[HTML][HTML] Graph theory: A comprehensive survey about graph theory applications in computer science and social networks

A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …

[HTML][HTML] The influences of the COVID-19 pandemic on medical service behaviors

WH Chang - Taiwanese Journal of Obstetrics and Gynecology, 2020 - Elsevier
The outbreak of the novel coronavirus (COVID-19) has greatly impacted medical services
worldwide. In addition to changing the processes used by hospital medical services, it has …

[HTML][HTML] A Semantic-enhancement-based social network user-alignment algorithm

Y Huang, P Zhao, Q Zhang, L Xing, H Wu, H Ma - Entropy, 2023 - mdpi.com
User alignment can associate multiple social network accounts of the same user. It has
important research implications. However, the same user has various behaviors and friends …

[HTML][HTML] SiMAIM: identifying sockpuppets and puppetmasters on a single forum-oriented social media site

YH Liu, CY Kuo - The Journal of Supercomputing, 2023 - Springer
With the Internet becoming indispensable in our lives, social media has become an integral
part of our lives. However, with this has come the phenomenon of a single user registering …

Exploiting Two‐Level Information Entropy across Social Networks for User Identification

L Xing, K Deng, H Wu, P Xie… - … and Mobile Computing, 2021 - Wiley Online Library
As the popularity of online social networks has grown, more and more users now hold
multiple virtual accounts at the same time. Under these circumstances, identifying multiple …

Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm

NJ Uke, SA Lokhande, P Kale, SD Pawar… - Cluster …, 2024 - Springer
Over the past few years, global use of Online Social Networks (OSNs) has increased. The
rising use of OSN makes protecting users' privacy from OSN attacks difficult. Finally, it affects …

[HTML][HTML] Exploiting user friendship networks for user identification across social networks

Y Qu, L Xing, H Ma, H Wu, K Zhang, K Deng - Symmetry, 2022 - mdpi.com
Identifying offline entities corresponding to multiple virtual accounts of users across social
networks is crucial for the development of related fields, such as user recommendation …

[HTML][HTML] A survey on social network's anomalous behavior detection

L Xing, S Li, Q Zhang, H Wu, H Ma, X Zhang - Complex & Intelligent …, 2024 - Springer
The onset of Web 3.0 has catalyzed the rapid advancement of social networking,
transforming platforms into essential elements deeply embedded within the fabric of daily …

[HTML][HTML] Cross-Social-Network User Identification Based on Bidirectional GCN and MNF-UI Models

S Huang, H Xiang, C Leng, F Xiao - Electronics, 2024 - mdpi.com
Due to the distinct functionalities of various social network platforms, users often register
accounts on different platforms, posing significant challenges for unified user management …

[HTML][HTML] A Multiple Salient Features-Based User Identification across Social Media

Y Qu, H Ma, H Wu, K Zhang, K Deng - Entropy, 2022 - mdpi.com
Identifying users across social media has practical applications in many research areas,
such as user behavior prediction, commercial recommendation systems, and information …