Skip to main content

W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1423))

Included in the following conference series:

Abstract

Most of the hidden dangers of network system security are caused by group events. Group analysis and data mining for them are of great significance to ensure network security. Although the existing group detection algorithms have achieved a series of results, they can only be divided on one of the network structure and group attributes, but cannot combine them together, which has certain limitations. The comprehensive vector can be constructed by collecting and mining the group data which cause the hidden danger of security, which can analyze the hidden danger of security from the aspects of network structure and node attribute, so as to realize the guidance and control of group behavior. Therefore, in view of the above problems, this paper proposes a group detection algorithm based on synthesis vector, which can finally find a special group which is closely connected in structure and very similar in attribute. Firstly, the comprehensive similarity is calculated based on the fusion vector in the sharing layer of the comprehensive vector computing model. Then, reconstruct the weighted network diagram. Finally, based on Louvain algorithm, the improvement is carried out. The improved algorithm is referred to as the W-Louvain algorithm. The W-Louvain algorithm is used to divide the groups, and the closely connected vectors in the structure and the very similar vectors in the attributes are divided into the same group. Experiments show that on multiple datasets the evaluation indexes of W-Louvain algorithm, such as modularity Q, number k of community, density D of community and similarity degree S of comprehensive vector attribute, are better than the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. You, C., Zhu, D., Sun, Y.: SNES: social-network-oriented public opinion monitoring platform based on elastic search. Comput. Mater. Continua 61(3), 1271–1283 (2019)

    Article  Google Scholar 

  2. Chuai, Y.: Security problems and countermeasures of network information construction. Electron. Technol. Softw. Eng. 22, 202–203 (2019)

    Google Scholar 

  3. Pan, L., Wu, P., Huang , D.: Research advances in online social networking groups. J. Electron. Inf. Technol. 39(9), 2097–2107 (2017)

    Google Scholar 

  4. Liu, Y., Zhang, J., Chen, J.: A method based on maximum frequent item set mining for weibo hype group discovery. Comput. Eng. Appl. 53(04), 90–97 (2017)

    Google Scholar 

  5. Wang, Y., Han, T., Zhou, K.: Group discovery algorithm based on key map in public security intelligence. J. Zhejiang Univ. (Eng. Edn.) 51(06), 1173–1180 (2017)

    Google Scholar 

  6. He, Z., Wu, M., Li, X.: Overview of data mining. Chinese Foreign Entrepr. 33, 234 (2019)

    Google Scholar 

  7. Li, Y.: Research on the application of artificial intelligence in computer network technology in the era of big data. Sci. Technol. Innov. 31, 90–91 (2019)

    Google Scholar 

  8. Wu, C.: Research on the application of data mining technology in the field of Internet. Comput. Knowl. Technol. 36 (2019)

    Google Scholar 

  9. Blondel, V.D., Guillaume, J.L., Lambiotte, R.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), 1–13 (2008)

    Google Scholar 

  10. Rungan, Z., Yu, W., Xin, C.: Discovery and visualization algorithm of large-scale social network community. Comput. Aided J. Des. Graph. 29(02), 328–336 (2017)

    Google Scholar 

  11. Atzmueller, M., Doerfel, S., Mitzlaff, F.: Description-oriented community detection using exhaustive subgroup discovery. Inf. Sci. 329 (2016)

    Google Scholar 

  12. Zhang, B., Zhang, L., Mu, C.: A most influential node group discovery method for influence maximization in social networks: a trust-based perspective. Data Knowl. Eng. 121 (2019)

    Google Scholar 

  13. Zhu, D., Sun, Y., Li, X.: MINE: a method of multi-interaction heterogeneous information network embedding. Comput. Mater. Continua 63(3), 1343–1356 (2020)

    Google Scholar 

  14. Zhu, D., Sun, Y., Cao, N.: BDNE: a method of bi-directional distance network embedding. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 158–161. IEEE, Guilin (2019)

    Google Scholar 

  15. Zhu, D., Wang, Y., You, C., et al.: MMLUP: multi-source & multi-task learning for user profiles in social network. Comput. Mater. Continua 61(3), 1105–1115 (2019)

    Google Scholar 

  16. Li, P., Peng, W., Danhua, H.: Research progress of online social network group discovery. J. Electron. Inf. Technol. 33(09), 2097–2107 (2017)

    Google Scholar 

  17. Zhenglin, H.: Characteristics of social network crime. Netw. Secur. Technol. Appl. (06), 183–184 (2014)

    Google Scholar 

Download references

Acknowledgement

This work is supported by State Grid Shandong Electric Power Company Science and Technology Project Funding under Grant no.520613200001,520613180002, 62061318C002, Weihai Scientific Research and Innovation Fund (2020) and the Grant 19YG02, Sanming University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongjie Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiao, X., Zhang, X., Xu, M., Zhai, M., Wu, M., Zhu, D. (2021). W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1423. Springer, Cham. https://doi.org/10.1007/978-3-030-78618-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78618-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78617-5

  • Online ISBN: 978-3-030-78618-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics