[1] GROVER A, LESKOVEC J. Node2vec: Scalable feature learning for networks[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016: 855-864.
[2] TANG J, QU M, WANG M, et al. LINE: Large-scale information network embedding[C]//Proceedings of the 24th International Conference on World Wide Web, 2015: 1067-1077.
[3] DU N, SONG L, GOMEZ RODRIGUEZ M, et al. Scalable influence estimation in continuous-time diffusion networks[J]. Advances in Neural Information Processing Systems, 2013: 26-37.
[4] FUNK S, GILAD E, WATKINS C, et al. The spread of awareness and its impact on epidemic outbreaks[J]. Proceedings of the National Academy of Sciences, 2009, 106(16): 6872-6877.
[5] WANG Z, BAUCH C T, BHATTACHARYYA S, et al. Statistical physics of vaccination[J]. Physics Reports, 2016, 664: 1-113.
[6] SUN M, TAO Y, FU X. Asymmetrical dynamics of epidemic propagation and awareness diffusion in multiplex networks[J]. Chaos: An Interdisciplinary Journal of Nonlinear Science, 2021, 31(9): 093134.
[7] HUANG H, CHEN Y, YAN Z. Impacts of social distancing on the spread of infectious diseases with asymptomatic infection: A mathematical model[J]. Applied Mathematics and Computation,2021,398: 125983.
[8] MENG X, CAI Z, SI S, et al. Analysis of epidemic vaccination strategies on heterogeneous networks: Based on SEIRV model and evolutionary game[J]. Applied Mathematics and Computation, 2021,403: 126172.
[9] WANG Z, XIA C, CHEN Z, et al. Epidemic propagation with positive and negative preventive information in multiplex networks[J]. IEEE Transactions on Cybernetics, 2020, 51(3): 1454-1462.
[10] SATORRAS P R, VESPIGNANI A. Epidemic spreading in scale-free networks[J]. Physical Review Letters, 2001, 86(14): 3200.
[11] KEMPE D, KLEINBERG J, TARDOS . Maximizing the spread of influence through a social network[C]//Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003: 137-146.
[12] KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks[J]. Nature Physics, 2010, 6(11): 888-893.
[13] SHAH D, ZAMAN T. Rumors in a network: Whos the culprit?[J]. IEEE Transactions on Information Theory, 2011, 57(8): 5163-5181.
[14] SHAH D, ZAMAN T. Detecting sources of computer viruses in networks: Theory and experiment[C]//Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2010: 203-214.
[15] LUO W, TAY W P. Estimating infection sources in a network with incomplete observations[C]//Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013: 301-304.
[16] ZHU K, YING L. Information source detection in the SIR model: A sample-path-based approach[J]. IEEE/ACM Transactions on Networking, 2014, 24(1): 408-421.
[17] HAMMOND D K, VANDERGHEYNST P, GRIBONVAL R. Wavelets on graphs via spectral graph theory[J]. Applied and Computational Harmonic Analysis, 2011, 30(2): 129-150.
[18] GRADY L, FUNKALEA G. Multi-label image segmentation for medical applications based on graph-theoretic electrical potentials[C]//Proceedings of the Computer Vision and Mathematical Methods in Medical and Biomedical Image Analysis, 2004: 230-245.
[19] PEROZZI B, ALRFOU R, SKIENA S. DeepWalk: Online learning of social representations[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014: 701-710.
[20] ZHAN X X, LI Z, MASUDA N, et al. Susceptible-infected-spreading-based network embedding in static and temporal networks[J]. EPJ Data Science, 2020, 9(1): 30-31.

陈奇(1998—),硕士研究生,主要研究领域为网络科学。
E-mail: chenqi@hdu.edu.cn

焦鹏飞(1990—),通信作者,博士,教授,主要研究领域为复杂网络科学及其应用。
E-mail: pjiao@hdu.edu.cn

王震(1984—),博士,副教授,主要研究领域为人工智能安全、数据驱动安全、博弈论、多智能体系统和网络科学等。
E-mail wangzhen@hdu.edu.cn