Chinese Journal of Network and Information Security ›› 2024, Vol. 10 ›› Issue (1): 79-90.doi: 10.11959/j.issn.2096-109x.2024013
• Papers • Previous Articles
Guodong XIN, Tengwei ZHU, Junheng HUANG, Jiayang Wei, Runxuan Liu, Wei WANG
Revised:
2023-11-21
Online:
2024-02-01
Published:
2024-02-01
Supported by:
CLC Number:
Guodong XIN, Tengwei ZHU, Junheng HUANG, Jiayang Wei, Runxuan Liu, Wei WANG. Multi-query based key node mining algorithm for social networks[J]. Chinese Journal of Network and Information Security, 2024, 10(1): 79-90.
[1] | 任晓龙, 吕琳媛 . 网络重要节点排序方法综述[J]. 科学通报, 2014,59(13): 1175-1197. |
REN X L , LYU L Y . Review of ranking nodes complex networks[J]. Science Bulletin, 2014,59(13): 1175-1197. | |
[2] | LU P , DONG C . Ranking the spreading influence of nodes in complex networks based on mixing degree centrality and local structure[J]. International Journal of Modern Physics B, 2019,33(32): 1950395. |
[3] | FA N Y , ZHANG R , ZHAO Y ,et al. Identifying the most influential spreaders in complex networks by an extended local K-shell sum[J]. International Journal of Modern Physics C, 2017,28(1): 925-214. |
[4] | SARA A , HASSAN B . Identification of influential spreaders in complex networks using HybridRank algorithm[J]. Scientific Reports, 2018,8(1): 11932. |
[5] | HAI J , QIAN C , YU D ,et al. Parallel computation of hierarchical closeness centrality and applicationst[C]// Proceedings of World Wide Web. 2018: 3047-3064. |
[6] | NEWMAN M E J . A measure of betweenness centrality based on random walks[J]. Social Networks, 2004,27(1): 39-54. |
[7] | BRIN S , PAGE L , MOTWAMI R ,et al. The PageRank citation ranking:bringing order to the Web[Z]. Stanford Digital Libraries Working Paper, 1998(6): 102-107. |
[8] | XU S , WANG P . Identifying important nodes by adaptive LeaderRank[J]. Physica A:Statistical Mechanics and its Applications, 2017,469: 654-664. |
[9] | 陈勇, 胡爱群, 胡啸 . 通信网中节点重要性的评价方法[J]. 通信学报, 2004,25(8): 129-134. |
CHEN Y , HU A Q , HU X . Evaluation method of node importance in communication network[J]. Journal on Communications, 2004,25(8): 129-134. | |
[10] | 谭跃进, 吴俊, 邓宏钟 . 复杂网络中节点重要度评估的节点收缩方法[J]. 系统工程理论与实践, 2006,(11): 79-83. |
TAN Y J , WU J , DENG H Z . Node importance in complex networks[J]. Systems Engineering Theory and Practice, 2006,(11): 79-83. | |
[11] | RASHID Y , BHAT J I . OlapGN:a multi-layered graph convolution network-based model for locating influential nodes in graph networks[J]. Knowledge-Based Systems, 2024,(283). |
[12] | BOUYER A , BENI H A , ARASTEH B ,et al. FIP:A fast overlapping community-based influence maximization algorithm using probability coefficient of global diffusion in social networks[J]. Expert Systems with Applications, 2023,(213). |
[13] | AGHAALIZADEH S , AFSHORD S T , BOUYER A ,et al. A three-stage algorithm for local community detection based on the high node importance ranking in social networks[J]. Physica A:Statistical Mechanics and its Applications, 2021,63(25420). |
[14] | WATTS D J , STROGATZ S H . Collective dynamics of small world network[J]. Nature, 1998,393(4): 440-442. |
[15] | BAHADORI S , MORADI P , ZARE H . An improved limited random walk approach for identification of overlapping communities in complex networks[J]. Applied Intelligence, 2020,51: 3561-3580. |
[16] | LIU J , ONG G P , CHEN X M . GraphSAGE-based traffic speed forecasting for segment network with sparse data[J]. IEEE Transactions on Intelligent Transportation Systems, 2020,23(3): 1755-1766. |
[17] | YAN Y , LUO D , NI J ,et al. Local graph clustering by multi-network random walk with restart[C]// Proceedings of Pacific-asia Conference on Knowledge Discovery & Data Mining. 2018: 490-501. |
[18] | SEIDMAN S B . Network structure and minimum degree[J]. Social Networks, 1983,5(3): 269-287. |
[19] | SOZIO M , GIONIS A . The community-search problem and how to plan a successful cocktail party[C]// Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data mining, 2010: 939-948. |
[20] | ROSSI R A , AHMED N K . An interactive data repository with visual analytics[J]. ACM SIGKDD Explorations Newsletter, 2016,17(2): 37-41. |
[21] | ARASTEH M , ALIZADEH S . A fast divisive community detection algorithm based on edge degree betweenness centrality[J]. Applied Intelligence, 2019,49(2): 689-702. |
[22] | KERMARREC A M , MERRER E L , SERICOLA B ,et al. Second order centrality:Distributed assessment of nodes criticity in complex networks[J]. Computer Communications, 2010,34(5): 619-628. |
[23] | TSALOUCHIDOU I , BAEZA-YATES R , BONCHI F ,et al. Temporal betweenness centrality in dynamic graphs[J]. International Journal of Data Science and Analytics, 2020,9(3): 257-272. |
[24] | ZHANG J X , CHEN D B , DONG Q ,et al. Identifying a set of influential spreaders in complex networks[J]. Scientific Reports, 2016,6(1): 27823. |
[25] | SONG YANG. . Networks:an Introduction by M.E.J.Newman[J]. The Journal of Mathematical Sociology, 2013,37(4): 250-251. |
[26] | BEINEKE L W , OELLERMANN O R , PIPPERT R E . The average connectivity of a graph[J]. Discrete Mathematics, 2002,252(1-3): 31-45. |
[27] | LUO D S , BIAN Y C , YAN Y W ,et al. Local community detection in multiple networks[C]// Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data mining, 2020: 266-274. |
[1] | Shuting LIU, Yinghua MA, Xiuzhen CHEN. Evolutionary game model of information management mechanism for public opinion governance [J]. Chinese Journal of Network and Information Security, 2023, 9(6): 102-115. |
[2] | Wenbo ZHAO, Zitong MA, Zhe YANG. Model of the malicious traffic classification based on hypergraph neural network [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 166-177. |
[3] | Zhaoyang FU, Zhikai CHEN, Li PAN. Sarcasm detection method based on fusion of text semantics and social behavior information [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 134-143. |
[4] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[5] | Yuhang ZHU, Lixin JI, Yingle LI, Haitao LI, Shuxin LIU. Temporal link prediction method based on community multi-features fusion and embedded representation [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 67-82. |
[6] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[7] | Wenqi SHI, Xiangyang LUO, Jiashan GUO. Social network user geolocating method based on weighted least squares [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 41-52. |
[8] | Yaofang ZHANG, Zheyu ZHANG, Haikuo QU, Ge ZHANG, Zibo WANG, Bailing WANG. Key path analysis method for large-scale industrial control network [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 31-43. |
[9] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[10] | Hao CHEN, Ping YI. Code vulnerability detection method based on graph neural network [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 37-45. |
[11] | Jinyin CHEN, Dunjie ZHANG, Guohan HUANG, Xiang LIN, Liang BAO. Adversarial attack and defense on graph neural networks: a survey [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 1-28. |
[12] | Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA. Survey of community privacy in social network [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 10-21. |
[13] | Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN. Mining behavior pattern of mobile malware with convolutional neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44. |
[14] | Pei WANG,Yan JIA,Aiping LI,Qianyue JIANG. De-anonymiation method for networks based on DeepLink [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 104-108. |
[15] | Qiang QU,Hongtao YU,Ruiyang HUANG. Attention-based approach of detecting spam in social networks [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|