• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin. Target Community Detection with User Interest Preferences and Influence[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82. DOI: 10.7544/issn1000-1239.2021.20190775
Citation: Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin. Target Community Detection with User Interest Preferences and Influence[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82. DOI: 10.7544/issn1000-1239.2021.20190775

Target Community Detection with User Interest Preferences and Influence

Funds: This work was supported by the National Natural Science Foundation of China (61762078, 61363058,61966004), the Research Fund of Guangxi Key Laboratory of Multi-Source Information Mining & Security (MIMS18-08), and the Research Fund of Northwest Normal University Young Teachers Research Capacity Promotion Plan (NWNU-LKQN2019-2).
More Information
  • Published Date: December 31, 2020
  • Target community detection is to find the cohesive communities consistent with user’s preference. However, all the existing works either largely ignore the outer influence of the communities, or not “target-based”, i.e., they are not suitable for a target request. To solve the above problems, in this paper, the target community detection with user interest preferences and influence (TCPI) is proposed to locate the most influential and high-quality community related to user’s preference. Firstly, the node structure and attribute information are synthesized, and maximum k-cliques containing sample nodes are investigated as the core of the potential target community, and an entropy weighted attribute weight calculation method is designed to capture the attribute subspace weight of the potential target community. Secondly, the internal compactness and the external separability of the community is defined as the community quality function and the high-quality potential target community is expanded with each of the maximum k-cliques as the core. Finally, the external impact score of the community is defined, and all potential target communities are ranked according to the quality function and the external impact score of the community, and the communities with higher comprehensive quality are decided as the target communities. In addition, a pruning strategy of two-level is designed to improve the performance and efficiency of the algorithm after calculating the attribute subspace weights of all maximal k-cliques. Experimental results on synthetic networks and real-world network datasets verify the efficiency and effectiveness of the proposed method.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Zhang Ming, Hua Yu, Liu Lurong, Hu Rong, Li Ziyi. A Write-Optimized Re-computation Scheme for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(2): 243-256. DOI: 10.7544/issn1000-1239.2020.20190524
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Extending PCM Lifetime by Redirecting Writes from the Most Modified Byte[J]. Journal of Computer Research and Development, 2019, 56(12): 2733-2743. DOI: 10.7544/issn1000-1239.2019.20180267
    [5]Niu Dejiao, He Qingjian, Cai Tao, Wang Jie, Zhan Yongzhao, Liang Jun. APMSS: The New Solid Storage System with Asymmetric Interface[J]. Journal of Computer Research and Development, 2018, 55(9): 2083-2093. DOI: 10.7544/issn1000-1239.2018.20180198
    [6]Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing. Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels[J]. Journal of Computer Research and Development, 2014, 51(7): 1594-1603.
    [7]Sun Zhizhuo, Zhang Quanxin, Li Yuanzhang, Tan Yu'an, Liu Jingyu, Ma Zhongmei. Write Optimization for RAID5 in Sequential Data Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1604-1612.
    [8]Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei. Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address[J]. Journal of Computer Research and Development, 2011, 48(8): 1455-1463.
    [9]Qiu Yuanjie and Liu Xinsong. Writing Mechanism in Digital Organism File System[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (910) PDF downloads (578) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return