{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T18:52:05Z","timestamp":1776711125395,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T00:00:00Z","timestamp":1776643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T00:00:00Z","timestamp":1776643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s10115-026-02756-8","type":"journal-article","created":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T18:12:15Z","timestamp":1776708735000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Against community detection : from non-overlapping to overlapping algorithm"],"prefix":"10.1007","volume":"68","author":[{"given":"Guoliang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hairui","family":"He","sequence":"additional","affiliation":[]},{"given":"Song","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,20]]},"reference":[{"key":"2756_CR1","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.ins.2021.08.031","volume":"579","author":"O Doluca","year":"2021","unstructured":"Doluca O, O\u011fuz K (2021) Apal: adjacency propagation algorithm for overlapping community detection in biological networks. Inf Sci 579:574\u2013590","journal-title":"Inf Sci"},{"issue":"4","key":"2756_CR2","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TBDATA.2022.3152431","volume":"8","author":"D Liu","year":"2022","unstructured":"Liu D, Yang G, Wang Y, Jin H, Chen E (2022) How to protect ourselves from overlapping community detection in social networks. IEEE Trans Big Data 8(4):894\u2013904","journal-title":"IEEE Trans Big Data"},{"key":"2756_CR3","first-page":"1","volume":"2015","author":"D Liu","year":"2015","unstructured":"Liu D, Duan D, Shikai S, Song G (2015) Effective semisupervised community detection using negative information. Math Probl Eng 2015:1\u20138","journal-title":"Math Probl Eng"},{"key":"2756_CR4","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.physa.2014.08.051","volume":"416","author":"D Liu","year":"2014","unstructured":"Liu D, Liu X, Wang W, Bai H (2014) Semi-supervised community detection based on discrete potential theory. Physica A 416:173\u2013182","journal-title":"Physica A"},{"issue":"29","key":"2756_CR5","doi-asserted-by":"publisher","first-page":"1450208","DOI":"10.1142\/S0217979214502087","volume":"28","author":"D Liu","year":"2014","unstructured":"Liu D, Bai H-Y, Li H-J, Wang W-J (2014) Semi-supervised community detection using label propagation. Int J Mod Phys B 28(29):1450208","journal-title":"Int J Mod Phys B"},{"key":"2756_CR6","doi-asserted-by":"publisher","first-page":"37261","DOI":"10.1109\/ACCESS.2018.2838568","volume":"6","author":"L Fan","year":"2018","unstructured":"Fan L, Xu S, Liu D, Ru Y (2018) Semi-supervised community detection based on distance dynamics. IEEE Access 6:37261\u201337271","journal-title":"IEEE Access"},{"issue":"08","key":"2756_CR7","doi-asserted-by":"publisher","first-page":"1650037","DOI":"10.1142\/S0217979216500375","volume":"30","author":"D Liu","year":"2016","unstructured":"Liu D, Wang C, Jing Y (2016) Estimating the optimal number of communities by cluster analysis. Int J Mod Phys B 30(08):1650037","journal-title":"Int J Mod Phys B"},{"issue":"7307","key":"2756_CR8","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1038\/nature09182","volume":"466","author":"YY Ahn","year":"2010","unstructured":"Ahn YY, Bagrow JP, Lehmann S (2010) Link communities reveal multiscale complexity in networks. Nature 466(7307):761","journal-title":"Nature"},{"issue":"10","key":"2756_CR9","doi-asserted-by":"publisher","first-page":"998","DOI":"10.14778\/2794367.2794370","volume":"8","author":"M Wang","year":"2015","unstructured":"Wang M, Wang C, Yu JX, Zhang J (2015) Community detection in social networks: an in-depth benchmarking study with a procedure-oriented framework. Proc VLDB Endow 8(10):998\u20131009","journal-title":"Proc VLDB Endow"},{"issue":"2","key":"2756_CR10","doi-asserted-by":"publisher","first-page":"26113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman MEJ, Girvan M (2004) Finding and evaluating community structure in networks. Phys Rev E 69(2):26113\u201326113","journal-title":"Phys Rev E"},{"issue":"70","key":"2756_CR11","first-page":"66","volume":"6","author":"A Clauset","year":"2004","unstructured":"Clauset A, Newman ME, Moore C (2004) Finding community structure in very large networks. Phys Rev E: Stat, Nonlin, Soft Matter Phys 6(70):66\u2013111","journal-title":"Phys Rev E: Stat, Nonlin, Soft Matter Phys"},{"issue":"10","key":"2756_CR12","doi-asserted-by":"publisher","first-page":"10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp 2008(10):10008","journal-title":"J Stat Mech: Theory Exp"},{"issue":"7043","key":"2756_CR13","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G Palla","year":"2005","unstructured":"Palla G, Der\u00e9nyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814\u2013818","journal-title":"Nature"},{"key":"2756_CR14","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2013) Overlapping community detection at scale: a nonnegative matrix factorization approach. In: Proceedings of the sixth ACM international conference on web search and data mining, pp 587\u2013596","DOI":"10.1145\/2433396.2433471"},{"issue":"4","key":"2756_CR15","doi-asserted-by":"publisher","first-page":"e18961","DOI":"10.1371\/journal.pone.0018961","volume":"6","author":"A Lancichinetti","year":"2011","unstructured":"Lancichinetti A, Radicchi F, Ramasco JJ, Fortunato S (2011) Finding statistically significant communities in networks. PLoS ONE 6(4):e18961","journal-title":"PLoS ONE"},{"key":"2756_CR16","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201914. Association for Computing Machinery, New York, NY, USA, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"2756_CR17","doi-asserted-by":"crossref","unstructured":"Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855\u2013864","DOI":"10.1145\/2939672.2939754"},{"key":"2756_CR18","volume-title":"Advances in neural information processing systems","author":"EM Airoldi","year":"2008","unstructured":"Airoldi EM, Blei D, Fienberg S, Xing E (2008) Mixed membership stochastic blockmodels. In: Koller D, Schuurmans D, Bengio Y, Bottou L (eds) Advances in neural information processing systems, vol 21. Curran Associates Inc, New York"},{"key":"2756_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.ins.2022.10.027","volume":"614","author":"D Liu","year":"2022","unstructured":"Liu D, Chang Z, Yang G, Chen E (2022) Hiding ourselves from community detection through genetic algorithms. Inf Sci 614:123\u2013137","journal-title":"Inf Sci"},{"key":"2756_CR20","doi-asserted-by":"publisher","first-page":"109495","DOI":"10.1016\/j.knosys.2022.109495","volume":"253","author":"D Liu","year":"2022","unstructured":"Liu D, Chang Z, Yang G, Chen E (2022) Community hiding using a graph autoencoder. Knowl-Based Syst 253:109495","journal-title":"Knowl-Based Syst"},{"key":"2756_CR21","doi-asserted-by":"publisher","first-page":"120235","DOI":"10.1016\/j.ins.2024.120235","volume":"663","author":"D Liu","year":"2024","unstructured":"Liu D, Jia R, Liu X, Zhang W (2024) A unified framework of community hiding using symmetric nonnegative matrix factorization. Inf Sci 663:120235","journal-title":"Inf Sci"},{"issue":"3","key":"2756_CR22","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TCSS.2021.3054115","volume":"8","author":"X Chen","year":"2021","unstructured":"Chen X, Jiang Z, Li H, Ma J, Yu PS (2021) Community hiding by link perturbation in social networks. IEEE Trans Comput Soc Syst 8(3):704\u2013715","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2756_CR23","unstructured":"Dai H, Li H, Tian T, Huang X, Wang L, Zhu J, Song L (2018) Adversarial attack on graph structured data. In: International conference on machine learning, pp 1115\u20131124"},{"issue":"5","key":"2756_CR24","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1109\/TCYB.2017.2696998","volume":"48","author":"Q Xuan","year":"2018","unstructured":"Xuan Q, Zhang Z, Fu C, Hu H, Filkov V (2018) Social synchrony on complex networks. IEEE Trans Cybern 48(5):1420\u20131431","journal-title":"IEEE Trans Cybern"},{"key":"2756_CR25","doi-asserted-by":"crossref","unstructured":"Nagaraja S (2010) The impact of unlinkability on adversarial community detection: effects and countermeasures. In: PETS\u201910 proceedings of the 10th international conference on privacy enhancing technologies, pp 253\u2013272","DOI":"10.1007\/978-3-642-14527-8_15"},{"issue":"2","key":"2756_CR26","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1038\/s41562-017-0290-3","volume":"2","author":"M Waniek","year":"2018","unstructured":"Waniek M, Michalak TP, Rahwan T, Wooldridge MJ (2018) Hiding individuals and communities in a social network. Nat Hum Behav 2(2):139\u2013147","journal-title":"Nat Hum Behav"},{"issue":"4","key":"2756_CR27","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TKDE.2017.2776133","volume":"30","author":"V Fionda","year":"2018","unstructured":"Fionda V, Pirr\u00f2 G (2018) Community deception or: How to stop fearing community detection algorithms. IEEE Trans Knowl Data Eng 30(4):660\u2013673","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"2756_CR28","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TCSS.2019.2912801","volume":"6","author":"J Chen","year":"2019","unstructured":"Chen J, Chen L, Chen Y, Zhao M, Yu S, Xuan Q, Yang X (2019) Ga-based q-attack on community detection. IEEE Trans Comput Soc Syst 6(3):491\u2013503","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2756_CR29","first-page":"12938","volume":"32","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu J, Zhang Z, Zhu L, Li A (2019) Rem: from structural entropy to community structure deception. Adv Neural Inf Process Syst 32:12938\u201312948","journal-title":"Adv Neural Inf Process Syst"},{"key":"2756_CR30","doi-asserted-by":"crossref","unstructured":"Li J, Zhang H, Han Z, Rong Y, Cheng H, Huang J (2020) Adversarial attack on community detection by hiding individuals. In: Huang Y, King I, Liu T, Steen M (eds) WWW \u201920: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020. ACM \/ IW3C2 pp 917\u2013927","DOI":"10.1145\/3366423.3380171"},{"issue":"1","key":"2756_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TCSS.2020.3031596","volume":"8","author":"J Chen","year":"2021","unstructured":"Chen J, Chen Y, Chen L, Zhao M, Xuan Q (2021) Multiscale evolutionary perturbation attack on community detection. IEEE Trans Comput Soc Syst 8(1):62\u201375","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2756_CR32","doi-asserted-by":"crossref","unstructured":"Coscia M, Rossetti G, Giannotti F, Pedreschi D (2012) DEMON: a local-first discovery method for overlapping communities. In: The 18th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201912, Beijing, China, August 12-16, 2012. ACM pp 615\u2013623","DOI":"10.1145\/2339530.2339630"},{"key":"2756_CR33","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11427995_3","volume-title":"Intelligence and security informatics","author":"J Baumes","year":"2005","unstructured":"Baumes J, Goldberg M, Magdon-Ismail M (2005) Efficient identification of overlapping communities. In: Kantor P, Muresan G, Roberts F, Zeng DD, Wang F-Y, Chen H, Merkle RC (eds) Intelligence and security informatics. Springer, Berlin, Heidelberg, pp 27\u201336"},{"key":"2756_CR34","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1186\/1471-2105-10-169","volume":"10","author":"M Wu","year":"2009","unstructured":"Wu M, Li X, Kwoh CK, Ng SK (2009) A core-attachment based method to detect protein complexes in ppi networks. BMC Bioinform 10:169","journal-title":"BMC Bioinform"},{"key":"2756_CR35","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s13278-020-00647-6","volume":"10","author":"A Choumane","year":"2020","unstructured":"Choumane A, Awada A, Harkous A (2020) Core expansion: a new community detection algorithm based on neighborhood overlap. Soc Netw Anal Min 10:30","journal-title":"Soc Netw Anal Min"},{"issue":"4","key":"2756_CR36","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TCSS.2021.3062711","volume":"8","author":"S Mittal","year":"2021","unstructured":"Mittal S, Sengupta D, Chakraborty T (2021) Hide and seek: outwitting community detection algorithms. IEEE Trans Comput Soc Syst 8(4):799\u2013808","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"3","key":"2756_CR37","doi-asserted-by":"publisher","first-page":"033015","DOI":"10.1088\/1367-2630\/11\/3\/033015","volume":"11","author":"A Lancichinetti","year":"2009","unstructured":"Lancichinetti A, Fortunato S, Kert\u00e9sz J (2009) Detecting the overlapping and hierarchical community structure in complex networks. New J Phys 11(3):033015","journal-title":"New J Phys"},{"key":"2756_CR38","doi-asserted-by":"crossref","unstructured":"Rossetti G, Pappalardo L, Rinzivillo S (2016) In: Cherifi H, Gon\u00e7alves B, Menezes R, Sinatra R (eds) A novel approach to evaluate community detection algorithms on ground truth. Springer, Cham pp 133\u2013144","DOI":"10.1007\/978-3-319-30569-1_10"},{"issue":"1","key":"2756_CR39","doi-asserted-by":"publisher","first-page":"18001","DOI":"10.1209\/0295-5075\/90\/18001","volume":"90","author":"A L\u00e1z\u00e1r","year":"2010","unstructured":"L\u00e1z\u00e1r A, \u00c1bel D, Vicsek T (2010) Modularity measure of networks with overlapping communities. Europhys Lett 90(1):18001","journal-title":"Europhys Lett"},{"key":"2756_CR40","doi-asserted-by":"publisher","first-page":"112827","DOI":"10.1016\/j.knosys.2024.112827","volume":"309","author":"S Chowdhury","year":"2025","unstructured":"Chowdhury S, Soni B (2025) R-vqa: a robust visual question answering model. Knowl-Based Syst 309:112827","journal-title":"Knowl-Based Syst"},{"issue":"6","key":"2756_CR41","doi-asserted-by":"publisher","first-page":"70010","DOI":"10.1111\/coin.70010","volume":"40","author":"S Chowdhury","year":"2024","unstructured":"Chowdhury S, Soni B (2024) Beyond words: Esc-net revolutionizes vqa by elevating visual features and defying language priors. Comput Intell 40(6):70010","journal-title":"Comput Intell"},{"key":"2756_CR42","doi-asserted-by":"publisher","first-page":"109948","DOI":"10.1016\/j.engappai.2024.109948","volume":"142","author":"S Chowdhury","year":"2025","unstructured":"Chowdhury S, Soni B (2025) Envqa: improving visual question answering model by enriching the visual feature. Eng Appl Artif Intell 142:109948","journal-title":"Eng Appl Artif Intell"},{"key":"2756_CR43","doi-asserted-by":"publisher","first-page":"10479","DOI":"10.1007\/s13369-023-07661-8","volume":"48","author":"S Chowdhury","year":"2023","unstructured":"Chowdhury S, Soni B (2023) Qsfvqa: a time efficient, scalable and optimized vqa framework. Arab J Sci Eng 48:10479\u201310491","journal-title":"Arab J Sci Eng"},{"key":"2756_CR44","doi-asserted-by":"publisher","first-page":"129906","DOI":"10.1016\/j.neucom.2025.129906","volume":"635","author":"S Chowdhury","year":"2025","unstructured":"Chowdhury S, Soni B (2025) Handling language prior and compositional reasoning issues in visual question answering system. Neurocomputing 635:129906","journal-title":"Neurocomputing"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-026-02756-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-026-02756-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-026-02756-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T18:12:20Z","timestamp":1776708740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-026-02756-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,20]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["2756"],"URL":"https:\/\/doi.org\/10.1007\/s10115-026-02756-8","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,20]]},"assertion":[{"value":"4 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"129"}}