{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:53:01Z","timestamp":1757620381915,"version":"3.44.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8-9","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12652-025-04988-y","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T12:20:11Z","timestamp":1753791611000},"page":"905-919","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["General Modular Graphs: a benchmark network model for testing community detection algorithms"],"prefix":"10.1007","volume":"16","author":[{"given":"Abhinav","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Pawan","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0602-3719","authenticated-orcid":false,"given":"Ravins","family":"Dohare","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"issue":"2","key":"4988_CR1","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1093\/comnet\/cnu026","volume":"3","author":"C Aicher","year":"2015","unstructured":"Aicher C, Jacobs AZ, Clauset A (2015) Learning latent block structure in weighted networks. J Complex Netw 3(2):221\u2013248","journal-title":"J Complex Netw"},{"key":"4988_CR2","unstructured":"Airoldi EM, Blei D, Fienberg S, Xing E (2008) Mixed membership stochastic blockmodels. Advances in neural information processing systems, 21 https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2008\/file\/8613985ec49eb8f757ae6439e879bb2a-Paper.pdf"},{"issue":"5439","key":"4988_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512. https:\/\/doi.org\/10.1126\/science.286.5439.509. (Accessed 2016-09-06)","journal-title":"Science"},{"issue":"2","key":"4988_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1038\/nrg1272","volume":"5","author":"A-L Barab\u00e1si","year":"2004","unstructured":"Barab\u00e1si A-L, Oltvai ZN (2004) Network biology: understanding the cell\u2019s functional organization. Nat Rev Genet 5(2):101\u2013113. https:\/\/doi.org\/10.1038\/nrg1272. (Accessed 2016-07-21)","journal-title":"Nat Rev Genet"},{"key":"4988_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-48413-4_23","volume-title":"Randomization, approximation, and combinatorial optimization algorithms and techniques. Lecture Notes in Computer Science","author":"A Condon","year":"1999","unstructured":"Condon A, Karp RM (1999) Algorithms for graph partitioning on the planted partition model. In: Hochbaum DS, Jansen K, Rolim JDP, Sinclair A (eds) Randomization, approximation, and combinatorial optimization algorithms and techniques. Lecture Notes in Computer Science. Springer, pp 221\u2013232"},{"key":"4988_CR7","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s P, R\u00e9nyi A (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5:17\u201361","journal-title":"Publ Math Inst Hung Acad Sci"},{"issue":"1","key":"4988_CR8","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s P, R\u00e9nyi A et al (1960) On the evolution of random graphs. Publ Math Inst Hung Acad Sci 5(1):17\u201360","journal-title":"Publ Math Inst Hung Acad Sci"},{"issue":"3","key":"4988_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010a) Community detection in graphs. Phys Rep 486(3):75\u2013174. https:\/\/doi.org\/10.1016\/j.physrep.2009.11.002. (Accessed 2023-01-19)","journal-title":"Phys Rep"},{"issue":"3\u20135","key":"4988_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010b) Community detection in graphs. Phys Rep 486(3\u20135):75\u2013174","journal-title":"Phys Rep"},{"issue":"12","key":"4988_CR12","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman MEJ (2002) Community structure in social and biological networks. PNAS 99(12):7821\u20137826. https:\/\/doi.org\/10.1073\/pnas.122653799. (Accessed 2016-09-01)","journal-title":"Proc Natl Acad Sci"},{"issue":"2","key":"4988_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0378-8733(83)90021-7","volume":"5","author":"PW Holland","year":"1983","unstructured":"Holland PW, Laskey KB, Leinhardt S (1983) Stochastic blockmodels: first steps. Soc Netw 5(2):109\u2013137","journal-title":"Soc Netw"},{"issue":"1","key":"4988_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.016107","volume":"83","author":"B Karrer","year":"2011","unstructured":"Karrer B, Newman MEJ (2011) Stochastic blockmodels and community structure in networks. Phys Rev E 83(1):016107. https:\/\/doi.org\/10.1103\/PhysRevE.83.016107. (Accessed 2017-05-24)","journal-title":"Phys Rev E"},{"key":"4988_CR15","unstructured":"Karypis G, Kumar V (1997) Metis: a software package for partitioning unstructured graphs, partitioning meshes, and computing fill-reducing orderings of sparse matrices"},{"key":"4988_CR16","doi-asserted-by":"publisher","unstructured":"Kumar P (2024) A depth-first search approach to detect the community structure of weighted networks using the neighbourhood proximity measure. Int J Data Sci Anal, 1\u201318. https:\/\/doi.org\/10.1007\/s41060-024-00631-9","DOI":"10.1007\/s41060-024-00631-9"},{"issue":"6","key":"4988_CR17","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1007\/s11704-019-8098-0","volume":"13","author":"P Kumar","year":"2019","unstructured":"Kumar P, Dohare R (2019) A neighborhood proximity based algorithm for overlapping community structure detection in weighted networks. Front Comput Sci 13(6):1353\u20131355","journal-title":"Front Comput Sci"},{"key":"4988_CR21","doi-asserted-by":"publisher","unstructured":"Kumar P, Dohare R (2020) The presence of anti-community structure in complex networks. In: Pant M, Sharma T, Basterrech S, Banerjee C (eds) Computational Network Application Tools for Performance Management. Asset Analytics. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-32-9585-8_13","DOI":"10.1007\/978-981-32-9585-8_13"},{"issue":"1","key":"4988_CR18","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11424-020-9252-3","volume":"34","author":"P Kumar","year":"2021","unstructured":"Kumar P, Dohare R (2021) Formalising and detecting community structures in real world complex networks. J Syst Sci Complex 34(1):180\u2013205. https:\/\/doi.org\/10.1007\/s11424-020-9252-3. (Accessed 2023-01-21)","journal-title":"J Syst Sci Complex"},{"issue":"1","key":"4988_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s41060-022-00314-3","volume":"14","author":"P Kumar","year":"2022","unstructured":"Kumar P, Dohare R (2022) An interaction-based method for detecting overlapping community structure in real-world networks. Int J Data Sci Anal 14(1):27\u201344. https:\/\/doi.org\/10.1007\/s41060-022-00314-3. (Accessed 2023-01-21)","journal-title":"Int J Data Sci Anal"},{"key":"4988_CR23","doi-asserted-by":"publisher","unstructured":"Kumar A, Kumar P, Dohare R (2024a) Pure expansion-based local community detection. Int J Data Sci Anal 18:317\u2013335. https:\/\/doi.org\/10.1007\/s41060-024-00602-0","DOI":"10.1007\/s41060-024-00602-0"},{"issue":"1","key":"4988_CR20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s13278-024-01257-2","volume":"14","author":"A Kumar","year":"2024","unstructured":"Kumar A, Kumar P, Dohare R (2024b) Revisiting neighbourhood proximity based algorithm for overlapping community detection in weighted networks. Soc Netw Anal Min 14(1):105","journal-title":"Soc Netw Anal Min"},{"key":"4988_CR22","doi-asserted-by":"publisher","unstructured":"Kumari A, Kumar A, Kumar P (2025) A new modularity metric for disjoint and overlapping community structure evaluation in weighted complex networks. Int J Data Sci Anal 1\u201325. https:\/\/doi.org\/10.1007\/s41060-025-00791-2","DOI":"10.1007\/s41060-025-00791-2"},{"issue":"1","key":"4988_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.016118","volume":"80","author":"A Lancichinetti","year":"2009","unstructured":"Lancichinetti A, Fortunato S (2009) Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Phys Rev E 80(1):016118. https:\/\/doi.org\/10.1103\/PhysRevE.80.016118. (Accessed 2023-01-21)","journal-title":"Phys Rev E"},{"issue":"4","key":"4988_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.78.046110","volume":"78","author":"A Lancichinetti","year":"2008","unstructured":"Lancichinetti A, Fortunato S, Radicchi F (2008) Benchmark graphs for testing community detection algorithms. Phys Rev E 78(4):046110. https:\/\/doi.org\/10.1103\/PhysRevE.78.046110. (Accessed 2016-09-01)","journal-title":"Phys Rev E"},{"issue":"1","key":"4988_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29\u2013123","journal-title":"Internet Math"},{"key":"4988_CR27","doi-asserted-by":"crossref","unstructured":"Liu X, Song W, Musial K, Li Y, Zhao X, Yang B (2025) Stochastic block models for complex network analysis: a survey. ACM Trans Knowl Discov Data 19(3):1\u201335","DOI":"10.1145\/3713076"},{"key":"4988_CR28","unstructured":"McDaid AF, Greene D, Hurley N (2011) Normalized mutual information to evaluate overlapping community finding algorithms. arXiv preprint arXiv:1110.2515"},{"key":"4988_CR29","doi-asserted-by":"publisher","unstructured":"Orman GK, Labatut V, Cherifi H (2013) Towards realistic artificial benchmark for community detection algorithms evaluation. Int J Web Based Commun 9(3):349. https:\/\/doi.org\/10.1504\/IJWBC.2013.054908. arXiv: 1308.0577. (Accessed 2019-02-11)","DOI":"10.1504\/IJWBC.2013.054908"},{"issue":"9","key":"4988_CR30","doi-asserted-by":"publisher","first-page":"2658","DOI":"10.1073\/pnas.0400054101","volume":"101","author":"F Radicchi","year":"2004","unstructured":"Radicchi F, Castellano C, Cecconi F, Loreto V, Parisi D (2004) Defining and identifying communities in networks. Proc Natl Acad Sci 101(9):2658\u20132663","journal-title":"Proc Natl Acad Sci"},{"issue":"2","key":"4988_CR31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026112","volume":"67","author":"E Ravasz","year":"2003","unstructured":"Ravasz E, Barab\u00e1si A-L (2003) Hierarchical organization in complex networks. Phys Rev E 67(2):026112","journal-title":"Phys Rev E"},{"key":"4988_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/9781118799635","volume-title":"An introduction to probability and statistics","author":"VK Rohatgi","year":"2015","unstructured":"Rohatgi VK, Saleh AME (2015) An introduction to probability and statistics, 2015th edn. Wiley, Berlin","edition":"2015"},{"key":"4988_CR34","doi-asserted-by":"crossref","unstructured":"Rossetti G, Pappalardo L, Rinzivillo S (2016) A novel approach to evaluate community detection algorithms on ground truth. In: Complex Networks VII: Proceedings of the 7th Workshop on Complex Networks CompleNet 2016, pp. 133\u2013144. Springer","DOI":"10.1007\/978-3-319-30569-1_10"},{"issue":"1","key":"4988_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-019-0165-9","volume":"4","author":"G Rossetti","year":"2019","unstructured":"Rossetti G, Milli L, Cazabet R (2019) Cdlib: a python library to extract, compare and evaluate communities from complex networks. Appl Netw Sci 4(1):1\u201326","journal-title":"Appl Netw Sci"},{"issue":"3\/4","key":"4988_CR35","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/2333389","volume":"42","author":"HA Simon","year":"1955","unstructured":"Simon HA (1955) On a class of skew distribution functions. Biometrika 42(3\/4):425\u2013440","journal-title":"Biometrika"},{"key":"4988_CR40","unstructured":"Wu C, He K, Chen J, Zhao Z, Du R (2020) Liveness is not enough: enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2219\u20132236"},{"key":"4988_CR37","doi-asserted-by":"crossref","unstructured":"Wu C, Chen J, He K, Zhao Z, Du R, Zhang C (2022) Echohand: high accuracy and presentation attack resistant hand authentication on commodity mobile devices. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2931\u20132945","DOI":"10.1145\/3548606.3560553"},{"key":"4988_CR36","doi-asserted-by":"crossref","unstructured":"Wu C, Chen J, Fang Q, He K, Zhao Z, Ren H, Xu G, Liu Y, Xiang Y (2024a) Rethinking membership inference attacks against transfer learning. IEEE Trans Inform Forensics Secur","DOI":"10.36227\/techrxiv.173750158.86681793\/v1"},{"key":"4988_CR38","doi-asserted-by":"crossref","unstructured":"Wu C, Chen J, Wang Z, Liang R, Du R (2024b) Semantic sleuth: identifying Ponzi contracts via large language models. In: Proceedings of the 39th IEEE\/ACM International Conference on automated software engineering, pp. 582\u2013593","DOI":"10.1145\/3691620.3695055"},{"key":"4988_CR39","doi-asserted-by":"crossref","unstructured":"Wu C, Chen J, Zhao Z, He K, Xu G, Wu Y, Wang H, Li H, Liu Y, Xiang Y (2024c) Tokenscout: early detection of ethereum scam tokens via temporal graph learning. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 956\u2013970","DOI":"10.1145\/3658644.3690234"},{"key":"4988_CR41","first-page":"1","volume":"2020","author":"J Xiao","year":"2020","unstructured":"Xiao J, Ren H-F, Xu X-K (2020) Constructing real-life benchmarks for community detection by rewiring edges. Complexity 2020:1\u201316","journal-title":"Complexity"},{"issue":"4","key":"4988_CR42","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/2501654.2501657","volume":"45","author":"J Xie","year":"2013","unstructured":"Xie J, Kelley S, Szymanski BK (2013) Overlapping community detection in networks: The state-of-the-art and comparative study. ACM Comput Surv 45(4):43\u201314335. https:\/\/doi.org\/10.1145\/2501654.2501657. (Accessed 2023-01-21)","journal-title":"ACM Comput Surv"},{"issue":"1","key":"4988_CR43","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10115-013-0693-z","volume":"42","author":"J Yang","year":"2013","unstructured":"Yang J, Leskovec J (2013) Defining and evaluating network communities based on ground-truth. Knowl Inf Syst 42(1):181\u2013213. https:\/\/doi.org\/10.1007\/s10115-013-0693-z. (Accessed 2016-09-10)","journal-title":"Knowl Inf Syst"},{"key":"4988_CR44","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2012a) Defining and evaluating network communities based on ground-truth. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, pp. 1\u20138","DOI":"10.1145\/2350190.2350193"},{"key":"4988_CR45","unstructured":"Yang J, Leskovec J (2012b) Structure and overlaps of communities in networks. arXiv preprint arXiv:1205.6228"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-04988-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-025-04988-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-025-04988-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:29:07Z","timestamp":1757312947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-025-04988-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":43,"journal-issue":{"issue":"8-9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["4988"],"URL":"https:\/\/doi.org\/10.1007\/s12652-025-04988-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"22 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}]}}