Effective edge-based approach for promoting the spreading of SIR model
Abstract
Promoting some typical spreading dynamics, for instance, the spreading of information, commercial message, vaccination guidance, innovation, and political movement, can bring benefits to all aspects of the socio–economic systems. In this study, we propose a strategy for promoting the spreading of the susceptible–infected–recovered model, which is widely applied to describe these common spreading dynamics in real life. Specifically, we first quantify the potential influence that the addition of each latent edge (that is, edges that do not exist before) could cause to the spreading dynamics. Then, we strategically add the latent edges to the original networks according to the potential influence of each latent edge. Numerical simulations verify the effectiveness of our strategy and demonstrate that our strategy outperforms several static strategies, namely, adding the latent edges between nodes with the largest degree or eigenvector centrality. This study provides an effective way of promoting the spreading of the susceptible–infected–recovered model by modifying the network structure slightly and helps in understanding what a better network structure for the spreading dynamics is. Besides, the theoretical framework established in this study provides inspirations for the further investigations of edge–based promoting strategies for other spreading models.
pacs:
89.75.Hc, 87.19.X-, 87.23.Ge1 Introduction
The subject of promoting the spreading dynamics in networked systems is attracting substantial attention from multiple disciplines, for instance, computer science, statistical physics, and network science [1, 2]. Maximizing the spreading prevalence of some common spreading dynamics, including the spreading of information, vaccination guidance, innovation, commercial message, and political movement, can bring benefits to all aspects of the socio-economic systems [3, 4, 5, 6, 7]. The study of promoting these spreading dynamics is of great importance in both theoretical and practical perspectives.
Understanding the evolutionary mechanisms of the spreading dynamics in real life and building suitable models to describe them play essential roles in developing promoting strategies. Various spreading models have been proposed for spreading dynamics with different evolutionary mechanisms. For instance, in some simple contagions (e.g., information diffusion and innovation spreading) where the infected individuals could infect the susceptible ones by a single contact, the classic susceptible–infected–susceptible (SIS) model [8, 9], susceptible–infected–recovered (SIR) model [10, 11] and many of their extensions [12, 13, 14, 15, 16] have been widely applied. Besides, for some complex contagions (e.g., behavior adoption [17] and political information spreading [18, 19]), researchers have proposed the threshold model which incorporates the social reinforcement mechanism (i.e., the mechanism that the susceptible individuals becoming infected with a probability that increases with the cumulative number of contacts with the infected ones) [20, 21]. More spreading models with other complex mechanisms can be found in [22, 23, 24].
Based on these spreading models, researchers go further to develop strategies to promote or enhance the spreading dynamics. Some of the researchers focus on designing effective transmission strategies [25, 26, 27, 28, 29, 30] such as developing smart protocols to avoid invalid contacts (for instance, the contact between two infected nodes). Besides, some of the researchers are committed to identifying vital nodes [31, 32, 33, 34, 35, 36, 37, 38] with high centralities (for instance, degree, betweenness, and closeness centrality); and they suggest that selecting these vital nodes to the initial seeds can maximizing the spreading prevalence. Recently, several researchers find that structural perturbations (that is, modifying the network structure slightly) can be used for promoting spreading dynamics as well [39, 40, 41].
Nevertheless, despite all of these efforts, no previous study has investigated the problem of how to effectively promote the spreading dynamics of the SIR model by structural perturbations, to the best of our knowledge. To fill up this research blankness, we propose an effective edge–based strategy for promoting the SIR spreading dynamics in this study. The SIR model is first proposed to study the epidemic transmission. Later on, researchers extend it to various other contagion processes, including information diffusion, innovation spreading, promotion of commercial products and the spread of political movements [42, 43, 44, 45, 46, 47, 48, 49]. Our strategy enhances the spreading dynamics of the SIR model by adding edges that do not exist before. To be specific, we first develop a mathematical model to quantify the influence that the addition of each latent edge (i.e., each edge that does not exist in the original network) could cause to the spreading dynamics. This developed mathematical model is able to facilitate the determination of the spreading prevalence of the SIR model as well. Then, we strategically add the latent edges to the original networks according to the influence of each latent edge. Note that our strategy incorporates both the information of network structure and spreading dynamics. This study will show that our strategy is effective and outperforms those static approaches, such as adding the latent edge between nodes with the highest degree or eigenvector centrality.
We organize this paper as follows. First, Sec. 2 describes the spreading model and our strategy in detail. Then, Sec. 3 gives the theoretical framework for determining the influence of each latent edge. Further, Sec. 4 presents the numerical simulations to verify the effectiveness of our strategy. Finally, Sec. 5 concludes the paper.
2 Model description
In this study, we consider a discrete-time SIR dynamics that runs on a complex network with adjacency matrix . The number of nodes and edges of is denoted by and , respectively. Generally, each node in this model will be assigned with one of three different states, that is, the susceptible state (S), the informed (or infected) state (I), or the recovered state (R). Denote the state of node by ; thus, . Initially, all the nodes are set to be in the S state. Then, a small fraction of nodes are selected to be in the I state. For every time step, every node in the I state will infect or inform each of its neighbors in the S state with the transmission probability . After the transmission process, each node in the I state will turn to the R state with the recovery probability . We refer to as the effective transmission probability. The spreading dynamics will be terminated once there is no node in the I state, and the fraction of nodes in the R state after the termination of spreading dynamics is referred to as the spreading prevalence.
According to the evolutionary rules of the SIR model described in the above paragraph, we can obtain the probabilities of nodes and edges in different states when the dynamics is terminated, for instance, the probability of node being in R state or the joint probability of edge being in RS state. Our objective is to maximize the spreading prevalence of the discrete-time SIR dynamics that runs on top of the network by adding a fraction of latent edges, i.e., the edges that do not exist in the original network before. To determine which latent edge should be added first, we need a measure to rank the influence of each latent edge.
Consider we add a latent edge to the original network . If the final states of nodes and are , then this added edge will make no difference to the spreading prevalence since both node and will still be in the S state and influence no other node. Similarly, if the final states of nodes and are supposed to be , then adding an edge between them will barely bring new nodes to the I state because nodes and will be infected or informed regardless of whether they are directly connected. Therefore, only when the final states are and (or and ), the spreading prevalence will be increased by adding an edge between nodes and . Take the former situation as an example, that is, the situation when the final states of nodes and are and , respectively. In this case, if we add an edge between nodes and , and node gets infected or informed in the time , then node can bring node into the I state with probability in the time . When it comes to the time , as a new node in the I state, node goes ahead to influence its neighbors in the S state. Obviously, if node has a large expected number of neighbors whose final states are S, then adding the edge can bring a large number of new nodes into the I state and increases the final spreading prevalence. Therefore, we only consider node and its neighbors whose final states are S. For convenience, we refer to node and its neighbors who have a final state of S as the candidate nodes. Then, the expected number of new infected or informed nodes that come from the candidate nodes after adding the latent edge can be calculated as
(1) |
where is the conditional probability that node is in the S state when is in the S state. Similarly, we can obtain the expected number when the final states of nodes and are and , respectively. Take both cases of and into consideration, we define the influence of latent edge as
(2) |
Our approach to effectively promote the spreading dynamics of the SIR model is based on adding the latent edge with the highest influence . Thus, we refer to our strategy as the latent–edge–influence (LEI) strategy. Hereafter, the problem reduces to solving Eq. (2), that is, finding the probabilities of nodes in different states and the conditional probabilities.
3 Theoretical analysis
In this section, we will develop a new theoretical framework to study the discrete–time SIR spreading dynamics on complex networks. Based on this developed framework, Eq. (2) can be well solved.
Inspired by the epidemic link equations (ELE) model proposed by Matamalas et al. [50], we first define a set of discrete–time equations for the probabilities of edges in different states and then solve the equations at the final state. For the sake of simplicity, we denote the joint probabilities as , where . The evolution of these denoted joint probabilities depends on each other according to the evolutionary rules of the SIR model.
For instance, the iteration of sponges on , , and . Specifically, we can obtain the iteration formula of as follows:
(3) | |||||
where represents the probability that node (in the S sate) is not brought into the I state by any of its neighbors (excluding ). Note that Eq. (3) has taken into account all the possible state changes of nodes and . Given the states of nodes and at time as , the first term of Eq. (3) considers the situation when and both nodes and are brought into the state I by their neighbors at time . Besides, the second term represents that the states of nodes and at time are and , respectively, and then node holds its state but node is brought into the state by its neighbors. Moreover, the third term accounts for that the state of node is at time and then node is brought into the state while node holds its state. Last, the fourth term considers that nodes and are both in the state at time and remain in the state when it comes to time .
Similarly, the iteration formulas of joint probabilities and can be obtained as
(4) |
and
(5) |
respectively. Note that for the joint probability , where and , we should have . However, if , and may have different values. That is to say, we should calculate and separately for a single edge when . We obtain the expressions of these asymmetric joint probabilities, i.e., , , and as follows:
(6) |
(7) |
and
(8) | |||||
In addition, in Eqs. (3)–(8) can be expressed as
(9) |
where stands for the probability that node is in the I state when node is in the S state. The conditional probability can be expressed as
(10) |
Iterating Eqs. (3)–(8) from any meaningful initial condition [e.g., , , and ] can give the probability of any possible state of edge at the final state. For a network made up of nodes and edges, we will have equations in total for determining the probabilities of states of all the edges. We refer to the approach of using the equations to solve the SIR model as the SIR–edge–equations (SIRee) approach. Denote the final value of as . Then, we can obtain the probabilities of node in R as
(11) |
Thus, the spreading prevalence can be computed as
(12) |
Besides, we can get the conditional probability in Eq. (2) as
(13) |
Define short notations for convenience as follows,
(14) |
Substituting Eqs. (11) and (13) back into Eq. (2) yields the following expression of latent edge influence :
(15) |
Eq. (15) reveals that the influence of each latent edge depends on both the network structure (e.g. the adjacency matrices ) and the spreading dynamics (e.g. and ). As described in Sec. 2, our strategy for promoting the spreading of the SIR model on networks is based on the addition of the latent edge with highest influence iteratively. In order to ensure that we really add the current latent edge with the highest influence, we need to resolve Eqs. (3)–(8) and recalculate Eq. (15) after adding any single edge because the network structure changes after each edge addition.
4 Simulation results
This section will present extensive numerical simulations on both synthetic and real–world networks to verify the effectiveness of our approach.
To begin with, we test the agreement between our SIR–ee numerical approach proposed in Sec. 3 and the empirical simulations for the SIR model. Figs. 1 (a) and (b) show the spreading prevalences predicted by Eq. (12) and obtained by Monte Carlo simulations on two synthetic scale-free (SF) networks and , respectively. These two SF networks have the same degree exponent but different average degrees. Specifically, has an average degree of while has an average degree of . More information about these two synthetic networks can be found in Tab. 1. As can be seen, there is a marked agreement between the results of our SIR–ee numerical approach and Monte Carlo simulations in the full range of effective transmission probability on both the synthetic network we studied. Thus, it is valid to use our SIR–ee approach to determine the global impact of the SIR model.

Then, we go further to test the performance of our strategy in promoting the spreading of the SIR model on the two synthetic SF networks. As described in Sec. 3, our strategy is to add the latent edge , which has the highest influence calculated by Eq. (15) iteratively. After the addition of a single edge, we resolve Eqs. (3)–(8) and recalculate Eq. (15) to ensure that we really add the current latent edge with the highest influence. For comparison, we also test three additional strategies. First, we consider the approach to add the latent edge , which has the largest degree product , that is, the product of the degree of the nodes connected by the latent edge. This strategy is referred to as the degree–product (DP) strategy in the rest of the paper. Similarly, we also consider the strategy to add the latent edge , which has the largest eigenvector centrality product , that is, the product of the eigenvector centrality of the nodes connected by the latent edge. We refer to this strategy as the eigenvector–centrality–product (ECP) strategy. Last, we carry out the strategy to add the latent edge selected by random and refer to this strategy as the random (RD) strategy. Note that we recalculate all the measures in the three strategies after the addition of any single edge, as in the case of our strategy.

Denote as the incremental spreading prevalence obtained by the SIR–ee numerical approach after adding the selected latent edge. Then we rank all the latent edges according to the values of . We call this kind of edge rank the numerical edge rank and denote the normalized numerical edge rank as , where is the number of all the latent edges. Fig. 2 presents the correlations between the theoretical edge ranks scored by different strategies and the numerical edge ranks. Specifically, Figs. 2 (a) and (b) demonstrate that the normalized edge rank of the optimal latent edge selected by our strategy is close to for the full range of effective transmission probability on both the networks and . The results prove that our strategy performs well in finding the optimal latent edge, which is the key step in promoting strategies. However, the normalized edge ranks of the optimal edges and become large when is big. Besides, Figs. 2 (c) and (d) also show the Spearman rank correlations between the theoretical edge ranks scored by different strategies and the numerical edge ranks, that is,
(16) |
where and denote the theoretical edge rank and numerical edge rank of edge , respectively. It can be seen that the Spearman rank correlation between the theoretical edge ranks scored by our strategy and the numerical edge ranks is close to for the full range of effective transmission probability on both networks. This suggests that our strategy can well predict the overall numerical ranks of the latent edges. However, the Spearman correlation between the theoretical edge ranks scored by the strategy DP or ECP, and the numerical edge ranks are close to only for of small values. This can be explained by the fact that nodes with a high degree or eigenvector centrality will be infected or informed with a larger probability compared with those nodes with small centralities when is small. If we add the latent edges between them, then these high–centrality nodes together with their neighbors can form an infected or informed cluster that facilitates the spreading. Thus the DP and ECP strategies perform well in finding the optimal latent edge or predicting the overall numerical ranks when is small. However, when becomes large, the globally spreading outbreak occurs; thus, connecting the nodes with high centralities becomes unnecessary, but additional connections to those nodes with low centrality are required for the promoting of the spreading. Therefore, both the DP and ECP strategies fail. Note that random strategy is useless in finding the optimal latent edge or predicting the numerical ranks of the latent edges; thus, we have not included the corresponding results of random strategy here. All in all, Fig. 2 shows strong evidence for the potential superiority of our strategy in promoting the spreading of the SIR model.



Afterward, Figs. 3 and 4 give intuitive demonstrations of the performance of different strategies on the two synthetic networks from two perspectives. On the one hand, Fig. 3 compares the original spreading prevalence and the spreading prevalence after adding a number of edges (that is, increasing the average degree of the network by ) using different strategies. The results lead to the conclusion that our strategy performs the best in promoting the spreading of the SIR model for the full range of the effective transmission probability on both networks. Meanwhile, the DP and ECP strategies have good performance only when is small, and the RD strategy performs well only for of large values. It also should be mentioned that the incremental spreading prevalences are much larger in the more sparse network after adding the same number of edges by our strategy. That is to say, the effectiveness of our strategy is more obvious in sparse networks, which are common in the real world. On the other hand, Fig. 4 demonstrates that our strategy can bring the fastest full–blown break–out of the SIR model. In the numerical simulations, we set the recovery probability to be and choose the transmission probability such that the original spreading prevalence of the SIR model is about for both the two synthetic networks, that is, and for and , respectively. It can be observed that our strategy performs the best in increasing the spreading prevalence to on both networks. Besides, the DP and ECP strategy both perform worse than the RD strategy since the value of effective transmission probabilities are relatively large on both networks. These results about the three strategies (i.e., DP strategy, ECP strategy, and RD strategy) coincide with the findings we obtained from Fig. 3. Sum up, Figs. 3 and 4 give the direct proofs of the effectiveness and superiority of our strategy.
Finally, we test our strategy on real–world networks: (a) ca—CSphd [51]; (b) 1138—bus [51]; (c) Air traffic control [52]; (d) web-EPA [51]; (e) tech-routers-rf [51] ; (f) Physicians [52]; (g) inf-USAir97 [51]; (h) econ-wm1 [51]; and (i) Jazz musicians [52]. Detailed information of these real–world networks is presented in Tab. 1. They cover a wide range of average degree (between 2.035 and 27.697). We plot the incremental spreading prevalence after increasing the average degree by (that is, adding a number of edges) as a function of the effective transmission probability in Fig. 5. It can be seen that our strategy leads to the largest incremental spreading prevalence for the full range of effective transmission probability on all the real–world networks. Besides, the DP and ECP strategies perform better than the random strategy only for of small values. Moreover, the incremental spreading prevalence is larger in the network with a smaller average degree. The results of these real–world networks are in concordance with the conclusions we draw on the synthetic networks and .
Name | |||||
---|---|---|---|---|---|
SF2.3 | 200 | 500 | 14 | 5 | 31.27 |
sparse SF2.3 | 200 | 500 | 9 | 3 | 11.92 |
ca–CSphd | 1025 | 1043 | 46 | 2.035 | 12.166 |
1138–bus | 1038 | 1458 | 17 | 2.562 | 9.814 |
Air traffic control | 1226 | 2408 | 34 | 3.928 | 28.899 |
web-EPA | 4253 | 8897 | 175 | 4.184 | 118.451 |
tech-routers-rf | 2113 | 6632 | 109 | 6.277 | 135.704 |
Physicians | 117 | 465 | 26 | 7.95 | 79.162 |
inf-USAir97 | 332 | 2126 | 139 | 12.807 | 568.163 |
econ-wm1 | 258 | 2389 | 106 | 18.519 | 917.434 |
Jazz musicians | 198 | 2742 | 100 | 27.697 | 1070.242 |
5 Conclusions
Promoting some typical spreading dynamics (for instance, the spreading of information, vaccination guidance, commercial message, innovation, and political movements) in networked systems can be of both theoretical and practical importance. In this study, we proposed an effective edge–based strategy for promoting the spreading dynamics of the SIR model on complex networks.
To be specific, we first quantified the potential influence that the addition of each latent edge could cause to the spreading dynamics by a mathematical model. This mathematical model could also facilitate the determination of the spreading prevalence. Then, we strategically added the latent edges to the original networks according to the potential influence of each latent edge. Note that previous approaches for promoting the spreading dynamics on complex networks mostly only consider either the structure of networks or spreading dynamics. However, our strategy incorporates both the information of network structure and spreading dynamics. Extensive numerical simulations verified the effectiveness of our strategy and demonstrated that our strategy outperforms those static approaches, such as adding the latent edge between nodes with the highest degree or eigenvector centrality.
This study provides an effective approach for promoting the spreading of the SIR model by modifying the network structure slightly and helps to understand what a better network structure for the spreading dynamics is. Besides, the theoretical framework we developed in this study offers inspirations for further investigations on edge–based promoting strategies for other spreading models.
Acknowledgements
This work was partially supported by the China Postdoctoral Science Special Foundation (Grant No. 2019T120829), National Natural Science Foundation of China (Grant Nos. 61903266), Fundamental Research Funds for the Central Universities, and Sichuan Science and Technology Program (NO. 20YYJC4001).
References
References
- [1] Morone F and Makse H A 2015 Nature 524 65
- [2] Pan L, Wang W, Cai S and Zhou T 2019 Physical Review E 100 022316
- [3] Wang Z, Bauch C T, Bhattacharyya S, d’Onofrio A, Manfredi P, Perc M, Perra N, Salathe M and Zhao D 2016 Physics Reports 664 1–113
- [4] Gong M, Yan J, Shen B, Ma L and Cai Q 2016 Information Sciences 367 600–614
- [5] Del Ferraro G, Moreno A, Min B, Morone F, Pérez-Ramírez Ú, Pérez-Cervera L, Parra L C, Holodny A, Canals S and Makse H A 2018 Nature Communications 9 2274
- [6] Hu Y, Ji S, Jin Y, Feng L, Stanley H E and Havlin S 2018 Proceedings of the National Academy of Sciences 115 7468–7472
- [7] Lokhov A Y and Saad D 2017 Proceedings of the National Academy of Sciences 114 E8138–E8146
- [8] Fu X, Small M, Walker D M and Zhang H 2008 Physical Review E 77 036113
- [9] Xian J, Yang D, Pan L and Wang W 2020 arXiv:2002.06567
- [10] Daley D J and Kendall D G 1964 Nature 204 1118–1118
- [11] Daley D J and Kendall D G 1965 IMA Journal of Applied Mathematics 1 42–55
- [12] Wang Z, Zhang H and Wang Z 2014 Chaos, Solitons & Fractals 61 1–7
- [13] Sun G Q, Jusup M, Jin Z, Wang Y and Wang Z 2016 Physics of Life Reviews 19 43–73
- [14] Zuzek L A, Stanley H and Braunstein L 2015 Scientific Reports 5 12151
- [15] Wang Z, Guo Q, Sun S and Xia C 2019 Applied Mathematics and Computation 349 134–147
- [16] Xia C, Wang Z, Zheng C, Guo Q, Shi Y, Dehmer M and Chen Z 2019 Information Sciences 471 185–200
- [17] Aral S and Nicolaides C 2017 Nature Communications 8 14753
- [18] Romero D M, Meeder B and Kleinberg J 2011 Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter Proceedings of the 20th International Conference on World Wide Web (ACM) pp 695–704
- [19] Centola D and Macy M 2007 American Journal of Sociology 113 702–734
- [20] Watts D J 2002 Proceedings of the National Academy of Sciences of the United States of America 99 5766–5771
- [21] Lü L, Chen D B and Zhou T 2011 New Journal of Physics 13 123005
- [22] Wang W, Liu Q H, Liang J, Hu Y and Zhou T 2019 Physics Reports 820 1–51
- [23] Boccaletti S, Bianconi G, Criado R, Del Genio C I, Gómez-Gardeñes J, Romance M, Sendiña-Nadal I, Wang Z and Zanin M 2014 Physics Reports 544 1–122
- [24] Wang Z, Andrews M A, Wu Z X, Wang L and Bauch C T 2015 Physics of Life Reviews 15 1–29
- [25] Yang R, Zhou T, Xie Y B, Lai Y C and Wang B H 2008 Physical Review E 78 066109
- [26] Gao L, Wang W, Pan L, Tang M and Zhang H F 2016 Scientific Reports 6 38220
- [27] Yang R, Huang L and Lai Y C 2008 Physical Review E 78 026111
- [28] Roshani F and Naimi Y 2012 Physical Review E 85 036109
- [29] Gao L, Wang W, Shu P, Gao H and Braunstein L A 2017 Europhysics Letters 118 18001
- [30] Cui P B, Wang W, Cai S M, Zhou T, Lai Y C et al. 2018 Physical Review E 98 052311
- [31] Lü L, Chen D, Ren X L, Zhang Q M, Zhang Y C and Zhou T 2016 Physics Reports 650 1–63
- [32] Liao H, Mariani M S, Medo M, Zhang Y C and Zhou M Y 2017 Physics Reports 689 1–54
- [33] Xin Y, Gao C, Wang Z, Zhen X and Li X 2019 IEEE Access 7 92070–92078
- [34] Chen W, Wang C and Wang Y 2010 Scalable influence maximization for prevalent viral marketing in large-scale social networks Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pp 1029–1038
- [35] Riquelme F and González-Cantergiani P 2016 Information Processing & Management 52 949–975
- [36] Kitsak M, Gallos L K, Havlin S, Liljeros F, Muchnik L, Stanley H E and Makse H A 2010 Nature Physics 6 888–893
- [37] Lü L, Zhou T, Zhang Q M and Stanley H E 2016 Nature Communications 7 10168
- [38] Chen W, Wang Y and Yang S 2009 Efficient influence maximization in social networks Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pp 199–208
- [39] Aguirre J, Papo D and Buldú J M 2013 Nature Physics 9 230–234
- [40] Milanese A, Sun J and Nishikawa T 2010 Physical Review E 81 046112
- [41] Van Mieghem P, Wang H, Ge X, Tang S and Kuipers F A 2010 The European Physical Journal B 76 643–652
- [42] Xian J, Yang D, Pan L, Wang W and Wang Z 2019 Chaos: An Interdisciplinary Journal of Nonlinear Science 29 113123
- [43] Zhu K and Ying L 2014 IEEE/ACM Transactions on Networking 24 408–421
- [44] Shulgin B, Stone L and Agur Z 1998 Bulletin of Mathematical Biology 60 1123–1148
- [45] Zhao L, Cui H, Qiu X, Wang X and Wang J 2013 Physica A: Statistical Mechanics and its Applications 392 995–1003
- [46] Chen Z, Zhu K and Ying L 2016 IEEE Transactions on Network Science and Engineering 3 17–31
- [47] Wu J, Gao Z and Sun H 2004 Modern Physics Letters B 18 1537–1542
- [48] Woo J, Son J and Chen H 2011 An sir model for violent topic diffusion in social media Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics (IEEE) pp 15–19
- [49] Xian J, Yang D, Pan L, Liu M and Wang W 2020 Journal of Statistical Mechanics: Theory and Experiment 2020 023402
- [50] Matamalas J T, Arenas A and Gómez S 2018 Science Advances 4 eaau4212
- [51] Rossi R A and Ahmed N K 2015 The network data repository with interactive graph analytics and visualization AAAI URL http://networkrepository.com
- [52] Kunegis J 2013 Konect: The koblenz network collection Proceedings of the 22nd International Conference on World Wide Web WWW ’13 Companion (New York, NY, USA: Association for Computing Machinery) pp 1343–1350 ISBN 9781450320382 URL https://doi.org/10.1145/2487788.2488173