Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    ARTICLE

    Deep Learning Social Network Access Control Model Based on User Preferences

    Fangfang Shan1,2,*, Fuyang Li1, Zhenyu Wang1, Peiyu Ji1, Mengyi Wang1, Huifang Sun1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1029-1044, 2024, DOI:10.32604/cmes.2024.047665 - 16 April 2024

    Abstract A deep learning access control model based on user preferences is proposed to address the issue of personal privacy leakage in social networks. Firstly, social users and social data entities are extracted from the social network and used to construct homogeneous and heterogeneous graphs. Secondly, a graph neural network model is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network. Then, high-order neighbor nodes, hidden neighbor nodes, displayed neighbor nodes, and social data nodes are… More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Text-Modal Dominance and Fusing Multiple Multi-Model Clues

    Lifang Fu1, Huanxin Peng2,*, Changjin Ma2, Yuhan Liu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4399-4416, 2024, DOI:10.32604/cmc.2024.047053 - 26 March 2024

    Abstract In recent years, how to efficiently and accurately identify multi-model fake news has become more challenging. First, multi-model data provides more evidence but not all are equally important. Secondly, social structure information has proven to be effective in fake news detection and how to combine it while reducing the noise information is critical. Unfortunately, existing approaches fail to handle these problems. This paper proposes a multi-model fake news detection framework based on Tex-modal Dominance and fusing Multiple Multi-model Cues (TD-MMC), which utilizes three valuable multi-model clues: text-model importance, text-image complementary, and text-image inconsistency. TD-MMC is… More >

  • Open Access

    ARTICLE

    The Social Networking Addiction Scale: Translation and Validation Study among Chinese College Students

    Siyuan Bi1, Junfeng Yuan1,2, Lin Luo1,2,3,*

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 51-60, 2024, DOI:10.32604/ijmhp.2023.041614 - 05 February 2024

    Abstract Purpose: The core component theory of addiction behavior provides a multidimensional theoretical model for measuring social networking addiction. Based on this theoretical model, the Social Networking Addiction Scale (SNAS) was developed. The aim of this study was to test the psychometric properties of the Chinese version of the SNAS (SNAS-C). Methods: This study used a sample of 3383 Chinese university students to conduct confirmatory factor analysis (CFA) to explore the structural validity of the SNAS-C. This study examined the Pearson correlations between the six subscales of the SNAS-C (i.e., salience, mood modification, tolerance, withdrawal symptoms,… More >

  • Open Access

    ARTICLE

    A Weighted Multi-Layer Analytics Based Model for Emoji Recommendation

    Amira M. Idrees1,*, Abdul Lateef Marzouq Al-Solami2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1115-1133, 2024, DOI:10.32604/cmc.2023.046457 - 30 January 2024

    Abstract The developed system for eye and face detection using Convolutional Neural Networks (CNN) models, followed by eye classification and voice-based assistance, has shown promising potential in enhancing accessibility for individuals with visual impairments. The modular approach implemented in this research allows for a seamless flow of information and assistance between the different components of the system. This research significantly contributes to the field of accessibility technology by integrating computer vision, natural language processing, and voice technologies. By leveraging these advancements, the developed system offers a practical and efficient solution for assisting blind individuals. The modular… More >

  • Open Access

    ARTICLE

    A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating

    Rongrong Ren1,2, Luyang Su1,2, Xinyu Meng1,2, Jianfang Wang3, Meng Zhao1,2,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 429-458, 2024, DOI:10.32604/cmes.2023.027310 - 22 September 2023

    Abstract With the development of big data and social computing, large-scale group decision making (LGDM) is now merging with social networks. Using social network analysis (SNA), this study proposes an LGDM consensus model that considers the trust relationship among decision makers (DMs). In the process of consensus measurement: the social network is constructed according to the social relationship among DMs, and the Louvain method is introduced to classify social networks to form subgroups. In this study, the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights. In the… More >

  • Open Access

    ARTICLE

    Real-Time Spammers Detection Based on Metadata Features with Machine Learning

    Adnan Ali1, Jinlong Li1, Huanhuan Chen1, Uzair Aslam Bhatti2, Asad Khan3,*

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 241-258, 2023, DOI:10.32604/iasc.2023.041645 - 27 February 2024

    Abstract Spammer detection is to identify and block malicious activities performing users. Such users should be identified and terminated from social media to keep the social media process organic and to maintain the integrity of online social spaces. Previous research aimed to find spammers based on hybrid approaches of graph mining, posted content, and metadata, using small and manually labeled datasets. However, such hybrid approaches are unscalable, not robust, particular dataset dependent, and require numerous parameters, complex graphs, and natural language processing (NLP) resources to make decisions, which makes spammer detection impractical for real-time detection. For… More >

  • Open Access

    ARTICLE

    Maximizing Influence in Temporal Social Networks: A Node Feature-Aware Voting Algorithm

    Wenlong Zhu1,2,*, Yu Miao1, Shuangshuang Yang3, Zuozheng Lian1,2, Lianhe Cui1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3095-3117, 2023, DOI:10.32604/cmc.2023.045646 - 26 December 2023

    Abstract Influence Maximization (IM) aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes. However, most existing studies on the IM problem focus on static social network features, while neglecting the features of temporal social networks. To bridge this gap, we focus on node features reflected by their historical interaction behavior in temporal social networks, i.e., interaction attributes and self-similarity, and incorporate them into the influence maximization algorithm and information propagation model. Firstly, we propose… More >

  • Open Access

    ARTICLE

    A Positive Influence Maximization Algorithm in Signed Social Networks

    Wenlong Zhu1,2,*, Yang Huang1, Shuangshuang Yang3, Yu Miao1, Chongyuan Peng1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1977-1994, 2023, DOI:10.32604/cmc.2023.040998 - 30 August 2023

    Abstract The influence maximization (IM) problem aims to find a set of seed nodes that maximizes the spread of their influence in a social network. The positive influence maximization (PIM) problem is an extension of the IM problem, which consider the polar relation of nodes in signed social networks so that the positive influence of seeds can be the most widely spread. To solve the PIM problem, this paper proposes the polar and decay related independent cascade (IC-PD) model to simulate the influence propagation of nodes and the decay of information during the influence propagation in… More >

  • Open Access

    ARTICLE

    Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China

    Xiaolin Lu1,*, Xiaolei Miao2

    International Journal of Mental Health Promotion, Vol.25, No.9, pp. 1041-1052, 2023, DOI:10.32604/ijmhp.2023.030232 - 10 August 2023

    Abstract Background: During the early stages of the COVID-19 pandemic in China, social interactions shifted to online spaces due to lock-downs and social distancing measures. As a result, the impact of online social networking on users’ emotional status has become stronger than ever. This study examines the association between online social networking and Internet users’ emotional status and how offline reality affects this relationship. Methods: The study utilizes cross-sectional online survey data (n = 3004) and Baidu Migration big data from the first 3 months of the pandemic. Two dimensions of online networking are measured: social… More > Graphic Abstract

    Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China

  • Open Access

    ARTICLE

    Deep Neural Network for Detecting Fake Profiles in Social Networks

    Daniyal Amankeldin1, Lyailya Kurmangaziyeva2, Ayman Mailybayeva2, Natalya Glazyrina1, Ainur Zhumadillayeva1,*, Nurzhamal Karasheva3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1091-1108, 2023, DOI:10.32604/csse.2023.039503 - 26 May 2023

    Abstract This paper proposes a deep neural network (DNN) approach for detecting fake profiles in social networks. The DNN model is trained on a large dataset of real and fake profiles and is designed to learn complex features and patterns that distinguish between the two types of profiles. In addition, the present research aims to determine the minimum set of profile data required for recognizing fake profiles on Facebook and propose the deep convolutional neural network method for fake accounts detection on social networks, which has been developed using 16 features based on content-based and profile-based… More >

Displaying 21-30 on page 3 of 93. Per Page