W Li, K Zhong, J Wang, D Chen - Expert Systems with Applications, 2021 - Elsevier
… based on the relative entropy, instead of the Euclidean distance. This is because, … social networks, the similarity betweenusers is the similarity of the information carried by the users…
Y Li, Z Su, J Yang, C Gao - Information Sciences, 2020 - Elsevier
… We apply these information redundancies in several classifiers to study their contributions to useridentification. Furthermore, we apply the friendship-basedinformation redundancies …
T Wen, Y Deng - Information Sciences, 2020 - Elsevier
… the network, including the identification of important nodes. … identify influential nodes on the basis of the local information … the information in boxes through the Shannonentropy, which is …
ED Raj, G Manogaran, G Srivastava… - … on Computational Social …, 2020 - ieeexplore.ieee.org
… a rough set-based granular framework for socialnetwork analysis, which will act … entropy of the real networks is shown in Fig. 4. The entropy decreases initially for all the real networks …
T Zhu, J Li, X Hu, P Xiong… - … on Knowledge and Data …, 2020 - ieeexplore.ieee.org
… The privacy that an adversary can obtain is evaluated by the the divergence between the informationentropy HšXŽ of the target node and the entropy HšXaŽ that an adversary has …
… It uses the principle of Entropy and Information Gain to build the decision tree. The entropy is … The below-mentioned equation shows the entropy with two different attributes for our data …
… based on their interests and socialconnections has became a more and more important challenge in literature. Community Detection … normalized conditional entropybetween the two …
… outperform all traditional methods. For the first time in the literature, we offer to useentropy … Equipping the proposed hybridized type aggregation techniques with the entropy calculation…
XL Yan, YP Cui, SJ Ni - Chinese physics B, 2020 - iopscience.iop.org
… According to the four kinds of main characteristics of nodes, we divide several basic centrality methods into four groups and design different combination schemes. Then, we useentropy …