.
doi: 10.1007/s11424-020-9023-1
|
7 |
SHAO C C , CUI P S , XUN P , et al. Rank correlation between centrality metrics in complex networks: an empirical study[J]. Open Physics, 2018, 16 (1): 1009- 1023.
doi: 10.1515/phys-2018-0122
|
8 |
FREEMAN L C . A set of measures of centrality based on betweenness[J]. Sociometry, 1977, 40 (1): 35- 41.
doi: 10.2307/3033543
|
9 |
DU Y X , GAO C , CHEN X , et al. A new closeness centrality measure via effective distance in complex networks[J]. Chaos, 2015, 25 (3): 440- 442.
|
10 |
JOONHYUN B , SANGWOOK K . Identifying and ranking influential spreaders in complex networks by neighborhood coreness[J]. Physica A: Statal Mechanics and its Applications, 2014, 395 (4): 549- 559.
|
11 |
JIANG Z Y , LIU Z Q , HE X , et al. Cascade phenomenon against subsequent failures in complex networks[J]. Physica A: Statal Mechanics and its Applications, 2018, 499, 472- 480.
doi: 10.1016/j.physa.2018.02.071
|
12 |
SOHEILA M , REZA F , MOSTAFA S , et al. Identifying influential nodes in heterogeneous networks[J]. Expert Systems with Applications, 2020, 160, 113580.
doi: 10.1016/j.eswa.2020.113580
|
13 |
丁学君, 李梦雨. 在线社会网络中考虑用户体验的谣言阻断策略[J]. 系统工程学报, 2020, 35 (6): 721- 735.
doi: 10.13383/j.cnki.jse.2020.06.001
|
|
DING X J , LI M Y . Rumor blocking strategies considering user experience in online social network[J]. Journal of Systems Engineering, 2020, 35 (6): 721- 735.
doi: 10.13383/j.cnki.jse.2020.06.001
|
14 |
BANERJEE S , JENAMANI M , PRATIHAR D K . A survey on influence maximization in a social network[J]. Knowledge and Information Systems, 2020, 62, 3417- 3455.
doi: 10.1007/s10115-020-01461-4
|
15 |
TANG J X , ZHAO F Q , ZHANG R S , et al. A sequential seed scheduling heuristic based on determinate and latent margin for influence maximization problem with limited budget[J]. International Journal of Modern Physics C, 2021, 32 (6): 2150079.
doi: 10.1142/S0129183121500790
|
16 |
ZHANG L , XIA J J , CHENG F , et al. Multi-objective optimization of critical node detection based on cascade model in complex networks[J]. IEEE Trans.on Network Science and Engineering, 2020, 7 (3): 2052- 2066.
doi: 10.1109/TNSE.2020.2972980
|
17 |
FAN C J , ZENG L , SUN Y Z , et al. Finding key players in complex networks through deep reinforcement learning[J]. Nature Machine Intelligence, 2020, 2 (6): 317- 324.
doi: 10.1038/s42256-020-0177-2
|
18 |
王超, 郭基联, 符凌云. 基于拓扑势的作战体系网络节点重要度评估方法[J]. 兵工学报, 2020, 41 (8): 188- 194.
|
|
WANG C , GUO J L , FU L Y . Research on evaluation method of node importance of combat system-of-systems network based on topological potential[J]. Acat Armamentarii, 2020, 41 (8): 188- 194.
|
19 |
DOMINGOS P, RICHARDSON M. Mining the network value of customers[C]//Proc. of the 7th International Conference on Knowledge Discovery and Data Mining, 2001: 57-66.
|
20 |
LESKOVEC J, KRAUSE A, GUESTRIN C, et al. Cost-effective outbreak detection in networks[C]//Proc. of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007: 420-429.
|
21 |
LATORA V , MARCHIORI M . A measure of centrality based on the network efficiency[J]. New Journal of Physics, 2007, 9 (6): 188.
doi: 10.1088/1367-2630/9/6/188
|
22 |
NEMHAUSER G , WOLSEY L , FISHER M . An analysis of the approximations for maximizing submodular set functions[J]. Mathematical Programming, 1978, 14 (1): 265- 294.
doi: 10.1007/BF01588971
|
23 |
刘凤增, 肖兵, 金宏斌, 等. 基于有限节点集的网络毁伤最大化问题研究[J]. 控制与决策, 2020, 35 (4): 937- 942.
|
|
LIU F Z , XIAO B , JIN H B , et al. Network damage maximization based on finite node set[J]. Control and Decision, 2020, 35 (4): 937- 942.
|
24 |
YUAN H N , HAN Y N , CAI N , et al. A multi-granularity backbone network extraction method based on the topology potential[J]. Complexity, 2018, 8604132.
|
25 |
WANG S L , MALANG K , YUAN H N , et al. Extracting skeleton of the global terrorism network based on m-modified topology potential[J]. Complexity, 2020, 7643290.
|
26 |
LIU Y S , YE X F , ZHAN X H , et al. TPQCI: a topology potential-based method to quantify functional influence of copy number variations[J]. Methods, 2021,
doi: 10.1016/j.ymeth.2021.04.015
|
27 |
淦文燕, 赫南, 李德毅, 等. 一种基于拓扑势的网络社区发现方法[J]. 软件学报, 2009, 20 (8): 2241- 2254.
|
|
GAN W Y , HE N , LI D Y , et al. Community discovery method in networks based on topological potential[J]. Journal of Software, 2009, 20 (8): 2241- 2254.
|
28 |
LI M , LU Y , WANG J X , et al. A topology potential-based method for identifying essential proteins from PPI networks[J]. IEEE Trans.on Computational Biology and Bioinformatics, 2015, 12 (2): 372- 383.
doi: 10.1109/TCBB.2014.2361350
|
29 |
TANG J , TANG X Y , YUAN J S . An effcient and effective hop-based approach for infuence maximization in social networks[J]. Social Network Analysis and Mining, 2018, 8, 10.
doi: 10.1007/s13278-018-0489-y
|
30 |
蓝羽石, 毛少杰, 王珩. 指挥信息系统结构理论与优化方法[M]. 北京: 国防工业出版社, 2015.
|
|
LAN Y S , MAO S J , WANG H . The theory and optimization method of command information system structure[M]. Beijing: National Defense Industry Press, 2015.
|
31 |
LESKOVEC J. Autonomous systems-Oregon-1[EB/OL]. [2021-04-07]. http://snap.stanford.edu/data/Oregon-1.html.
|