{"id":"https://openalex.org/W4408300198","doi":"https://doi.org/10.70985/vhyr7797","title":"Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks","display_name":"Discussion on Cluster Analysis and Data Privacy Protection Strategy of Cultural Communication Metaphor Patterns in Online Social Networks","publication_year":2025,"publication_date":"2025-03-10","ids":{"openalex":"https://openalex.org/W4408300198","doi":"https://doi.org/10.70985/vhyr7797"},"language":"en","primary_location":{"id":"doi:10.70985/vhyr7797","is_oa":true,"landing_page_url":"https://doi.org/10.70985/vhyr7797","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/88/69","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://networksecuritypub.com/index.php/journal/article/download/88/69","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101799546","display_name":"Lei Shi","orcid":"https://orcid.org/0009-0009-6147-9688"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lei Shi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101799546"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06099263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2024","issue":"10","first_page":"30","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12705","display_name":"Educational Reforms and Innovations","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/2307","display_name":"Health, Toxicology and Mutagenesis"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12705","display_name":"Educational Reforms and Innovations","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/2307","display_name":"Health, Toxicology and Mutagenesis"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metaphor","display_name":"Metaphor","score":0.7204716205596924},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6058787107467651},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.57276850938797},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4487093389034271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39300641417503357},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.06510722637176514},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.06388795375823975}],"concepts":[{"id":"https://openalex.org/C2778311575","wikidata":"https://www.wikidata.org/wiki/Q18534","display_name":"Metaphor","level":2,"score":0.7204716205596924},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6058787107467651},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.57276850938797},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4487093389034271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39300641417503357},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06510722637176514},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.06388795375823975},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.70985/vhyr7797","is_oa":true,"landing_page_url":"https://doi.org/10.70985/vhyr7797","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/88/69","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.70985/vhyr7797","is_oa":true,"landing_page_url":"https://doi.org/10.70985/vhyr7797","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/88/69","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408300198.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1593456883","https://openalex.org/W2953707841","https://openalex.org/W1496791764","https://openalex.org/W4318485713","https://openalex.org/W2740319091","https://openalex.org/W4225340788","https://openalex.org/W33899462"],"abstract_inverted_index":{"The":[0,74,119,140,151,212],"existing":[1],"analysis":[2,48,81,109,208,220],"of":[3,22,143,162,164,178,182,217],"cultural":[4,23,117,179],"communication":[5,24],"metaphor":[6,35,129],"patterns":[7,36],"in":[8,18,116,227],"online":[9,60],"social":[10,61],"networks":[11],"is":[12,37,77,93,123,145,169,192,210],"limited":[13],"to":[14,39,54,70,82,95,105,125,194],"specific":[15],"platforms,":[16],"resulting":[17],"a":[19,46],"one-sided":[20],"understanding":[21],"metaphors,":[25],"and":[26,30,49,68,112,132,184,206,221],"the":[27,97,127,148,159,165,188,199,203,207,215,218],"data":[28,50,80,84,153,213,222],"processing":[29,91],"storage":[31],"process":[32],"when":[33],"analyzing":[34],"prone":[38],"user":[40],"privacy":[41,51,85,190,223],"leakage.":[42],"This":[43],"paper":[44],"introduced":[45],"cluster":[47,157,197,219],"protection":[52,224],"strategy":[53,225],"collect":[55],"user-generated":[56],"content":[57],"from":[58,102],"multiple":[59],"platforms":[62],"such":[63],"as":[64],"Weibo,":[65],"WeChat,":[66],"Facebook,":[67],"Douyin":[69],"ensure":[71,83],"sample":[72],"diversity.":[73],"Laplacian":[75],"mechanism":[76],"used":[78,124],"before":[79],"by":[86,147],"adding":[87],"noise.":[88],"Natural":[89],"language":[90],"technology":[92],"applied":[94],"use":[96],"BERT":[98],"(Bidirectional":[99],"Encoder":[100],"Representations":[101],"Transformers)":[103],"model":[104],"perform":[106],"deep":[107],"semantic":[108],"on":[110],"text":[111],"identify":[113],"metaphorical":[114],"expressions":[115],"communication.":[118],"K-means":[120],"clustering":[121],"algorithm":[122],"classify":[126],"extracted":[128,166],"feature":[130,167],"vectors,":[131],"different":[133],"K":[134],"values":[135],"are":[136,172],"set":[137,193],"for":[138],"experiments.":[139],"optimal":[141,160,189],"number":[142,161],"clusters":[144,163],"determined":[146],"elbow":[149],"rule.":[150],"experimental":[152],"shows":[154],"that":[155],"after":[156],"analysis,":[158,198],"vectors":[168],"5,":[170],"which":[171],"\u201dsocial":[173],"identity,\u201d":[174],"\u201demotional":[175],"resonance,\u201d":[176],"\u201dtransmission":[177],"symbols,\u201d":[180],"\u201dexpression":[181],"values\u201d":[183],"\u201dcross-cultural":[185],"communication,\u201d":[186],"When":[187],"budget":[191],"0.5":[195],"during":[196],"risk":[200],"value":[201],"reaches":[202],"minimum":[204],"0.008,":[205],"accuracy":[209],"0.98.":[211],"proves":[214],"effectiveness":[216],"studied":[226],"this":[228],"paper.":[229]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
