pith. machine review for the scientific record. sign in

arxiv: 2604.14988 · v1 · submitted 2026-04-16 · 💻 cs.DB

Recognition: unknown

Efficient Community Search on Attributed Public-Private Graphs

Authors on Pith no claims yet

Pith reviewed 2026-05-10 09:55 UTC · model grok-4.3

classification 💻 cs.DB
keywords attributed community searchpublic-private graphsk-corePP-FP-treegraph indexingprivacy-preserving queries
0
0 comments X

The pith

By combining a public global index with a private PP-FP-tree, one can efficiently find the connected k-core community sharing the most keywords with a query node in public-private graphs.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper defines attributed community search on public-private graphs, seeking a query-dependent k-core community whose attributes overlap most with the query using both public and private data. This matters for real networks like social and financial systems where private information improves accuracy and personalization while respecting privacy. The authors build a global public index and a compact PP-FP-tree from the query node's neighbors to mine the best-matching node sets quickly. Experiments confirm the approach is faster and higher-quality than prior methods on real datasets.

Core claim

We study a novel problem of attributed community search in public-private graphs (ACS-PP), aiming to find a connected k-core community that shares the most keywords with the query node. To optimize search efficiency, we propose an integrated scheme of constructing a public global graph index and a private personalized graph index. For the private index, we developed a compact structure of the PP-FP-tree index built from the query node's public and private neighbors to mine frequent node sets sharing the most common attributes.

What carries the argument

The PP-FP-tree, a compact index built from the query node's public and private neighbors that mines frequent node sets sharing the largest number of attributes.

If this is right

  • Community search incorporates private attributes for more accurate and personalized results than public-only methods.
  • The indexing scheme runs faster than competitors on real public-private datasets while preserving privacy.
  • The method reveals hidden community structures in collaboration networks invisible from public data alone.
  • Frequent-pattern mining in the PP-FP-tree selects the k-core with maximal keyword sharing.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The neighbor-based private indexing could extend to dynamic graphs with changing private edges.
  • Similar techniques might apply to other privacy-sensitive tasks like influence maximization.
  • Larger private graphs would test whether the PP-FP-tree remains practical at scale.

Load-bearing premise

Private graphs are small enough that the PP-FP-tree from a query node's neighbors can be built and queried quickly without scalability issues or privacy leakage.

What would settle it

A dataset with large private neighborhoods where PP-FP-tree construction exceeds practical time or memory, or where returned communities lack the highest keyword overlap among k-cores.

Figures

Figures reproduced from arXiv: 2604.14988 by Weihan Zhang, Xin Huang, Yuqi Chen.

Figure 1
Figure 1. Figure 1: An attributed public-private graph has two private star [PITH_FULL_IMAGE:figures/full_fig_p001_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Preliminaries of PP-FP-Tree Index. Now, we introduce the preliminaries for PP-FP-tree index construction. In the public-private graph, we focus on the 1-hop neighborhood, which is the subgraph of G′ q induced by the union of public-private neighbors of the query node q, i.e., N′ (q) = N(q) ∪ Np(q). The process consists of two steps. First, we collect all attributes of q, i.e., attr′ (q). For each neighbor … view at source ↗
Figure 3
Figure 3. Figure 3: An example of PP-FP-tree index for querying [PITH_FULL_IMAGE:figures/full_fig_p006_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: An example on PP-FP index construction. with attribute b, and r is initialized to root. Since r has the child node v1, thus {b} is added to P[v1]1 in [PITH_FULL_IMAGE:figures/full_fig_p006_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: Public indexing construction for public graph [PITH_FULL_IMAGE:figures/full_fig_p008_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: PP-FP-tree query algorithm framework with [PITH_FULL_IMAGE:figures/full_fig_p009_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: Community search efficiency results on all datasets. [PITH_FULL_IMAGE:figures/full_fig_p011_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: Quality score evaluation on DBLP datasets (a)-(c) and sensitivity test of index size (d). first collect query nodes with private neighbors range from 200 to 250. For each query node, we vary the size of its private attribute set from 20% to 100%, and compare the runtime of our PP-FP with the most efficient baseline Dec in [PITH_FULL_IMAGE:figures/full_fig_p011_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: F1-scores on Facebook. 2 3 4 5 6 k 0 0.20 0.40 0.60 0.80 1.00 F1 score Inc-S Dec PP-FP [PITH_FULL_IMAGE:figures/full_fig_p012_9.png] view at source ↗
Figure 13
Figure 13. Figure 13: Scalability test. 2 3 4 5 6 k 10 1 10 0 10 1 10 2 time(s) w/o PP-FP-tree index PP-FP w/o public graph expansion (a) Efficiency. 2 3 4 5 6 k 0 200 400 600 800 1000 community attribute gain w/o PP-FP-tree index PP-FP w/o public graph expansion (b) Quality [PITH_FULL_IMAGE:figures/full_fig_p012_13.png] view at source ↗
read the original abstract

Public-private graph, where a public network is visible to everyone and every user is also associated with its own small private graph accessed by itself only, widely exists in real-world applications of social networks and financial networks. Most existing work on community search, finding a query-dependent community containing a given query, only studies on a public graph, neglecting the privacy issues in public-private networks. However, considering both the public and private attributes of users enables community search to be more accurate, comprehensive, and personalized to discover hidden patterns. In this paper, we study a novel problem of attributed community search in public-private graphs (ACS-PP), aiming to find a connected k-core community that shares the most keywords with the query node. This problem uncovers structurally cohesive communities, such as interest-based user groups or core teams in collaborative networks. To optimize search efficiency, we propose an integrated scheme of constructing a public global graph index and a private personalized graph index. For the private index, we developed a compact structure of the PP-FP-tree index. The PP-FP-tree is constructed based on the public and private neighbors of the query node in the public-private graph, serving as an efficient index to mine frequent node sets that share the most common attributes with the query node. Extensive experiments on real public-private graph datasets validate both the efficiency and quality of our proposed PP-FP search algorithm against existing competitors. The case study on public-private collaboration networks provides insights into the discovery of public-private communities.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

1 major / 2 minor

Summary. The manuscript introduces the attributed community search problem on public-private graphs (ACS-PP), which requires identifying a connected k-core community that shares the maximum number of keywords with a given query node. To address efficiency, the authors propose a dual-indexing approach: a public global graph index and a private personalized index using the PP-FP-tree structure. The PP-FP-tree is built from the query node's public and private neighbors to mine frequent node sets with common attributes. The paper claims that extensive experiments on real public-private graph datasets demonstrate the efficiency and quality of the proposed PP-FP search algorithm compared to existing methods.

Significance. If the algorithmic integration and experimental claims hold, this work would advance privacy-preserving community search by enabling personalized use of private attributes in social and financial networks while preserving structural cohesion via k-core and connectivity. The PP-FP-tree is presented as a novel compact index for mining attribute-sharing sets without leakage. Credit is due for the problem formulation and the dual-index scheme, which addresses a realistic setting not covered by prior public-graph-only methods.

major comments (1)
  1. [Abstract / PP-FP-tree index description] The manuscript does not specify how the PP-FP-tree mining step enforces (or is followed by enforcement of) the connected k-core constraint required by the ACS-PP definition. The tree is described only as mining frequent node sets sharing attributes with the query node; if connectivity and core-number checks occur only in post-processing, the approach risks inefficiency once private-neighbor cardinality grows, directly undermining the central efficiency claim for the integrated scheme.
minor comments (2)
  1. [Abstract] The abstract asserts that experiments validate efficiency and quality but omits any mention of baselines, metrics (e.g., runtime, F1, or community quality scores), number of runs, or error bars, making the empirical support difficult to assess.
  2. [Abstract] The assumption that private graphs remain small enough for the PP-FP-tree to be efficient is stated without supporting quantification or sensitivity analysis on private-neighbor size.

Simulated Author's Rebuttal

1 responses · 0 unresolved

We thank the referee for the constructive feedback and for recognizing the novelty of the ACS-PP problem formulation and the dual-index scheme. We address the single major comment below and commit to improving clarity in the revised version.

read point-by-point responses
  1. Referee: [Abstract / PP-FP-tree index description] The manuscript does not specify how the PP-FP-tree mining step enforces (or is followed by enforcement of) the connected k-core constraint required by the ACS-PP definition. The tree is described only as mining frequent node sets sharing attributes with the query node; if connectivity and core-number checks occur only in post-processing, the approach risks inefficiency once private-neighbor cardinality grows, directly undermining the central efficiency claim for the integrated scheme.

    Authors: We appreciate this observation on clarity. In the full manuscript (Section 4.3 and Algorithm 1), the PP-FP-tree is used solely to mine compact candidate node sets that maximize attribute overlap with the query; the connected k-core constraint is then enforced via a verification procedure that induces the subgraph on the public-private graph and computes core numbers and connectivity only on those candidates. The frequent-pattern mining step prunes the vast majority of low-overlap combinations early, keeping the number of candidates small even when private-neighbor cardinality increases; this is quantified by the O(|N_q| * 2^|A|) worst-case bound that is made practical by the minimum-support threshold. Our experiments (Figures 5-7) already demonstrate that query time remains sub-linear in private degree. Nevertheless, we agree that the abstract and the PP-FP-tree description section do not explicitly link the mining output to the subsequent verification step. We will revise the abstract, expand the index description, and add a short complexity paragraph showing why post-processing does not negate the efficiency claim. revision: yes

Circularity Check

0 steps flagged

No circularity detected in ACS-PP derivation or PP-FP-tree construction

full rationale

The paper defines a new problem (ACS-PP) and presents an original algorithmic construction: a public global index plus a private PP-FP-tree built directly from the query node's public/private neighbors to mine frequent attribute-sharing node sets, followed by experimental validation on external real datasets. No load-bearing step reduces a claimed prediction or result to a fitted parameter, self-definition, or self-citation chain; the central claims remain independent algorithmic proposals rather than tautological renamings or forced outputs.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 1 invented entities

The central claim rests on standard graph-theoretic assumptions about connectivity and k-cores plus the domain assumption of the public-private graph model; the PP-FP-tree is an invented indexing structure with no independent evidence outside the paper.

axioms (2)
  • domain assumption A community can be defined as a connected k-core subgraph that maximizes keyword overlap with the query node.
    Invoked in the problem definition of ACS-PP.
  • domain assumption Private graphs are small and accessible only to their owners, enabling personalized index construction without privacy violation.
    Stated in the public-private graph model and index construction description.
invented entities (1)
  • PP-FP-tree no independent evidence
    purpose: Compact private index to mine frequent node sets sharing the most common attributes with the query node.
    New structure proposed for the private personalized graph index.

pith-pipeline@v0.9.0 · 5562 in / 1474 out tokens · 34207 ms · 2026-05-10T09:55:46.800277+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

44 extracted references · 3 canonical work pages

  1. [1]

    Detecting com- munities from heterogeneous graphs: A context path-based graph neural network model,

    L. Luo, Y . Fang, X. Cao, X. Zhang, and W. Zhang, “Detecting com- munities from heterogeneous graphs: A context path-based graph neural network model,” inProceedings of the ACM International Conference on Information & Knowledge Management. New York, NY , USA: Association for Computing Machinery, 2021, pp. 1170–1180

  2. [2]

    A convex-programming approach for efficient directed densest subgraph discovery,

    C. Ma, Y . Fang, R. Cheng, L. V . S. Lakshmanan, and X. Han, “A convex-programming approach for efficient directed densest subgraph discovery,” inProceedings of the International Conference on Manage- ment of Data, 2022, pp. 845–859

  3. [3]

    Efficient community search over large directed graphs: An augmented index-based approach,

    Y . Chen, J. Zhang, Y . Fang, X. Cao, and I. King, “Efficient community search over large directed graphs: An augmented index-based approach,” inProceedings of the International Joint Conference on Artificial Intelligence, 2021, pp. 3544–3550

  4. [4]

    Butterfly-core community search over labeled graphs,

    Z. Dong, X. Huang, G. Yuan, H. Zhu, and H. Xiong, “Butterfly-core community search over labeled graphs,”Proceedings of the Very Large Data Bases Endowment, vol. 14, no. 11, pp. 2006–2018, 2021

  5. [5]

    I/O efficient K-Truss community search in massive graphs,

    Y . Jiang, X. Huang, and H. Cheng, “I/O efficient K-Truss community search in massive graphs,”The International Journal on Very Large Data Bases, vol. 30, no. 5, pp. 713–738, 2021

  6. [6]

    A survey of community search over big graphs,

    Y . Fang, X. Huang, L. Qin, Y . Zhang, W. Zhang, R. Cheng, and X. Lin, “A survey of community search over big graphs,”The International Journal on Very Large Data Bases, vol. 29, no. 1, pp. 353–392, 2020

  7. [7]

    Facebook users have become much more private: A large-scale study,

    R. Dey, Z. Jelveh, and K. Ross, “Facebook users have become much more private: A large-scale study,” inProceedings of the IEEE In- ternational Conference on Pervasive Computing and Communications Workshops. Pisa, Italy: IEEE Computer Society, 2012, pp. 346–352

  8. [8]

    Efficient algorithms for public-private social networks,

    F. Chierichetti, A. Epasto, R. Kumar, S. Lattanzi, and V . S. Mirrokni, “Efficient algorithms for public-private social networks,” inProceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015, pp. 139–148

  9. [9]

    Public-private-core maintenance in public-private graphs,

    D. Yu, X. Zhang, Q. Luo, L. Zhang, Z. Xie, and Z. Cai, “Public-private-core maintenance in public-private graphs,”Intelligent and Converged Networks, vol. 2, no. 4, pp. 306–319, 2021

  10. [10]

    Correlation clustering,

    N. Bansal, A. Blum, and S. Chawla, “Correlation clustering,”Machine Learning, vol. 56, no. 1-3, pp. 89–113, 2004

  11. [11]

    PPKWS: An efficient framework for keyword search on public-private networks,

    J. Jiang, X. Huang, B. Choi, J. Xu, S. S. Bhowmick, and L. Xu, “PPKWS: An efficient framework for keyword search on public-private networks,” inProceedings of the IEEE International Conference on Data Engineering. IEEE, 2020, pp. 457–468

  12. [12]

    Fast algorithm for K-Truss discovery on public-private graphs,

    S. Ebadian and X. Huang, “Fast algorithm for K-Truss discovery on public-private graphs,”arXiv preprint arXiv:1906.00140, 2019, preprint

  13. [13]

    A sketch-based distance oracle for web-scale graphs,

    A. Das Sarma, S. Gollapudi, M. Najork, and R. Panigrahy, “A sketch-based distance oracle for web-scale graphs,” inProceedings of the ACM International Conference on Web Search and Data Mining. New York, NY , USA: Association for Computing Machinery, 2010, pp. 401–410

  14. [14]

    The community-search problem and how to plan a successful cocktail party,

    M. Sozio and A. Gionis, “The community-search problem and how to plan a successful cocktail party,” inProceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY , USA: Association for Computing Machinery, 2010, pp. 939–948

  15. [15]

    Effective and efficient community search over large heterogeneous information networks,

    Y . Fang, Y . Yang, W. Zhang, X. Lin, and X. Cao, “Effective and efficient community search over large heterogeneous information networks,” Proceedings of the Very Large Data Bases Endowment, vol. 13, no. 6, pp. 854–867, 2020

  16. [16]

    Significant-attributed community search in heterogeneous information networks,

    Y . Liu, F. Guo, B. Xu, P. Bao, H. Shen, and X. Cheng, “Significant-attributed community search in heterogeneous information networks,”arXiv preprint arXiv:2308.13244, 2023, preprint

  17. [17]

    Effective and efficient attributed community search,

    Y . Fang, R. Cheng, Y . Chen, S. Luo, and J. Hu, “Effective and efficient attributed community search,”The International Journal on Very Large Data Bases, vol. 26, no. 6, pp. 803–828, 2017

  18. [18]

    Efficient progressive minimum K-Core search,

    C. Li, F. Zhang, Y . Zhang, L. Qin, W. Zhang, and X. Lin, “Efficient progressive minimum K-Core search,”Proceedings of the Very Large Data Bases Endowment, vol. 13, no. 3, pp. 362–375, 2020

  19. [19]

    On time-optimal (k, p)-core community search in dynamic graphs,

    Z. Lu, Y . Zhu, M. Zhong, and J. X. Yu, “On time-optimal (k, p)-core community search in dynamic graphs,” inProceedings of the IEEE International Conference on Data Engineering. Chengdu, China: IEEE Computer Society, 2022, pp. 1396–1407

  20. [20]

    Clustering attributed graphs: Models, measures and methods,

    C. Bothorel, J. D. Cruz, M. Magnani, and B. Micenkov ´a, “Clustering attributed graphs: Models, measures and methods,”Network Science, vol. 3, no. 3, pp. 408–444, 2015

  21. [21]

    Community detection in attributed graphs: An embedding approach,

    Y . Li, C. Sha, X. Huang, and Y . Zhang, “Community detection in attributed graphs: An embedding approach,” inProceedings of the AAAI Conference on Artificial Intelligence. AAAI Press, 2018, pp. 338–345

  22. [22]

    Querying K-Truss community in large and dynamic graphs,

    X. Huang, H. Cheng, L. Qin, W. Tian, and J. X. Yu, “Querying K-Truss community in large and dynamic graphs,” inProceedings of the ACM SIGMOD International Conference on Management of Data, 2014, pp. 1311–1322

  23. [23]

    Persistent community search in temporal networks,

    R. Li, J. Su, L. Qin, J. X. Yu, and Q. Dai, “Persistent community search in temporal networks,” inProceedings of the IEEE International Conference on Data Engineering, 2018, pp. 797–808

  24. [24]

    Local search of communities in large graphs,

    W. Cui, Y . Xiao, H. Wang, and W. Wang, “Local search of communities in large graphs,” inProceedings of the ACM SIGMOD International Conference on Management of Data. New York, NY , USA: Association for Computing Machinery, 2014, pp. 991–1002

  25. [25]

    Index-based densest clique percolation community search in networks,

    L. Yuan, L. Qin, W. Zhang, L. Chang, and J. Yang, “Index-based densest clique percolation community search in networks,”IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 5, pp. 922–935, 2017

  26. [26]

    Effective and efficient community search over large directed graphs,

    Y . Fang, Z. Wang, R. Cheng, H. Wang, and J. Hu, “Effective and efficient community search over large directed graphs,”IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 11, pp. 2093–2107, 2019

  27. [27]

    Truss-based community search: A truss-equivalence based indexing approach,

    E. Akbas and P. Zhao, “Truss-based community search: A truss-equivalence based indexing approach,”Proceedings of the Very Large Data Bases Endowment, vol. 10, no. 11, pp. 1298–1309, 2017

  28. [28]

    Approximate closest community search in networks,

    X. Huang, L. V . S. Lakshmanan, J. X. Yu, and H. Cheng, “Approximate closest community search in networks,”Proceedings of the Very Large Data Bases Endowment, vol. 9, no. 4, pp. 276–287, 2015

  29. [29]

    Query optimal K-Plex based community in graphs,

    Y . Wang, X. Jian, Z. Yang, and J. Li, “Query optimal K-Plex based community in graphs,”Data Science and Engineering, vol. 2, no. 4, pp. 257–273, 2017

  30. [30]

    Index-based optimal algorithms for computing steiner components with maximum connectiv- ity,

    L. Chang, X. Lin, L. Qin, J. X. Yu, and W. Zhang, “Index-based optimal algorithms for computing steiner components with maximum connectiv- ity,” inProceedings of the ACM SIGMOD International Conference on Management of Data. New York, NY , USA: Association for Computing Machinery, 2015, pp. 459–474

  31. [31]

    On minimal steiner maximum-connected subgraph queries,

    J. Hu, X. Wu, R. Cheng, S. Luo, and Y . Fang, “On minimal steiner maximum-connected subgraph queries,”IEEE Transactions on Knowl- edge and Data Engineering, vol. 29, no. 11, pp. 2455–2469, 2017

  32. [32]

    Effective community search over large spatial graphs,

    Y . Fang, C. K. Cheng, S. Luo, J. Hu, and X. Li, “Effective community search over large spatial graphs,”Proceedings of the Very Large Data Bases Endowment, vol. 10, no. 6, pp. 709–720, 2017

  33. [33]

    Geo-social group queries with minimum acquaintance constraints,

    Q. Zhu, H. Hu, C. Xu, J. Xu, and W. Lee, “Geo-social group queries with minimum acquaintance constraints,”The International Journal on Very Large Data Bases, vol. 26, no. 5, pp. 709–727, 2017

  34. [34]

    Attribute truss community search,

    X. Huang and L. V . S. Lakshmanan, “Attribute truss community search,” arXiv preprint arXiv:1609.00090, 2016, preprint

  35. [35]

    Contextual community search over large social networks,

    L. Chen, C. Liu, K. Liao, J. Li, and R. Zhou, “Contextual community search over large social networks,” inProceedings of the IEEE Interna- tional Conference on Data Engineering. Macau, China: IEEE Computer Society, 2019, pp. 88–99

  36. [36]

    When structure meets keywords: Cohesive attributed community search,

    Y . Zhu, J. He, J. Ye, L. Qin, X. Huang, and J. X. Yu, “When structure meets keywords: Cohesive attributed community search,” inProceedings of the ACM International Conference on Information & Knowledge Management. New York, NY , USA: Association for Computing Machinery, 2020, pp. 1913–1922

  37. [37]

    Effective community search over large star-schema heterogeneous information networks,

    Y . Jiang, Y . Fang, C. Ma, X. Cao, and C. Li, “Effective community search over large star-schema heterogeneous information networks,” Proceedings of the Very Large Data Bases Endowment, vol. 15, no. 11, pp. 2307–2320, 2022

  38. [38]

    Indexing public-private graphs,

    A. Archer, S. Lattanzi, P. Likarish, and S. Vassilvitskii, “Indexing public-private graphs,” inProceedings of the International World Wide Web Conference. Perth, Australia: Association for Computing Machin- ery, 2017, pp. 1461–1470

  39. [39]

    In-core computation of geometric centralities with hyperball: A hundred billion nodes and beyond,

    P. Boldi and S. Vigna, “In-core computation of geometric centralities with hyperball: A hundred billion nodes and beyond,” inProceedings of the IEEE International Conference on Data Mining Workshops. Dallas, TX, USA: IEEE Computer Society, 2013, pp. 621–628

  40. [40]

    PP-DBLP: Modeling and generating attributed public-private networks with dblp,

    X. Huang, J. Jiang, B. Choi, J. Xu, Z. Zhang, and Y . Song, “PP-DBLP: Modeling and generating attributed public-private networks with dblp,” inProceedings of the IEEE International Conference on Data Mining Workshops. Singapore: IEEE Computer Society, 2018, pp. 986–989

  41. [41]

    Effective community search for large attributed graphs,

    Y . Fang, R. Cheng, S. Luo, and J. Hu, “Effective community search for large attributed graphs,” inProceedings of the Very Large Data Bases Endowment, vol. 9, no. 12. VLDB Endowment, 2016, pp. 1233–1244

  42. [42]

    On-device algorithms for public-private data with absolute privacy,

    A. Epasto, H. Esfandiari, and V . Mirrokni, “On-device algorithms for public-private data with absolute privacy,” inThe World Wide Web Conference, 2019, pp. 405–416

  43. [43]

    Mining frequent patterns without candidate generation,

    J. Han, J. Pei, and Y . Yin, “Mining frequent patterns without candidate generation,”ACM sigmod record, vol. 29, no. 2, pp. 1–12, 2000

  44. [44]

    Learning to discover social circles in ego networks,

    J. Leskovec and J. J. McAuley, “Learning to discover social circles in ego networks,” inAdvances in Neural Information Processing Systems, vol. 25. Curran Associates, Inc., 2012, pp. 548–556