entropy-logo

Journal Browser

Journal Browser

Advances in Complex Networks and Their Applications, from COMPLEX NETWORKS 2023

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Complexity".

Deadline for manuscript submissions: closed (30 June 2024) | Viewed by 15826

Special Issue Editor

Special Issue Information

Dear Colleagues,

Since 2012, the International Conference on Complex Networks and Their Applications (COMPLEX NETWORKS) has connected researchers from various scientific communities working in areas related to network science. The twelfth edition of this annual event will be held from 28 to 30 November 2023.

Authors of selected papers from the conference will be invited to submit extended versions of their original papers and contributions under the conference topics. They will reflect the latest problems, advances, and diversity within the network science community. New papers that are closely related to the conference themes are also welcome.

Topics of interest include, but are not limited to, the following:

  • structural network measures
  • community structure
  • link analysis and ranking
  • motif discovery in complex networks
  • network models
  • diffusion and epidemics
  • temporal networks
  • multilayer networks
  • dynamics on/of networks
  • synchronization in networks
  • resilience and robustness of networks
  • controlling networks
  • reputation, influence, and trust
  • mobility
  • networks in finance and economics
  • ecological networks and food webs
  • earth science applications
  • biological networks
  • brain networks
  • urban systems and networks
  • network medicine
  • machine learning and networks

Prof. Dr. Hocine Cherifi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Related Special Issues

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

28 pages, 2389 KiB  
Article
Simulating Weak Attacks in a New Duplication–Divergence Model with Node Loss
by Ruihua Zhang and Gesine Reinert
Entropy 2024, 26(10), 813; https://doi.org/10.3390/e26100813 - 25 Sep 2024
Viewed by 500
Abstract
A better understanding of protein–protein interaction (PPI) networks representing physical interactions between proteins could be beneficial for evolutionary insights as well as for practical applications such as drug development. As a statistical model for PPI networks, duplication–divergence models have been proposed, but they [...] Read more.
A better understanding of protein–protein interaction (PPI) networks representing physical interactions between proteins could be beneficial for evolutionary insights as well as for practical applications such as drug development. As a statistical model for PPI networks, duplication–divergence models have been proposed, but they suffer from resulting in either very sparse networks in which most of the proteins are isolated, or in networks which are much denser than what is usually observed, having almost no isolated proteins. Moreover, in real networks, where a gene codes a protein, gene loss may occur. The loss of nodes has not been captured in duplication–divergence models to date. Here, we introduce a new duplication–divergence model which includes node loss. This mechanism results in networks in which the proportion of isolated proteins can take on values which are strictly between 0 and 1. To understand this new model, we apply strong and weak attacks to networks from duplication–divergence models with and without node loss, and compare the results to those obtained when carrying out similar attacks on two real PPI networks of E. coli and of S. cerevisiae. We find that the new model more closely reflects the damage caused by strong and weak attacks found in the PPI networks. Full article
Show Figures

Figure 1

21 pages, 1994 KiB  
Article
Dynamic Contact Networks in Confined Spaces: Synthesizing Micro-Level Encounter Patterns through Human Mobility Models from Real-World Data
by Diaoulé Diallo, Jurij Schönfeld, Tessa F. Blanken and Tobias Hecking
Entropy 2024, 26(8), 703; https://doi.org/10.3390/e26080703 - 19 Aug 2024
Viewed by 961
Abstract
This study advances the field of infectious disease forecasting by introducing a novel approach to micro-level contact modeling, leveraging human movement patterns to generate realistic temporal-dynamic networks. Through the incorporation of human mobility models and parameter tuning, this research presents an innovative method [...] Read more.
This study advances the field of infectious disease forecasting by introducing a novel approach to micro-level contact modeling, leveraging human movement patterns to generate realistic temporal-dynamic networks. Through the incorporation of human mobility models and parameter tuning, this research presents an innovative method for simulating micro-level encounters that closely mirror infection dynamics within confined spaces. Central to our methodology is the application of Bayesian optimization for parameter selection, which refines our models to emulate both the properties of real-world infection curves and the characteristics of network properties. Typically, large-scale epidemiological simulations overlook the specifics of human mobility within confined spaces or rely on overly simplistic models. By focusing on the distinct aspects of infection propagation within specific locations, our approach strengthens the realism of such pandemic simulations. The resulting models shed light on the role of spatial encounters in disease spread and improve the capability to forecast and respond to infectious disease outbreaks. This work not only contributes to the scientific understanding of micro-level transmission patterns but also offers a new perspective on temporal network generation for epidemiological modeling. Full article
Show Figures

Figure 1

19 pages, 6004 KiB  
Article
An Evaluation Model for Node Influence Based on Heuristic Spatiotemporal Features
by Sheng Jin, Yuzhi Xiao, Jiaxin Han and Tao Huang
Entropy 2024, 26(8), 676; https://doi.org/10.3390/e26080676 - 10 Aug 2024
Viewed by 943
Abstract
The accurate assessment of node influence is of vital significance for enhancing system stability. Given the structural redundancy problem triggered by the network topology deviation when an empirical network is copied, as well as the dynamic characteristics of the empirical network itself, it [...] Read more.
The accurate assessment of node influence is of vital significance for enhancing system stability. Given the structural redundancy problem triggered by the network topology deviation when an empirical network is copied, as well as the dynamic characteristics of the empirical network itself, it is difficult for traditional static assessment methods to effectively capture the dynamic evolution of node influence. Therefore, we propose a heuristic-based spatiotemporal feature node influence assessment model (HEIST). First, the zero-model method is applied to optimize the network-copying process and reduce the noise interference caused by network structure redundancy. Second, the copied network is divided into subnets, and feature modeling is performed to enhance the node influence differentiation. Third, node influence is quantified based on the spatiotemporal depth-perception module, which has a built-in local and global two-layer structure. At the local level, a graph convolutional neural network (GCN) is used to improve the spatial perception of node influence; it fuses the feature changes of the nodes in the subnetwork variation, combining this method with a long- and short-term memory network (LSTM) to enhance its ability to capture the depth evolution of node influence and improve the robustness of the assessment. Finally, a heuristic assessment algorithm is used to jointly optimize the influence strength of the nodes at different stages and quantify the node influence via a nonlinear optimization function. The experiments show that the Kendall coefficients exceed 90% in multiple datasets, proving that the model has good generalization performance in empirical networks. Full article
Show Figures

Figure 1

18 pages, 8430 KiB  
Article
Non-Coding RNAs Extended Omnigenic Module of Cancers
by Jie Li, Bingbo Wang and Xiujuan Ma
Entropy 2024, 26(8), 640; https://doi.org/10.3390/e26080640 - 27 Jul 2024
Viewed by 876
Abstract
The emergence of cancers involves numerous coding and non-coding genes. Understanding the contribution of non-coding RNAs (ncRNAs) to the cancer neighborhood is crucial for interpreting the interaction between molecular markers of cancer. However, there is a lack of systematic studies on the involvement [...] Read more.
The emergence of cancers involves numerous coding and non-coding genes. Understanding the contribution of non-coding RNAs (ncRNAs) to the cancer neighborhood is crucial for interpreting the interaction between molecular markers of cancer. However, there is a lack of systematic studies on the involvement of ncRNAs in the cancer neighborhood. In this paper, we construct an interaction network which encompasses multiple genes. We focus on the fundamental topological indicator, namely connectivity, and evaluate its performance when applied to cancer-affected genes using statistical indices. Our findings reveal that ncRNAs significantly enhance the connectivity of affected genes and mediate the inclusion of more genes in the cancer module. To further explore the role of ncRNAs in the network, we propose a connectivity-based method which leverages the bridging function of ncRNAs across cancer-affected genes and reveals the non-coding RNAs extended omnigenic module (NeOModule). Topologically, this module promotes the formation of cancer patterns involving ncRNAs. Biologically, it is enriched with cancer pathways and treatment targets, providing valuable insights into disease relationships. Full article
Show Figures

Figure 1

19 pages, 601 KiB  
Article
Multilingual Hate Speech Detection: A Semi-Supervised Generative Adversarial Approach
by Khouloud Mnassri, Reza Farahbakhsh and Noel Crespi
Entropy 2024, 26(4), 344; https://doi.org/10.3390/e26040344 - 18 Apr 2024
Cited by 1 | Viewed by 3127
Abstract
Social media platforms have surpassed cultural and linguistic boundaries, thus enabling online communication worldwide. However, the expanded use of various languages has intensified the challenge of online detection of hate speech content. Despite the release of multiple Natural Language Processing (NLP) solutions implementing [...] Read more.
Social media platforms have surpassed cultural and linguistic boundaries, thus enabling online communication worldwide. However, the expanded use of various languages has intensified the challenge of online detection of hate speech content. Despite the release of multiple Natural Language Processing (NLP) solutions implementing cutting-edge machine learning techniques, the scarcity of data, especially labeled data, remains a considerable obstacle, which further requires the use of semisupervised approaches along with Generative Artificial Intelligence (Generative AI) techniques. This paper introduces an innovative approach, a multilingual semisupervised model combining Generative Adversarial Networks (GANs) and Pretrained Language Models (PLMs), more precisely mBERT and XLM-RoBERTa. Our approach proves its effectiveness in the detection of hate speech and offensive language in Indo-European languages (in English, German, and Hindi) when employing only 20% annotated data from the HASOC2019 dataset, thereby presenting significantly high performances in each of multilingual, zero-shot crosslingual, and monolingual training scenarios. Our study provides a robust mBERT-based semisupervised GAN model (SS-GAN-mBERT) that outperformed the XLM-RoBERTa-based model (SS-GAN-XLM) and reached an average F1 score boost of 9.23% and an accuracy increase of 5.75% over the baseline semisupervised mBERT model. Full article
Show Figures

Figure 1

11 pages, 1078 KiB  
Article
Unveiling Human Values: Analyzing Emotions behind Arguments
by Amir Reza Jafari, Praboda Rajapaksha, Reza Farahbakhsh, Guanlin Li and Noel Crespi
Entropy 2024, 26(4), 327; https://doi.org/10.3390/e26040327 - 12 Apr 2024
Viewed by 1399
Abstract
Detecting the underlying human values within arguments is essential across various domains, ranging from social sciences to recent computational approaches. Identifying these values remains a significant challenge due to their vast numbers and implicit usage in discourse. This study explores the potential of [...] Read more.
Detecting the underlying human values within arguments is essential across various domains, ranging from social sciences to recent computational approaches. Identifying these values remains a significant challenge due to their vast numbers and implicit usage in discourse. This study explores the potential of emotion analysis as a key feature in improving the detection of human values and information extraction from this field. It aims to gain insights into human behavior by applying intensive analyses of different levels of human values. Additionally, we conduct experiments that integrate extracted emotion features to improve human value detection tasks. This approach holds the potential to provide fresh insights into the complex interactions between emotions and values within discussions, offering a deeper understanding of human behavior and decision making. Uncovering these emotions is crucial for comprehending the characteristics that underlie various values through data-driven analyses. Our experiment results show improvement in the performance of human value detection tasks in many categories. Full article
Show Figures

Figure 1

22 pages, 41620 KiB  
Article
Research on a Critical Link Discovery Method for Network Security Situational Awareness
by Guozheng Yang, Yongheng Zhang, Yuliang Lu, Yi Xie and Jiayi Yu
Entropy 2024, 26(4), 315; https://doi.org/10.3390/e26040315 - 4 Apr 2024
Viewed by 2791
Abstract
Network security situational awareness (NSSA) aims to capture, understand, and display security elements in large-scale network environments in order to predict security trends in the relevant network environment. With the internet’s increasingly large scale, increasingly complex structure, and gradual diversification of components, the [...] Read more.
Network security situational awareness (NSSA) aims to capture, understand, and display security elements in large-scale network environments in order to predict security trends in the relevant network environment. With the internet’s increasingly large scale, increasingly complex structure, and gradual diversification of components, the traditional single-layer network topology model can no longer meet the needs of network security analysis. Therefore, we conduct research based on a multi-layer network model for network security situational awareness, which is characterized by the three-layer network structure of a physical device network, a business application network, and a user role network. Its network characteristics require new assessment methods, so we propose a multi-layer network link importance assessment metric: the multi-layer-dependent link entropy (MDLE). On the one hand, the MDLE comprehensively evaluates the connectivity importance of links by fitting the link-local betweenness centrality and mapping entropy. On the other hand, it relies on the link-dependent mechanism to better aggregate the link importance contributions in each network layer. The experimental results show that the MDLE has better ordering monotonicity during critical link discovery and a higher destruction efficacy in destruction simulations compared to classical link importance metrics, thus better adapting to the critical link discovery requirements of a multi-layer network topology. Full article
Show Figures

Figure 1

14 pages, 394 KiB  
Article
A Multi-Information Spreading Model for One-Time Retweet Information in Complex Networks
by Kaidi Zhao, Dingding Han, Yihong Bao, Jianghai Qian and Ruiqi Yang
Entropy 2024, 26(2), 152; https://doi.org/10.3390/e26020152 - 9 Feb 2024
Cited by 1 | Viewed by 1139
Abstract
In the realm of online social networks, the spreading of information is influenced by a complex interplay of factors. To explore the dynamics of one-time retweet information spreading, we propose a Susceptible–Infected–Completed (SIC) multi-information spreading model. This model captures how multiple pieces of [...] Read more.
In the realm of online social networks, the spreading of information is influenced by a complex interplay of factors. To explore the dynamics of one-time retweet information spreading, we propose a Susceptible–Infected–Completed (SIC) multi-information spreading model. This model captures how multiple pieces of information interact in online social networks by introducing inhibiting and enhancement factors. The SIC model considers the completed state, where nodes cease to spread a particular piece of information after transmitting it. It also takes into account the impact of past and present information received from neighboring nodes, dynamically calculating the probability of nodes spreading each piece of information at any given moment. To analyze the dynamics of multiple information pieces in various scenarios, such as mutual enhancement, partial competition, complete competition, and coexistence of competition and enhancement, we conduct experiments on BA scale-free networks and the Twitter network. Our findings reveal that competing information decreases the likelihood of its spread while cooperating information amplifies the spreading of mutually beneficial content. Furthermore, the strength of the enhancement factor between different information pieces determines their spread when competition and cooperation coexist. These insights offer a fresh perspective for understanding the patterns of information propagation in multiple contexts. Full article
Show Figures

Figure 1

33 pages, 30151 KiB  
Article
Comparison of Graph Distance Measures for Movie Similarity Using a Multilayer Network Model
by Majda Lafhel, Hocine Cherifi, Benjamin Renoust and Mohammed El Hassouni
Entropy 2024, 26(2), 149; https://doi.org/10.3390/e26020149 - 8 Feb 2024
Viewed by 1643
Abstract
Graph distance measures have emerged as an effective tool for evaluating the similarity or dissimilarity between graphs. Recently, there has been a growing trend in the application of movie networks to analyze and understand movie stories. Previous studies focused on computing the distance [...] Read more.
Graph distance measures have emerged as an effective tool for evaluating the similarity or dissimilarity between graphs. Recently, there has been a growing trend in the application of movie networks to analyze and understand movie stories. Previous studies focused on computing the distance between individual characters in narratives and identifying the most important ones. Unlike previous techniques, which often relied on representing movie stories through single-layer networks based on characters or keywords, a new multilayer network model was developed to allow a more comprehensive representation of movie stories, including character, keyword, and location aspects. To assess the similarities among movie stories, we propose a methodology that utilizes a multilayer network model and layer-to-layer distance measures. We aim to quantify the similarity between movie networks by verifying two aspects: (i) regarding many components of the movie story and (ii) quantifying the distance between their corresponding movie networks. We tend to explore how five graph distance measures reveal the similarity between movie stories in two aspects: (i) finding the order of similarity among movies within the same genre, and (ii) classifying movie stories based on genre. We select movies from various genres: sci-fi, horror, romance, and comedy. We extract movie stories from movie scripts regarding character, keyword, and location entities to perform this. Then, we compute the distance between movie networks using different methods, such as the network portrait divergence, the network Laplacian spectra descriptor (NetLSD), the network embedding as matrix factorization (NetMF), the Laplacian spectra, and D-measure. The study shows the effectiveness of different methods for identifying similarities among various genres and classifying movies across different genres. The results suggest that the efficiency of an approach on a specific network type depends on its capacity to capture the inherent network structure of that type. We propose incorporating the approach into movie recommendation systems. Full article
Show Figures

Figure 1

12 pages, 426 KiB  
Article
Uncertainty in GNN Learning Evaluations: A Comparison between Measures for Quantifying Randomness in GNN Community Detection
by William Leeney and Ryan McConville
Entropy 2024, 26(1), 78; https://doi.org/10.3390/e26010078 - 17 Jan 2024
Viewed by 1533
Abstract
(1) The enhanced capability of graph neural networks (GNNs) in unsupervised community detection of clustered nodes is attributed to their capacity to encode both the connectivity and feature information spaces of graphs. The identification of latent communities holds practical significance in various domains, [...] Read more.
(1) The enhanced capability of graph neural networks (GNNs) in unsupervised community detection of clustered nodes is attributed to their capacity to encode both the connectivity and feature information spaces of graphs. The identification of latent communities holds practical significance in various domains, from social networks to genomics. Current real-world performance benchmarks are perplexing due to the multitude of decisions influencing GNN evaluations for this task. (2) Three metrics are compared to assess the consistency of algorithm rankings in the presence of randomness. The consistency and quality of performance between the results under a hyperparameter optimisation with the default hyperparameters is evaluated. (3) The results compare hyperparameter optimisation with default hyperparameters, revealing a significant performance loss when neglecting hyperparameter investigation. A comparison of metrics indicates that ties in ranks can substantially alter the quantification of randomness. (4) Ensuring adherence to the same evaluation criteria may result in notable differences in the reported performance of methods for this task. The W randomness coefficient, based on the Wasserstein distance, is identified as providing the most robust assessment of randomness. Full article
Show Figures

Figure 1

Back to TopTop