- Complex Network Analysis Techniques
- Opinion Dynamics and Social Influence
- Opportunistic and Delay-Tolerant Networks
- Mental Health Research Topics
- Graph theory and applications
- Network Traffic and Congestion Control
- Gene Regulatory Network Analysis
- COVID-19 epidemiological studies
- Advanced Graph Neural Networks
- Peer-to-Peer Network Technologies
- Topic Modeling
- Caching and Content Delivery
- Bioinformatics and Genomic Networks
- Infrastructure Resilience and Vulnerability Analysis
- Game Theory and Applications
- Advanced Graph Theory Research
- Data Visualization and Analytics
- Web Data Mining and Analysis
- Energy, Environment, Economic Growth
- Parallel Computing and Optimization Techniques
- Misinformation and Its Impacts
- Web visibility and informetrics
- Discourse Analysis in Language Studies
- DNA and Biological Computing
- Gaussian Processes and Bayesian Inference
Delft University of Technology
2016-2025
Xinjiang University
2025
Fudan University
2024
Ministry of Ecology and Environment
2024
Shanghai Electric (China)
2024
Southeast University
2024
Central South University
2024
Chongqing Metrology Quality Inspection and Research Institute
2024
Northwest Normal University
2024
Central University of Finance and Economics
2018-2023
Most real-world networks are not isolated. In order to function fully, they interconnected with other networks, and this interconnection influences their dynamic processes. For example, when the spread of a disease involves two species, dynamics within each species (the contact network) differs from that between network). We model generic using adjacency matrices, A B, in which is 2N*2N matrix depicts connectivity size N, B interconnections two. Using an N-intertwined mean-field...
The decrease of the spectral radius, an important characterizer network dynamics, by removing links is investigated. minimization radius $m$ shown to be NP-complete problem, which suggests considering heuristic strategies. Several greedy strategies are compared, and several bounds on derived. strategy that removes link $l=i~j$ with largest product $({x}_{1}){}_{i}({x}_{1}){}_{j}$ components eigenvector ${x}_{1}$ belonging adjacency eigenvalue superior other in most cases. Furthermore, a...
It was recently found that cascading failures can cause the abrupt breakdown of a system interdependent networks.Using percolation method developed for single clustered networks by Newman [Phys.Rev. Lett.103, 058701 (2009)], we develop an analytical studying how clustering within affects system's robustness.We find significantly increases vulnerability system, which is represented increased value threshold pc in networks.
In recent decades, a number of centrality metrics describing network properties nodes have been proposed to rank the importance nodes. order understand correlations between and approximate high-complexity metric by strongly correlated low-complexity metric, we first study correlation in terms their Pearson coefficient similarity ranking addition considering widely used metrics, introduce new measure, degree mass. The m mass node is sum weighted its neighbors no further than hops away. We...
When transport in networks follows the shortest paths, union of all path trees ${G}_{\ensuremath{\cup}\text{SPT}}$ can be regarded as ``transport overlay network.'' Overlay such peer-to-peer or virtual private considered a subgraph ${G}_{\ensuremath{\cup}\text{SPT}}$. The traffic through network is examined by betweenness ${B}_{l}$ links strength disorder controlled by, e.g., tuning extreme value index $\ensuremath{\alpha}$ independent and identically distributed polynomial link weights. In...
The interplay between disease dynamics on a network and the of structure that characterizes many real-world systems contacts. A continuous-time adaptive susceptible-infectious-susceptible (ASIS) model is introduced in order to investigate this interaction, where susceptible node avoids infections by breaking its links infected neighbors while it enhances connections with other nodes creating them. When initial topology complete graph, an exact solution average metastable-state fraction...
Defining an optimal protection strategy against viruses, spam propagation or any other kind of contamination process is important feature for designing new networks and architectures. In this work, we consider decentralized strategies when a virus propagating over network through SIS epidemic process. We assume that each node in the can fully protect itself from infection at constant cost, use recovery software, once it infected. model our system using game theoretic framework find pure,...
Increasingly popular reuse-based design paradigms create a pressing need for authorship enforcement techniques that protect the intellectual property rights of designers. We develop first protection protocols embedding watermarks at physical level. demonstrate these are tarnsparent with respect to existing industrial tools and flows, they can embed into real-world designs very low implementation overhead (as measured by such standard metrics as wirelength, layout area, number vias, routing...
Significant research effort has been devoted to the topological features of complex networks enhance performance dynamic processes implemented on these networks. In this work, we investigate how optimize a network for given process via minor modification. The alg
In this work, we aim to understand the influence of heterogeneity infection rates on Susceptible-Infected-Susceptible (SIS) epidemic spreading. Employing classic SIS model as benchmark, study independently identically distributed average fraction infected nodes in metastable state. The log-normal, gamma and a newly designed distributions are considered for rates. We find that, when recovery rate is small, i.e., spreads out both homogeneous heterogeneous cases: 1) retards virus spreading, 2)...
Epidemics have so far been mostly studied in undirected networks. However, many real-world networks, such as the online social network Twitter and world wide web, on which information, emotion, or malware spreads, are directed composed of both unidirectional links bidirectional links. We define directionality $\ensuremath{\xi}$ percentage The epidemic threshold ${\ensuremath{\tau}}_{c}$ for susceptible-infected-susceptible (SIS) is lower bounded by $1/{\ensuremath{\lambda}}_{1}$ where...
Networks can be used to describe the interconnections among individuals, which play an important role in spread of disease. Although small-world effect has been found have a significant impact on epidemics single networks, interconnected networks rarely considered. Here, we study susceptible-infected-susceptible (SIS) model epidemic spreading system comprising two networks. We find that threshold such decreases when rewiring probability component increases. When infection rate is low,...
Human social interactions are typically recorded as time-specific dyadic interactions, and represented evolving (temporal) networks, where links activated/deactivated over time. However, individuals can interact in groups of more than two people. Such group be higher-order events an network. Here, we propose methods to characterize the temporal-topological properties compare networks identify their (dis)similarities. We analyzed 8 real-world physical contact finding following: (a) Events...
During heavy rainfall events, stormwater exceeds the drainage capacity and overflows onto urban surface, causing flooding problems. Risk resilience assess severity recovery characteristics of damage from static dynamic perspectives independently. This work proposes a spatial grid-based integrated risk-resilience assessment framework for to consider both risk aspects at detailed level. The formulates an drainage-surface coupled model simulate inundation process. A classification method is...
Abstract Temporal networks, whose network topology changes over time, are used to represent, e.g., opportunistic mobile vehicle and social contact where two devices (autos or individuals) connected only when they close (interact with) each other. Such networks facilitate the transfer of information. In this paper, we address problem navigation on temporal networks: how route a traffic demand from source s destination d at time $$t_s$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">...
Epidemic remains one of the major threats to human society, which has attracted much attention for decades. Since real-world systems usually depend on each other, epidemics interconnected networks have been studied recently. However, in most studies spatial constraints these are neglected. Here we study a system composed two lattices, is compared with Erdös-Rényi (ER) networks. Our results show that epidemic threshold lattices decreases increasing length links between When infection rate...
Abstract Progress has been made in understanding how temporal network features affect the percentage of nodes reached by an information diffusion process. In this work, we explore further: which node pairs are likely to contribute actual information, i.e., appear a trajectory? How is likelihood related local connection pair? Such deep role crucial tackle challenging optimization problems such as kind or contacts should be stimulated order maximize prevalence spreading. We start using...