Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (74)
  • Open Access

    ARTICLE

    SPN-Based Performance Analysis of Multiple Users’ Behaviors for SNS

    Zhiguo Hong1,*, Yongbin Wang2,3, Minyong Shi4

    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 1-13, 2022, DOI:10.32604/jihpp.2022.026440

    Abstract With the rapid development of various applications of Information Technology, big data are increasingly generated by social network services (SNS) nowadays. The designers and providers of SNS distribute different client applications for PC, Mobile phone, IPTV etc., so that users can obtain related service via mobile or traditional Internet. Good scalability and considerably short time delay are important indices for evaluating social network systems. As a result, investigating and mining the principle of users’ behaviors is an important issue which can guide service providers to establish optimal systems with SNS. On the basis of analyzing the characteristics of social network… More >

  • Open Access

    ARTICLE

    SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Networking

    Amel Boudelaa1, Zohra Abdelhafidi1, Nasreddine Lagraa1, Chaker Abdelaziz Kerrache1, Muhammad Bilal2, Daehan Kwak3,*, Mohamed Bachir Yagoubi1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2495-2512, 2022, DOI:10.32604/cmc.2022.028619

    Abstract Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations. However, content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’ high mobility. Our aim with this paper is to improve content delivery and… More >

  • Open Access

    ARTICLE

    Detection of Toxic Content on Social Networking Platforms Using Fine Tuned ULMFiT Model

    Hafsa Naveed1, Abid Sohail2, Jasni Mohamad Zain3,*, Noman Saleem4, Rao Faizan Ali5, Shahid Anwar6

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 15-30, 2023, DOI:10.32604/iasc.2023.023277

    Abstract Question and answer websites such as Quora, Stack Overflow, Yahoo Answers and Answer Bag are used by professionals. Multiple users post questions on these websites to get the answers from domain specific professionals. These websites are multilingual meaning they are available in many different languages. Current problem for these types of websites is to handle meaningless and irrelevant content. In this paper we have worked on the Quora insincere questions (questions which are based on false assumptions or questions which are trying to make a statement rather than seeking for helpful answers) dataset in order to identify user insincere questions,… More >

  • Open Access

    ARTICLE

    Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks

    Ashit Kumar Dutta1,*, Basit Qureshi2, Yasser Albagory3, Majed Alsanea4, Anas Waleed AbulFaraj5, Abdul Rahaman Wahab Sait6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2097-2110, 2022, DOI:10.32604/iasc.2022.027500

    Abstract Recently, the exponential utilization of Internet has posed several cybersecurity issues in social networks. Particularly, cyberbulling becomes a common threat to users in real time environment. Automated detection and classification of cyberbullying in social networks become an essential task, which can be derived by the use of machine learning (ML) and deep learning (DL) approaches. Since the hyperparameters of the DL model are important for optimal outcomes, appropriate tuning strategy becomes important by the use of metaheuristic optimization algorithms. In this study, an effective glowworm swarm optimization (GSO) with deep neural network (DNN) model named EGSO-DNN is derived for cybersecurity… More >

  • Open Access

    ARTICLE

    Customized Share Level Monitoring System for Users in OSN-Third Party Applications

    T. Shanmuigapriya1,*, S. Swamynathan2, Thiruvaazhi Uloli3

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1327-1339, 2022, DOI:10.32604/csse.2022.024440

    Abstract Preserving privacy of the user is a very critical requirement to be met with all the international laws like GDPR, California privacy protection act and many other bills in place. On the other hand, Online Social Networks (OSN) has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and external applications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as… More >

  • Open Access

    ARTICLE

    Deep Contextual Learning for Event-Based Potential User Recommendation in Online Social Networks

    T. Manojpraphakar*, A. Soundarrajan

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 699-713, 2022, DOI:10.32604/iasc.2022.025090

    Abstract Event recommendation allows people to identify various recent upcoming social events. Based on the Profile or User recommendation people will identify the group of users to subscribe the event and to participate, despite it faces cold-start issues intrinsically. The existing models exploit multiple contextual factors to mitigate the cold-start issues in essential applications on profile recommendations to the event. However, those existing solution does not incorporate the correlation and covariance measures among various contextual factors. Moreover, recommending similar profiles to various groups of the events also has not been well analyzed in the existing literature. The proposed prototype model Correlation… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning-based Cyberattack Detection and Classification Technique on Social Networks

    Amani Abdulrahman Albraikan1, Siwar Ben Haj Hassine2, Suliman Mohamed Fati3, Fahd N. Al-Wesabi2,4, Anwer Mustafa Hilal5,*, Abdelwahed Motwakel5, Manar Ahmed Hamza5, Mesfer Al Duhayyim6

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 907-923, 2022, DOI:10.32604/cmc.2022.024488

    Abstract Cyberbullying (CB) is a distressing online behavior that disturbs mental health significantly. Earlier studies have employed statistical and Machine Learning (ML) techniques for CB detection. With this motivation, the current paper presents an Optimal Deep Learning-based Cyberbullying Detection and Classification (ODL-CDC) technique for CB detection in social networks. The proposed ODL-CDC technique involves different processes such as pre-processing, prediction, and hyperparameter optimization. In addition, GloVe approach is employed in the generation of word embedding. Besides, the pre-processed data is fed into Bidirectional Gated Recurrent Neural Network (BiGRNN) model for prediction. Moreover, hyperparameter tuning of BiGRNN model is carried out with… More >

  • Open Access

    ARTICLE

    A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks

    Vivek Kumar Sinha1, Divya Anand1,*, Fahd S. Alharithi2, Ahmed H. Almulihi2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6293-6305, 2022, DOI:10.32604/cmc.2022.024877

    Abstract The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server. There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server. However, existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as man-in-the-middle, brute-force attacks, and many others in social networks. In this article, the authors proposed an improved as well as safe 3PAKE protocol based on the hash… More >

  • Open Access

    ARTICLE

    Social Networks Fake Account and Fake News Identification with Reliable Deep Learning

    N. Kanagavalli1,*, S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 191-205, 2022, DOI:10.32604/iasc.2022.022720

    Abstract Recent developments of the World Wide Web (WWW) and social networking (Twitter, Instagram, etc.) paves way for data sharing which has never been observed in the human history before. A major security issue in this network is the creation of fake accounts. In addition, the automatic classification of the text article as true or fake is also a crucial process. The ineffectiveness of humans in distinguishing the true and false information exposes the fake news as a risk to credibility, democracy, logical truth, and journalism in government sectors. Besides, the automatic fake news or rumors from the social networking sites… More >

  • Open Access

    ARTICLE

    Optimal Data Placement and Replication Approach for SIoT with Edge

    B. Prabhu Shankar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 661-676, 2022, DOI:10.32604/csse.2022.019507

    Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low latency. The major issue is… More >

Displaying 31-40 on page 4 of 74. Per Page