{"id":"https://openalex.org/W4210983563","doi":"https://doi.org/10.1109/tc.2022.3142626","title":"Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks","display_name":"Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks","publication_year":2022,"publication_date":"2022-02-10","ids":{"openalex":"https://openalex.org/W4210983563","doi":"https://doi.org/10.1109/tc.2022.3142626"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2022.3142626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2022.3142626","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055176283","display_name":"Limei Lin","orcid":"https://orcid.org/0000-0001-7227-6258"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Limei Lin","raw_affiliation_strings":["Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078667775","display_name":"Yanze Huang","orcid":"https://orcid.org/0000-0002-9468-8701"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanze Huang","raw_affiliation_strings":["School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I83791580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103047340","display_name":"Sun\u2010Yuan Hsieh","orcid":"https://orcid.org/0000-0003-4746-3179"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sun-Yuan Hsieh","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Institute of Medical Information, National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Institute of Medical Information, National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055176283"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":1.1368,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.78251887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"71","issue":"11","first_page":"2968","last_page":"2981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7288261651992798},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.6538676023483276},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5403023958206177},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4528159201145172},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.4466429650783539},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4446144700050354},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.422513484954834},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32501280307769775},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.23924469947814941},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23551389575004578},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15027984976768494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7288261651992798},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.6538676023483276},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5403023958206177},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4528159201145172},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.4466429650783539},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4446144700050354},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.422513484954834},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32501280307769775},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.23924469947814941},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23551389575004578},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15027984976768494},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2022.3142626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2022.3142626","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1522679168","display_name":null,"funder_award_id":"171061","funder_id":"https://openalex.org/F4320326297","funder_display_name":"Fok Ying Tung Education Foundation"},{"id":"https://openalex.org/G1972098169","display_name":null,"funder_award_id":"2021J05228","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G3427569034","display_name":null,"funder_award_id":"62102088","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4481851352","display_name":null,"funder_award_id":"62171132","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4778711934","display_name":null,"funder_award_id":"61771140","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4875579843","display_name":null,"funder_award_id":"U1905211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7432090956","display_name":null,"funder_award_id":"GJ-YB-20-06","funder_id":"https://openalex.org/F4320325142","funder_display_name":"Fujian University of Technology"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null},{"id":"https://openalex.org/F4320325142","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16"},{"id":"https://openalex.org/F4320326297","display_name":"Fok Ying Tung Education Foundation","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1928747060","https://openalex.org/W1970820267","https://openalex.org/W1971616976","https://openalex.org/W1974942795","https://openalex.org/W1975379709","https://openalex.org/W2017645660","https://openalex.org/W2028922670","https://openalex.org/W2069358766","https://openalex.org/W2071038293","https://openalex.org/W2079731381","https://openalex.org/W2123649966","https://openalex.org/W2126343340","https://openalex.org/W2126601274","https://openalex.org/W2141558197","https://openalex.org/W2169786428","https://openalex.org/W2193308852","https://openalex.org/W2325432808","https://openalex.org/W2330431269","https://openalex.org/W2342680475","https://openalex.org/W2342845836","https://openalex.org/W2473519882","https://openalex.org/W2499054262","https://openalex.org/W2735983048","https://openalex.org/W2767288538","https://openalex.org/W2784272468","https://openalex.org/W2791677100","https://openalex.org/W2903017839","https://openalex.org/W2911523613","https://openalex.org/W2941176923","https://openalex.org/W2947869719","https://openalex.org/W2962590879","https://openalex.org/W2962746987","https://openalex.org/W3015140201","https://openalex.org/W3101150121","https://openalex.org/W3119972824"],"related_works":["https://openalex.org/W3013085049","https://openalex.org/W1560496689","https://openalex.org/W1992739770","https://openalex.org/W4386900933","https://openalex.org/W1975289146","https://openalex.org/W4229058035","https://openalex.org/W3125672081","https://openalex.org/W2006389905","https://openalex.org/W4297797135","https://openalex.org/W2105887828"],"abstract_inverted_index":{"A":[0],"human":[1],"contact":[2,73],"network":[3],"(HCN)":[4],"consists":[5],"of":[6,53,150,159,167,175,204,213],"individuals":[7],"moving":[8],"around":[9],"and":[10,66,101,130,182,188,223],"interacting":[11],"with":[12,36,74,177],"each":[13,75],"other.":[14],"In":[15,87],"HCN,":[16,168],"it":[17],"is":[18,69,162,192],"essential":[19],"to":[20,109,132,145,198],"detect":[21],"malicious":[22,40,111,151,160,205],"users":[23,41,112,161,206],"who":[24],"break":[25],"the":[26,31,37,50,59,134,147,157,165,189,202,208,210,219,235],"data":[27,32,51,144],"delivery":[28,33,52],"through":[29],"terminating":[30],"or":[34],"tampering":[35],"data.":[38],"Since":[39],"will":[42],"pay":[43],"more":[44,64,77,82],"but":[45,229],"gain":[46],"less":[47],"when":[48,156,196],"breaking":[49],"opportunistic":[54],"contacts,":[55],"we":[56,90,115,127,138],"focus":[57],"on":[58,98,122,142],"non-opportunistic":[60],"contacts":[61],"that":[62,71],"occur":[63],"frequently":[65,78],"stably.":[67],"It":[68],"observed":[70],"people":[72],"other":[76],"if":[79],"they":[80,230],"have":[81],"social":[83,99],"features":[84],"in":[85],"common.":[86],"this":[88],"paper,":[89],"build":[91],"up":[92],"topology":[93],"structure":[94],"for":[95],"HCN":[96],"based":[97,121],"features,":[100],"propose":[102],"a":[103,172],"graph":[104],"theoretical":[105],"comparison":[106],"detection":[107,119,135,173,211],"model":[108],"perform":[110,139],"detection.":[113],"Then":[114],"present":[116],"an":[117],"adaptive":[118],"scheme":[120,170,215],"Hamiltonian":[123],"cycle":[124],"decomposition.":[125],"Also,":[126],"define":[128],"comparison-0-string":[129],"comparison-1-string":[131],"improve":[133],"efficiency.":[136],"Moreover,":[137],"scenario":[140],"simulations":[141],"real":[143],"realize":[146],"detected":[148],"process":[149],"users.":[152],"Experiments":[153],"show":[154],"that,":[155],"number":[158,203],"bounded":[163],"by":[164],"dimension":[166],"our":[169,214],"has":[171],"rate":[174,181,185,212,222,226],"100%":[176],"both":[178],"false":[179,183,220,224],"positive":[180,221],"negative":[184,225],"being":[186],"0%,":[187],"running":[190],"cost":[191],"also":[193],"very":[194],"low":[195],"compared":[197],"baseline":[199,236],"approaches.":[200,237],"When":[201],"exceeds":[207],"bound,":[209],"decreases":[216],"slowly,":[217,228],"while":[218],"increase":[227],"are":[231],"still":[232],"better":[233],"than":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
