Skip to main content

2021 | OriginalPaper | Buchkapitel

W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors

verfasst von : Xueming Qiao, Xiangkun Zhang, Ming Xu, Mingyuan Zhai, Mingrui Wu, Dongjie Zhu

Erschienen in: Advances in Artificial Intelligence and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the hidden dangers of network system security are caused by group events. Group analysis and data mining for them are of great significance to ensure network security. Although the existing group detection algorithms have achieved a series of results, they can only be divided on one of the network structure and group attributes, but cannot combine them together, which has certain limitations. The comprehensive vector can be constructed by collecting and mining the group data which cause the hidden danger of security, which can analyze the hidden danger of security from the aspects of network structure and node attribute, so as to realize the guidance and control of group behavior. Therefore, in view of the above problems, this paper proposes a group detection algorithm based on synthesis vector, which can finally find a special group which is closely connected in structure and very similar in attribute. Firstly, the comprehensive similarity is calculated based on the fusion vector in the sharing layer of the comprehensive vector computing model. Then, reconstruct the weighted network diagram. Finally, based on Louvain algorithm, the improvement is carried out. The improved algorithm is referred to as the W-Louvain algorithm. The W-Louvain algorithm is used to divide the groups, and the closely connected vectors in the structure and the very similar vectors in the attributes are divided into the same group. Experiments show that on multiple datasets the evaluation indexes of W-Louvain algorithm, such as modularity Q, number k of community, density D of community and similarity degree S of comprehensive vector attribute, are better than the existing methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat You, C., Zhu, D., Sun, Y.: SNES: social-network-oriented public opinion monitoring platform based on elastic search. Comput. Mater. Continua 61(3), 1271–1283 (2019)CrossRef You, C., Zhu, D., Sun, Y.: SNES: social-network-oriented public opinion monitoring platform based on elastic search. Comput. Mater. Continua 61(3), 1271–1283 (2019)CrossRef
2.
Zurück zum Zitat Chuai, Y.: Security problems and countermeasures of network information construction. Electron. Technol. Softw. Eng. 22, 202–203 (2019) Chuai, Y.: Security problems and countermeasures of network information construction. Electron. Technol. Softw. Eng. 22, 202–203 (2019)
3.
Zurück zum Zitat Pan, L., Wu, P., Huang , D.: Research advances in online social networking groups. J. Electron. Inf. Technol. 39(9), 2097–2107 (2017) Pan, L., Wu, P., Huang , D.: Research advances in online social networking groups. J. Electron. Inf. Technol. 39(9), 2097–2107 (2017)
4.
Zurück zum Zitat Liu, Y., Zhang, J., Chen, J.: A method based on maximum frequent item set mining for weibo hype group discovery. Comput. Eng. Appl. 53(04), 90–97 (2017) Liu, Y., Zhang, J., Chen, J.: A method based on maximum frequent item set mining for weibo hype group discovery. Comput. Eng. Appl. 53(04), 90–97 (2017)
5.
Zurück zum Zitat Wang, Y., Han, T., Zhou, K.: Group discovery algorithm based on key map in public security intelligence. J. Zhejiang Univ. (Eng. Edn.) 51(06), 1173–1180 (2017) Wang, Y., Han, T., Zhou, K.: Group discovery algorithm based on key map in public security intelligence. J. Zhejiang Univ. (Eng. Edn.) 51(06), 1173–1180 (2017)
6.
Zurück zum Zitat He, Z., Wu, M., Li, X.: Overview of data mining. Chinese Foreign Entrepr. 33, 234 (2019) He, Z., Wu, M., Li, X.: Overview of data mining. Chinese Foreign Entrepr. 33, 234 (2019)
7.
Zurück zum Zitat Li, Y.: Research on the application of artificial intelligence in computer network technology in the era of big data. Sci. Technol. Innov. 31, 90–91 (2019) Li, Y.: Research on the application of artificial intelligence in computer network technology in the era of big data. Sci. Technol. Innov. 31, 90–91 (2019)
8.
Zurück zum Zitat Wu, C.: Research on the application of data mining technology in the field of Internet. Comput. Knowl. Technol. 36 (2019) Wu, C.: Research on the application of data mining technology in the field of Internet. Comput. Knowl. Technol. 36 (2019)
9.
Zurück zum Zitat Blondel, V.D., Guillaume, J.L., Lambiotte, R.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), 1–13 (2008) Blondel, V.D., Guillaume, J.L., Lambiotte, R.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), 1–13 (2008)
10.
Zurück zum Zitat Rungan, Z., Yu, W., Xin, C.: Discovery and visualization algorithm of large-scale social network community. Comput. Aided J. Des. Graph. 29(02), 328–336 (2017) Rungan, Z., Yu, W., Xin, C.: Discovery and visualization algorithm of large-scale social network community. Comput. Aided J. Des. Graph. 29(02), 328–336 (2017)
11.
Zurück zum Zitat Atzmueller, M., Doerfel, S., Mitzlaff, F.: Description-oriented community detection using exhaustive subgroup discovery. Inf. Sci. 329 (2016) Atzmueller, M., Doerfel, S., Mitzlaff, F.: Description-oriented community detection using exhaustive subgroup discovery. Inf. Sci. 329 (2016)
12.
Zurück zum Zitat Zhang, B., Zhang, L., Mu, C.: A most influential node group discovery method for influence maximization in social networks: a trust-based perspective. Data Knowl. Eng. 121 (2019) Zhang, B., Zhang, L., Mu, C.: A most influential node group discovery method for influence maximization in social networks: a trust-based perspective. Data Knowl. Eng. 121 (2019)
13.
Zurück zum Zitat Zhu, D., Sun, Y., Li, X.: MINE: a method of multi-interaction heterogeneous information network embedding. Comput. Mater. Continua 63(3), 1343–1356 (2020) Zhu, D., Sun, Y., Li, X.: MINE: a method of multi-interaction heterogeneous information network embedding. Comput. Mater. Continua 63(3), 1343–1356 (2020)
14.
Zurück zum Zitat Zhu, D., Sun, Y., Cao, N.: BDNE: a method of bi-directional distance network embedding. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 158–161. IEEE, Guilin (2019) Zhu, D., Sun, Y., Cao, N.: BDNE: a method of bi-directional distance network embedding. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 158–161. IEEE, Guilin (2019)
15.
Zurück zum Zitat Zhu, D., Wang, Y., You, C., et al.: MMLUP: multi-source & multi-task learning for user profiles in social network. Comput. Mater. Continua 61(3), 1105–1115 (2019) Zhu, D., Wang, Y., You, C., et al.: MMLUP: multi-source & multi-task learning for user profiles in social network. Comput. Mater. Continua 61(3), 1105–1115 (2019)
16.
Zurück zum Zitat Li, P., Peng, W., Danhua, H.: Research progress of online social network group discovery. J. Electron. Inf. Technol. 33(09), 2097–2107 (2017) Li, P., Peng, W., Danhua, H.: Research progress of online social network group discovery. J. Electron. Inf. Technol. 33(09), 2097–2107 (2017)
17.
Zurück zum Zitat Zhenglin, H.: Characteristics of social network crime. Netw. Secur. Technol. Appl. (06), 183–184 (2014) Zhenglin, H.: Characteristics of social network crime. Netw. Secur. Technol. Appl. (06), 183–184 (2014)
Metadaten
Titel
W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors
verfasst von
Xueming Qiao
Xiangkun Zhang
Ming Xu
Mingyuan Zhai
Mingrui Wu
Dongjie Zhu
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-78618-2_11

Premium Partner