Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (90)
  • Open Access

    REVIEW

    From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods

    Shaojie Min1, Yaxiao Luo1, Kebing Liu1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.073175 - 09 December 2025

    Abstract User identity linkage (UIL) across online social networks seeks to match accounts belonging to the same real-world individual. This cross-platform mapping enables accurate user modeling but also raises serious privacy risks. Over the past decade, the research community has developed a wide range of UIL methods, from structural embeddings to multimodal fusion architectures. However, corresponding adversarial and defensive approaches remain fragmented and comparatively understudied. In this survey, we provide a unified overview of both mapping and anti-mapping methods for UIL. We categorize representative mapping models by learning paradigm and data modality, and systematically compare them… More >

  • Open Access

    ARTICLE

    Multi-Objective Evolutionary Framework for High-Precision Community Detection in Complex Networks

    Asal Jameel Khudhair#, Amenah Dahim Abbood#,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-31, 2026, DOI:10.32604/cmc.2025.068553 - 10 November 2025

    Abstract Community detection is one of the most fundamental applications in understanding the structure of complicated networks. Furthermore, it is an important approach to identifying closely linked clusters of nodes that may represent underlying patterns and relationships. Networking structures are highly sensitive in social networks, requiring advanced techniques to accurately identify the structure of these communities. Most conventional algorithms for detecting communities perform inadequately with complicated networks. In addition, they miss out on accurately identifying clusters. Since single-objective optimization cannot always generate accurate and comprehensive results, as multi-objective optimization can. Therefore, we utilized two objective functions… More >

  • Open Access

    ARTICLE

    The longitudinal relationship between active use of social network sites and loneliness: Examining the mediating effects of positive feedback and social support

    Jing Wu1,2,*, Yuan Gao2, Quanlu Hao2, Zhun Liu3, Weijie Meng1

    Journal of Psychology in Africa, Vol.35, No.6, pp. 871-876, 2025, DOI:10.32604/jpa.2025.075981 - 30 December 2025

    Abstract This study employed a longitudinal approach to investigate how positive feedback and social support mediate the connection between active social network use and feelings of loneliness. A total of 811 college students (females = 58.20%, Mage = 19.15, SD = 0.99) participated in this research study. At T1 time point, students completed the Active SNS Questionnaire. At T2 time point, students completed the online versions of the Positive Feedback Scale, Perceived Social Support Multidimensional Scale, and UCLA Loneliness Scale. T2 online positive feedback influences how T1 actively uses their social network, which relates to T2 loneliness, More >

  • Open Access

    REVIEW

    A Comprehensive Review of Dynamic Community Detection: Taxonomy, Challenges, and Future Directions

    Hiba Sameer Saeed#, Amenah Dahim Abbood#,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4375-4405, 2025, DOI:10.32604/cmc.2025.067783 - 23 October 2025

    Abstract In recent years, the evolution of the community structure in social networks has gained significant attention. Due to the rapid and continuous evolution of real-world networks over time. This makes the process of identifying communities and tracking their topology changes challenging. To tackle these challenges, it is necessary to find efficient methodologies for analyzing the behavior patterns of dynamic communities. Several previous reviews have introduced algorithms and models for community detection. However, these methods have not been very accurate in identifying communities. Moreover, none of the reviewed papers made an apparent effort to link algorithms… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-Based Hybrid Framework for Personality Trait Prediction through Behavioral Analysis

    Nareshkumar Raveendhran, Nimala Krishnan*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3253-3265, 2025, DOI:10.32604/cmc.2025.067490 - 23 September 2025

    Abstract Social media outlets deliver customers a medium for communication, exchange, and expression of their thoughts with others. The advent of social networks and the fast escalation of the quantity of data have created opportunities for textual evaluation. Utilising the user corpus, characteristics of social platform users, and other data, academic research may accurately discern the personality traits of users. This research examines the traits of consumer personalities. Usually, personality tests administered by psychological experts via interviews or self-report questionnaires are costly, time-consuming, complex, and labour-intensive. Currently, academics in computational linguistics are increasingly focused on predicting… More >

  • Open Access

    ARTICLE

    The Identification of Influential Users Based on Semi-Supervised Contrastive Learning

    Jialong Zhang1, Meijuan Yin2,*, Yang Pei2, Fenlin Liu2, Chenyu Wang2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2095-2115, 2025, DOI:10.32604/cmc.2025.065679 - 29 August 2025

    Abstract Identifying influential users in social networks is of great significance in areas such as public opinion monitoring and commercial promotion. Existing identification methods based on Graph Neural Networks (GNNs) often lead to yield inaccurate features of influential users due to neighborhood aggregation, and require a large substantial amount of labeled data for training, making them difficult and challenging to apply in practice. To address this issue, we propose a semi-supervised contrastive learning method for identifying influential users. First, the proposed method constructs positive and negative samples for contrastive learning based on multiple node centrality metrics… More >

  • Open Access

    ARTICLE

    Possible Classifications of Social Network Addiction: A Latent Profile Analysis of Chinese College Students

    Lin Luo1,2,*, Junfeng Yuan1, Yanling Wang1, Rui Zhu1, Huilin Xu1, Siyuan Bi1, Zhongge Zhang1

    International Journal of Mental Health Promotion, Vol.27, No.6, pp. 863-876, 2025, DOI:10.32604/ijmhp.2025.064385 - 30 June 2025

    Abstract Objectives: Social Network Addiction (SNA) is becoming increasingly prevalent among college students; however, there remains a lack of consensus regarding the measurement tools and their optimal cutoff score. This study aims to validate the 21-item Social Network Addiction Scale-Chinese (SNAS-C) in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population. Methods: A cross-sectional survey was conducted, recruiting 3387 college students. Latent profile analysis (LPA) and receiver operating characteristic (ROC) curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C. Results:More >

  • Open Access

    ARTICLE

    Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services

    Sangmin Kim1, Byeongcheon Lee1, Muazzam Maqsood2, Jihoon Moon3,*, Seungmin Rho4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2079-2108, 2025, DOI:10.32604/cmes.2025.061653 - 30 May 2025

    Abstract The increased accessibility of social networking services (SNSs) has facilitated communication and information sharing among users. However, it has also heightened concerns about digital safety, particularly for children and adolescents who are increasingly exposed to online grooming crimes. Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims. However, research on grooming detection in South Korea remains limited, as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations, leading to inaccurate classifications. To address these issues, this study proposes a novel… More >

  • Open Access

    ARTICLE

    A Deep Learning Framework for Arabic Cyberbullying Detection in Social Networks

    Yahya Tashtoush1,*, Areen Banysalim1, Majdi Maabreh2, Shorouq Al-Eidi3, Ola Karajeh4, Plamen Zahariev5

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3113-3134, 2025, DOI:10.32604/cmc.2025.062724 - 16 April 2025

    Abstract Social media has emerged as one of the most transformative developments on the internet, revolutionizing the way people communicate and interact. However, alongside its benefits, social media has also given rise to significant challenges, one of the most pressing being cyberbullying. This issue has become a major concern in modern society, particularly due to its profound negative impacts on the mental health and well-being of its victims. In the Arab world, where social media usage is exceptionally high, cyberbullying has become increasingly prevalent, necessitating urgent attention. Early detection of harmful online behavior is critical to… More >

  • Open Access

    ARTICLE

    Relationship between Psychological Security and Fear of Missing Out among University Students: A Moderated Mediation Model

    Xiaowen Wan1, Wenbin Sheng1, Rong Huang1, Cheng Zeng1, Xu Zhou2,*, Yuan Wu3, Xiaohui Cao1, Xiaoke Chen1

    International Journal of Mental Health Promotion, Vol.27, No.2, pp. 215-229, 2025, DOI:10.32604/ijmhp.2025.059074 - 03 March 2025

    Abstract Background: As the digital age progresses, fear of missing out (FoMO) is becoming increasingly common, and the impact factor of FOMO needs to be further investigated. This study aims to explore the relationship between psychological security (PS) and FoMO by analyzing the mediating role of social networking addiction (SNA) and the moderating role of social self-efficacy (SSE). Methods: We collected a sample of 1181 college students (with a mean age of 19.67 ± 1.38 years) from five universities in a province of mainland China through cluster sampling. Data were gathered using the psychological security questionnaire… More >

Displaying 1-10 on page 1 of 90. Per Page