{"id":"https://openalex.org/W4405305691","doi":"https://doi.org/10.1109/icis61260.2024.10778292","title":"Unsupervised Community Detection Framework for Social Network Forensics","display_name":"Unsupervised Community Detection Framework for Social Network Forensics","publication_year":2024,"publication_date":"2024-09-20","ids":{"openalex":"https://openalex.org/W4405305691","doi":"https://doi.org/10.1109/icis61260.2024.10778292"},"language":"en","primary_location":{"id":"doi:10.1109/icis61260.2024.10778292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis61260.2024.10778292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073215897","display_name":"Ao Shen","orcid":"https://orcid.org/0009-0004-8304-0397"},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ao Shen","raw_affiliation_strings":["School of Computer and Information Engineering, Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040488307","display_name":"K. P. Chow","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kam Pui Chow","raw_affiliation_strings":["The University of Hong Kong,Department of Engineering,Hong Kong,China"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong,Department of Engineering,Hong Kong,China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":null,"display_name":"Qingkai Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I135905480","display_name":"Shanghai Polytechnic University","ror":"https://ror.org/02as5yg64","country_code":"CN","type":"education","lineage":["https://openalex.org/I135905480"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingkai Zhou","raw_affiliation_strings":["School of Computer and Information Engineering, Shanghai Polytechnic University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Shanghai Polytechnic University,Shanghai,China","institution_ids":["https://openalex.org/I135905480"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073215897"],"corresponding_institution_ids":["https://openalex.org/I135905480"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25701675,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"162","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6970980763435364},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4528364837169647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970980763435364},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4528364837169647}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icis61260.2024.10778292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis61260.2024.10778292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1974865694","https://openalex.org/W2003312983","https://openalex.org/W2056043697","https://openalex.org/W2089458547","https://openalex.org/W2095293504","https://openalex.org/W2112129186","https://openalex.org/W2116341502","https://openalex.org/W2151936673","https://openalex.org/W2278211498","https://openalex.org/W2615174697","https://openalex.org/W2920703887","https://openalex.org/W2946991347","https://openalex.org/W2962756421","https://openalex.org/W2965819445","https://openalex.org/W3138168410","https://openalex.org/W4206965490","https://openalex.org/W4285125898","https://openalex.org/W6760423706","https://openalex.org/W6760463152"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Social":[0],"network":[1,83,87,104],"forensics":[2],"aims":[3],"to":[4,56,80,90,149,156],"collect":[5],"and":[6,12,23,34,50,59,85,113],"analyze":[7,47,150],"social":[8,24,40,82,86,103,151],"media":[9,25],"user":[10,92],"information":[11],"communication":[13,88],"content.":[14],"When":[15],"people":[16],"communicate":[17],"through":[18],"messages,":[19],"phone":[20],"calls,":[21],"emails,":[22],"platforms,":[26],"they":[27],"leave":[28],"various":[29],"records":[30],"on":[31,71,123],"their":[32],"devices":[33],"the":[35,102,107,111,115,124,142],"Internet,":[36],"forming":[37],"a":[38],"huge":[39],"network.":[41],"Community":[42],"detection":[43,68,98,144],"can":[44,100],"help":[45],"investigators":[46,155],"group":[48],"leaders":[49],"community":[51,67,97,143],"structure,":[52],"which":[53],"is":[54,79],"significant":[55],"case":[57],"investigation":[58],"crime":[60],"control.":[61],"This":[62],"paper":[63],"proposes":[64],"an":[65],"unsupervised":[66,135],"framework":[69,99,122,145],"based":[70],"GCN":[72],"(Graph":[73],"Convolution":[74],"Network).":[75],"Our":[76],"main":[77],"idea":[78],"utilize":[81],"topology":[84],"content":[89],"construct":[91],"features.":[93],"The":[94],"proposed":[95],"end-to-end":[96],"display":[101],"topology,":[105],"locate":[106],"core":[108],"members":[109],"of":[110],"community,":[112],"show":[114,130],"connections":[116,158],"between":[117,159],"users.":[118],"We":[119,138],"evaluate":[120],"our":[121,132],"Enron":[125],"email":[126],"dataset.":[127],"Experimental":[128],"results":[129],"that":[131,141],"model":[133],"outperforms":[134],"benchmark":[136],"methods.":[137],"also":[139],"concluded":[140],"should":[146],"be":[147],"able":[148],"networks,":[152],"enabling":[153],"forensic":[154],"reveal":[157],"people.":[160]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
