Fig. 14: Performance of different recognition methods in network destructive experiments. | Humanities and Social Sciences Communications

Fig. 14: Performance of different recognition methods in network destructive experiments.

From: A classification and recognition algorithm of key figures in public opinion integrating multidimensional similarity and K-shell based on supernetwork

Fig. 14

a Network destructive experiment at 1‰ attack ratio. b Network destructive experiment at 2‰ attack ratio. c Network destructive experiment at 5‰ attack ratio. All the network destructive experiments show the experimental results of six algorithms in four periods. The six algorithms are CI, forwarding volume, degree centrality, K-shell, multidimensional similarity, classification and recognition. The four periods are gestational period, explosion period, duration period and recovery period.

Back to article page