Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

How to Protect Ourselves From Overlapping Community Detection in Social Networks

Full metadata record
DC Field Value Language
dc.contributor.authorLiu, Dong-
dc.contributor.authorYang, Guoliang-
dc.contributor.authorWang, Yanwei-
dc.contributor.authorJin, Hu-
dc.contributor.authorChen, Enhong-
dc.date.accessioned2022-12-20T05:54:10Z-
dc.date.available2022-12-20T05:54:10Z-
dc.date.issued2022-02-
dc.identifier.issn2332-7790-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/111382-
dc.description.abstractIn recent years, overlapping community detection algorithms have been paid more and more attention, which not only reveal the real social relations, but also expose the possible communication channels between communities. Those individuals (or people) in the overlapping area are very important to the communities that can promote communication between two or more communities. On the other hand, from the privacy perspective, some people may not want to be found out in the overlapping areas. With this in mind, we raise a question "Can individuals modify their relationships to avoid the community discovery algorithms locating them into overlapping areas?" If this problem could be solved, these people may not need to worry about being disturbed. In particular, we first give three heuristic hiding strategies, i.e., Random Hiding(RH), Based Degree Hiding(DH) and Betweenness Hiding(BH), as comparison, utilizing the randomly the node, information of node degree and node betweenness centrality, respectively. And then, we propose a novel hiding algorithm by exploiting the importance degree of nodes in communities based on which the corresponding social connections are added or deleted called name BIH. Through extensive experiments, we show the effectiveness of the proposed algorithm in moving out a target node from overlapped areas.-
dc.format.extent11-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleHow to Protect Ourselves From Overlapping Community Detection in Social Networks-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/TBDATA.2022.3152431-
dc.identifier.scopusid2-s2.0-85125291913-
dc.identifier.wosid000822369300001-
dc.identifier.bibliographicCitationIEEE Transactions on Big Data, v.8, no.4, pp 894 - 904-
dc.citation.titleIEEE Transactions on Big Data-
dc.citation.volume8-
dc.citation.number4-
dc.citation.startPage894-
dc.citation.endPage904-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusCOMPLEX NETWORKS-
dc.subject.keywordPlusPERTURBATION-
dc.subject.keywordPlusATTACK-
dc.subject.keywordAuthorDetection algorithms-
dc.subject.keywordAuthorSocial networking (online)-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorImage edge detection-
dc.subject.keywordAuthorComplex networks-
dc.subject.keywordAuthorBig Data-
dc.subject.keywordAuthorOptimization-
dc.subject.keywordAuthorOverlapping community detection-
dc.subject.keywordAuthorcommunity deception-
dc.subject.keywordAuthorhiding-
dc.subject.keywordAuthorprivacy protection-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/9716832-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF ENGINEERING SCIENCES > SCHOOL OF ELECTRICAL ENGINEERING > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher JIN, HU photo

JIN, HU
ERICA 공학대학 (SCHOOL OF ELECTRICAL ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE