Exploring Uncertainty Methods for Centrality Analysis in Social Networks

Author(s):  
Xianglin Zuo ◽  
Bo Yang ◽  
Wanli Zuo
Author(s):  
Natalia Nikolaevna Gorlushkina ◽  
Sergei Evgenievich Ivanov ◽  
Lubov Nikolaevna Ivanova

The subject of the research is the methods of network cyberspace analysis based on graph models. The analysis allows to find leaders of groups and communities, to find cohesive groups and visualize the results. The main methods of the graph theory used for cyberspace social networks are the methods of analyzing the centrality to determine the relative weight or importance of the vertices of the graph. There are known methods for analyzing centralities: by degree, by proximity, by mediation, by radiality, by eccentricity, by status, eigenvector, referential ranking. The disadvantage of these methods is that they are based only on one or several properties of the network participant. Based on the centrality analysis methods, a new generalized centrality method is proposed, taking into account such participant properties as the participant's popularity, the importance and speed of information dissemination in the cyberspace network. A mathematical model of a new method of generalized centrality has been developed. Comparison of the results of the presented method with the methods of the analysis of centralities is performed. As a visual example, a subgroup of cyberspace consisting of twenty participants, represented by a graph model, is analyzed. Comparative analysis showed the accuracy of the method of generalized centrality, taking into account at once a number of factors and properties of the network participant.


Author(s):  
Katerina Pechlivanidou ◽  
Dimitrios Katsaros ◽  
Leandros Tassiulas

Complex network analysis comprises a popular set of tools for the analysis of online social networks. Among these techniques, k-shell decomposition of a network is a technique that has been used for centrality analysis, for communities' discovery, for the detection of influential spreaders, and so on. The huge volume of input graphs and the environments where the algorithm needs to run, i.e., large data centers, makes none of the existing algorithms appropriate for the decomposition of graphs into shells. In this article, we develop for a distributed algorithm based on MapReduce for the k-shell decomposition of a graph. We furthermore, provide an implementation and assessment of the algorithm using real social network datasets. We analyze the tradeoffs and speedup of the proposed algorithm and conclude for its virtues and shortcomings.


2021 ◽  
Vol 2082 (1) ◽  
pp. 012010
Author(s):  
Yuning Song ◽  
Liping Ding ◽  
Mengying Dong ◽  
Xuehua Liu ◽  
Xiao Wang

Abstract With the advent of the big data era and the advancement of social network analysis, the public is increasingly concerned about the privacy protection in today’s complex social networks. For the past few years, the rapid development of differential privacy (DP) technology, as a method with a reliable theoretical basis, can effectively solve the key problem of how to “disassociate” personal information in social networks. This paper focuses on the multi-mode heterogeneous network model which has attracted a lot of attention in the field of network research. It introduces differential privacy and its application in big social networks briefly first, and then proposes a centrality-analysis method based on DP in a typical social network, i.e. the multi-mode network. The calculation principle and applicable scenarios are discussed. Then, its utility is analyzed and evaluated through experimental simulation. Possible improvement of DP algorithm in multi-mode networks above is prospected in the end.


Sign in / Sign up

Export Citation Format

Share Document