2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6654714
|View full text |Cite
|
Sign up to set email alerts
|

Social network generation and friend ranking based on mobile phone data

Abstract: Social networking websites have been increasingly popular in the recent years. The users create and maintain their social networks by themselves in these websites by establishing or removing the connections to friends and sites of interests. The smart phones not only create a high availability for social network applications, but also serve for all forms of digital communication such as voice or video calls, e-mails and texts, which are also the ways to form or maintain our social network.In this paper, we dea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…The results have shown strong ties between nodes in the 6-clique and 7-clique based communities. With the same principle, the authors in [12] have used kcliques to understand the structure of a hacker community called Shadowcrew. In addition, with a large scale dataset of offenses reported by law enforcement in Canada, the authors in [13] have applied k-clique with k 3 to identify what they refer to as "co-offending groups"; which is formed by one or more offenders who can be involved in a crime.…”
Section: B Criminal Network Analysismentioning
confidence: 99%
“…The results have shown strong ties between nodes in the 6-clique and 7-clique based communities. With the same principle, the authors in [12] have used kcliques to understand the structure of a hacker community called Shadowcrew. In addition, with a large scale dataset of offenses reported by law enforcement in Canada, the authors in [13] have applied k-clique with k 3 to identify what they refer to as "co-offending groups"; which is formed by one or more offenders who can be involved in a crime.…”
Section: B Criminal Network Analysismentioning
confidence: 99%
“…Akbas et al, proposed a friends ranking algorithm which assigns weights to the durations of the calls, video conferences, face-to-face meetings and the sizes of the emails and texts and then depending on the value it finds the friendship levels [16].…”
Section: Related Workmentioning
confidence: 99%
“…The authors demonstrated strong ties among vertices in each clique. Similarly, the authors of [30] employed the k-clique technique to investigate the relationships among a community of hackers called Shadowcrew.…”
Section: Ieee Transactions On Information Forensics and Securitymentioning
confidence: 99%
“…A large number of methods have been developed in recent years for determining the relative importance of vertices. Most of these methods employ standard network metrics techniques, k-clique techniques [20,23,30], or semantic similarities techniques [8].…”
mentioning
confidence: 99%