2019
DOI: 10.3390/fi11120254
|View full text |Cite
|
Sign up to set email alerts
|

Research on Community Detection of Online Social Network Members Based on the Sparse Subspace Clustering Approach

Abstract: The text data of the social network platforms take the form of short texts, and the massive text data have high-dimensional and sparse characteristics, which does not make the traditional clustering algorithm perform well. In this paper, a new community detection method based on the sparse subspace clustering (SSC) algorithm is proposed to deal with the problem of sparsity and the high-dimensional characteristic of short texts in online social networks. The main ideal is as follows. First, the structured data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…proposed ISESS system to reduce the impact of flooding attack [28]. Zhou detected denial of service attack by studying the behaviour model of SIP transaction state machine [29]. Malicious code is a very abstract concept, as defined in the English–Chinese Information security dictionary as software or firmware that can complete some unauthorized function on an information system, taking advantage of system defects, computer viruses and Trojan horses.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…proposed ISESS system to reduce the impact of flooding attack [28]. Zhou detected denial of service attack by studying the behaviour model of SIP transaction state machine [29]. Malicious code is a very abstract concept, as defined in the English–Chinese Information security dictionary as software or firmware that can complete some unauthorized function on an information system, taking advantage of system defects, computer viruses and Trojan horses.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Liu et al proposed ISESS system to reduce the impact of flooding attack[28]. Zhou detected denial of service attack by studying the behaviour model of SIP transaction state machine[29]…”
mentioning
confidence: 99%