Next Article in Journal
Analysis of the Multi-Objective Control Sequence Optimization Problem in Bivariate Fertilizer Applicators
Previous Article in Journal
Multi-View Utility-Based Clustering: A Mutually Supervised Perspective
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identifying Vital Nodes by Local g-Core on Symmetric Networks

School of Cyber Science and Technology, Shandong University, Qingdao 266237, China
Symmetry 2025, 17(6), 925; https://doi.org/10.3390/sym17060925
Submission received: 12 May 2025 / Revised: 6 June 2025 / Accepted: 9 June 2025 / Published: 11 June 2025
(This article belongs to the Section Computer)

Abstract

:
The H-index is a widely recognized centrality measure for nodes in symmetric networks, defined as the maximum number of neighbors with degrees equal to or greater than the node’s own degree. However, this metric underestimates the structural influence of “weak nodes”—low-degree nodes connected to high-degree hubs—that often serve as critical connectors in network topology. To address this limitation, we propose the H α -index, which generalizes the H-index by considering the maximum number of neighbors with degrees at least α times the node’s degree, where α 1 . Based on this refinement, we introduce two novel centrality measures: the g-core and the local g-core, which were derived from iterative applications of the H α -index to a node’s neighbors. Extensive experiments on sixteen real-world networks demonstrate the efficiency of our methods. Notably, the local g-core achieves 45–105% higher Kendall Tau correlation coefficients compared to the traditional H-index and coreness on three benchmark networks, highlighting its superior performance in capturing node influence.

1. Introduction

Identifying influential nodes [1,2,3,4,5,6] in complex networks [7,8,9] remains a persistent challenge, with critical applications spanning targeted advertising on social platforms, source localization in rumor propagation, and the selection of high-impact researchers.
In the context of various methods for assessing scientific influence, one prominent metric is the H-index [10], which has emerged as a widely adopted metric to quantify both the quality and productivity of the research output. Originally proposed by J. E. Hirsch to characterize individual scientific contributions, the H-index has since been extended to evaluate academic institutions and journals [11]. By integrating measures of publication quality (impact factor) and quantity (publication count), it addresses the limitations of traditional metrics that prioritize only one dimension.
Over the past two decades, the H-index has attracted significant attention from scientometrics researchers proposing various improvements in different perspectives [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27]. These advancements fall into three primary categories: (I) Normalization and Averaging: Methods such as normalizing the H-index by the number of authors [14], by the publication year [15], and by the disciplinary field [16], as well as by averaging with citation counts [17] or geometric mean [18]. (II) Incorporation of Additional Information: Approaches that integrate auxiliary data, including the author’s position in bylines [19], the shape of citing functions [20], subdomain distributions within a scientist’s citation profile [21], the collaboration distance between citing and cited authors [22], excess citations beyond H 2 citations for papers [23], and the inclusion of uncited papers [24]. (III) Temporal Evolution Analysis: Studies examining the H-index’s trajectory over a researcher’s career, such as predictive models via regression analysis [25,26] and time window evaluations [27].
These improvements, though valuable, are closely tied to the intrinsic properties of papers and authors, making generalization to broader complex networks challenging.
Notably, the H-index has also captured the interest of scholars in complex networks since Lü et al. [28] revealed the H-index’s relationship to degree and coreness. Specifically, Lü et al. [28] defined an H-operator on a group of numbers via the H-index. They proved that the coreness—a centrality measure introduced by Kitsak et al.—is the limit of the iteration of the H-operator. This seminal work [28] has sparked widespread attention. On the one hand, it has been extended to directed networks [29] and weighted networks [30]. On the other hand, it has reinvigorated interest in coreness, a computationally efficient centrality metric. Despite its utility, coreness has inherent limitations, such as limited discrimination power and coarse-grained resolution, which can hinder its application in certain contexts. To address these, several refinements have been proposed, including mixed degree [31], shortest distance-based coreness [32], community-based coreness [33], coreness without redundant links [34], and two-step coreness [35].
This paper investigates the limitations of the H-index in capturing the influence of weak nodes—nodes with small degrees but high-degree neighbors. Our analysis is driven by the observation that the H-index, which counts neighbors’ degrees, underestimates the influence of weak nodes. For example, consider two nodes: Node u has neighbors with degrees { 3 , 3 , 3 } , yielding H ( u ) = 3 and highlighting that it is indeed a weak node. Node v has neighbors with degrees { 10 , 10 , 10 } , also yielding H ( v ) = 3 . Although node v is a weak node (low degree but surrounded by high-degree neighbors), it is more influential in information propagation than node v. This illustrates a critical shortcoming of the H-index: specifically, it assigns equal influence to nodes with structurally distinct neighbor sets.
The k-core decomposition, derived by iteratively applying the H-index to a node’s neighbors, exacerbates this bias. Weak nodes are systematically underestimated in k-core analyses due to their low intrinsic degrees, despite their high-degree neighbors.
To estimate the influence of weak nodes during information spreading, we propose a new centrality, the H α -index, which is the maximum number of neighbors with at least α times the node’s degree. This formulation emphasizes relative neighbor quality (via α ) over absolute degree thresholds, enabling nuanced influence quantification.
Building on the H α -index, we define the g-core, a hierarchical decomposition that partitions the network based on H α -index values. This method better captures the influence of weak nodes compared to the traditional k-core.
The rest of the paper is organized as follows: Section 2 provides the theoretical background on the H-index, k-core, and collective influence centrality. Section 3 introduces the H α -index, the g-core, and the local g-core. Section 4 presents experiments validating the superiority of the H α -index and g-core. Section 5 discusses future research directions.

2. Classical Centrality

2.1. Notations

Let G ( V , E ) denote an undirected symmetric network, where V and E represent the set of nodes and the set of edges in G, respectively. The adjacency matrix A = ( a u v ) n × n encodes connectivity, where n = | V | is the number of nodes in G and a u v = 1 if nodes u and v are connected, i.e., ( u , v ) E , and a u v = 0 otherwise. The neighborhood N G ( v ) of the node v is defined as the set of nodes directly connected to v. For a node v, let k v denote its degree, i.e., | N G ( v ) | .

2.2. H-Index Centrality

Definition 1. 
Let Ω = { x 1 , x 2 , , x m } be a finite non-empty set of positive real numbers. Define the subset T y Ω as   
T y = { x j Ω x j y } .
The H-operator, denoted as H ( Ω ) , is the maximum value y such that | T y | = y .
Definition 2. 
Let v be a node in the graph G, and let N G ( v ) denote its neighborhood. The H-index of v, denoted as h v , is defined as
h v = H { k u u N G ( v ) } ,
where k u is the degree of node u.

2.3. Coreness Centrality

Coreness centrality is a network topological measure derived from k-core decomposition. It evaluates a node’s importance based on its position within the hierarchical core structure of a network. Nodes with higher coreness values occupy denser, more central regions of the network, playing critical roles in maintaining global connectivity and influence.
The k-core is obtained through iterative degree-based pruning:
(1).
Start with the original graph G = ( V , E ) .
(2).
Iteratively remove all nodes with a degree less than k along with their incident edges.
(3).
Repeat until no nodes with a degree less than k remain.
The resulting subgraph is the k-core. The node v is assigned a coreness of c v = k if it belongs to the k-core but not the ( k + 1 ) -core. This hierarchical decomposition ensures that nodes in higher k-cores are more deeply embedded within the network’s core structure.

2.4. Closeness Centrality

Closeness centrality measures a node’s centrality based on its average distance to all other nodes in the network. It quantifies how quickly a node can reach others, reflecting its efficiency in spreading information or influence. Nodes with high closeness centrality are “close” to others, meaning that they have short average path lengths to all nodes.
The closeness centrality c c ( v ) of the node v in the connected graph G = ( V , E ) with n nodes is defined as
c c ( v ) = n 1 u v d ( u , v ) ,
where d ( u , v ) is the shortest path length between nodes u and v and n 1 normalizes the measure to account for the number of other nodes in the network.

2.5. Collective Influence Centrality

Collective influence (CI) is a method developed by Morone and Makse [36] for identifying highly influential nodes in complex networks. CI quantifies a node’s influence by measuring the extent of damage inflicted on the network’s giant connected component upon the node’s removal. The formal definition of CI is given by
c i ( u ) = ( k u 1 ) v D ( u , l ) ( k v 1 ) ,
where k u represents the degree of node i, D ( i , l ) denotes the set of nodes at a l-hop distance from node u, and k v is the degree of node j.

2.6. Betweenness Centrality

Betweenness centrality is a measure of a node’s centrality in a network based on the extent to which it lies on the shortest paths between pairs of other nodes. It quantifies a node’s role as a “bridge” or intermediary in facilitating communication, information flow, or interactions across the network. Nodes with high betweenness centrality are critical for maintaining connectivity and controlling the flow of resources, as their removal can significantly disrupt network interactions.
The betweenness centrality b t ( u ) of the node u in graph G = ( V , E ) with n nodes is defined as
b t ( u ) = s t u σ ( s , t | u ) σ ( s , t ) ,
where σ ( s , t ) is the total number of shortest paths from node s to node t and σ ( s , t | u ) is the number of those shortest paths that pass through node u.

3. H α -Index, g -Core, and Local g -Core on Symmetric Networks

3.1. H α -Index

Definition 3. 
Let Ω = { x 1 , x 2 , , x m } be a finite set of positive real numbers, α 1 be a real number, and T α , y = { x j Ω : x j α y } . The H α -operator H α ( Ω ) is defined as the maximum value y such that | T α , y | = y .
Definition 4. 
Given node v G with neighbors N G ( v ) , the H α -index of v, denoted as h α , v , is defined as
h α , v = H α { k u u N G ( v ) } ,
where k u denotes the degree of node u.
Definition 5. 
Let G ( V , E ) be a simple undirected symmetric network. For any node v V , the H α -sequence of v, denoted as { h α , v ( t ) } t = 0 , is recursively defined as
h α , v ( t ) = H α { h α , u ( t 1 ) u N G ( v ) } , t 1 , H α { k u u N G ( v ) } , t = 0 .
By this definition, the H α -index corresponds to the cardinality of the set T α , v . This yields the following inequality:
h α , v t 0 , t .
From the definition of the H α -index, it is evident that the H-index is a specific instance of the H α -index. Specifically, when α = 1 , the H-index coincides with the H α -index, i.e., h v = h α , v . Furthermore, when α = 1 , the H α -sequence h α , v t converges to its coreness c v , as established by Lü et al. [28].
Theorem 1. 
For any node v V in the network G ( V , E ) , if α > 1 , then the following equation holds:
h α , v = 0 ,
where h α , v denotes the limit of the H α -sequence for node v.
Proof. 
We prove that the H α -sequence h α , v t is strictly monotonic decreasing whenever h α , v t > 0 .
(1) Base Case ( t = 1 ): By the definition of the H α -sequence,
h α , v 1 = H α { h α , u 0 u N G ( v ) } .
Since h α , u 0 = k u (the initial degree of node u), we have
h α , v 1 = H α ( { k u u N G ( v ) } ) < k v .
This implies h α , v 1 < h α , v 0 , establishing the base case.
(2) Inductive Step: Assume that some t 0 1 , 0 < h α , v t 0 + 1 < h α , v t 0 . According to the definition of the H α -sequence,
h α , v t 0 + 2 = H α { h α , u t 0 + 1 u N G ( v ) } .
Since h α , u t 0 + 1 < h α , u t 0 for all u N G ( v ) (by the inductive hypothesis) and H α is a monotonic decreasing function, it follows that
h α , v t 0 + 2 < H α { h α , u t 0 u N G ( v ) } = h α , v t 0 + 1 .
Thus, the inequality holds for t 0 + 2 , completing the inductive step.
(3) Conclusion: By induction, the H α -sequence h α , v t is strictly monotonic decreasing for all t 1 whenever h α , v t > 0 .
(4) Convergence to Zero: Since the sequence h α , v t is strictly decreasing and bounded below by 0 (as shown in Equation (1)), the monotone convergence theorem ensures
lim t h α , v t = 0 .
Thus, h α , v = 0 as required.    □
The H α -operator and the H α -index have been implemented and reference them as Algorithms 1 and 2. The H α -operator computes the thresholded value h for a given vector c and a parameter α 1 . It iteratively evaluates the maximum integer x such that at least x elements in c satisfy the condition c i α x . This process identifies a critical point where the density of values in c relative to α -scaled thresholds is maximized. The algorithm terminates once the condition is met or exhausts the search range, ensuring computational efficiency by limiting the search to min ( length ( c ) , max ( c ) ) . The output h quantifies the structural resilience or dominance of values in c under the specified α -weighted constraint, making it applicable in scenarios requiring threshold-based analysis of data distributions.
The H α -index algorithm evaluates the influence of a node in a network by leveraging its neighborhood structure. Given the adjacency matrix A and parameter α , it first extracts node degrees degree from A. For each node i, it computes the degrees of its immediate neighbors n _ degree and applies the H α -operator to this subset. The resulting y i represents the H α -index of node i, reflecting the interplay between the node’s connectivity and the α -scaled thresholding of its neighbors’ degrees. This metric provides insights into how local network properties propagate globally, enabling the identification of nodes whose influence is contingent on both their direct connections and the collective behavior of their neighbors.

3.2. g-Core and Local g-Core

Classically, the H-sequence h 1 , v t converges to its coreness c v  [28]. However, when extended to the H α -index framework, the iterative sequence converges to zero (See Theorem 1), presenting challenges in generalizing the k-core concept. To address this, we propose accumulating the iterative values during the convergence process, as later termination at zero indicates stronger coreness. This leads to the following definition of the g-core, where the summation of values quantifies the structural centrality.
Algorithm 1:  H α -operator
Symmetry 17 00925 i001
Algorithm 2:  H α -index
Symmetry 17 00925 i002
Definition 6. 
The g-core of a node v is defined as
g ( v ) = t = 0 h α , v t .
Furthermore, to incorporate neighborhood influence, we introduce the local g-core, which integrates the coreness metrics of adjacent nodes, enabling localized structural analysis.
Definition 7. 
The local g-core of node v is defined as
l g ( v ) = g ( v ) + η u N G ( v ) g ( u ) ,
where η ( 0 , 1 ) is a parameter between the node v and its neighbors.
The g-core was implemented in Algorithm 3. The g-core algorithm iteratively refines the structural properties of a network through successive applications of the H α -index. Starting with initial node degrees, it computes the H α -index vector hindex and updates the degree vector for the next iteration. This process continues until all elements in hindex become zero, signifying that the network’s structural constraints under α -scaled thresholds are fully exhausted. The algorithm accumulates intermediate results into a matrix hall, and the final output core is obtained by summing all rows of the hall. This cumulative measure captures the network’s progressive degradation under iterative α -based filtering, offering a quantitative framework to assess robustness or vulnerability in complex systems.
Algorithm 3: g-core Calculation
Symmetry 17 00925 i003
Table 1 presents the H α -sequence and g-core values for the nodes in Figure 1. Node v 1 in Figure 1 has neighbors with degrees { 4 , 4 } , whereas node v 6 has neighbors with degrees { 2 , 2 } . Despite node v 1 being structurally more influential than node v 6 , their H-indices are equal. This highlights a limitation of the H-index and traditional coreness metrics: they fail to distinguish the true influence of nodes based on neighborhood diversity. In contrast, the g-core and H α -index values of v 1 are strictly greater than those of v 6 , demonstrating their capacity to more effectively capture the structural significance of nodes with heterogeneous neighborhood properties.

3.3. Time Complexity Analysis

The overall complexity for the H α -index is O ( m + n 2 ) . The g-core calculation algorithm has a worst-case complexity of O ( n ( m + n 2 ) ) , primarily due to its dependence on multiple iterations of the H α -index, while the H α -index algorithm operates under O ( m + n 2 ) . The local g-core for node v, as defined in Equation (4), involves two main components: the g-core value of the node itself and an accumulated term from its neighbors. The complexity of calculating the local g primarily depends on the degree of the node. Therefore, its complexity can generally be expressed as O ( d n ( m + n 2 ) ) , where d represents the maximum degree of a network.

4. Experimental Results

We compare the proposed centralities with the degree, H-index, coreness, closeness, betweenness, and CI using Kendall’s tau coefficient and the imprecision value on 15 real networks.

4.1. Data Sets

The experiments utilize 15 benchmark networks spanning diverse domains: (1) C. elegans neural network [7]: A neural network of the nematode Caenorhabditis elegans. (2) Email communication network [37]: An email network among university members. (3) Kohonen self-organizing maps [38]: A network representing academic articles on self-organizing maps and related references. (4) Router-level internet topology [39]: A network modeling global internet router connections. (5) Yeast protein interactions [8]: A protein–protein interaction network in budding yeast. (6) US air transportation system [38]: A network representing commercial airline routes in the United States. (7) Scientometrics literature network [38]: A citation network from S c i e n t o m e t r i c s journal articles (1978–2000). (8) Small–Griffith citation network [38]: A network of citations to works by Small, Griffith, and their descendants. (9) Sexual activity network [40]: A social network derived from a web-based sexual contact community. (10) Condensed matter collaboration network [41]: A collaboration network of scientists sharing preprints in condensed matter physics (1995–2003). (11) Enron email corpus [42]: A large-scale email communication network containing 0.5 million emails. (12) Secure information exchange network [38]: A network of secure information exchange via routers. (13) Arxiv condensed matter collaboration [41]: A network of collaborations among condensed matter physicists. (14) Enron email network [42]: A network derived from 30,000+ emails in the Enron scandal. (15) General network repository [38]: A heterogeneous collection of citation networks. (16) Amazon [43] is a co-purchase network between products on Amazon website. For more details, see Table 2.

4.2. Evaluation Metrics

4.2.1. SIR Model

We utilize the standard susceptible–infected–recovered (SIR) model [44,45] to evaluate the accuracy of the proposed centralities in identifying vital nodes. In this model, each node transitions through three states: susceptible (S), infected (I), and recovered (R). The spreading influence of a node is defined as the average number of recovered nodes that serve as the infected source in the SIR process.
The simulation proceeds as follows:
(1) One node is selected as the infected seed, with all others initially susceptible. (2) At each simulation step, infected nodes transmit the infection to susceptible neighbors with probability β and then transition to the recovered state with probability γ . (3) The process terminates when no infected nodes remain.
The total number of recovered nodes at termination quantifies the seed node’s influence. The SIR model’s approximate epidemic threshold [46] is given by
β c = k k 2 k ,
where k denotes the average node degree. Simulations are conducted at β = 1.5 β c , 2 β c , and 2.5 β c , with γ = 1 fixed. Each result represents the average over 100 independent simulations.

4.2.2. Kendall’s Tau Coefficient

As a rank correlation metric [47], Kendall’s tau ( τ ) quantifies the agreement between node rankings derived from a given centrality and the ground truth (empirical SIR influence). A higher τ value indicates stronger correlation between the centrality ranking and the actual spreading influence.

4.2.3. Imprecision Value

This metric [48] evaluates a centrality’s ability to identify the most influential nodes. Given a network with n nodes and a fraction p ( 0 , 1 ) ,
M 1 ( p ) : Cumulative influence of the top p n nodes ranked by a centrality.
M 2 ( p ) : Maximum cumulative influence achievable from any p n nodes.
The imprecision value is defined as
ε ( p ) = 1 M 1 ( p ) M 2 ( p ) .
Smaller ε ( p ) values indicate better performance in prioritizing high-influence nodes.

4.3. Results of Kendall’s Tau Coefficients

Since the local g-core involves two parameters, α and η , we conduct extensive experiments to analyze their performance across different value combinations. Specifically, we test nine values of α = { 1.1 , 1.2 , 1.3 , 1.4 , 1.6 , 1.8 , 2 , 2.5 , 3 } and nine values of η = { 0.01 , 0.02 , 0.03 , 0.05 , 0.1 , 0.2 , 0.3 , 0.4 , 0.5 } . Among all α - η combinations, the proposed local g-core achieves the highest performance in terms of Kendall’s tau coefficients when α = 1.1 and η = 0.3 under the SIR simulation with infected probability β = 2.5 β c . A comprehensive summary of these results is presented in Table 3.
As shown in Table 3, the local g-core outperforms existing centrality measures across all sixteen real-world networks in terms of Kendall’s tau coefficients. Notably, for the networks NS, PGP, and Router, the Kendall’s tau coefficients of the local g-core are 45–105% higher than those of classical coreness.
Table 3 also demonstrates that the H α -index is slightly better than the classical H-index in terms of Kendall’s tau coefficients. This suggests that considering weak nodes is useful in finding vital nodes. Kendall’s tau coefficients of nine centralities when the infected probability values are β = 1.5 β c and 2.0 β c are presented in Table A1 and Table A2 in Appendix A.

4.4. Results of Imprecision Value

The imprecision value focuses exclusively on the most critical nodes in a network. In all experiments, we analyze the top 10% most influential nodes, corresponding to p = 0.1 in the imprecision value. The parameters α and η for the local g-core are identical to those used in Section 3.3. Among all α - η combinations, the proposed centralities demonstrate strong performance when α = 1.1 and η = 0.3 , and the infection probability in the SIR simulation is set to β = 2.5 β c . These results are summarized in Table 4.
As shown in Table 4, the local g-core outperforms the remaining centralities across ten real-world networks, while the g-core achieves the best performance on four networks. The imprecision values for nine centralities under infection probabilities β = 1.5 β c and β = 2.0 β c are detailed in Table A3 and Table A4 of Appendix A.

4.5. Parameters of Local g-Core

This subsection investigates how the parameters α and η in the local g-core influence Kendall’s tau coefficients. For brevity, we omit the analysis of imprecision values, as their trends are highly consistent with the results presented here.
Figure 2 shows the Kendall’s tau coefficients of the local g-core when α = 1.1 , η ( 0.01 , 0.5 ) , and β = 2.5 β c . As illustrated, the coefficients achieve their maximum at η = 0.3 across nearly all networks. Similar patterns are observed for β = 1.5 β c and 2.0 β c under identical α and η values.
Figure 3 presents the Kendall’s tau coefficients under η = 0.3 , α ( 1.1 , 3 ) , and β = 2.5 β c . The data reveal that the maximum coefficient occurs at α = 1.1 on almost all networks. Consistency in performance is maintained across β = 1.5 β c and 2.0 β c .
To evaluate the combined impact of α and η , Figure 4 displays the Kendall’s tau coefficients for the C. elegans network across all α - η combinations. The results confirm that α = 1.1 and η = 0.3 consistently yield optimal performance for β = 2.5 β c , 1.5 β c , and 2.0 β c .

5. Conclusions

This paper addresses the challenge of identifying vital nodes in complex networks, where most existing centrality measures inadequately account for weak nodes. To address this limitation, we propose a novel H α -index, defined as the maximum number of neighbors whose degrees exceed α times the degree of the focal node. By iteratively applying the H α -index to a node’s neighbors, we derive two novel centrality measures: the g-core and the local g-core. Experimental results demonstrate that these centralities outperform existing methods in real-world networks, offering a robust framework for node prioritization.
Future research will extend this framework to weighted networks. While the theoretical properties of the H α -index and the g-core in weighted networks align closely with those in unweighted networks, nuanced differences in their behavior and computational dynamics warrant further investigation. This extension will enhance the applicability of our approach to a broader class of networked systems.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Acknowledgments

The author would like to express his gratitude to the editor and the anonymous reviewers. Their insightful and constructive comments greatly improved the quality and presentation of this paper.

Conflicts of Interest

The author has no relevant financial or non-financial interests to disclose.

Appendix A

Table A1. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 1.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table A1. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 1.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.690.730.710.630.540.740.740.740.77
email0.810.850.840.810.640.870.860.890.91
Kohonen0.650.660.670.710.520.690.670.670.77
Metabolic0.560.590.610.580.400.640.590.600.67
Moreno0.620.630.640.740.520.750.660.700.75
NS0.500.510.470.370.330.700.540.660.70
PGP0.510.510.510.590.340.600.520.710.72
Router0.320.280.290.600.320.370.300.640.65
SciMet0.770.800.810.810.620.810.810.830.85
SmaGr0.630.650.660.660.550.690.660.670.73
USAir0.700.730.730.760.530.740.750.770.81
Yeast0.690.710.700.610.390.770.710.740.76
Sex0.480.520.530.720.420.560.540.620.70
Condmat0.560.610.610.720.330.740.630.760.76
EmailEnron0.490.490.490.490.430.530.510.510.53
Amazon0.280.320.300.600.280.530.550.610.63
Table A2. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 2.0 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table A2. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 2.0 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.780.820.790.610.610.810.820.830.84
Email0.860.890.870.790.670.900.900.930.95
Kohonen0.640.660.660.740.510.690.660.670.79
Metabolic0.600.630.650.560.430.670.640.670.73
Moreno0.650.680.680.760.530.800.710.760.81
NS0.460.470.440.390.300.660.520.630.66
PGP0.460.480.480.650.320.570.500.730.75
Router0.310.280.290.630.300.360.300.640.65
SciMet0.810.850.850.800.640.840.850.880.89
SmaGr0.680.710.710.660.570.740.710.720.78
USAir0.740.770.770.750.560.790.780.810.85
Yeast0.660.690.680.640.370.760.690.770.77
Sex0.480.520.540.750.410.560.560.660.74
Condmat0.600.650.640.740.350.780.670.810.81
EmailEnron0.490.500.500.560.430.560.520.550.59
Amazon0.270.310.280.600.300.550.580.630.61
Table A3. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 2.0 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table A3. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 2.0 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.02780.02590.290.07840.06690.02780.03090.02210.0187
Email0.02020.00860.05810.04760.10.01380.01390.00520.0038
Kohonen0.13380.12210.1310.12490.2020.09190.12150.120.0789
Metabolic0.06230.03050.02940.03780.1720.04720.0430.03210.0294
Moreno0.05610.03440.02990.03360.19770.03360.03640.0290.0223
NS0.21350.23710.28310.33890.29830.09640.19530.17070.1189
PGP0.12570.09680.10740.13160.57080.03590.09050.0340.035
Router0.19340.19390.19630.12620.21250.11940.19220.13030.0921
SciMet0.07070.03510.04460.10930.18710.04530.03470.03040.0262
SmaGr0.0750.05290.06940.0880.10580.050.06850.04680.0343
USAir0.01110.01550.02160.03590.21360.01110.01550.0070.007
Yeast0.09540.07790.07140.44380.75090.04660.07680.00990.0194
Sex0.22440.15820.12250.04810.31320.09780.15280.08980.072
Condmat0.16340.0820.11270.10190.42020.05150.07660.01920.0287
EmailEnron0.09380.07330.06840.0650.24660.06260.0720.06770.0576
Amazon0.21070.13520.07130.12350.31250.05170.04290.03090.0259
Table A4. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 1.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table A4. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 1.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.02140.01530.21810.05850.04940.02140.00980.01280.0093
Email0.01010.0060.04220.03330.06340.00890.01030.00280.0009
Kohonen0.15840.13330.14830.12910.23320.09610.13350.12810.0736
Metabolic0.04640.02720.0350.0380.20580.03060.01810.02390.0248
Moreno0.03690.01870.01820.03770.17590.0250.01810.01360.0127
NS0.19610.27430.30730.29050.27230.10250.2320.1980.1514
PGP0.13030.09570.11240.17140.55180.03970.09030.03210.0334
Router0.17480.18070.17970.1290.21140.10250.17580.11110.0761
SciMet0.04110.01460.03350.09560.13970.03110.01730.01450.011
SmaGr0.04610.03060.05350.09950.11640.03870.03710.02380.0206
USAir0.00990.01310.01970.03650.20440.00990.01310.00530.0053
Yeast0.10720.08940.08450.41230.70320.05820.08560.00830.0209
Sex0.18420.11850.08610.05830.28760.06660.11320.0540.0439
Condmat0.11070.04440.09690.08810.34220.03370.03930.01220.0138
EmailEnron0.06110.03730.03260.04530.24580.03060.03630.03150.0236
Amazon0.18020.12320.06190.10170.28430.05130.03720.02650.0183

References

  1. Chen, D.; Lü, L.; Shang, M.S.; Zhang, Y.C.; Zhou, T. Identifying influential nodes in complex networks. Phys. A Stat. Mech. Its Appl. 2012, 391, 1777–1787. [Google Scholar] [CrossRef]
  2. Narayanam, R.; Narahari, Y. A shapley value-based approach to discover influential nodes in social networks. IEEE Trans. Autom. Sci. Eng. 2011, 8, 130–147. [Google Scholar] [CrossRef]
  3. Lü, L.; Chen, D.; Ren, X.L.; Zhang, Q.M.; Zhang, Y.C.; Zhou, T. Vital nodes identification in complex networks. Phys. Rep. 2016, 650, 1–63. [Google Scholar] [CrossRef]
  4. Dong, Z.; Chen, Y.; Tricco, T.S.; Li, C.; Hu, T. Hunting for vital nodes in complex networks using local information. Sci. Rep. 2021, 11, 9190. [Google Scholar] [CrossRef]
  5. Fan, T.; Lü, L.; Shi, D.; Zhou, T. Characterizing cycle structure in complex networks. Commun. Phys. 2021, 4, 272. [Google Scholar] [CrossRef]
  6. Zhao, Y.; Yang, B. Vital nodes identification method integrating degree centrality and cycle ratio. Chin. Phys. B 2025, 34, 038901. [Google Scholar] [CrossRef]
  7. Watts, D.J.; Strogatz, S.H. Collective dynamics of ’small-world’ networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef] [PubMed]
  8. Von Mering, C.; Krause, R.; Snel, B.; Cornell, M.; Oliver, S.G.; Fields, S.; Bork, P. Comparative assessment of large-scale data sets of protein-protein interactions. Nature 2002, 417, 399–403. [Google Scholar] [CrossRef]
  9. Strogatz, S.H. Exploring complex networks. Nature 2001, 410, 268–276. [Google Scholar] [CrossRef]
  10. Hirsch, J.E. An index to quantify an individual’s scientific research output. Proc. Natl. Acad. Sci. USA 2005, 102, 16569–16572. [Google Scholar] [CrossRef]
  11. Huang, M.H. Exploring the h-index at the institutional level. Online Inf. Rev. 2012, 36, 534–547. [Google Scholar] [CrossRef]
  12. Papić, A. Informetrics: The development, conditions and perspectives. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 700–704. [Google Scholar] [CrossRef]
  13. Zeng, A.; Shen, Z.; Zhou, J.; Wu, J.; Fan, Y.; Wang, Y.; Stanley, H.E. The science of science: From the perspective of complex systems. Phys. Rep. 2017, 714–715, 1–73. [Google Scholar] [CrossRef]
  14. Batista, P.D.; Campiteli, M.G.; Kinouchi, O. Is it possible to compare researchers with different scientific interests? Scientometrics 2006, 68, 179–189. [Google Scholar] [CrossRef]
  15. von Bohlen und Halbach, O. How to judge a book by its cover? How useful are bibliometric indices for the evaluation of “scientific quality” or “scientific productivity”? Ann. Anat.-Anat. Anz. 2011, 193, 191–196. [Google Scholar] [CrossRef]
  16. Kaur, J.; Radicchi, F.; Menczer, F. Universality of scholarly impact metrics. J. Inf. 2013, 7, 924–932. [Google Scholar] [CrossRef]
  17. Egghe, L. Theory and practise of the g-index. Scientometrics 2006, 69, 131–152. [Google Scholar] [CrossRef]
  18. Dorogovtsev, S.N.; Mendes, J.F.F. Ranking scientists. Nat. Phys. 2015, 11, 882–883. [Google Scholar] [CrossRef]
  19. Tscharntke, T.; Hochberg, M.E.; Rand, T.A.; Resh, V.H.; Krauss, J. Author Sequence and Credit for Contributions in Multiauthored Publications. PLoS Biol. 2007, 5, e18. [Google Scholar] [CrossRef]
  20. Gągolewski, M.; Grzegorzewski, P. A geometric approach to the construction of scientific impact indices. Scientometrics 2009, 81, 617–634. [Google Scholar] [CrossRef]
  21. Bornmann, L.; Mutz, R.; Daniel, H.D. The h index research output measurement: Two approaches to enhance its accuracy. J. Inf. 2010, 4, 407–414. [Google Scholar] [CrossRef]
  22. Bras-Amorós, M.; Domingo-Ferrer, J.; Torra, V. A bibliometric index based on the collaboration distance between cited and citing authors. J. Inf. 2011, 5, 248–264. [Google Scholar] [CrossRef]
  23. Dodson, M. Citation analysis: Maintenance of h-index and use of e-index. Biochem. Biophys. Res. Commun. 2009, 387, 625–626. [Google Scholar] [CrossRef] [PubMed]
  24. Rochim, A.F.; Muis, A.; Sari, R.F. Improving Fairness of H-index: RA-index. DESIDOC J. Libr. Inf. Technol. 2018, 38, 378–386. [Google Scholar] [CrossRef]
  25. Acuna, D.E.; Allesina, S.; Kording, K.P. Predicting scientific success. Nature 2012, 489, 201–202. [Google Scholar] [CrossRef]
  26. Penner, O.; Pan, R.K.; Petersen, A.M.; Kaski, K.; Fortunato, S. On the Predictability of Future Impact in Science. Sci. Rep. 2013, 3, 3052. [Google Scholar] [CrossRef] [PubMed]
  27. Schreiber, M. Restricting the h-index to a publication and citation time window: A case study of a timed Hirsch index. J. Inf. 2015, 9, 150–155. [Google Scholar] [CrossRef]
  28. Lü, L.; Zhou, T.; Zhang, Q.M.; Stanley, H.E. The H-index of a network node and its relation to degree and coreness. Nat. Commun. 2016, 7, 10168. [Google Scholar] [CrossRef]
  29. Zhai, L.; Yan, X.; Zhang, G. The bi-directional h-index and B-core decomposition in directed networks. Phys. A Stat. Mech. Its Appl. 2019, 531, 121715. [Google Scholar] [CrossRef]
  30. Wu, X.; Wei, W.; Tang, L.; Lu, J.; Lu, J. Coreness and h-Index for Weighted Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2019, 66, 3113–3122. [Google Scholar] [CrossRef]
  31. Zeng, A.; Zhang, C.J. Ranking spreaders by decomposing complex networks. Phys. Lett. Sect. A Gen. At. Solid State Phys. 2013, 377, 1031–1035. [Google Scholar] [CrossRef]
  32. Liu, J.G.; Ren, Z.M.; Guo, Q. Ranking the spreading influence in complex networks. Phys. A Stat. Mech. Its Appl. 2013, 392, 4154–4159. [Google Scholar] [CrossRef]
  33. Hu, Q.C.; Yin, Y.S.; Ma, P.F.; Gao, Y.; Zhang, Y.; Xing, C.X. A new approach to identify influential spreaders in complex networks. Wuli Xuebao/Acta Phys. Sin. 2013, 62, 140101. [Google Scholar] [CrossRef]
  34. Liu, Y.; Tang, M.; Zhou, T.; Do, Y. Improving the accuracy of the k-shell method by removing redundant links: From a perspective of spreading dynamics. Sci. Rep. 2015, 5, 13172. [Google Scholar] [CrossRef]
  35. Wu, J.; Qi, X.; Cao, Z. H-sequences and 2-step coreness in graphs. Discret. Appl. Math. 2024, 343, 258–268. [Google Scholar] [CrossRef]
  36. Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef] [PubMed]
  37. Guimera, R.; Danon, L.; Diaz-Guilera, A.; Giralt, F.; Arenas, A. Self-similar community structure in a network of human interactions. Phys. Rev. E 2003, 68, 065103. [Google Scholar] [CrossRef] [PubMed]
  38. Batagelj, V.; Mrvar, A. Pajek—Analysis and Visualization of Large Networks. In Proceedings of the Graph Drawing, 9th International Symposium, GD 2001, Vienna, Austria, 23–26 September 2001; Revised Papers. pp. 477–478. [Google Scholar] [CrossRef]
  39. Spring, N.; Mahajan, R.; Wetherall, D.; Anderson, T. Measuring ISP Topologies With Rocketfuel. IEEE/ACM Trans. Netw. 2004, 12, 2–16. [Google Scholar] [CrossRef]
  40. Rocha, L.E.C.; Liljeros, F.; Holme, P. Simulated epidemics in an empirical spatiotemporal network of 50,185 sexual contacts. PLoS Comput. Biol. 2011, 7, e1001109. [Google Scholar] [CrossRef]
  41. Leskovec, J.; Kleinberg, J.; Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 2007, 1, 2. [Google Scholar] [CrossRef]
  42. Leskovec, J.; Lang, K.J.; Dasgupta, A.; Mahoney, M.W. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Math. 2009, 6, 29–123. [Google Scholar] [CrossRef]
  43. Yang, J.; Leskovec, J. Defining and evaluating network communities based on ground-truth. In Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics—MDS ’12, Beijing, China, 12–16 August 2012. [Google Scholar] [CrossRef]
  44. Pastor-Satorras, R.; Castellano, C.; Van Mieghem, P.; Vespignani, A. Epidemic processes in complex networks. Rev. Mod. Phys. 2015, 87, 925. [Google Scholar] [CrossRef]
  45. Moreno, Y.; Pastor-Satorras, R.; Vespignani, A. Epidemic outbreaks in complex heterogeneous networks. Eur. Phys. J. B 2002, 26, 521–529. [Google Scholar] [CrossRef]
  46. Newman, M.E.J. Spread of epidemic disease on networks. Phys. Rev. E-Stat. Nonlinear Soft Matter Phys. 2002, 66, 016128/1–016128/11. [Google Scholar] [CrossRef] [PubMed]
  47. Kendall, M.G. A new measure of rank correlation. Biometrika 1938, 30, 81–93. [Google Scholar] [CrossRef]
  48. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef]
Figure 1. Example network illustrating the H α -index and g-core. The g-core values for nodes v 1 and v 6 are 5 and 3, respectively.
Figure 1. Example network illustrating the H α -index and g-core. The g-core values for nodes v 1 and v 6 are 5 and 3, respectively.
Symmetry 17 00925 g001
Figure 2. Kendall’s tau coefficients of the local g-core on the sixteen real networks when α = 1.1 and η ( 0.01 , 0.5 ) . For each network, the infected probability is set as β = 2.5 β c . The fifteen networks from left to right are in the same order as the networks in Table 2.
Figure 2. Kendall’s tau coefficients of the local g-core on the sixteen real networks when α = 1.1 and η ( 0.01 , 0.5 ) . For each network, the infected probability is set as β = 2.5 β c . The fifteen networks from left to right are in the same order as the networks in Table 2.
Symmetry 17 00925 g002
Figure 3. Kendall’s tau coefficients of the local g-core on the fifteen real networks when η ( 0.01 , 0.5 ) and α ( 1.1 , 3 ) . For each network, the infected probability is set as β = 2.5 β c . The fifteen networks from left to right are in the same order as the networks in Table 2.
Figure 3. Kendall’s tau coefficients of the local g-core on the fifteen real networks when η ( 0.01 , 0.5 ) and α ( 1.1 , 3 ) . For each network, the infected probability is set as β = 2.5 β c . The fifteen networks from left to right are in the same order as the networks in Table 2.
Symmetry 17 00925 g003
Figure 4. Kendall’s tau coefficients of the local g-core on the C. elegns network when η ( 0.01 , 0.5 ) and α ( 1.1 , 3 ) . From left to right, the infected probability β is set as β = 1.5 β c , 2.0 β c , and 2.5 β c . The color of the points on the surface varies with the Kendall’s tau value. Deeper shades of blue represent smaller values, while deeper shades of orange correspond to larger values.
Figure 4. Kendall’s tau coefficients of the local g-core on the C. elegns network when η ( 0.01 , 0.5 ) and α ( 1.1 , 3 ) . From left to right, the infected probability β is set as β = 1.5 β c , 2.0 β c , and 2.5 β c . The color of the points on the surface varies with the Kendall’s tau value. Deeper shades of blue represent smaller values, while deeper shades of orange correspond to larger values.
Symmetry 17 00925 g004
Table 1. The H-index, coreness, H α -sequence, and g-core, where α = 1.1 .
Table 1. The H-index, coreness, H α -sequence, and g-core, where α = 1.1 .
Node v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8
h α , v 0 24343222
h α , v 1 22222111
h α , v 2 11111000
h α , v 00000000
g-core57676333
H-index23333222
coreness23333222
Table 2. Basic topological features of nine real networks. | V | and | E | denote the number of nodes and the number of links, respectively. <k> and <d> represent the average degree and the average shortest distance, respectively. C is the clustering coefficient, and r is the assortative coefficient.
Table 2. Basic topological features of nine real networks. | V | and | E | denote the number of nodes and the number of links, respectively. <k> and <d> represent the average degree and the average shortest distance, respectively. C is the clustering coefficient, and r is the assortative coefficient.
Networks | V | | E | <k><d>Cr
(0) C . e l e g a n s 297214814.462.460.308−0.163
(1) USAir332212612.812.740.749−0.208
(2) SmaGr3799144.826.040.798−0.082
(3) Metabolic45320258.942.660.646−0.226
(4) SciMet10599144.826.040.798−0.082
(5) Email113354419.623.600.2540.078
(6) Moreno1773913110.303.380.721−0.049
(7) NS158927423.4517.140.80−0.082
(8) Yeast237511,6939.855.090.3880.454
(9) Kohonen446912,7185.693.670.211−0.121
(10) Router502262582.496.450.033−0.138
(11) PGP10,68024,3164.557.480.2660.238
(12) Sex15,81038,5404.885.790.000−0.115
(13) Condmat27,519116,1818.445.760.6550.166
(14) EmailEnron36,692183,83110.023.240.497−0.111
(15) Amazon334,863925,8725.324.330.39670.235
Table 3. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 2.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table 3. Kendall’s tau coefficients comparing nine centralities. For each network, the infection probability is set as β = 2.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.820.850.810.590.640.840.850.860.86
Email0.880.910.880.780.680.910.910.930.96
Kohonen0.640.660.670.730.510.690.670.680.79
Metabolic0.650.690.710.550.450.700.690.720.76
Moreno0.680.710.710.760.550.810.740.800.83
NS0.460.480.440.400.300.640.530.620.64
PGP0.450.470.470.680.300.550.500.730.75
Router0.330.310.320.610.320.380.330.660.67
SciMet0.840.880.870.790.660.850.880.900.91
SmaGr0.730.760.760.660.600.780.770.780.82
USAir0.750.780.780.780.570.800.790.830.86
Yeast0.660.690.690.660.370.760.700.790.80
Sex0.520.570.590.740.450.600.610.720.79
Condmat0.630.680.670.730.370.790.710.840.85
EmailEnron0.490.500.500.600.430.580.530.580.63
Amazon0.280.320.290.590.270.540.570.590.60
Table 4. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 2.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
Table 4. Imprecision values comparing nine centralities. For each network, the infection probability is set as β = 2.5 β c , with parameters α = 1.1 and η = 0.3 . The maximum value in each row is highlighted in boldface to indicate the best performance. Abbreviations: CN (coreness), CC (closeness), BT (betweenness), CI (collective influence), H α -index ( H α ), GC (g-core), and LGC (local g-core).
NetworksDegreeH-IndexCNCCBTCI H α GCLGC
C . e l e g a n s 0.01030.01190.15080.04700.02550.01030.01610.01000.0032
Email0.00480.00500.03010.01980.03930.00460.00810.00230.0004
Kohonen0.15580.13760.13650.16480.26030.10250.13080.12040.0795
Metabolic0.05560.01640.02680.03700.19950.03380.01580.01260.0187
Moreno0.02890.01120.01600.03850.17480.02140.01400.00940.0099
NS0.15970.21340.24770.20680.21740.09550.20010.17170.1404
PGP0.12680.09110.11570.18660.52980.04270.08610.03020.0316
Router0.13850.13300.13040.13790.19570.06500.12550.07100.0555
SciMet0.02480.00860.03100.08350.10440.02100.01100.00670.0059
SmaGr0.03300.01000.04340.10200.09880.02210.02200.01480.0141
USAir0.00620.00570.00630.02180.18750.00620.00570.00270.0027
Yeast0.08250.07790.08580.34660.63530.04480.07680.00260.0090
Sex0.13630.07720.04940.07720.24340.04280.07140.02670.0243
Condmat0.07300.02540.08020.07440.27350.02530.02140.01420.0100
EmailEnron0.05020.02540.02040.04920.25510.02450.02380.01960.0154
Amazon0.13040.08740.04570.07320.21350.03240.02170.01730.0129
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, L. Identifying Vital Nodes by Local g-Core on Symmetric Networks. Symmetry 2025, 17, 925. https://doi.org/10.3390/sym17060925

AMA Style

Wang L. Identifying Vital Nodes by Local g-Core on Symmetric Networks. Symmetry. 2025; 17(6):925. https://doi.org/10.3390/sym17060925

Chicago/Turabian Style

Wang, Letian. 2025. "Identifying Vital Nodes by Local g-Core on Symmetric Networks" Symmetry 17, no. 6: 925. https://doi.org/10.3390/sym17060925

APA Style

Wang, L. (2025). Identifying Vital Nodes by Local g-Core on Symmetric Networks. Symmetry, 17(6), 925. https://doi.org/10.3390/sym17060925

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop