Kun Zhao’s research while affiliated with Qingdao University of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Fig. 1. (Color online) The relationship between probability p and entropy (Àp à logðpÞ). The entropy increases nonlinearly with the probability p when p 0:365.
Fig. 2. (Color online) The illustration of node importance. Node 6 plays a signi¯cant role in the network because it is a bridge of two important nodes (5 and 8).
The characteristics of SF networks.
Evaluate Invulnerability of Scale-free Networks Using Total Information of Local Sub-graph
  • Article
  • Full-text available

July 2018

·

171 Reads

·

3 Citations

International Journal of Modern Physics C

Tingyuan Nie

·

·

Mengda Lin

·

Kun Zhao

The quantification for the invulnerability of complex network is a fundamental problem in which identifying influential nodes is of theoretical and practical significance. In this paper, we propose a novel definition of centrality named total information (TC) which derives from a local sub-graph being constructed by a node and its neighbors. The centrality is then defined as the sum of the self-information of the node and the mutual information of its neighbor nodes. We use the proposed centrality to identify the importance of nodes through the evaluation of the invulnerability of scale-free networks. It shows both the efficiency and the effectiveness of the proposed centrality are improved, compared with traditional centralities.

Download

The dynamic correlation between degree and betweenness of complex network under attack

April 2016

·

43 Reads

·

21 Citations

Physica A Statistical Mechanics and its Applications

Complex networks are often subjected to failure and attack. Recent work has addressed the resilience of complex networks to either random or intentional deletion of nodes or links. Here we simulate the breakdown of the small-world network and the scale-free network under node failure or attacks. We analyze and discuss the dynamic correlation between degree and betweenness in the process of attack. The simulation results show that the correlation for scale-free network obeys a power law distribution until the network collapses, while it represents irregularly for small-world network.


Using mapping entropy to identify node centrality in complex networks

February 2016

·

128 Reads

·

83 Citations

Physica A Statistical Mechanics and its Applications

The problem of finding the best strategy to attack network or immunize population with a minimal number of nodes attracts current research interest. The assessment of node importance has been a fundamental issue in such research of complex networks. In this paper, we propose a new concept called mapping entropy (ME) to identify the importance of a node in the complex network. The concept is established according to the local information which considers the correlation among all neighbours of a node. We evaluate the efficiency of the centrality by static attacks and dynamic attacks on standard network models and real-world networks. The simulation result shows that the new centrality is more efficient than traditional attack strategies, no matter in static manner or dynamic manner.


New attack strategies for complex networks

April 2015

·

101 Reads

·

80 Citations

Physica A Statistical Mechanics and its Applications

The invulnerability of complex networks is an important issue in that the behavior of scale-free network differs from that of exponential network. According to the structural characteristics of the networks, we propose two new attack strategies named IDB (initial degree and betweenness) and RDB (recalculated degree and betweenness). The strategies are originated from ID (initial degree distribution) and RD (recalculated degree distribution) strategies in which attacks are based on initial structural information of a network. The probability of node removals depends on a new metric combining degree centrality and betweenness centrality. We evaluate the efficiency of the proposed strategies on one real-world network and three network models. Experimental results indicate that the proposed strategies are more efficient than the traditional ID and RD strategies. Specially, the WS small-world network behaves more sensitive to the proposed strategies. The attack efficiency of RDB strategy is improved by 20% to RD strategy, and IDB strategy is improved by 40% to ID strategy.

Citations (3)


... Other node attack strategies are based on different topological properties of the networks, like eigenvector centrality [5,8], closeness centrality [9,10], and clustering coefficient [5]. In addition, scientists investigated these attack strategies' variations [4,11,12]. By analyzing the impact of these attack strategies, we can identify the node importance in the network. ...

Reference:

Effect of Weight Thresholding on the Robustness of Real-World Complex Networks to Central Node Attacks
The dynamic correlation between degree and betweenness of complex network under attack
  • Citing Article
  • April 2016

Physica A Statistical Mechanics and its Applications

... Considering that nodes at the crossroads of different communities tend to be more powerful in disseminating information from one community to another. Inspired by the information entropy [49], we then introduce the other concept of Hierarchical-Community Entropy (HCE) to measure the amount of the community structural information of nodes. For the communities, the Community Importance (CI) of each community can be calculated as follows: ...

Using mapping entropy to identify node centrality in complex networks
  • Citing Article
  • February 2016

Physica A Statistical Mechanics and its Applications

... Nodes that are more susceptible to infection and can further infect a large number of other nodes in the network are considered critical nodes [10]. Critical nodes are essential for identifying key cities to promote sustainable development [11], protecting important transportation hubs [12,13], controlling the spread of rumors and social opinions [14], and resisting cyber attacks [15]. ...

New attack strategies for complex networks
  • Citing Article
  • April 2015

Physica A Statistical Mechanics and its Applications