key: cord-0234592-i7m77w7u authors: Xue, Leyang; Zhang, Peng; Zeng, An title: Maximizing spreading in complex networks with risk in node activation date: 2021-04-14 journal: nan DOI: nan sha: 285205e1a892bb86a7134607d9eaa03439aa5fd9 doc_id: 234592 cord_uid: i7m77w7u It is widely acknowledged that the initial spreaders play an important role for the wide spreading of information in complex networks. Thus, a variety of centrality-based methods have been proposed to identify the most influential spreaders. However, most of the existing studies have overlooked the fact that in real social networks it is more costly and difficult to convince influential individuals to act as initial spreaders, resulting in a high risk in maximizing the spreading. In this paper, we address this problem on the basis of the assumption that large-degree nodes are activated with a higher risk than small-degree nodes. We aim to identify the effective initial spreaders to maximize spreading when considering both the activation risk and the outbreak size of initial spreaders. On random networks, the analytical analysis reveals that the degree of optimal initial spreaders does not correspond to the largest degree of nodes in the network but rather be determined by infection probability and difference of activation risk among nodes with different degree. Here, we propose a risk-aware metric to identify the effective spreaders on real networks. The numerical simulation shows that the risk-aware metric outperforms the existing benchmark centralities in maximizing the effective spreading. Social networks as a media play an irreplaceable role in the spreading of information, opinion, ideas, innovation, and rumors [1, 2, 3] . In social networks, identifying influential spreaders could help us efficiently control the outbreak of epidemics [4] , successfully advertise a new product [5] , and largely facilitate information dissemination [6] . A recent example is that super spreading events (SSE) are associated with explosive growth early in an outbreak of COVID-19 [7] , identifying the high-risk setting of SSE and timely implementation of interventions can help prevent and control future infections disease outbreaks. Hence, the problem of influence maximization has received extensive attention from multiple disciplines, such as mathematics, physics, computer science, sociology [8, 9, 10, 11, 12] . Thus far, large effort has been devoted to identifying influential nodes [13, 14, 15, 16, 17] . Originally, some well-known centralities are used to identify the influential nodes in complex networks, such as degree, closeness [18] , betweenness [19] , eigenvector [20] , Katz [21] and subgraph [22] . Then, Kitsak et al. [23] argue that the location of nodes in the network is more important than its immediate neighbors in evaluating the spreading influence of nodes, and use the k-shell decomposition to measure the location of nodes in the network. If the node is located in the core of the network, it will have a higher influence to disseminate the information than the one located in the periphery. Although some nodes with the same coreness are indistinguishable in some cases (e.g. Barabasi-Albert network and treelike network) by k-shell because it is highly coarse-grained, their findings have been widely disseminated and draw attention to the problem. Subsequently, many new methods have been devised to identify the influential spreaders [24] . For example, Zeng et al. present a mixed degree decomposition (MDD) procedure to rank the spreader by considering ⋆ Fully documented templates are available in the elsarticle package on CTAN. * Correspondence and requests for materials should be addressed to A.Z Email address: anzeng@bnu.edu.cn (An Zeng) the residual degree and exhausted degree (In the k s layer decomposition, nodes with degree smaller than the k s value of the current layer are successively pruned until no more such nodes remain. In this case, for each remaining node, residual degree refers to the number of links connecting to other remaining nodes, and exhausted degree denotes the number of links connecting to removed nodes), and show that the MDD outperforms the k-shell [25] ; Lü et al. find that H-index could better quantify the node influence than the degree and coreness (i.e. k-shell) [26] ; Zareie et al. propose an improved cluster rank approach to identify the influential nodes by taking into account the common hierarchy of nodes and their neighborhood set [27] . The main implicit assumption in most relevant studies is that the probability of influential individuals to act as initial spreaders is independent of personal influence (i.e. status level in the social network, referred to the rank, deference, or popularity). But when dealing with a real application of influence maximization, we recognize that some realistic factors (e.g. the cost, accessibility of influential individuals) still need to be considered into the problem. In related work, many researchers propose a variety of methods to identify individuals with high influence and suggest that marketing managers should try to seed them to promote products on online social networks. The high-influence seeding targets indeed have higher returns but associated with high risks due to the following reason. (1) There is a constrain in the budget of promotional activities. In marketing, hiring higher influence individuals to promote the products need pay higher cost than average people. (2) Even though marketing managers could pay for the high cost, celebrities are not willing to promote products because of duty or time constrain [28] , resulting in a high risk in maximizing the spreading. The related empirical study also confirms that the probability of responding to an endorsement request is dependent on status, and it sharply declines with the status difference in a user-generated network [29] . To make the problem closer to the real situation, we relax the assumption and capture reality factors as the activation risk of initial spreaders. Here, we assume that individuals with higher influence tend to be activated (i.e. be accepted to act as initial spreaders) at a higher risk than ordinary. When one takes into account both the outbreak size and the activation risk of the target individual, selecting initial spreaders based on the existing centrality metrics may fail to maximize spreading in complex networks. In this paper, we generalize the traditional problem about the identification of influential spreaders by considering the risk in initial node activation. We assume that the probability to activate nodes acted as initial spreaders decrease with the degree of nodes. For simplicity, we use the exponential decay function to approximate the relation between the activation probability and the degree of nodes. The expected value of outbreak size over the activated probability could quantify the effective spreading coverage of nodes (i.e. the expected value of the number of infected nodes in a spreading initiated from a single node). On random networks, we analyse the degree value of the optimal initial spreaders by the bond percolation model. The finding suggests that the optimal seed policy (i.e. selecting the optimal initial spreaders to maximize the effective spreading) is not the largest-degree node in the network. Meanwhile, we verify that existing centrality is correlated with the degree on the real-world network. Simply discounting for a degree in existing centralities might not be enough to identify the effective spreaders. Therefore, it is necessary to devise a new method for this case. We then propose a risk-aware method to identify the effective spreader, further maximizing the effective spreading. The performance of the risk-aware centrality is tested on disparate real networks by SIR model. Numerical simulations show that our method outperforms existing benchmark centralities (i.e. the ratio between existing centralities and degree). We briefly describe the problem of spreading with the risk in node activation. The basic idea is that it is difficult to convince an individual with more followers in social networks (i.e. larger-degree node) than an individual with fewer followers (i.e. smaller-degree node) to act as the initial spreader. We denote this as the risk of activating the node for spreading. Although the node with a larger degree could disseminate a large fraction of the population, it may refuse to initiate contagion due to the higher activation risk. A natural problem is which node should be selected as the initial spreader for maximizing the spreading under the risk in node activation. To address this problem, we first quantify the activation risk of nodes. Based on the assumption that the activation risk decreases with the degree of nodes, we employ the exponential decay function to characterize the negative relation between degree and activation probability, because its analytical result is tractable and agrees well with the intuition in reality. A detailed discussion about the selection of the function form could see the Appendix F. The exponential decay is monotonic and could map the value of degree (i.e. the number of node's immediate neighbors) into the range from 0 to 1. The activation probability of nodes is acquired by the formula, where k i , k , and λ are respectively the degree of node i, the average degree of network, and the exponential decay constant that is called the risk parameter for determining the difference of activation probability among nodes with distinct degrees. When λ = 0, the problem degenerates to the original definition because each node in the network has the same activation probability. Only if λ > 0, activation risk emerges. A larger λ corresponds to a higher risk when trying to activate large-degree nodes as initial spreaders. p i represents the probability that the node i accepts to act as the initial spreader. Then, the spreading coverage s i is defined as the ratio of infected nodes to all nodes in the network, given the spreading originated from node i. When one takes into account the activation risk of initial spreaders, the expected value of spreading coverage of nodes is naturally regarded as the effective spreading coverage. Thus, the effective spreading coverage of node i can be easily expressed ass i = p i * s i . In this paper, we employ effective spreading coverage as a target function to quantify the practical outbreak size of spreading initiated from a target node with activation risk. The illustration of the problem could be seen in Fig. 1 . Fig. 1 . Illustration of the problem for maximizing spreading with risk in node activation. Here, we assume that the probability in initial node activation decreases with the degree of nodes when one considers the realistic factors (e.g. the cost, accessibility of node) into the problem. The effective spreading coverage could be quantified by the expected value of outbreak size over activation probability. The degree of selected two nodes (red and blue) in the ca-Netscience network are 34 and 3 respectively. Although the red node acted as an initial spreader could infect a large number of nodes than the blue one, it has the smallest activation probability in the network. In the subplots (a) and (b), we show the contagion triggered respectively from the two nodes with a critical infection rate by SIR model. Obviously, the number of infected nodes originated from the red node is larger than the blue, but the effective spreading coverage of the red is lower than the blue node (λ = 0.2). The risk of node activation is more common in real problems such as advertising. We thus describe the spreading process as the information spreading on social networks. Susceptible-infected-recovered (SIR) could well describe the information spreading process in social media [30, 31] . Therefore, we apply the SIR model to simulate this process on disparate empirical networks. In the SIR model, individuals are classed into three states: susceptible (S), infected (I), and recovered (R). S nodes do not carry the disease and can be infected. I nodes carry the disease and can infect others. R nodes either die or recover and immune to further infection. At the beginning of dynamics, all nodes are initially in the susceptible state except for an initial infected spreader. At each time step, nodes in the infected state can infect their neighbors with probability β who are in the susceptible state, then immediately transform from infected to recover state. The nodes in the recovered state never change their state. The dynamics process continues until there are no infected nodes in the network. At the end of dynamics, the total number of infected nodes is calculated by counting the number of nodes in the recovered state. The spreading coverage of nodes is calculated by the ratio of infected nodes to all nodes in the network. Due to the stochastic nature of the model, all experimental results are obtained by averaging over 1000 independent numerical simulations with the same initial condition. The degree of the optimal initial spreaders to maximize the effective spreading coverage on random network The relation between the SIR and the bond percolation model is studied by Newman [32] . The SIR model with infection rate β is equivalent to a bond percolation model with bond occupation probability T . The bond percolation model could give the exact mean size of the SIR epidemic outbreak triggered from a randomly chosen single node by generating function. Here, we investigate the maximum effective spreading coverage on a random network with a given degree distribution by the bond percolation model. Then, we also give the degree of nodes selected as the optimal initial spreader. To this end, we first derive the mean size of the outbreak originated from the single node with degree k. The formula could be seen as following, where k , k 2 , and β c are the average degree of network, second moment of degree, critical infection rate respectively, and β c = k k 2 − k . G 1 (x) denotes the generation function of the degree distribution of nodes reached by following a randomly chosen edge, The detailed description about G 1 (x) and the derivation of Eqs. 2 see the Appendix A. Here, we only consider the part where the infection rate is less than the critical infection rate (β < β c ). In the case of larger β, the role of individual nodes is no longer important since the final spreading coverage is independent of where it originated from. Combining the Eqs. 1 with 2, we have Eqs. 3 represents the mean size of effective spreading coverage initiated from a single node with degree k on a random network. By differentiating for k, we have The degree of optimal node (k * ) corresponding to the maximum effective spreading coverage s * can be obtained by setting the ∂ s k ∂x = 0, Substituting the G ′ 1 (1) = 1 β c into the Eqs.5, we further simplify the equation, We find that the degree of optimal nodes depends on the infection rate β and the risk parameter λ, because k and β c is a constant with a given degree distribution. The result suggests that the optimal initial spreaders to maximize the effective spreading coverage is different from the traditional problem (i.e. influence maximization problem on random network). Besides, substituting the Eqs.6 into Eqs.3, we also give the mean size of maximum effective spreading coverages * triggered from nodes with the k * on a random network with a given degree distribution by We further analyze k * . In the Eqs.6, k * is codetermined by λ and β. Specifically, we wish to analyze the effect of variable on the degree of optimal spreaders by fixing a parameter. (1) If we take the limit of β as lim β→β c k λ − 1− β βc β , the optimal degree k * = k λ . When λ → 0, k * = ∞. When λ → ∞, then k * = 0. The optimal degree of nodes decrease with λ by fixing β. This tells us that in a higher-risk condition, the optimal spreaders shift to select the lower-degree nodes as the initial spreader. (2) By setting the λ = k , the optimal degree k * = 1 β c − 1 β . One could see that k * increases monotonically with β, suggesting that as the infection rate increases, the larger-degree nodes have a comparative advantage for maximizing the effective spreading coverage. In the related work, some centrality metrics are proposed to identify influential spreaders or important nodes [14, 23, 33, 34] . When the risk is considered in node activation, the analysis of the optimal initial spreaders on random networks reveals the fact that optimal seed policy is obviously distinct from the largest degree node in the original problem, which suggests that it might be not efficient to directly utilize existing metrics to identify the initial spreaders in the real network. Meanwhile, the correlation analysis between degree and other metrics is made to verify that existing centrality metrics are not enough to perform well in the identification of effective spreaders because they are correlated with the degree (for correlation analysis, see the Appendix C). Therefore, it is necessary for maximizing the effective spreading to design a new measure in real networks. The analytic result shows that the degree value of the optimal spreaders in the problem is inversely proportional to risk parameter λ and has a positive relation with infection rate β, suggesting small-degree nodes linked to many hubs are more likely to maximize the effective spreading. Inspired by the analytic result, we consider two factors to design the new metric, i.e. outbreak size and activation risk. On one hand, we expect that it could select nodes linked to many hubs, because the spreading initiated from those nodes could cover more nodes with the help of the neighboring hub when the infection rate β is larger, which also requires that degree of the node itself could not be too small (This corresponds to the analytical solution where the optimal degree value has a positive relation with the infection rate β). On the other hand, we hope that the initial spreaders are selected as small-degree nodes when the activation risk λ is higher (This corresponds to the analytical solution where the optimal degree value is inversely proportional to risk parameter λ). Therefore, the effective spreaders could be better characterized by the following two aspects: (1) spreaders with a strong spreading ability (e.g. possessing many high influence neighbors), (2) spreaders associated with lower activation risk (e.g. smaller degree nodes). In this paper, we propose the risk-aware metric (RA) to identify the efficient spreaders by rewarding nodes with higher-degree neighbors and penalizing higher-degree nodes. The risk-aware metric of node i is defined as follow, where k i , τ(i), k j are the degree of node i, the neighbor set of node i, and the degree of node j respectively. k j k i +k j means the potential influence of node i obtained from neighbor j. The potential influence means that the node's neighbors have higher influence to initiate a spreading although the node itself has lower influence. If k i = k j , As a consequence, k j k i +k j ∈ (0, 1). In this paper, the risk parameter λ to determine the risk difference of nodes with distinct degree is incorporated into the defined problem. To identify the effective spreader under different conditions (i.e. various λ), accordingly, the parameter θ is introduced to adjust the potential influence obtained from different neighbors. When θ = 0, the potential influence obtained from different neighbors is equal, and the risk-aware metric degenerates to the degree. When θ > 0, the lower potential influence obtained from neighbors will be largely weakened with an increase of θ. In other words, small-degree nodes are likely to have larger potential influence, because this term ( k j k i +k j ) θ plays an important role in the contribution of RA than the number of neighbors. Intuitively, a node has a large value of RA if it is connected to many other nodes that have a higher degree than the node. In fact, it is hard to estimate which nodes have the large value of RA. For instance, when the degree of node i is rather small, the potential influence obtained from each neighbor is relatively large. On the other hand, the overall sum of potential influence from neighbors is small due to the few neighbors. To further understand the metric, we make an illustration of nodes ranked by the risk-aware metric for different parameters θ in Fig. 2 . One could see clearly how the most highly ranked node identified by RA varies with θ. As θ increases, top ranked nodes are likely to be small-degree nodes with higher-degree neighbors. Actually, θ determines the ability to identify the potential influence of nodes. The larger the value of θ is, the greater the potential influence of the identified node is. The RA is significantly different from the traditional centrality metrics that measure the importance of nodes. The computational complexity to traverse the neighbors of a node is simply the average degree k of networks. If one estimates the potential influence of each node in a network by considering the degree of node and their neighbors, the computation complexity is O(N k 2 ) where N is the number of nodes in the network. Based on the idea to reward nodes connected to higher-degree nodes and penalize the nodes with high degree, we further consider other metrics to identify the effective spreader by different function form. The first potential influence metric (PI 1) and second potential influence metric (PI 2) are respectively defined in Eqs. (9) and Eqs. (10), where k i , τ(i), k j are the degree of node i, the neighbor set of node i, and the degree of node j respectively. Two potential influence metrics are parameter-free. PI 1 ∈ (−∞, +∞), PI 2 ∈ (0, +∞). Although PI 1 might be negative, we still could rank nodes. To confirm the effectiveness of new metrics, we need to compare them with some baseline methods. Due to the fact that there is a higher correlation between existing centrality metrics and degree (for correlation analysis, see Appendix C), it is not fair to directly utilize the existing metrics as baseline methods to compare with new metrics. Here, we calculate the ratio between existing centrality metrics and degree as baseline methods (e.g. Katz score / degree). In this way, it is reasonable to compare new metrics with baseline methods, which could be proved in the correlation analysis (see the Fig.6 in Appendix C). In this paper, we employ some representative centrality metrics to obtain the baseline method. We briefly introduce these metrics. (1) Degree. The degree of node i is defined as the number of immediate neighbors. k(i) = N j a i j where a i j is a component of the network's adjacency matrix and N is the number of nodes in the network. The degree reflects the direct influence of this node. (2) Coreness (also called k-shell, KS ) [23] . The k-shell reflects the location of a node, which is regarded as more important than the degree in evaluating its spreading influence. If a node is located in the core part of the network, the influence of the node will be higher than the node that is located in the periphery. Nodes are assigned to k-shell by the following steps: (1) In the first step, all nodes with degree k = 1 are removed, which will cause the reduction of degree value for remaining nodes. The process will continue by successive pruning of nodes until no more nodes with degree k = 1 remain, and then assign all removed nodes to the 1-shell. In this process, for each remaining node, residual degree refers to the number of links connecting to other remaining nodes, and exhausted degree denotes the number of links connecting to removed nodes. (2) In the second step, all remaining nodes with degree k = 2 will be removed, then the process will be iteratively updated until the residual degree of all remaining nodes is larger than 2, the k-shell of removed nodes in the second step is equal to 2. (3) The process of decomposition will continue until all nodes in the network are removed. The k-shell of each node corresponds to its shell layer. (3) Closeness [18] . The closeness is defined as the inverse of the mean geodesic distances form a node to all other nodes. is the number of nodes in the network and d i j denotes the length of shortest path between node i and node j. Obviously, the larger the closeness is, the more central the node is. (4) Betweenness [19] . The betweenness measures the number of times that a node acts as a bridge along the shortest path between the other two nodes. It is defined as Illustration of top-3 nodes ranked by the risk-aware metric for different parameter θ in ca-Netscience network. In each inset, we display the identified target node (blue node) and its neighbors (yellow node) extracted from the original network as well as the link between them. The number in node denotes degree in the original network and the size of node shape also denotes the degree (note that the links of neighbor nodes do not show entirely in each inset). The number on the upper left and upper right corner respectively suggest the node label and RA score. By observing the local structure of each identified node, it is easier to understand the concept of the risk-aware metric. of shortest paths between node j and node k and σ jk|i denotes the number of path which pass through node i among all shortest paths between node j and node k. N is the number of nodes in the network. (5) Eigenvector [20] . The eigenvector centrality considers not only the number of immediate neighbors but also the influence of each neighbor. The eigenvector centrality of node i is denoted by x i , x i = 1 λ N j=1 a i j x j where λ and a i j is respectively the largest eigenvalue and a component of adjacency matrix A, and x j denotes the eigenvector centrality of node j, which could be described by the matrix form as The eigenvector is widely used to measure the influence of nodes. (6) Subgraph [22] . The subgraph centrality is defined as a weighted sum of the number of all closed walks starting and ending at the node i. The subgraph centrality of node i is defined as ii represents the number of closed walks with length k starting and ending at node i, which is defined as the i the diagonal entry of k the power of adjacency matrix A. The Closed walks with shorter lengths have more influence on the centrality than longer closed walks in the subgraph centrality. (7) Katz [21] . The Katz centrality of nodes is defined by considering all different length walks. It holds that a shorter walk plays a more important role than a long walk. The specific formula is is a tunable parameter and s k denotes the weight of a walk with length k. For the power method to converge, the value of the attenuation factor s has to be set such that it is smaller than the reciprocal of the absolute value of the largest eigenvalue of A. (8) Collective influence (CI) [10] . Collective influence pursues the goal of maximizing the overall influence of multiple spreaders. It could give a minimal set of spreaders for the objective. The CI is an adaptive algorithms which removes the nodes progressively according to current CI value, defined as CI is the ball of radius ℓ centered on node i, and ∂B(i, ℓ) is the frontier of the ball, that is, the set of nodes with shortest path length ℓ from the node i. The ℓ is a non-negative integer which does not exceed the network diameter. (9) Non-backtracking (NB) [35, 36] . The nonbacktracking centrality mainly considers the local effect of eigenvector centrality, because a hub node with a higher eigenvector centrality distributes the centrality to its neighbors, and then back it again and inflate the hub's centrality. The nonbacktracking centrality prevents the reflection and excludes self effect in summation over neighbors. It can be calculated by the nonbacktracking matrix B (the nonbacktracking matric is converted by the adjacency matrix A, see the reference [37, 36] ). The nonbacktracking centrality x j of node j is defined to be the sum of centralities over the neighbors of j, x j = i A i j v i→ j where the v i→ j is the element of leading eigenvector of the nonbacktracking matrix B and give the centrality of node i ignoring any contribution from j. In the simulation experiment, the degree, ks, closeness, betweenness, eigenvector, subgraph, and Katz centrality are implemented by the networkx package in Python. We implement the CI and NB centrality based on the original definition of metrics. In the collective influence centrality, we set the radius ℓ = 3, because ℓ needs to be set smaller than the diameter of the network (the smallest diameter among disparate networks in this paper is 5, see the Table 1 in Appendix B). To examine the performance of methods, we employ the Kendall rank correlation coefficient to estimate the ability of centrality metrics to identify the effective spreaders. In addition, we also use the average of effective spreading coverage to test the performance of methods for identifying top n effective spreaders. To obtain a comprehensive understanding of method performance, we devise the normalized score to summarize the performance of each method in all networks employed in this paper. (1) Kendall rank correlation coefficient (τ) [38] . It is also called as Kendall's τ coefficient used to assess statistical associations based on the ranks of the data. The τ test is a non-parametric hypothesis test for statistical dependence based on the τ coefficient. For any pair of observations (x i , y i ) and (x j , y j ), they are said to be concordant where N c is the number of concordant pairs and N d is the number of discordant pairs. Here, we use the Kendall rank correlation to investigate how the ranking based on centralities is correlated to the ranking generated by effective spreading coverage. According to the definition of Kendall rank correlation, −1 ≤ τ ≤ 1. The Kendall's τ coefficient will be 1 if the agreement between centralities and effective spreading is perfect, which means that the employed centrality metrics could well identify the effective spreader. (2) Average of effective spreading coverage ( s n ). To systematically estimate the performance of method to identify the effective spreaders under various risk, we average the effective spreading coverage s over various λ (λ ∈ [0, 0.9] with a step of 0.1). When dealing with actual problems, we might only need to identify high-ranking effective spreaders rather than all. To estimate the performance of method in identifying high-ranking effective spreaders, we thus average the effective spreading coverage over top n effective spreaders. The formula could be seen in the Eqs.11, where σ(top n ) denotes the set of nodes whose centrality score is ranked in top n (e.g. n=1,10,20),s i (λ) means the effective spreading coverage when risk parameter is set as λ. (3) Normalized score (NS ). It is designed to summarize the performance of metrics in all networks, further having a comprehensive understanding for different methods about overall performance. We normalize the performance of metrics in each networks such that all metrics's performance range in [0, 1], and then average the normalized performance across networks. The normalized score is defined in the Eqs.12, where e represents the evaluation metrics (e.g. Kendall's τ, s n ), γ(n) and γ(c) are respectively the set of networks and centrality metrics. c i min (e) denotes the value of the worst-performing metrics among all centralities in i network according to the e evaluation metrics. Inversely, c i max (e) denotes the value of the best-performing metrics among all centralities in i network according to the e evaluation metrics. Similarly, c i m (e) is the value of the m metric in i network according to the e evaluation metrics. |γ(n)| is the number of networks in the datasets. Based on NS m (e), we could give a normalized score for different methods according to a given estimation metrics, which quantifies overall performance in all networks. NS m (e) ∈ [0, 1]. For Kendall's τ and s n , the larger the normalized score is, the better centrality metrics perform in all networks. To confirm the correctness of analytic result on random networks and validate the risk-aware method, we respectively conduct experiments on the Erdos-Renyi network (ER) and 40 real networks. The size of these networks range from 34 to 4991, and their average degree varies between 2.04 and 82.42. We consider 40 networks of small to medium size from different systems. Specifically, these networks include 6 biology networks (bio-Yeast [39] , bio-Celegans, bio-Grid-Plant, bio-Grid-Worm, Protein [40] , Metabolic [41] ), 4 collaboration networks (ca-Erdos992, ca-GrQc, ca-Netscience [42] , ca-CSphd), 4 animal networks (ani-Dolphins [43] , ani-Mammalia, ani-Aves-Songbird, ani-Reptilia), 4 email networks (email-Dnc, email-Corecipient, email-Enron-Only, email-Univ), 4 infrastructure networks (inf-Power [44] ,inf-Euroroad [45] ,inf-Usair97, inf-Openflights), 4 facebook networks (socfb-Calrech36, socfb-Haverford76, socfb-Reed98, socfb-Simmons81), 3 ecology networks (econ-Mahindas, econ-Wml, econ-Poli), 3 human social networks (hs-Arenas-Jazz [46] , hs-Physical [47] , hs-Zachary [48] ), 3 interaction networks (ia-Crime-Moreno, ia-Fb-Messages, ia-Infect-Dublin), 2 retweet networks (rt-Twitter-Copen, rt-Retweet), 1 brain network (bn-Mouse-Kasthuri), 1 web network (web-EPA), and 1 social network (soc-Karate). The networks with unlabeled reference are download from the network repository [49] . Details about analyzed networks can be found in Appendix B. Taking the ER network as an example, we verify the degree of the optimal spreaders to the maximum effective spreading coverage. The degree distribution of the ER network is Poisson for larger N where N is the total number of nodes in the network. The mean degree of the ER network is k = N p c where p c refers to the probability of edge creation. The critical infection rate is β c = = 1 N p c because k 2 = k + k 2 on ER network. Substituting the β c and k into the Eqs.6, we obtain the equation Given an ER network with N and p c , we find that k * is determined by λ and β. In Fig. 3 (a), we show the optimal degree plotted as a function of λ and β. One could see clearly that k * is inversely proportional to λ and has a positive relation with β. The result reveals an important finding that there is an optimal initial spreader to maximize the effective spreading for any pair of parameters λ and β. Once the risk is considered into the problem, the most effective spreader does not correspond to the largest-degree node in networks but be determined by λ and β. Meanwhile, we also marked the parameter region where k * > 0 in Fig.3 (b) , since the degree value of nodes in the connected network is greater than 0. When we take the pair of parameters located in the region where k * ≤ 0, the optimal degree value of nodes would be 1. In Fig 3 (c) and (d), we show the effective spreading coverages for several pair of parameters, which is obtained from the exact numerical simulation of SIR model on ER networks (see the green and yellow stripe in the Fig.3 (b) ). Simulations are performed on the network of N = 1000 with p c = 0.01. For each pair of parameter λ and β, we simulate the spreading triggered from a single node in the network and conduct 1000 experiments for each node. Then we calculate the effective spreading coverages by averaging over nodes with the same degree. The simulation results show two important findings analyzed in the previous section. First, k * corresponding to the maximum effective spreading in the data agrees well with our analytic results (the orange dashed line). Also, the changing trend of k * in the simulation for different pairs of parameters consistent with the analytic result, confirming the correctness of degree of the optimal initial spreaders. The small disagreement between simulations and analytic results for k * appears to be a finite size effect due to the relatively small network size in the simulation. Second, one could see that k * increases with β when fixing λ, suggesting that it is still a better choice to target a high-degree node as initial spreaders if the infection rate is larger even if there is risk in node activation. On the contrary, with a given β, k * decreases with λ, indicating that one should choose a conservative seed policy when the risk difference for nodes with various degrees is rather larger, e.g. selecting a small-degree node as an initial spreader. For different methods, we could generate the final ranking of nodes. In principle, the ranking generated by a benchmark centrality metric with good performance should be as consistent as possible with the ranking based on the node's effective spreading coverages. Here, we use the Kendall rank correlation (τ) to measure the performance of different methods. Due to the parameter θ incorporated into risk-aware metric, we firstly study how θ affects the performance of RA under different λ. In the Fig.4 (a) , we show the τ value of RA(θ) for diverse risk parameter λ on ca-Netscience network. For any λ, there is an optimal parameter θ * to maximize the τ under the current resolution of θ with the steps of 0.5. We find that the θ * increases with the λ, suggesting that RA with larger θ performs better in this case where the activation risk of nodes with a large degree is far higher than the small degree. This is because potential influential nodes connected to a few high-degree nodes could be given a higher centrality value by RA with larger θ, which maintains a higher consistency order with the effective spreading coverage of nodes when the λ is larger. Although the θ * varies with λ within the range from 0 to 0.9, we could fixe a parameter to make RA achieve the higher τ as far as possible under different λ. When θ is set as 2.5, the risk-aware metric performs relatively well under different λ because the stand deviation of RA(θ = 2.5) is the lowest S τ (θ) = 0.9 λ=0 (τ λ (θ)− τ(θ) ) 2 9 . In this way, we further compare the RA(θ = 2.5) with other baseline methods under different λ in the Fig.4 (b) . The τ of RA(θ = 2.5) is lower than the Subgraph, Katz, Degree, and K-shell with a smaller λ, but RA(θ = 2.5) remarkably outperforms others with the increase of λ, indicating that our method performs more accurate than other methods in ranking the effective spreading of nodes. Besides, the τ of PI 1 and PI 2 is lower than RA(θ = 2.5) when λ < 0.6, because they penalize high-degree node stronger than RA. This could be used to explain why τ of PI 1 and PI 2 is higher than RA for a larger λ. Some statistical significance tests are made to verify the Kendall rank correlation between centralities value and effective spreading of nodes (see the Table 2 in Appendix D). In fact, we cannot exactly determine the value of λ for the practical problem. In order to systematically study the performance of RA(θ = 2.5), we calculate the τ by averaging all τ over different λ we consider, τ = 0.9 λ=0 τ(λ)/10, which could quantify the performance of different methods to identify the effective spreader in distinct conditions. Therefore, we further compare RA(2.5) with other methods under different infection rate β in the Fig.4 (c) . By visual observation, although the τ of RA(θ = 2.5) for a larger β is the same as subgraph benchmark centrality, the K-S test confirms that the Kendall rank correlation distribution under various conditions is significantly different (see the Table 4 in Appendix D). The result shows that RA(θ = 2.5) outperforms most baseline methods when the infection rate β is larger. Meanwhile, the standard deviation of τ for RA (2.5) is rather low compared with other methods (see the error bar in Fig.4 (c) ), further revealing that our method is robust under different conditions. Moreover, our method has a huge advantage over global centrality metrics because the RA associated with every node is computed by considering their nearest neighbors. Finally, we investigate how λ and θ together affect the value of τ in Fig.4 (d) . The black dashed line shows the optimal λ corresponding to the maximum τ varies with the increase of θ, suggesting that RA have a better performance on larger λ when θ gradually increases. Similarly, the grey dashed line denotes the optimal θ corresponding to the maximum τ varies with λ, meaning that a larger θ should be selected to identify the effective spreaders when λ gradually increases. The two dashed lines together reveal that there is a positive correlation between λ and θ. For the higher difference of activation risk, RA with a larger θ might perform better on identifying the effective spreaders. The test of Kendall rank correlation between RA and effective spreading confirms that the correlation for most pair of parameters (θ and λ) is significant and the result could be accepted (see the Table 3 in Appendix D). To validate the effectiveness of RA, we compare the RA with other baseline methods on 40 disparate real networks according to the average of Kendall rank correlation τ , standard deviation of Kendall rank correlation S τ and average of effective spreading coverage s n . Here, we employ the NS to summarize the overall performance of different methods such that one gets a comprehensive understanding of the metrics' performance. The θ * is determined in each network by the lowest standard deviation S τ (θ) instead of the largest τ , so the RA(θ * ) cannot guarantee the best performance of RA among all parameters, which also means that its performance is more robust than other parameters under different λ. In Fig.5 (a) , we show the NS of τ for different methods. The overall performance of RA(θ * ) and RA(θ = 2.5) are better than other methods in 40 real networks (The normalized value of τ for different methods in each network are provided in Appendix E). Since the θ * is a tunable parameter and varies with the actual network, it is not competitive compared with other methods. Except for the RA( * ), RA(θ = 2.5) has the best overall performance among all methods. Although the NS of Subgraph/k is very close to the RA(θ = 2.5), it considers global structural information. The PI 1 and PI 2 underperform than RA(θ = 2.5) although they are proposed with the same idea. The possible reason is that the extent to penalize the high degree node could be controlled by parameter θ in RA. Therefore, the RA with θ = 2.5 is a good metric to identify an effective spreader. Besides, the NS of the standard deviation of τ for various methods in 40 networks is shown in Fig.5 (b) (The normalized value of the standard deviation of τ for different methods in each network could be seen in Appendix E). For the NS of S τ , the smaller the NS is, the smaller the standard deviation of τ. The Eigenvector/k has the smallest volatility among all methods under different λ. For the RA(θ = 2.5), it could keep relative stability under different risk cases although it underperforms than the Eigenvector/k. Finally, the performance of RA are discussed further according to the s n . Here, we identify the effective spreaders ranked in the top n=1, 10, and 20 by different methods and calculate the s n . The NS of s n for different methods is shown in Fig.5 (c). The NS of RA(θ * ) and RA(2.5) for identifying the top 1, 10, 20 nodes are higher than other baselines methods. The overall performance of RA(2.5) in 40 networks is better than other methods except for RA(θ * ), which again confirms that RA(2.5) is a good predictor for identifying effective spreader. As we all know, a product promoted by a celebrity on a social network is rapidly spread to millions of users, while a similar product posted by a less connected individual cannot spread to many users. One of the most important factors determining the fate of the spreading process is where the initial spreader is located in the social network with a given connectivity pattern. So far, many methods have been proposed to identify the influential spreaders by utilizing purely the node topology features. However, when dealing with the real application of influence maximization, most of the existing studies have ignored the fact that it is more costly and difficult to convince influence nodes to act as initial spreaders, resulting in higher risk in maximizing the spreading. Therefore, we consider the real factors and introduce the activation risk of initial spreaders into the problem. In this paper, we assume that the probability of nodes to act as initial spreaders depend on their degree, and the large-degree nodes associate with lower activation probability than the small-degree nodes. For simplicity, we take the exponential decay function to map the degree of the node into the activated probability and introduce a risk parameter λ to determine the difference of activation risk over various nodes. Through the theoretical result obtained from the percolation model on random networks, we find that the degree of the optimal initial spreader depends on the λ and infection rate β rather than the largest degree of nodes in the network. Meanwhile, we confirm the finding by numerical simulation on the ER network. In a real-world network, we analyze that some existing centralities are correlated with degree. It might not enough to identify the effective spreaders by simply discounting for the degree in existing centralities. Thus, the risk-aware metric is proposed to identify effective spreaders. Experimental results about the normalized score of Kendall rank correlation τ and the average of effective spreading coverage s n on 40 disparate real networks show that our method outperforms some existing benchmark centralities. In actual problems, it is difficult to quantify the activation risk of influencers in marketing. The possibility to activate influencers depends on many factors, such as cost, brand awareness, and high-quality content. Among all factors, the cost of the influencer can be regarded as the main factor for successfully working with the influencer. Therefore, activation risk is very relevant to the cost of influencers. Due to the fact that the cost of influencers is an unsolved empirical problem, we introduce the activation risk to characterize the problem so that it fails to lose the generality, and assume that large-degree nodes tend to be activated with a lower probability. In a certain extent, the degree-decaying effect in effective spreading could be interpreted as higher cost. In addition, we employ the exponential decay function to describe the negative relation between the degree of node and activation risk because of analytic tractability and reasonable analytic results that agree with the intuition in reality. In fact, the conclusion obtained from results relies on the specific form of the activation function, which is proved in the Appendix F. Although the analysis result is not robust against the form of activation function, the study still reveals that many existing centralities might not be enough to identify the effective spreaders once we consider the reality factors in node activation. For the practical problem, our findings suggest it is critical to propose new methods to identify effective spreaders that have a strong spreading ability but low degree because it could help us to design advertising and immunization strategy at a lower cost. The risk-aware metric can not only identify the effective spreaders but also be used to evaluate the potential importance of a node in the network. Meanwhile, it may also have additional "risk" to identify the most influential spreaders because it does not guarantee the outbreak size of detected nodes could achieve the maximization. We believe that this paper proposes a general research problem and many related issues could be studied in the near future. For example, different functional dependencies of effective spreading on the degree could be considered in the follow-up studies. One could design the effective spreading coverage on the basis of the middle-status conformity theory [50] (i.e. individuals who are most likely to adopt an innovation or be susceptible to social contagion are those people in the middle strata of social status). The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The mean size of the outbreak initiated from a randomly chosen node has been given by the bond percolation model and generation function [32] . Here, we wish to get the mean outbreak size of the disease s k triggered from the single node with the degree k on a random network. The ultimate size of the outbreak starting with a single infective node would be precisely the size of the cluster of nodes that can be reached from the initial node. In fact, the SIR model is equivalent to a bond percolation with bond occupation probability T . We employ the percolation model and generation function to give the exact mean size of the outbreak initiated from the single node with the degree k. Firstly, we need to define some generation functions because it could generate the probability distribution and easily work than probability distribution itself (The crucial properties of generation function could see the work [51] ). For instance, a generating function of degree distribution is as follow, the mean degree k of the node in the network is given by If we follow an edge to the node at one of its ends, the probability of the reached nodes with degree k is q k = kp k k . In general, we will concern with the number of ways of leaving such a node excluding the edge we arrived along, which is the degree minus 1. The distribution of degrees of the nodes reached by following a randomly chosen edge is generated by For a node with degree k, the probability of node having exactly m edges occupied from the k edges follows the binomial distribution k m T m (1 − T ) k−m , hence the probability distribution of occupied edges for a node with degree k is generated by Eqs.17, Likewise, the probability distribution of occupied edges leaving the node arrived by following a randomly chosen edge is generated by Eqs.18 We define the ρ s (T ) as the distribution of cluster size of nodes reached by following a randomly chosen edge. Let H 1 (x, T ) be the generating function for this distribution as is shown in the Eqs. 19 , The H 1 can be broken down into an additive set of contributions as follows. We follow an edge to reach the cluster, which might be consisted by the following two parts: (1) a single node with no occupated edges connected to it other than the one along which we passed to reach it; (2) a single node with any number m (m > 1) of occupated edge attached to it excluding the one along which we have reached it. Each occupated edge leading to another cluster whose size distribution is also generated by the H 1 . The chance that a finite cluster containing a closed loop of edges goes as N −1 , and is zero in the limit of N → ∞. Using these results, the H 1 (x, T ) can be expressed in a Dyson-equation-like self-consistent form by Eqs.20, The self-consistent process mentioned-above can be a better understanding by the following analysis. By analogy with the preceding part, then we represent the p k s (T ) as the distribution of the size of cluster reachable from a starting node with the degree k. We also give the generating function for this distribution in the Eqs.21. The p k s (T ) can be expressed by the P(s − 1|k), which means the probability of cluster size s − 1 reached from the starting node with degree k, other than the starting node. The size of cluster s can be broken down into different contributions from the m occupied edges for a node with a degree k, which is described in the second row of Eqs.21. The δ is the Dirac delta function. If s = m r=1 j r , then δ = 1, otherwise δ = 0. The δ(s, m r=1 j r ) aims to hold that the sum of clustered size reached from the occupied edge is the same as s. The ρ j r refers to the probability of cluster size j r of nodes reached by following a randomly chosen edge. By simplifying the equation, we obtain the form h k Then, we make full use of the important properties of generating function. The mean of the probability distribution is given by the first derivative of the generating function, evaluated at 1. Using the Eqs.21, we obtained the mean outbreak size of disease initiated from the node with degree k by differentiating for x. At x = 1, we have H 1 (x, T ) )) k−1 T H ′ By differentiating the Eqs.20, we have By simplifying the Eqs. 23 , Due to the fact that the generating functions are 1 at x = 1 if the distributions generated by generating functions are normalized, hence H 1 (1, T ) T (1 − x) ). Thus, we have Substuting the Eqs.25, H 1 (1, T ) = 1 and G 1 (1, T ) = 1 into the Eqs.22, we obtain the exact value of mean outbreak size of disease triggered from the node with degree k, We take the derivative with respect to G 1 (x), it would be G We get the mean outbreak size of disease triggered from the node of degree k in closed form when T c < k k 2 − k . The risk-aware metric does not aim at specific datasets, so we examine the performance of our method on 40 datasets from different domains. Most of the datasets are downloaded from the network repository 1 , other datasets are downloaded from the website 2 . In the network repository, we randomly select 3 to 5 networks from different categories to form the corpus. We consider the largest connected component in each original network and analyze the statistical characteristic of networks. Detailed information see the Table 1 . The effective spreading s k is defined as s k * p k where the activation risk p k is quantified by the degree-decay function. In this way, some existing centrality metrics might underperform because they are correlated with the degree. To confirm the guess, we analyze Kendall rank correlation between degree and other centrality metrics. In fact, the correlation between two metrics depends on the network structure and varies with real networks. Here, we use two distinct ways to analyze the correlation in order to obtain a relative objective and comprehensive result on 40 networks. On one hand, we average the correlation between any two centrality metrics over 40 networks, which might have some bias due to the existence of extreme value. On the other hand, we count the ratio of the network in which Kendall rank correlation between two centralities is higher than a threshold (threshold = 0.5). If the results obtained from different method show the same phenomenon, a general conclusion could be drawn. The Kendall rank correlation between any two centrality metrics is analyzed. The results in Fig.6 (a)(c) show that centrality metrics could be roughly classified into three groups. The first group contains betweenness, Katz, subgraph, k-shell, and CI. The Kendall rank correlation between degree and them are very strong. The second group includes closeness, eigenvector, and NB. There is a weak correlation between them and degree. The third group includes PI 1, PI 2, RA(2.5), and RA( * ), they are no correlated with a degree. Besides, the results show that centrality metrics within each group are correlated with each other, further confirming the reasonability of classification. Table 1 . Structural properities on real networks. Structural properities include the number of nodes in the network (N), average degree ( k ), second order moment of degree( k 2 ), maximum degree (k max ), network diameter (d), assortativity coefficient (r) and critical infection rate (β c ). correlation analysis, we verify that it is not competitive to employ existing metrics as baseline methods to compare with the RA method, because the activation probability in effective spreading has already considered the degree-decay effect and there is a strong correlation between degree and centralities in existing metrics, which naturally weakens the performance of existing metrics. To eliminate the degree-decay effect, we calculate the ratio between centralities and degree (e.g. Katz score/degree, betweenness score/degree) as benchmark centralities. In Fig.6 (b)(d) , the results show that there is no correlation between most benchmark centralities and degree. As for the benchmark centrality of closeness, Katz, and k-shell, they have a negative correlation with the degree, which suggests that making a comparison between them and RA is more competitive when λ is very large. As a result, it is relatively fair to compare RA with other benchmark centralities by the effective spreading as a target function. Some rigorous statistical tests are provided to validate the result in the main text. We firstly make the significance tests of Kendall rank correlation between different methods and effective spreading coverages. For various λ, the pvalue for Kendall rank correlation coefficient is shown in Table 2 . The result corresponds to Fig.4 (b) . When λ = 0.5 and 0.6, the Kendall rank correlation is not significant for some baseline methods, so the null hypothesis is supported, which suggests that there is no correlation between methods (BTN/k, CLO/k, Katz/k, KS/k, Degree) and effective spreading. In most cases, the baseline methods are correlated to effective spreading. Besides, we also test the Kendall rank correlation between RA and effective spreading under different pair of parameters (λ and β) in Table 3 , which corresponds to Fig.4 (d) . For most pairs of parameters, the p-value is lower than 0.05, which means the correlation between RA and effective spreading coverage could be accepted. But for larger λ and smaller θ, or larger θ and smaller λ, there is no correlation between RA and effective spreading coverage. For the Fig.4 (c) , some points among different methods might overlap due to the visual observation, we thus employ the Kolmogorov-Smirnov test (K-S test) to measure the difference of Kendall rank correlation distribution between RA and other baseline methods under various λ, further verify that performance of our method is distinct with others. The K-S test is one of the most useful nonparametric methods to quantify a distance between the empirical distribution function of two samples. For a given infection rate β, two samples in the K-S test are respectively from Kendall rank correlation of both baseline method and RA under different conditions. The p-value of the K-S test under different infection rates β is shown in Table 4 . One could see that the p-value of the K-S test is equal to 0 between RA and any baseline methods, suggesting that the distribution of Kendall correlation of RA is statistically significantly different with other baseline methods. 20 According to different evaluation metrics, we normalize the performance of different methods on each network, further obtaining the overall performance on all networks. The normalized value of Kendall rank correlation between benchmark centralities and effective spreading could be seen in Table 5 . Besides, we also show the normalized value of the standard deviation of Kendall rank correaltion between centralities and effective spreading coverage in Table 6 . In defined problem, the choice of activation function is important to analytic tractability, and the optimal initial spreaders about the problem also depends on the slection of activation function. To provide evidence to support the claim, we choose the 1 k γ as activation function to make a further analysis. p k = 1 k γ , γ is a parameter to control the risk difference among nodes with different degree. Firstly, we substitute 1 k γ into the s k = p k * s k , see the Eqs.27. Then, we derive analytic solution by setting ∂ s k (1) When −1 ≤ γ < 0, k * is less than 0 and is the minimal point of s k , which suggests that the degree of the optimal initial spreaders in the problem should be the largest degree among all nodes in the network (see the Fig.7 (a) ). (2) When γ = 0, then s k = 1 + kβ 1− β βc , the problem degrenerates into the original problem (see the Fig.7 (b) ) and the degree of the optimal initial spreaders is the largest degree among all nodes in the network. (3) When 0 < γ < 1, k * is greater than 0 and corresponds to the minimal point of s k (see the Fig.7 (c) ). The degree of the optimal initial spreaders in the problem is difficult to be determined. By calculating partial derivatives for γ, ∂k * ∂γ = ( 1 β − 1 β c )( 1 1−γ ) 2 > 0, we find that k * increases as γ, which suggests that the minimal point of s k tends to be large as the increase of γ, further inferring that the degree of the optimal initial spreaders should be the largest degree among all nodes when γ is close to 0 and the smallest degree among all nodes when γ is close to 1. (4) When γ = 1, s k = k −1 + ββ c β c −β (see the Fig.7 (d) ), which suggests the degree of the optimal initial spreaders should be the smallest degree among all nodes in the network. In summary, the degree of the optimal initial spreaders to maximize the effective spreading s k corresponds to the largest degree among all nodes in network when γ < γ c , and corresponds to the smallest degree among all nodes in network when γ > γ c (γ c is a threshold). The results here are qualitatively similar to the exponential decay function, namely the degree of the optimal initial spreaders have a negative relation with γ. We conduct the experiment to test the performance of risk-aware metric according to the activation function ( 1 k γ ). γ is set from 0 to 1 with a step of 0.1. The setting of γ is the same as the risk parameter λ. The experimental result is shown in Fig.8 . One could see that the performance of RA(θ = 2.5) for τ , S τ and s is poorer than other baseline methods. The RA(θ * ) is used to make a comparison, it lacks an advantage. The possible reason behind the results is that the optimal initial spreaders for most of γ in interval γ ∈ [0, 1] favor the largest-degree nodes in the network, and the optimal initial spreaders for less γ favor the smallest-degree nodes. In other words, the degree of the optimal spreaders is not continuous when we consider 1 k γ as an activation function, which could be confirmed by the simulation result. In the Eqs.27, the effective spreading s k = k −γ + k 1−γ q, q = ββ c β c −β . When q is given, the s k plotted as a function of k for different γ could be seen in the Fig.9 (a). One could clearly observe the change of effective spreading as the increase of γ. In Fig.9 (b) , the degree of the optimal initial spreaders for various γ shows the discontinuous transition. The condition where the degree of the optimal spreaders is in the intermediate degree does not exist, which is different from the analytical result of exponential decay activation. When we select 1 k γ as an activation function, the largest effective spreading coverage among all nodes does not correspond to the nodes linked to many hubs but the largest-degree node or smallest-degree node in the real networks. This could explain why the RA has poorer performance than other metrics, and degree and subgraph benchmark centrality have better performance. Through the above analysis, the inversely proportional function might not be a good form as activation function because it is hard to analyze the degree of the optimal initial spreaders and there is no exact analytical solution for the optimal degree value in the defined problem. Intuitively, the optimal initial spreaders obtained from the 1 k γ is not agreed well with the real condition, although it could characterize the negative relation between the degree and Networks BTN/k CLO/k EIG/k NB/k Katz/k SG/k KS/k CI (3) Table 5 . Normalized value of Kendall rank correlation between methods and effective spreading in all networks. The name of methods in the table is the same as the Table. 2. The RA( * ) denotes that θ is determined by the smallest standard deviation of Kendall rank correlation over different λ in each network. The number in bold denotes the method performs well than other methods in the current network. Table 6 . Normalized value of the standard deviation of Kendall rank correlation between methods and effective spreading. The name of methods in the table is the same as the Table. 2. The RA( * ) denotes that θ is determined by the smallest standard deviation of Kendall rank correlation among all parameters θ (θ ∈ [0, 9.5] with a step of 0.5). The number in bold denotes that Kendall rank correlation of the method has the smallest volatility under different λ. activation probability. Therefore, the form of the activation function is important to the quantification of the problem. The conclusion obtained from the result depends on the activation function. Fig. 7 . The effective spreading s k for various γ, s k = k −γ + k 1−γ q, q = ββc βc−β . Here q is set as 0.1. One could clearly see that the change of function form as the increase of γ. The k value corresponding to largest effective spreading coverage on the right side of dashed line is the optimal degree of node in the problem. The optimal initial spreaders to maximize the effective spreading for different γ. Here, we assume that the network size is 100. The spread of behavior in an online social network experiment The spread of innovations in social networks Containment of rumor spread in complex social networks Immunization of complex networks Effects of the network structure on the dynamics of viral marketing Extracting influential nodes for information diffusion on a social network Identifying and interrupting superspreading events-implications for control of severe acute respiratory syndrome coronavirus 2 A survey on influence maximization in a social network Influence maximization on social graphs: A survey Influence maximization in complex networks through optimal percolation Vital nodes identification in complex networks Social influence maximization under empirical influence models Leaders in social networks, the delicious case Identifying influential nodes in complex networks Identifying influential nodes in large-scale directed networks: the role of clustering Role of centrality for the identification of influential spreaders in complex networks Identifying a set of influential spreaders in complex networks The centrality index of a graph Centrality in social networks conceptual clarification Some unique properties of eigenvector centrality Identification of top-k nodes in large networks using katz centrality Identification of influential spreaders in complex networks Systematic comparison between methods for the detection of influential spreaders in complex networks Ranking spreaders by decomposing complex networks The h-index of a network node and its relation to degree and coreness Finding influential nodes in social networks based on neighborhood correlation coefficient, Knowledge-Based Systems Everyone's an influencer: quantifying influence on twitter Climb or jump: status-based seeding in user-generated content networks Epidemics and rumours Epidemic processes in complex networks Spread of epidemic disease on networks Fast influencers in complex networks Leveraging percolation theory to single out influential spreaders in networks Localization and centrality in networks Spectral redemption in clustering sparse networks A new measure of rank correlation Lethality and centrality in protein networks High-quality binary protein interaction map of the yeast interactome network Bigg: a biochemical genetic and genomic knowledgebase of large scale metabolic reconstructions Finding community structure in networks using the eigenvectors of matrices The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations Collective dynamics of small-world networks Graph partitioning and graph clustering Community structure in jazz The diffusion of an innovation among physicians An information flow model for conflict and fission in small groups The network data repository with interactive graph analytics and visualization Van den Bulte, Nonmonotonic status effects in new product adoption Random graphs with arbitrary degree distributions and their applications