Computer Science ›› 2026, Vol. 53 ›› Issue (3): 166-172.doi: 10.11896/jsjkx.250400086
• Database & Big Data & Data Science • Previous Articles Next Articles
HOU Jingle1, LI Zhengjun2, DAI Qiangqiang1, LI Ronghua1, WANG Guoren1
CLC Number:
| [1]DU N,WU B,PEI X,et al.Community detection in large-scale social networks[C]//Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis.2007:16-25. [2]XIE J,KELLEY S,SZYMANSKI B K.Overlapping community detection in networks:The state-ofthe-art and comparative study[J].ACM Computer Surveys,2013,45(4):43:1-43:35. [3]TANG G,PEI J,LUK W.Email mining:tasks,common techniques,and tools[J].Knowledge and Information Systems,2014,41(1):1-31. [4]CAPOCCI A,SERVEDIO V D,COLAIORI F,et al.Preferentialattachment in the growth of social networks:The internet encyclopedia Wikipedia[J].Physical Review E,2006,74(3):036116. [5]KLEINBERG J M.Authoritative sources in a hyperlinked environment[J].Journal of the ACM,1999,46(5):604-632. [6]LI Z,XIONG H,LIU Y,et al.Detecting blackhole and volcano patterns in directed networks[C]//Proceedings of the 2010 IEEE International Conference on Data Mining.2010:294-303. [7]ZHANG J,WANG C,WANG J.Who proposed the relation-ship?:recovering the hidden directions of undirected social networks[C]//Proceedings of the 23rd International Conference on World Wide Web.ACM,2014:807-818. [8]GIATSIDIS C,THILIKOS D M,VAZIRGIANNIS M.D-cores:measuring collaboration of directed graphs based on degeneracy[J].Knowledge and Information Systems,2013,35(2):311-343. [9]MA C,FANG Y,CHENG R,et al.Efficient algorithms for densest subgraph discovery on large directed graphs[C]//Procee-dings of the 2020 ACM SIGMOD International Conference on Management of Data.ACM,2020:1051-1066. [10]GUO G,YAN D,YUAN L,et al.Maximal directed quasi-clique mining[C]//Proceedings of the 38th IEEE International Confe-rence on Data Engineering.IEEE Computer Society,2022:1900-1913. [11]ALBA R D.A graph-theoretic definition of a sociometric clique[J].Journal of Mathematical Sociology,1973,3(1):113-126. [12]FREEMAN L C.The sociological concept of “group”:An empirical test of two models[J].American Journal of Sociology,1992,98(1):152-166. [13]BALASUNDARAM B,BUTENKO S,HICKS I V.Clique relaxations in social network analysis:The maximum k-plex problem[J].Operations Research,2011,59(1):133-142. [14]SEIDMAN S B,FOSTER B L.A graph-theoretic generalization of the clique concept[J].Journal of Mathematical sociology,1978,6(1):139-154. [15]BRON C,KERBOSCH J.Algorithm 457:Finding all cliques of an undirected graph[J].Communications of the ACM,1973,16(9):575-576. [16]WU B,PEI X.A parallel algorithm for enumerating all the maximal k-plexes[C]//Pacific-Asia Conference on Knowledge Discovery and Data Mining.2007:476-483. [17]CONTE A,FIRMANI D,MORDENTE C,et al.Fast enumeration of large k-plexes[C]//Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2017:115-124. [18]CONTE A,MATTEIS T D,SENSI D D,et al.D2K:scalablecommunity detection in massive networks via small-diameter k-plexes[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.2018:1272-1281. [19]CONTE A,KANTÉ M M,UNO T,et al.Maximal strongly connected cliques in directed graphs:algorithms and bounds[J].Discrete Applied Mathematics,2021,303:237-252. [20]CHEN J J,DAI Q Q,LI R H,et al.Research on directed clique enumeration algorithms that satisfy strong connectivity[J].Computer Science and Exploration,2024,18(5):1211-1222. [21]PEARCE D J,KELLY P H J,HANKIN C.Efficient field-sensitive pointer analysis of C[J].ACM Transactions on Programming Languages and Systems,2007,30(1):4. [22]SAITO H,TOYODA M,KITSUREGAWA M,et al.A large-scale study of link spam detection by graph algorithms[C]//Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web.ACM,2007:45-48. |
| [1] | LIU Lilong, LIU Guoming, QI Baoyuan, DENG Xueshan, XUE Dizhan, QIAN Shengsheng. Efficient Inference Techniques of Large Models in Real-world Applications:A Comprehensive Survey [J]. Computer Science, 2026, 53(1): 12-28. |
| [2] | LIU Dayong, DONG Zhiming, GUO Qisheng, GAO Ang, QIU Xuehuan. Research on Architecture and Technology Pathways for Empowering Tactical AdversarialSimulation Experiments with LLMs [J]. Computer Science, 2026, 53(1): 39-50. |
| [3] | WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96. |
| [4] | LIU Hongjian, ZOU Danping, LI Ping. Pedestrian Trajectory Prediction Method Based on Graph Attention Interaction [J]. Computer Science, 2026, 53(1): 97-103. |
| [5] | XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140. |
| [6] | ZHAO Wenhao, MEI Meng, WANG Xiaoping, LUO Hangyu. PKHOI:Enhancing Human-Object Interaction Detection Algorithms with Prior Knowledge [J]. Computer Science, 2026, 53(1): 141-152. |
| [7] | ZHOU Bingquan, JIANG Jie, CHEN Jiangmin, ZHAN Lixin. EvR-DETR:Event-RGB Fusion for Lightweight End-to-End Object Detection [J]. Computer Science, 2026, 53(1): 153-162. |
| [8] | LI Fangfang, KONG Yuqiu, LIU Yang , LI Pengyue. Co-salient Object Detection Guided by Category Labels [J]. Computer Science, 2026, 53(1): 163-172. |
| [9] | LI Ang, ZHANG Jieyuan, LIU Xunyun. Camouflaged Object Detection for Aerial Images Based on Bidirectional Cross-attentionCross-domain Fusion [J]. Computer Science, 2026, 53(1): 173-179. |
| [10] | BU Yunyang, QI Binting, BU Fanliang. Multimodal Sentiment Analysis for Interactive Fusion of Dual Perspectives Under Cross-modalInconsistent Perception [J]. Computer Science, 2026, 53(1): 187-194. |
| [11] | LYU Jinggang, GAO Shuo, LI Yuzhi, ZHOU Jin. Facial Expression Recognition with Channel Attention Guided Global-Local Semantic Cooperation [J]. Computer Science, 2026, 53(1): 195-205. |
| [12] | CHEN Jiwei, CHEN Zebin, TAN Guang. Visual Floorplan Localization Based on BEV Perception [J]. Computer Science, 2026, 53(1): 216-223. |
| [13] | KALZANG Gyatso, NYIMA Tashi, QUN Nuo, GAMA Tashi, DORJE Tashi, LOBSANG Yeshi, LHAMO Kyi, ZOM Kyi. Data Augmentation Methods for Tibetan-Chinese Machine Translation Based on Long-tail Words [J]. Computer Science, 2026, 53(1): 224-230. |
| [14] | JIA Jingdong, HOU Xin, WANG Zhe, HUANG Jian. Research on User Data-driven App Fading Functions [J]. Computer Science, 2026, 53(1): 262-270. |
| [15] | CHEN Zhuangzhuang, DENG Yichen, YU Dunhui, XIAO Kui. Cross-language Knowledge Graph Entity Alignment Based on Meta-learning [J]. Computer Science, 2026, 53(1): 271-277. |
|
||