{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T15:16:19Z","timestamp":1772896579655,"version":"3.50.1"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62076087 and 91746209"],"award-info":[{"award-number":["62076087 and 91746209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Changjiang Scholars and Innovative Research Team in University (PCSIRT) of the Ministry of Education","award":["IRT17R32"],"award-info":[{"award-number":["IRT17R32"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p>\n            Traditional social group analysis mostly uses interaction models, event models, or other social network analysis methods to identify and distinguish groups. This type of method can divide social participants into different groups based on their geographic location, social relationships, and\/or related events. However, in some applications, it is necessary to make more specific restrictions on the members and the interactions between members of the group. Generally, Graph Pattern Matching (GPM) technique is used to solve this problem. However, the existing GPM methods rarely consider the rich contextual information of nodes and edges to measure the credibility between members. In this article, first, a social group query problem that needs to consider the trust between members of the group is proposed. Then, to solve this problem, a multi-fuzzy-constrained strong simulation matching model is proposed based on multi-constrained simulation, and a\n            <jats:bold>Strong Simulation<\/jats:bold>\n            GPM algorithm (NTSS) based on the exploration of pattern\n            <jats:bold>Node Topological<\/jats:bold>\n            ordered sequence is proposed. Aiming at the inefficiency of the NTSS algorithm when pattern graph with multiple nodes with zero in-degree and the problem of repeated calculation of matching edges shared by multiple matching subgraphs, two optimization strategies are proposed. Finally, we conduct verification experiments on the effectiveness and efficiency of the NTSS algorithm and the algorithms with the optimization strategies on four social network datasets in real applications. Experimental results show that the NTSS algorithm is significantly better than the existing multi-constrained GPM algorithm, and the NTSS_Inv_EdgC algorithm, which combines two optimization strategies, greatly improves the efficiency of the NTSS algorithm.\n          <\/jats:p>","DOI":"10.1145\/3481640","type":"journal-article","created":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T04:28:40Z","timestamp":1634963320000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Social Group Query Based on Multi-Fuzzy-Constrained Strong Simulation"],"prefix":"10.1145","volume":"16","author":[{"given":"Guliu","family":"Liu","sequence":"first","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education and Hefei University of Technology"}]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education, Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), and Hefei University of Technology"}]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Macquarie University, NSW, Australia"}]},{"given":"Xindong","family":"Wu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education and Mininglamp Academy of Sciences, Mininglamp Technology"}]}],"member":"320","published-online":{"date-parts":[[2021,10,22]]},"reference":[{"issue":"2","key":"e_1_3_1_2_2","first-page":"1","article-title":"Compact group discovery in attributed graphs and social networks","volume":"57","author":"Khan Abeer","year":"2019","journal-title":"Information Processing & Management"},{"issue":"6","key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"920","DOI":"10.3156\/jsoft.28.920","article-title":"Social group discovery extracting useful features using multiple instance learning","volume":"28","author":"Ryota Sato","year":"2017","journal-title":"Journal of Japan Society for Fuzzy Theory & Intelligent Informatics"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57811-4_17"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920878"},{"key":"e_1_3_1_6_2","volume-title":"Proceedings of the IEEE International Conference on Data Engineering","author":"Fan Wenfei","year":"2013"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113297"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2785824"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00714-9"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-194653"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2528937"},{"key":"e_1_3_1_12_2","volume-title":"Proceedings of the International Conference on Power Electronics & Intelligent Transportation System","author":"Ngan Henry Y. T.","year":"2010"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.09.015"},{"key":"e_1_3_1_14_2","volume-title":"Proceedings of the International Conference on Computational Science & Engineering","author":"Amin Milani Fard","year":"2009"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.14778\/1978665.1978671"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339679"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3375548"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3110215"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3080574"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2489791"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3127876"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321925"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.2174\/157340911798260340"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488518500277"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.14778\/2311906.2311907"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/543613.543620"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007607"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.69"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916274"},{"key":"e_1_3_1_31_2","first-page":"1391","volume-title":"Proceedings of the 24th AAAI Conference on Artificial Intelligence and the 22nd Innovative Applications of Artificial Intelligence Conference","author":"Liu Guanfeng","year":"2010"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.47"},{"key":"e_1_3_1_33_2","first-page":"1025","volume-title":"Proceedings of the International Conference on Autonomous Agents & Multiagent Systems","author":"Hang Chungwei","year":"2009"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:12Z","timestamp":1750193292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3481640"],"URL":"https:\/\/doi.org\/10.1145\/3481640","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,22]]},"assertion":[{"value":"2021-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}