{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:20Z","timestamp":1740174860176,"version":"3.37.3"},"reference-count":50,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RSP-2020\/184","61631018"],"award-info":[{"award-number":["RSP-2020\/184","61631018"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["RSP-2020\/184","61631018"],"award-info":[{"award-number":["RSP-2020\/184","61631018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2020,11,30]]},"abstract":"<jats:p>Stochastic Internet of Things (IoT)-based communication behavior of the progressing world is tremendously impacting social networks. The growth of social networks helps to quantify the effect on the Social Internet of Things (SIoT). Multiple existences of two persons at several geographical locations in different time frames hint to predict the social connection. We investigate the extent to which social ties between people can be inferred by critically reviewing the social networks. Our study used Chinese telecommunication-based anonymized caller data records (CDRs) and two openly available location-based social network data sets, Brightkite and Gowalla. Our research identified social ties based on mobile communication data and further exploits communication reasons based on geographical location. This paper presents an inference framework that predicts the missing ties as suspicious social connections using pipe and filter architecture-based inference framework. It highlights the secret relationship of users, which does not exist in real data. The proposed framework consists of two major parts. Firstly, users\u2019 cooccurrence based on the mutual location in a specific time frame is computed and inferred as social ties. Results are investigated based upon the cooccurrence count, the gap time threshold values, and mutual friend count values. Secondly, the detail about direct connections is collected and cross-related to the inferred results using Precision and Recall evaluation measures. In the later part of the research, we examine the false-positive results methodically by studying the human cooccurrence patterns to identify hidden relationships using a social activity. The outcomes indicate that the proposed approach achieves comprehensive results that further support the theory of suspicious ties.<\/jats:p>","DOI":"10.1155\/2020\/6667610","type":"journal-article","created":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T15:06:57Z","timestamp":1606835217000},"page":"1-16","source":"Crossref","is-referenced-by-count":4,"title":["Inferring Ties in Social IoT Using Location-Based Networks and Identification of Hidden Suspicious Ties"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7940-1960","authenticated-orcid":true,"given":"Nauman Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Key Laboratory of Wireless-Optical Communication, University of Science and Technology China, Hefei 230027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5758-2169","authenticated-orcid":true,"given":"Sihai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Wireless-Optical Communication, University of Science and Technology China, Hefei 230027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2229-2852","authenticated-orcid":true,"given":"Wuyang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Key Laboratory of Wireless-Optical Communication, University of Science and Technology China, Hefei 230027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":true,"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8896-547X","authenticated-orcid":true,"given":"Ikram","family":"Ud Din","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9699-1675","authenticated-orcid":true,"given":"Muhammad","family":"Asif","sequence":"additional","affiliation":[{"name":"Key Laboratory of Wireless-Optical Communication, University of Science and Technology China, Hefei 230027, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77332-2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2014.2318835"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1108\/intr-11-2013-0231"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1177\/0019793917729350"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.09.010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.worlddev.2018.05.007"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256044"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.3390\/app10155167"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-442450-0.50025-0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3343675"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-27290-8"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1006155107"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"issue":"2","key":"14","article-title":"Absent ties in social networks, their treatments, and blockmodeling outcomes","volume":"9","author":"A. \u017dnidar\u0161i\u010d","year":"2012","journal-title":"Advances in Methodology & Statistics\/Metodoloski Zvezki"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2576939"},{"article-title":"The power of indirect social ties","year":"2014","author":"X. Zuo","key":"16"},{"first-page":"17","article-title":"Tie strength in co-authorship social networks: analyses, metrics and a new computational model","author":"M. A. Brand\u00e3o","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNS.2018.8573634"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/app10175957"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2908412"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3390\/make1030053"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08010-9"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0092196"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313635"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-013-3902-8"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.5120\/21351-4042"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2014.113"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/adma.201805921"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2017.1700030"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103174"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377080"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2019.8680980"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2012.09.011"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.2307\/202051"},{"first-page":"1940","article-title":"Statistical properties and temporal properties of calling behavior","author":"J. Gui","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.01.007"},{"first-page":"21","article-title":"Quantifying the invisible audience in social networks","author":"M. S. Bernstein","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.4018\/ijose.2019010105"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284092"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.09.002"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.3390\/app10175922"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2015.7293303"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.3390\/app10186527"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-019-0196-6"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.007"},{"first-page":"1174","article-title":"Seeing the unseen network: Inferring hidden social ties from respondent-driven sampling","author":"L. Chen","key":"47"},{"article-title":"SNAP datasets: stanford large network dataset collection","year":"2014","author":"J. Leskovec","key":"48"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.365"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460356"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/6667610.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/6667610.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2020\/6667610.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T15:06:59Z","timestamp":1606835219000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2020\/6667610\/"}},"subtitle":[],"editor":[{"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,30]]},"references-count":50,"alternative-id":["6667610","6667610"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6667610","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2020,11,30]]}}}