Tagged articles
12 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 4, 2026 · Information Security

Behind the Death of Iran's Supreme Leader: Tehran's Cameras and Communications Under Long‑Term Deep Control

The article details how Israeli intelligence allegedly infiltrated Tehran's traffic cameras and mobile‑network infrastructure for years, used advanced algorithms and social‑network analysis to build an omniscient target profile of Ayatollah Khamenei, and coordinated his assassination as a political decision rather than a mere technical feat.

AssassinationCyber EspionageIran
0 likes · 11 min read
Behind the Death of Iran's Supreme Leader: Tehran's Cameras and Communications Under Long‑Term Deep Control
Model Perspective
Model Perspective
Dec 4, 2025 · Fundamentals

Game Theory and Markov Chains Reveal the Math Behind Palace Intrigue

This article applies Markov chain modeling, game theory—including prisoner's dilemma, repeated games, and signaling games—plus social network analysis to dissect the power dynamics, alliances, and strategic behavior depicted in the Chinese palace drama "The Legend of Zhen Huan".

Game TheoryMarkov chainSocial Network Analysis
0 likes · 10 min read
Game Theory and Markov Chains Reveal the Math Behind Palace Intrigue
Model Perspective
Model Perspective
May 7, 2024 · Fundamentals

Beyond 150: Modeling Social Circles with Dunbar’s Number

This article explores Robin Dunbar’s social‑brain hypothesis, explains the layered structure of human relationships, proposes a vector‑based social model, and shows how similarity and difference metrics can inform personal and organizational network analysis.

Dunbar numberSocial Network AnalysisTeam Building
0 likes · 8 min read
Beyond 150: Modeling Social Circles with Dunbar’s Number
DataFunSummit
DataFunSummit
Aug 23, 2022 · Artificial Intelligence

Graph Deep Learning for Content Risk Control and APT Detection

This article presents a comprehensive overview of Tencent AI Lab's graph‑based approaches for detecting misinformation and advanced persistent threats, detailing the challenges of modeling news content and social context, the design of the Post‑User Interaction Network (PSIN), experimental results on large multi‑topic datasets, and a novel graph‑pretraining pipeline for APT detection.

APT detectionDeep LearningSocial Network Analysis
0 likes · 12 min read
Graph Deep Learning for Content Risk Control and APT Detection
ITPUB
ITPUB
Nov 18, 2020 · Databases

How JanusGraph and Spark GraphX Unlock Value Users in 58 Tribe’s Social Network

This article details how 58 Tribe built a large‑scale graph database with JanusGraph, integrated it with Spark GraphX to compute degree, closeness and betweenness centralities, optimized batch imports, identified cheating and high‑value users, and achieved significant performance gains for social network analysis.

Graph DatabaseJanusGraphSocial Network Analysis
0 likes · 16 min read
How JanusGraph and Spark GraphX Unlock Value Users in 58 Tribe’s Social Network
网易UEDC
网易UEDC
Nov 19, 2019 · Fundamentals

Why Traditional Sampling Fails for Niche Communities and How Respondent‑Driven Sampling Solves It

The article explains the limitations of probability sampling for small or hidden sub‑cultures, introduces respondent‑driven sampling (RDS) as a network‑based alternative, and outlines its theoretical basis, advantages, and step‑by‑step implementation for more accurate research on hidden populations.

Social Network Analysishidden populationsresearch methodology
0 likes · 9 min read
Why Traditional Sampling Fails for Niche Communities and How Respondent‑Driven Sampling Solves It
Qunar Tech Salon
Qunar Tech Salon
Aug 29, 2019 · Information Security

Using Graph Databases for Fraud Detection in Ride‑Hailing Platforms

The article explains how building a Neo4j‑based social graph of users, drivers, devices and other attributes enables detection of individual and group subsidy‑abuse fraud in ride‑hailing services through multi‑hop relationship analysis and targeted rule‑based alerts.

Graph DatabaseNeo4jRide Hailing
0 likes · 6 min read
Using Graph Databases for Fraud Detection in Ride‑Hailing Platforms
Python Crawling & Data Mining
Python Crawling & Data Mining
Apr 4, 2019 · Artificial Intelligence

Build and Visualize Three Kingdoms Character Networks with Python

This article demonstrates how to extract the character relationships from the classic novel Romance of the Three Kingdoms using Python, building entity dictionaries, constructing a co‑occurrence social network with HarvestText and NetworkX, visualizing subgraphs, ranking important figures, detecting communities, and creating an animated view of the network’s evolution over the story.

HarvestTextNLPPython
0 likes · 13 min read
Build and Visualize Three Kingdoms Character Networks with Python
21CTO
21CTO
Sep 26, 2017 · Big Data

How NTE Algorithm Accelerates New Common‑Friend Discovery in Billion‑Scale Graphs

Introducing the NTE (New Triangle Enumeration) algorithm, a divide‑and‑conquer approach that transforms the computation of newly added common friends in massive social graphs into efficient triangle enumeration tasks, with detailed implementations using GraphX‑based GTE, join‑based JTE, and sort‑based STE methods.

GraphXSocial Network AnalysisSpark
0 likes · 12 min read
How NTE Algorithm Accelerates New Common‑Friend Discovery in Billion‑Scale Graphs

Social Network Analysis on Weibo: Label Propagation, User Similarity, Community Detection, Influence Ranking, and Spam User Identification

This article introduces a series of algorithms for analyzing the Weibo social network, including label propagation, LDA‑based user similarity, time‑aware and interaction‑aware similarity measures, community detection, influence ranking via PageRank variants, and methods for identifying spam users, illustrating how these techniques can be applied to large‑scale social media data.

Big DataSocial Network Analysisinfluence ranking
0 likes · 19 min read
Social Network Analysis on Weibo: Label Propagation, User Similarity, Community Detection, Influence Ranking, and Spam User Identification
Architect
Architect
May 22, 2015 · Big Data

Weibo Social Network Analysis: Label Propagation, Similarity Measures, Community Detection, Influence Ranking and Spam User Identification

The article presents a comprehensive overview of algorithms for analyzing Weibo’s social network, covering label propagation, user similarity via LDA, temporal and interaction factors, community detection, influence ranking using PageRank variants, and methods for identifying spam accounts.

LDASocial Network Analysiscommunity-detection
0 likes · 16 min read
Weibo Social Network Analysis: Label Propagation, Similarity Measures, Community Detection, Influence Ranking and Spam User Identification