Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Nonuniform time slicing method based on prediction of community variance
Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN
Journal of Computer Applications    2023, 43 (11): 3457-3463.   DOI: 10.11772/j.issn.1001-9081.2022111736
Abstract131)   HTML2)    PDF (1001KB)(67)       Save

Time slicing methods in dynamic networks greatly influence the accuracy of community evolution analysis results. As communities vary nonlinearly with time and network topology, both the existing uniform time slicing method and network topology variance-based nonuniform time slicing method are unsatisfactory in capturing community evolution events. Therefore, a nonuniform time slicing method based on prediction of community variance was proposed, where the community variance is quantitatively described by the difference between the community modularity expected to be achieved by the updated network and the community modularity obtained by directly applying the community detection results of the network before changing. Firstly, the prediction model of community modularity was established on the basis of time series analysis. Secondly, with the established model, the expected community modularity of the updated network was predicted, and the prediction value of community variance was obtained. Finally, once the prediction value surpassed a previously set threshold, a new time slice was generated. Experimental results on two real network datasets show that compared with the traditional uniform time slicing method and the nonuniform time slicing method based on network topology variance, on the dynamic network dataset Arxiv HEP-PH, the proposed method identifies community disappearance events 1.10 days and 1.30 days earlier, respectively, and identifies the community forming events 8.34 days and 3.34 days earlier, respectively, and the total number of identified community shrinking and growing events increased by 10 and 1 respectively. On Sx?MathOverflow dataset, the proposed method identifies community disappearance events 3.30 days and 1.80 days earlier, and identifies the community forming events 6.41 days and 2.97 days earlier respectively, and the total number of identified community shrinking and growing events increased by 15 and 7, respectively.

Table and Figures | Reference | Related Articles | Metrics
Analysis of complex spam filtering algorithm based on neural network
Jian ZHANG, Ke YAN, Xiang MA
Journal of Computer Applications    2022, 42 (3): 770-777.   DOI: 10.11772/j.issn.1001-9081.2021040791
Abstract327)   HTML14)    PDF (610KB)(131)       Save

The recognition of spam is one of the main tasks in natural language processing. The traditional methods are based on text features or word frequency, which recognition accuracies mainly depend on the presence or absence of specific keywords. When there are no keywords or errors in recognizing keywords in the spam, the traditional methods have poor recognition performance. Neural network-based methods were proposed. Recognition training and testing were conducted on complex spam. The spams that cannot be recognized by traditional methods were collected and the same amount of normal information was randomly selected from spam messages, advertisement and spam email datasets to form three new datasets without duplicate data. Three models were proposed based on convolutional neural network and recurrent neural network and tested on three new datasets for spam recognition. The experimental results show that the neural network-based models learned better semantic features from the text and achieved the accuracies of more than 98% on all three datasets, which are significantly higher than those of the traditional methods, such as Naive Bayes (NB), Random Forest (RF) and Support Vector Machine (SVM). The experimental results also show that different neural networks are suitable for text classification with different lengths. The models composed of recurrent neural networks are good at recognizing text with sentence length, the models composed of convolutional neural networks are good at recognizing text with paragraph length, and the models composed of both neural networks are good at recognizing text with chapter length.

Table and Figures | Reference | Related Articles | Metrics
Image steganalysis method based on saliency detection
HUANG Siyuan, ZHANG Minqing, KE Yan, BI Xinliang
Journal of Computer Applications    2021, 41 (2): 441-448.   DOI: 10.11772/j.issn.1001-9081.2020081323
Abstract461)      PDF (1782KB)(799)       Save
Aiming at the problem that the steganalysis of images is difficult, and the existing detection models are difficult to make a targeted analysis of steganography regions of images, a method for image steganalysis based on saliency detection was proposed. In the proposed method, the saliency detection was used to guide the steganalysis model to focus on the image features of steganography regions. Firstly, the saliency detection module was used to generate saliency regions of the image. Secondly, the region filter module was used to filter the saliency images with a high degree of coincidence with the steganography regions, and image fusion technology was used to fuse them with the original images. Finally, the quality of training set was improved by replacing the error detection images with their corresponding saliency fusion images, so as to improve the training effect and detection ability of the model. The experiments were carried out on BOSSbase1.01 dataset. The dataset was embedded by image adaptive steganography algorithms in spatial domain and JPEG domain respectively, and experimental results show that the proposed method can effectively improve the the detection accuracy for deep learning-based steganalysis model by 3 percentage points at most. The mismatch test was also carried out on IStego100K dataset to further verify the generalization ability of the model and improve its application value. According to the result of the mismatch test, the proposed method has certain generalization ability.
Reference | Related Articles | Metrics
Node classification method in social network based on graph encoder network
HAO Zhifeng, KE Yanrong, LI Shuo, CAI Ruichu, WEN Wen, WANG Lijuan
Journal of Computer Applications    2020, 40 (1): 188-195.   DOI: 10.11772/j.issn.1001-9081.2019061116
Abstract833)      PDF (1280KB)(485)       Save
Aiming at how to merge the nodes' attributes and network structure information to realize the classification of social network nodes, a social network node classification algorithm based on graph encoder network was proposed. Firstly, the information of each node was propagated to its neighbors. Secondly, for each node, the possible implicit relationships between itself and its neighbor nodes were mined through neural network, and these relationships were merged together. Finally, the higher-level features of each node were extracted based on the information of the node itself and the relationships with the neighboring nodes and were used as the representation of the node, and the node was classified according to this representation. On the Weibo dataset, compared with DeepWalk model, logistic regression algorithm and the recently proposed graph convolutional network, the proposed algorithm has the classification accuracy greater than 8%; on the DBLP dataset, compared with multilayer perceptron, the classification accuracy of this algorithm is increased by 4.83%, and is increased by 0.91% compared with graph convolutional network.
Reference | Related Articles | Metrics
Separable reversible Hexadecimal data hiding in encrypted domain
KE Yan, ZHANG Minqing, LIU Jia
Journal of Computer Applications    2016, 36 (11): 3082-3087.   DOI: 10.11772/j.issn.1001-9081.2016.11.3082
Abstract587)      PDF (982KB)(597)       Save
In view of the poor separability and carrier recovery distortion of the current reversible data hiding technology, a novel scheme of separable reversible data hiding was proposed in encrypted domain. Hexadecimal data was embedded by recoding in the cipher text redundancy by the weight of the encrypted domain and the recoding of the encrypted data in Ring-Learning With Errors (R-LWE) algorithm. With embedded cipher text, the additional data was extracted by using data-hiding key, and the original data was recovered losslessly by using encryption key, and the processes of extraction and decryption were separable. By deducing the error probability of the scheme, the parameters in the scheme which directly related to the scheme's correctness were mainly discussed, and reasonable values of the parameters were got by experiments. The experimental results demonstrate that the proposed scheme can better guarantee the reversibility losslessly and 1 bit plaintext data can maximally load 4 bits additional data in encrypted domain.
Reference | Related Articles | Metrics
Overview on reversible data hiding in encrypted domain
KE Yan, ZHANG Minqing, LIU Jia, YANG Xiaoyuan
Journal of Computer Applications    2016, 36 (11): 3067-3076.   DOI: 10.11772/j.issn.1001-9081.2016.11.3067
Abstract910)      PDF (1927KB)(958)       Save
Reversible data hiding is a new research direction of information hiding technology. Reversible data hiding in encrypted domain is a significant point which combines the technologies of the signal processing in encrypted domain and information hiding and can play an important role of double insurance for information security in data processing. In particular with the adoption of cloud services, reversible data hiding in encrypted domain has become a focused issue to achieve privacy protection in the cloud environment. Concerning the current technical requirements, the background and the development of reversible data hiding were introduced in encrypted domain, and the current technical difficulties were pointed out and analysed. By studying on typical algorithms of various types, the reversible data hiding algorithms in encrypted domain were systematically classified and their technical frameworks, characteristics and limitations of different applications were analysed. Finally, focused on the technology needs and difficulties, several future directions in this field were proposed.
Reference | Related Articles | Metrics