4.2 Article

Mixing local and global information for community detection in large networks

期刊

JOURNAL OF COMPUTER AND SYSTEM SCIENCES
卷 80, 期 1, 页码 72-87

出版社

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jcss.2013.03.012

关键词

Complex networks; Community detection; Social networks; Social network analysis

向作者/读者索取更多资源

Clustering networks play a key role in many scientific fields, from Biology to Sociology and Computer Science. Some clustering approaches are called global because they exploit knowledge about the whole network topology. Vice versa, so-called local methods require only a partial knowledge of the network topology. Global approaches yield accurate results but do not scale well on large networks; local approaches, vice versa, are less accurate but computationally fast. We propose CONCLUDE (COmplex Network CLUster DEtection), a new clustering method that couples the accuracy of global approaches with the scalability of local methods. CONCLUDE generates random, non-backtracking walks of finite length to compute the importance of each edge in keeping the network connected, i.e., its edge centrality. Edge centralities allow for mapping vertices onto points of a Euclidean space and compute all-pairs distances between vertices; those distances are then used to partition the network into clusters. (C) 2013 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Target-specific sentiment analysis method combining word-masking data enhancement and adversarial learning

Xiaoyang Liu, Shanghong Dai, Giacomo Fiumara, Pasquale De Meo

Summary: This article introduces a novel method for target-specific sentiment classification, which constructs an adversarial learning-based classification model by replacing synonyms and inserting random words. Experimental results demonstrate that this method improves classification performance and the capability of adversarial sample defense across multiple datasets.

COMPUTER JOURNAL (2023)

Article Mathematics

Covert Network Construction, Disruption, and Resilience: A Survey

Annamaria Ficara, Francesco Curreri, Giacomo Fiumara, Pasquale De Meo, Antonio Liotta

Summary: This study examines covert networks, such as terrorist networks and criminal networks, using social network analysis (SNA). SNA helps identify the structure and functioning of these networks by calculating relevant metrics and parameters, enabling the identification of roles, positions, features, and other network characteristics. Law enforcement agencies are increasingly interested in SNA for identifying vulnerabilities and disrupting criminal groups. However, there are challenges in data collection techniques and the incompleteness and biases of real-world datasets.

MATHEMATICS (2022)

Article Engineering, Multidisciplinary

Network Connectivity Under a Probabilistic Node Failure Model

Lucia Cavallaro, Stefania Costantini, Pasquale De Meo, Antonio Liotta, Giovanni Stilo

Summary: This paper examines the impact of node removal on network robustness, proposes a probabilistic node failure model considering node strength, conducts experimental analysis on 8 real-world graphs, and finds that degree is the most significant factor causing the drop in spectral radius and the size of the largest connected component.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Artificial Intelligence

Link prediction approach combined graph neural network with capsule network

Xiaoyang Liu, Xiang Li, Giacomo Fiumara, Pasquale De Meo

Summary: This paper proposes a link prediction approach that combines Graph Neural Networks (GNNs) with Capsule Networks (CapsNet). The method transforms node embeddings into a node pair feature map and uses CapsNets to learn the feature representation, achieving better accuracy than competitor methods.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Cybernetics

Influential Spreaders Identification in Complex Networks With TOPSIS and K-Shell Decomposition

Xiaoyang Liu, Shu Ye, Giacomo Fiumara, Pasquale De Meo

Summary: This article proposes a hybrid method based on K-shell decomposition to identify the most influential spreaders in complex networks. The method combines K-shell decomposition with existing centrality methods, and selects the most influential nodes based on comprehensive scores. Experimental results show significant improvements in infection scale and shortest path length.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

A right kind of wrong: European equity market forecasting with custom feature engineering and loss functions

Albert Matuozzo, Paul D. Yoo, Alessandro Provetti

Summary: This study uses a variety of predictors, including a lagged and transformed version of the target series, to predict the future returns of the STOXX Europe 600 and the German DAX based on time series analysis. Feature engineering is employed to extract knowledge of market conditions and demand for hedging. By introducing a penalisation factor and loss functions, a traditional machine learning regression framework is adapted to solve equity forecasting problems using neural networks. Architecture based on convolutional neural network is proposed, treating the obtained feature map similar to an image. Experiments demonstrate that trading strategies derived from these forecasts are more profitable than those based on efficient market assumptions, indicating the importance of considering the temporal, non-stationary structure of financial data.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Information Systems

Branching processes reveal influential nodes in social networks

Pasquale De Meo, Mark Levene, Alessandro Provetti

Summary: The article introduces a variant of the branching process model, which can be used to predict the popularity of user-generated content and rank search results or suggestions. A new centrality index called the Stochastic Potential Gain (SPG) is proposed to evaluate the importance of agents in a social network. Experimental results demonstrate the effectiveness of this method in computing node centrality measures for online social networks.

INFORMATION SCIENCES (2023)

Proceedings Paper Computer Science, Interdisciplinary Applications

Analysis on the Effects of Graph Perturbations on Centrality Metrics

Lucia Cavallaro, Pasquale De Meo, Keyvan Golalipour, Xiaoyang Liu, Giacomo Fiumara, Andrea Tagarelli, Antonio Liotta

Summary: This study aims to explore the impact of small graph perturbations on centrality metrics. It is found that in the Uniform model, the change in the adjacency matrix is not significant when nodes are under small-scale attacks, even with a high failure probability. However, in the Best Connected model, the degree of perturbation is proportional to the ratio of nodes under attack.

COMPLEX NETWORKS AND THEIR APPLICATIONS XI, COMPLEX NETWORKS 2022, VOL 2 (2023)

Article Computer Science, Theory & Methods

Human and Social Capital Strategies for Mafia Network Disruption

Annamaria Ficara, Francesco Curreri, Giacomo Fiumara, Pasquale De Meo

Summary: Social Network Analysis (SNA) is used to analyze criminal networks and develop disruption interventions and crime prevention systems. This paper investigates the effectiveness of seven disruption strategies for real Mafia networks using SNA tools. Simulations show that actor removal based on social capital is the most effective strategy in disrupting criminal networks. Removing specific figures of Mafia families, like the Caporegime, also shows promise.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Cybernetics

Information Propagation Prediction Based on Spatial-Temporal Attention and Heterogeneous Graph Convolutional Networks

Xiaoyang Liu, Chenxiang Miao, Giacomo Fiumara, Pasquale De Meo

Summary: With the development of deep learning and other technologies, the proposed spatial-temporal attention heterogeneous graph convolutional networks (STAHGCNs) model has greatly improved the accuracy of information propagation prediction by integrating spatial factors such as time factor, user influence, and behavior. The experimental results have shown significant improvements over the original latest DyHGCN model in hits@N and map@N by 8.80% and 6.74% respectively, demonstrating the effectiveness of the proposed model. It has great significance for rumor monitoring and malicious account detection.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

Solving problems on generalized convex graphs via mim-width

Flavia Bonomo-Braberman, Nick Brettell, Andrea Munaro, Daniel Paulusma

Summary: This article discusses the convexity and mim-width of bipartite graphs, and it proves that for certain families of graphs 7-t, the 7-t-convex graphs can be solved in polynomial time for NP-complete problems. It also explores the bounded and unbounded mim-width of 7-t-convex graphs for different sets 7-t.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Performance modeling and analysis for randomly walking mobile users with Markov chains

Keqin Li

Summary: In this paper, we propose a computation offloading strategy to satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. By using Markov chains to characterize UE mobility and calculating the joint probability distribution of UE locations, we can obtain the average response time of UEs and predict the overall average response time of tasks. Additionally, we solve the power constrained MEC speed setting problem.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Correction Computer Science, Hardware & Architecture

Prediction, learning, uniform convergence, and scale-sensitive dimensions (vol 56, pg 174, 1998)

Peter L. Bartlett, Philip M. Long

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Fast and succinct population protocols for Presburger arithmetic

Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza

Summary: This paper presents a construction method that produces population protocols with a small number of states, while achieving near-optimal expected number of interactions, for deciding Presburger predicates.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Orienting undirected phylogenetic networks

Katharina T. Huber, Leo van Iersel, Remie Janssen, Mark Jones, Vincent Moulton, Yukihiro Murakami, Charles Semple

Summary: This paper investigates the relationship between undirected and directed phylogenetic networks, and provides corresponding algorithms. The study reveals that the directed phylogenetic network is unique under specific conditions. Additionally, an algorithm for directing undirected binary networks is described, applicable to certain classes of directed phylogenetic networks.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs

Francesco Betti Sorbelli, Alfredo Navarra, Lorenzo Palazzetti, Cristina M. Pinotti, Giuseppe Prencipe

Summary: This study discusses the deployment of IoT sensors in an area that needs to be monitored. Drones are used to collect data from the sensors, but they have energy and storage constraints. To maximize the overall reward from the collected data and ensure compliance with energy and storage limits, an optimization problem called Multiple-drone Data-collection Maximization Problem (MDMP) is proposed and solved using an Integer Linear Programming algorithm.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

On the complexity of the storyplan problem

Carla Binucci, Emilio Di Giacomo, William J. Lenhart, Giuseppe Liotta, Fabrizio Montecchiani, Martin Nollenburg, Antonios Symvonis

Summary: In this study, we investigate the problem of representing a graph as a storyplan, which is a model for dynamic graph visualization. We prove the NP-completeness of this problem and propose two parameterized algorithms as solutions. We also demonstrate that partial 3-trees always admit a storyplan and can be computed in linear time. Additionally, we show that even if the vertex appearance order is given, the problem of choosing how to draw the frames remains NP-complete.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)

Article Computer Science, Hardware & Architecture

Perpetual maintenance of machines with different urgency requirements

Leszek Gasieniec, Tomasz Jurdzinski, Ralf Klasing, Christos Levcopoulos, Andrzej Lingas, Jie Min, Tomasz Radzik

Summary: This passage describes the Bamboo Garden Trimming Problem and presents approximation algorithms for both Discrete BGT and Continuous BGT.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2024)