Full text

Turn on search term navigation

© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Community detection has been a subject of extensive research due to its broad applications across social media, computer science, biology, and complex systems. Modularity stands out as a predominant metric guiding community detection, with numerous algorithms aimed at maximizing modularity. However, modularity encounters a resolution limit problem when identifying small community structures. To tackle this challenge, this paper presents a novel approach by defining community structure information from the perspective of encoding edge information. This pioneering definition lays the foundation for the proposed fast community detection algorithm CSIM, boasting an average time complexity of only O(nlogn). Experimental results showcase that communities identified via the CSIM algorithm across various graph data types closely resemble ground truth community structures compared to those revealed via modularity-based algorithms. Furthermore, CSIM not only boasts lower time complexity than greedy algorithms optimizing community structure information but also achieves superior optimization results. Notably, in cyclic network graphs, CSIM surpasses modularity-based algorithms in effectively addressing the resolution limit problem.

Details

Title
CSIM: A Fast Community Detection Algorithm Based on Structure Information Maximization
Author
Liu, Yiwei 1   VIAFID ORCID Logo  ; Liu, Wencong 2 ; Tang, Xiangyun 3   VIAFID ORCID Logo  ; Yin, Hao 4 ; Yin, Peng 5 ; Xu, Xin 1 ; Wang, Yanbin 6 

 Defence Industry Secrecy Examination and Certification Center, Beijing 100089, China; [email protected] (Y.L.); [email protected] (P.Y.); [email protected] (X.X.) 
 School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China; [email protected] 
 School of Information Engineering, Minzu University of China, Beijing 100081, China; [email protected] 
 Research Center of Cyberspace Security, PKU-Changsha Institute for Computing and Digital Economy, Changsha 410205, China; [email protected] 
 Defence Industry Secrecy Examination and Certification Center, Beijing 100089, China; [email protected] (Y.L.); [email protected] (P.Y.); [email protected] (X.X.); School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100085, China 
 College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 
First page
1119
Publication year
2024
Publication date
2024
Publisher
MDPI AG
e-ISSN
20799292
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2999377829
Copyright
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.