Subtle role of latency for information diffusion in online social networks
Xiong Fei1, 2, †, , Wang Xi-Meng1, 2, Cheng Jun-Jun3
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China
China Information Technology Security Evaluation Center, Beijing 100085, China

 

† Corresponding author. E-mail: xiongf@bjtu.edu.cn

Project supported by the National Natural Science Foundation of China (Grant Nos. 61401015 and 61271308), the Fundamental Research Funds for the Central Universities, China (Grant No. 2014JBM018), and the Talent Fund of Beijing Jiaotong University, China (Grant No. 2015RC013).

Abstract
Abstract

Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks.

1. Introduction

The process of information diffusion has attracted wide attention. Many researchers have devoted themselves to investigating how information propagates from several initial spreaders to the population.[1,2] Different models have been put forward to describe local behaviors and analyze the dynamic diffusion process in various kinds of networks.[3,4] These models make a connection between local diffusion actions and the macroscopic state. Analysis and simulations have been conducted to reveal the dependence on model parameters.[5,6] As a typical representative, epidemic models reflect the mechanism of infection and recovery for diseases, and can be used to characterize information diffusion, such as the susceptible-infected (SI) model,[7,8] susceptible-infected-susceptible model (SIS),[9] susceptible-infected-refractory model (SIR),[1012] etc. Rumor models consider that the rumor may be clarified when two spreaders contact each other.[13] The underlying networks are of great importance for the diffusion process, determining the propagation velocity and extent.[14,15] A propagation model in two-layer multiplex networks was presented, and results proved that interactions between layers enhanced the diffusion process.[16] Moreover, in conjoint social-physical networks,[17] the scale of information diffusion is increased dramatically. In Ref. [18], the effect of community structure was studied in the presence of social reinforcement. Meanwhile, some studies extracted the most influential nodes in the diffusion process.[19,20] In Ref. [21], compared with the degree, the coreness constitutes a good topological descriptor to identify influential spreaders in complex networks, if epidemic models are used. When the diffusion process is characterized by rumor models, the coreness does not determine the spreading ability of nodes, but it reflects whether a node can suppress the rumor.[22]

With the development of Web 2.0, online social networks have become one of the most important ways for people to gain and share information. A lot of researches focused on information diffusion in online social networks.[23,24] Power-law degree distribution in online social networks yields an optimal structure for information diffusion.[25] The spread of online user behaviors was explored, and it was found that clustered-lattice networks accelerated behavior spreading.[26] Besides, weak ties also greatly affect the spreading dynamics. In Ref. [27], selecting weak ties preferentially cannot make information diffuse quickly, but they act as bridges connecting isolated local communities. The environment in online social networks is more complex than real society, so researchers try to characterize the elaborate diffusion process.[28] In Ref. [29], the simultaneous diffusion of negative and positive information was considered, and more states of user behaviors were introduced into the diffusion model. Based on the model, in Ref. [30] two methods of restraining rumor spreading were compared, and it was found that the method of the truth clarification had a long-term performance while blocking rumors at the nodes with a large degree only took effect in the early stage. To describe online user decisions and actions, an evolutionary game theoretic framework[31] was proposed to model the diffusion dynamics, and the model could be explained by differential equations.

Current studies often assume that agents focus their attention on the topic all the time, and they continue to forward information and express their ideas. In current models, agents have the ability to spread information once they are infected by it. In fact, even if agents in online social networks are convinced by spreaders, they have no influence on neighbors until they publish or republish the information. After the forwarding event, susceptible neighbors can contact the information. As depicted in Ref. [29], the mechanism of forwarding information for agents was introduced into the rumor model. Their model is only suitable for the environment where two opposite kinds of information coexist, and the forwarding event is individual-related, so the spreading threshold cannot be derived analytically. Furthermore, users in online social networks do not always keep active. After a diffusion action, they may enter into a waiting period of stochastic length where no further action takes place. Therefore, individual latency generally exists in consecutive user behaviors. In Ref. [32], latency of voters was introduced into opinion dynamic models, and results showed that the macroscopic state was changed by latency. In these models it was assumed that agents have initial opinions towards a topic, and information is expected to reach all the population before the dynamics. However, whether latency in information diffusion affects the spreading scale and velocity still needs further exploring, and this problem is important for understanding the real intrinsic diffusion dynamics. In this paper, we propose a diffusion model with node latency. Spreaders may enter into the latent state and do not spread the information temporarily, but they may be reactivated again. We conduct mean-field analysis and numerical simulations of our model. We find that the node latency does not change the spreading threshold, but determines the final diffusion extent.

The rest of this paper is structured as follows. In Section 2, an information diffusion model with node latency for the online social medium is presented. In Section 3, the mean-field analyses of the model in homogeneous networks and heterogeneous networks are conducted. In Section 4 numerical simulations and a discussion about the model are given. Concluding remarks are given in Section 5.

2. Diffusion model with latency

In online social networks, users spread information to others by sending a message or publishing a post. They are not active all the time. After they take a diffusion action, their activity decreases and they temporarily keep away from the diffusion process. With the time elapsing, latent users may be reactivated, and they will interact with neighbors. Therefore, the activity of users is heterogeneous and dynamic, and it affects the process of information diffusion. We introduce latency of nodes into the epidemic model. After a node takes a diffusion action, it enters into a waiting period of stochastic length.

We introduce our diffusion model. In the model, a node may be in one of four potential states, i.e., the susceptible state, the infected state, the latent state, and the refractory state. The susceptible state means that agents do not see any information, and have no idea about the topic. Susceptible nodes may be infected if they receive the information from their neighbors. The infected state means that nodes are convinced of the information and are willing to propagate it. However, they do not have influence on neighbors until they forward the information. Latent users have accepted the information, but they freeze it and do not take diffusion actions. Refractory nodes absolutely lose their interest in the topic, and drop out of interactions.

Nodes interact with neighbors in terms of their states. Each time, infected nodes may send a message to their neighbors with the probability plat and then enter into the latent state. Susceptible neighbors receive the message and read it, and they may be infected with the spreading probability λ. Meanwhile, the latent nodes may recover their activity and enter into the infected state again with the probability pinf, or else, they may become refractory and withdraw from interactions with the probability δ. We provide the state transition graph for an arbitrary node in Fig. 1.

Fig. 1. State transition graph of a node in the topology.

From the above model, after nodes temporarily stop their diffusion actions, they may become active again with the probability pinf, and they may also lose their activity permanently with the probability (1 − pinf) δ. In the model, only the refractory state is stable, and infected and latent nodes will become extinct in the diffusion process. The final system evolves into the regime in which all nodes become refractory or the susceptible and refractory states coexist with different densities. From Fig. 1, the latent state can be treated as an intermediate state between diffusion actions and withdrawal from interactions. Although latent nodes trust the topic, they currently do not diffuse information to others. Therefore, the effect of node latency on the diffusion process cannot be ignored. The threshold of information diffusion is also related to the latent state. We will conduct mean-field analysis of the spreading dynamics.

3. Analytical approach

If the underlying network is a heterogeneous network, node degrees exhibit distribution P(k). The average degree of the network is

The probability that a node with degree k meets a neighbor with degree k′ is P(k′|k). The probability represents degree correlations of the network. Apparently, nodes belonging to different connectivity classes have different spreading dynamics. The overall densities of nodes with degree k in the susceptible, infected, latent, and refractory state are defined as ρs (k,t), ρi (k,t), ρl (k,t), and ρr (k,t), respectively. We are concerned about the variations of these four densities. ρs (k,t) decreases all the time since susceptible nodes are infected by receiving the information from neighbors. The probability that a susceptible node with degree k contacts an infected neighbor with degree k′ is P (ik|sk). In the mean-field approximation, the probability can be written as

The degrees of infected neighbors for a susceptible node are heterogeneous, and their densities are often different. For a susceptible node with degree k, the average density of infected neighbors is

An infected neighbor forwards a message with the probability plat, so the susceptible node is infected by the neighbor in the time interval [t,t + Δt] with the probability λ platΔt. For a susceptible node with degree k, it receives many messages from neighbors, and therefore, it may be infected with a greater chance. The probability of being infected by k neighbors is defined as Psi (k,t), and it is calculated by being multiplied with the probability for a single neighbor, and the resulting expression is as follows:

From Eq. (4), the probability for multiple infected sources is the same as that from the independent cascade model that has widely been validated in the process of information diffusion.[33] In the limit Δt → 0, Psi (k,t) is approached by

Thus, we obtain the transition rate of ρs (k,t). The variation of ρs (k,t) during [t,t + Δt] is . We have the following differential equation:

The density of infected nodes ρi (k,t) increases because susceptible agents are infected by the information from their neighbors and latent agents recover their activity. ρi (k,t) decreases as infected agents become latent. After infected nodes forward information, they will enter into the latent state, so the variation of ρi (k,t) is platρi (k,t). The variation of latent agents that are reactivated is pinfρl (k,t). Therefore, the transition rate of ρi (k,t) is expressed as

Analogously, ρl (k,t) increases when infected agents lose their activity temporarily, but decreases when latent agents become refractory or they are reactivated. The transition rates of ρl (k,t) and ρr (k,t) are given by

We will analyze the threshold of spreading probability below which the information cannot propagate in a network. Homogeneous and heterogeneous networks are used as interaction topology.

3.1. Homogeneous network

First, we consider homogeneous networks to explore basic features of the diffusion model. In the networks, degree fluctuations are very small with the same degree , and there are no degree correlations. Therefore, ρs (k,t), ρi (k,t), ρl (k,t) and ρr (k,t) are simply written as ρs (t), ρi (t), ρl (t), and ρr (t). Equations (6)–(8) are reduced to

Assume that information propagates in the global scope after time τ. When t < τ, information is trapped in the local area. Thus, we have ρs (τ) ≈ ρs (0), ρi (τ) ≈ ρi (0), and ρl (τ) ≈ ρl (0). In the beginning, only one infected node is assigned in the network, so we have the following initial condition:

When information propagates beyond the local region, the density of refractory agents varies beyond 0. In the situation, ∂ ρi (t)/t > 0 should hold for t = τ + Δt. Since Δt → 0 and the increase of ρl (t) is usually later than the increase of ρi (t), we have ∂ ρl (τ + Δt)/t ≈ 0. After some elementary manipulations of the third equation in Eq. (9), we have the following equation with the above condition:

The threshold condition of the second equation in Eq. (9) can also be written as

Inserting Eq. (11) into Eq. (12), we obtain

Since ρs (τ + Δt) ≈ 1, we find the final condition

From Eq. (14), the threshold of spreading probability correlates with the average node degree , and refractory probability δ and the reactivating probability pinf. However, the probability of becoming latent plat does not affect the spreading threshold.

Figure 2 illustrates the solution of Eq. (9). From Fig. 2, a threshold of spreading probability for information diffusion exists clearly, and the value of the threshold approaches Eq. (14), which is in accordance with our analysis. Above the threshold, ρr (∞) increases drastically with λ increasing, leading to a phase transition. In the left panel of Fig. 2, large average degree and reactivating probability pinf advance the diffusion process and reduce the threshold. We notice that when = 4, the information for λ ≥ 0.8 invades the whole system, but when = 2, some nodes are still unaware of the information for any λ. As shown in the right panel of Fig. 2, the latency parameter plat is unrelated to threshold, which is in consistence with the analysis of Eq. [14]. However, when information can propagate in the system, ρr (∞) varies slightly with the latency parameter. The larger refractory probability increases the threshold a little and reduces the diffusion extent, but its effect also depends on pinf. When pinf is large enough, δ does not have an obvious influence.

Fig. 2. Plots of final density of refractory nodes ρr (∞) versus λ, given by Eqs. (9) in homogeneous networks, with ρi (0) = 1/2500. (a) δ = 0.5, and plat = 0.5; (b) k = 4, and pinf = 0.3.
3.2. Heterogeneous network

Now, we consider uncorrelated inhomogeneous networks. The degree correlations of networks can be written as

The overall densities of infected and latent nodes are obtained by averaging the densities over different degrees, and given as

Integrating Eq. (6) from time 0 to time t, we have

where

Obviously, the initial value of ϕ (t) is ϕ (0) = 0. We multiply the first equation of Eq. (8) with kP (k)/ and sum over different k values, and then have the following expression:

We integrate Eq. (19) from time 0 to time t. Noticing that in the final system ρl (k,t) = 0 when t → ∞, the integral of Eq. (19) is simplified into

Analogously, we do the same sum manipulation of Eq. (7) and integrate it. Considering Eq. (17), we obtain

In the final system, we have dϕ (∞)/dt = 0. Thus, inserting Eq. (20), we gain the following equation from Eq. (21).

Around the threshold, ϕ (∞) is small. We make the Taylor expansion of eλkplatϕ(∞) in Eq. (22), and we find

Then, we obtain the expression of ϕ (∞) as

Information can propagate in the network if ϕ (∞) > 0. Thus, we obtain the threshold as

Since in the final system, ρi (k,∞) = 0 and ρl (k,∞) = 0 hold true, we have

Therefore, in heterogeneous networks, the threshold of spreading probability is also independent of plat, but relies on δ and pinf, which also holds true in homogeneous networks.

4. Simulation results

We conduct Monte-Carlo simulations to find the role of latency in the process of information diffusion, and the spreading thresholds in different networks are also investigated. In the beginning, a node is selected at random and it is set to be in the infected state, while all the other nodes are susceptible. Simulations are implemented synchronously. Each time, all infected nodes make a decision to take actions and spread information to neighbors, and then they may enter into the latent state. All latent nodes may recover their activity or withdraw from interactions. The dynamics continues until no more updates take place. Homogeneous networks and Barabasi–Albert scale-free networks mediate the diffusion process, and a real social network is also used as the underlying topology.

Figure 3 shows the densities of nodes in different states each as a function of time. The underlying networks are homogeneous networks. The density of latent nodes ρl (t) stays a little smaller than that of infected nodes ρi (t), and ρi (t) increases earlier. Latent nodes and infected nodes can interconvert into each other, and will become extinct together. Increasing λ raises the peaks of ρl (t), ρi (t), and ρr (∞). For larger λ, ρl (t) and ρi (t) increase rapidly in the early stage and reach their peaks within less time, but then they drop relatively slowly. ρs (t) becomes stable more rapidly than the densities of nodes in other states. Although infected nodes still exist in the system, all of their neighboring nodes enter into the refractory state and ρs (t) is prevented from decreasing. Larger λ accelerates the evolution of ρs (t), but it does not reduce the relaxation times of ρi (t) and ρr (t).

Fig. 3. Time evolutions of the density of susceptible, infected, latent, refractory nodes in homogeneous networks with the degree = 4. The system size is 2500, δ = 0.2, pinf = 0.5, and plat = 0.5. (a) λ = 0.2; (b) λ = 0.5.

To demonstrate the threshold for the diffusion process, we calculate the final densities of refractory nodes with different spreading probabilities as shown in Fig. 4. Information diffusion witnesses a distinct threshold in both networks. In the left panel, the threshold in a homogeneous network is nearly the same as that in Fig. 2 with the equal values of parameters, and it accords with the analytical result. The parameter plat does not change the threshold, but it affects the final diffusion extent, which is in accordance with the mean-field analysis of Section 3. In a scale-free network, ρr (∞) becomes slightly larger than in a homogeneous network due to the promotion of central nodes. In addition, the threshold in a scale-free network is approximately half that in a homogeneous network. In heterogeneous networks, the threshold depends on , as given in Eq. (25). However, in homogeneous networks, the threshold is proportional to 1/. For a Barabasi-Albert scale-free network, holds true. Therefore, we have .

Fig. 4. Plots of ρr (∞) versus λ, when N = 2500, δ = 0.5, and pinf = 0.3. (a) The underlying network is a homogeneous network with = 4; (b) a scale-free network mediates the diffusion process. The results are averaged over 100 different realizations.

Figure 5 shows the effects of latency probability plat on the diffusion extent. In the left panel, the underlying topology is the same scale-free network as that in Fig. 4. In the right panel, we use a real online network extracted from the Sina website that is a famous micro-blog in China. The real social network contains 5906 nodes with the average degree = 4.5008. The average shortest path length of the network is 4.99, and the clustering coefficient is 0.0772. From Fig. 5, it is dramatic that ρr (∞) first decreases with the increase of plat, and then it increases. Around plat = 0.5, ρr (∞) reaches the minimum. For small plat, infected nodes become latent with a small chance. Since only latent nodes may enter into the refractory state and thoroughly stop their interactions, the diffusion process will last a long time. More infected nodes exist in the system with small plat, and they have the ability to spread information, leading to a larger final diffusion. For large plat, although infected nodes become latent more quickly, they may forward more messages to their neighbors before they pause their diffusion actions. After infected nodes forward a message, their susceptible neighbors can see the message and have the opportunity to be infected. Therefore, large plat speeds up the diffusion process, and also increases ρr (∞). Obviously, the maximal density of infected nodes over time decreases with the increase of plat, but the change for the density of latent nodes is opposite. We also calculate the maximum sum of densities of infected and latent nodes over time. When λ = 0.2, δ = 0.2, and pinf = 0.5, the maximum sums in a scale-free network are 0.2792 for plat = 0.1, 0.2573 for plat = 0.5, 0.3071 for plat = 0.9, respectively. We can see the bottom of the sum occurs around plat = 0.5. Therefore, plat has a subtle role in the diffusion, and both large and small plat lead to a larger diffusion extent. Increasing pinf makes latent nodes easier to retrieve their activity, and causes more spreaders, so ρr (∞) with large pinf increases markedly. In addition, more nodes are infected in a scale-free network than in the real social network, since the scale-free network has a smaller average shortest path length 4.37. Furthermore, pinf in a scale-free network exerts a more obvious effect on the diffusion process.

Fig. 5. Plots of ρr (∞) versus plat, when λ = 0.2 and δ = 0.2. (a) A scale-free network is used; (b) a real social network is used. Each plot represents the results averaged over 100 different realizations.

Now, we concentrate on the dependence on the refractory probability δ. Intuitively, by increasing δ, more nodes thoroughly drop out of interactions, and information becomes less easy to propagate. As shown in Fig. 6, the final density of refractory nodes nearly decays with the increase of δ as a power law, that is, ρr (∞) ∝ δγ. The power exponent is γ = − 0.6963 ± 0.0718 in a scale-free network, while it is γ = − 0.7307 ± 0.0406 in the real network. When δ is small, the information in a scale-free network almost occupies the absolute majority of the system, while in the real network, many susceptible nodes survive in the end.

We measure the influence of nodes in the diffusion process, and try to find the effective topological descriptor for influence maximization. We use the real social network as interaction topology. Then, we define C(t) = ρi (t) + ρl (t) + ρr (t), where C(t) denotes the density of nodes that have ever been influenced by the information, and therefore, it can be used to measure the influence of initial spreaders at time t. We use three topological descriptors to identify influential nodes, i.e., the degree, k-core index, and betweenness.

Fig. 6. Plots of ρr (∞) versus δ, when λ = 0.2, pinf = 0.5, and plat = 0.5. Each plot represents the results averaged over 100 different realizations.
Fig. 7. Variations of C(t) with time in the real network, when δ = 0.2, pinf = 0.5, and plat = 0.5. Initial infected nodes are assigned according to the degree and betweenness.
Fig. 8. Variations of C(t) with time in the real network, when δ = 0.2, pinf = 0.5, and plat = 0.5. Initial infected nodes are assigned according to the coreness and betweenness.

We compare the performance of the degree with betweenness in Fig. 7, and compare the k-core index with betweenness in Fig. 8. In Fig. 7, we sort nodes according to the degree and betweenness, respectively, and select the top 10 nodes from each rank. To obtain a distinct result, we delete the common nodes occurring simultaneously in the top 10 of the degree and betweenness rank. For each topological descriptor, we retain 4 nodes as initial infected nodes. In Fig. 8, initial infected nodes are assigned similarly. From Fig. 7, the betweenness outperforms the degree a little in grasping the influential nodes in our diffusion model, despite the parameters. Moreover, the descriptor of betweenness has an obvious advantage compared with the k-core index from Fig. 8. Therefore, the betweenness is the best descriptor to mimic the node influence in information diffusion with latency.

5. Conclusions

In this paper, we study the effect of latency on the information diffusion process. We put forward a diffusion model that includes four node states, i.e., the susceptible, infected, latent and refractory state. After infected nodes take diffuse actions, they enter into the latent state and stop spreading information temporarily. Latent nodes may recover their activity, or they may become refractory and withdraw from interactions. We implement mean-field analysis and Monte-Carlo simulations to investigate the spreading threshold and final density of refractory nodes.

The results show that the threshold for information diffusion depends on the spreading probability, refractory probability, and reactivating probability, but the probability of becoming latent is unrelated to the threshold. The threshold in scale-free networks is nearly 4/log (N) times as large as that in homogeneous networks. Small or large latency leads to a larger diffusion extent, but the essential causes for these two situations are different. Moreover, the final density of refractory nodes increases markedly with the reactivating probability increasing. We also detect influential nodes in the diffuse model. From the result, the spreading capabilities of nodes mainly correlate with their betweenness, while the coreness does not perform well for identifying node influence.

In online social networks, there are two cases of popular information. In the first case, users forward information rapidly, and the information propagates on a large scale within a short time, implying large latency probability in the model. In the second case, users forward information and become latent slowly, but the diffusion process lasts a long time. Many users are influenced by the information finally. From the results, if one hopes to restrain the spread of a rumor, the method of creating another topic to distract user attention may not be so effective in online social networks. Under the measure, active users enter into the latent state temporarily but they do not withdraw from the diffusion of the rumor. The rumor can propagate slowly and can cause a long-term impact gradually. A better way to restrain the diffusion may be to separate the rumor from neighbors and to clarify the truth at the nodes with large betweenness.

Reference
1Barthélemy MBarrat APastor-Satorras RVespignani A 2004 Phys. Rev. Lett 92 178701
2Nekoveea MMorenob YBianconic GMarsili M 2007 Physica 374 457
3Lu YJiang GSong Y 2012 Chin. Phys. 21 100207
4Genois MVestergaard C LCattuto CBarrat A 2015 Nat. Commun 6 8860
5Gong YSong YJiang G 2012 Chin. Phys. 21 010205
6Reppas A IDe Decker YSiettos C I 2012 J. Stat. Mech 2012 P08020
7Zhou TLiu JBai WChen GWang B 2006 Phys. Rev. 74 056109
8Barthelemy MBarrat APastor-Satorras RVespignani A2002Phys. Rev. Lett92178701
9Parshani RCarmi SHavlin S 2010 Phys. Rev. Lett 104 258701
10Newman M E J 2002 Phys. Rev. 66 016128
11Silva R DFernandes H A 2015 J. Stat. Mech 2015 P06011
12Wang YCao J DAlofi AAL-Mazrooei AElaiw A 2015 Physica 437 75
13Castellano CFortunato SLoreto V 2009 Rev. Mod. Phys 81 591
14Fotouhi BShirkoohi M K 2016 Phys. Rev. 93 012301
15Liu CXie JChen HZhang HTang M 2015 Chaos 25 103111
16Li WTang SFang WGuo QZhang XZheng Z 2015 Phys. Rev. 92 042810
17Yagan OQian DZhang JCochran D 2013 IEEE J. Sel. Area Comm 31 1038
18Nematzadeh AFerrara EFlammini AAhn Y Y 2014 Phys. Rev. Lett 113 088701
19Song BJiang GSong YXia L 2015 Chin. Phys. 24 100101
20Hu QZhang YXu XXing CChen CChen X 2015 Acta Phys. Sin 64 190101 (in Chinese)
21Kitsak MGallos L KHavlin SLiljeros FMuchnik LStanley H EMakse H A 2010 Nat. Phys 6 888
22Borge-Holthoefer JMoreno Y 2012 Phys. Rev 85 026116
23Lu ZWen YZhang WZheng QCao G2015IEEE T. Mobile Comput151292
24Lu ZWen YCao G2014Proceedings of 33rd Annual IEEE International Conference on Computer Communications2014Toronto, Canada1932
25Li YQian MJin DHui PVasilakos A V 2015 Inform. Sci 293 383
26Centola D 2010 Science 329 1194
27Zhao JWu JXu K 2010 Phys. Rev. 82 016105
28Hu HWen YChua TLi X 2014 IEEE Access Journal 2 652
29Wen SHaghighi M SChen CXiang YZhou WJia W 2015 IEEE T. Comput 64 640
30Wen SJiang J JXiang YYu SZhou W LJia W J 2014 IEEE T. Parall. Distr 25 3306
31Jiang CChen YLiu K J 2014 IEEE T. Signal Proces 62 4573
32Lambiotte RSaramaki JBlondel V D 2009 Phys. Rev. 79 046107
33Goldenberg JLibai BMuller E 2001 Market. Lett 12 211