{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T04:45:49Z","timestamp":1692765949467},"reference-count":55,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["2017\u2010ST061\u2010CINA01"],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Networks"],"published-print":{"date-parts":[[2022,9]]},"abstract":"Abstract<\/jats:title>We consider two new problems regarding the impact of edge addition or removal on the modularity of partitions (or community structures) in a network. The first problem seeks to add edges to enforce that a desired partition is one partition that maximizes modularity. The second problem seeks to find the sparsest representation of a network that has the same partition with maximum modularity as the original network. We present integer programming formulations, a row generation algorithm, and heuristic algorithms to solve these problems. Further, we demonstrate a counter\u2010intuitive behavior of modularity that makes the development of heuristics for general networks difficult. We then present results on a selection of social and illicit networks from the literature.<\/jats:p>","DOI":"10.1002\/net.22084","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T08:23:02Z","timestamp":1638433382000},"page":"152-177","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing edge sets in networks to produce ground truth communities based on modularity"],"prefix":"10.1002","volume":"80","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8030-0323","authenticated-orcid":false,"given":"Daniel","family":"Kosmas","sequence":"first","affiliation":[{"name":"Department of Mathematical Sciences Rensselaer Polytechnic Institute Troy New York USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5087-4679","authenticated-orcid":false,"given":"John E.","family":"Mitchell","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences Rensselaer Polytechnic Institute Troy New York USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6210-9448","authenticated-orcid":false,"given":"Thomas C.","family":"Sharkey","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering Clemson University Clemson South Carolina USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0307-6743","authenticated-orcid":false,"given":"Boleslaw K.","family":"Szymanski","sequence":"additional","affiliation":[{"name":"Department of Computer Science Rensselaer Polytechnic Institute Troy New York USA"},{"name":"Spo\u0142eczna Akademia Nauk \u0141\u00f3d\u017a Poland"}]}],"member":"311","published-online":{"date-parts":[[2021,12]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2008-00425-1"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.82.046112"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2021.1939466"},{"key":"e_1_2_9_5_1","doi-asserted-by":"crossref","unstructured":"A.Bahulkar B. K.Szymanski N. O.Baycik andT. C.Sharkey Community detection with edge augmentation in criminal networks Proc. 2018 IEEE\/ACM Int. Conf. Adv. Soc. Netw. Anal. Min. (ASONAM) 2018 pp. 1168\u20131175.","DOI":"10.1109\/ASONAM.2018.8508326"},{"key":"e_1_2_9_6_1","unstructured":"V.BatageljandA.Mrvar Pajek datasets.http:\/\/vlado.fmf.uni\u2010lj.si\/pub\/networks\/data\/esna\/default.htm 2006."},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2012.746940"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0154244"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190689"},{"key":"e_1_2_9_11_1","first-page":"160","volume-title":"Crime and networks","author":"Bright D. A.","year":"2013"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2016.08.003"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113666"},{"key":"e_1_2_9_14_1","unstructured":"CASOS Public datasets.http:\/\/www.casos.cs.cmu.edu\/tools\/datasets\/external\/index.php 1986."},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307458"},{"key":"e_1_2_9_16_1","doi-asserted-by":"crossref","unstructured":"M.Chen T.Nguyen andB. K.Szymanski On measuring the quality of a network community structure Proceedings of the 2013 International Conference on Social Computing 2013 pp. 122\u2013127.","DOI":"10.1109\/SocialCom.2013.25"},{"key":"e_1_2_9_17_1","doi-asserted-by":"crossref","unstructured":"M. S.Cinar B.Genc H.Sever andV. V.Raghavan Analyzing structure of terrorist networks by using graph metrics Proceedings of the 2017 IEEE International Conference on Big Knowledge (ICBK) 2017 pp. 9\u201316.","DOI":"10.1109\/ICBK.2017.24"},{"key":"e_1_2_9_18_1","first-page":"1","article-title":"The igraph software package for complex network research","volume":"1695","author":"Csardi G.","year":"2006","journal-title":"Int. J. Complex Syst."},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0408.2011.00533.x"},{"key":"e_1_2_9_20_1","volume-title":"Understanding dark networks: A strategic framework for the use of social network analysis","author":"Cunningham D.","year":"2016"},{"key":"e_1_2_9_21_1","doi-asserted-by":"crossref","unstructured":"J.Deeb\u2010Swihart A.Endert andA.Bruckman Understanding law enforcement strategies and needs for combating human trafficking Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019 pp. 1\u201314.","DOI":"10.1145\/3290605.3300561"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1057567711418501"},{"key":"e_1_2_9_23_1","unstructured":"A.Elsisy A.Mandviwalla B.Szymanski andT.Sharkey A synthetic network generator for covert network analytics 2020 arXiv preprint arXiv:2008.04445."},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2018.0831"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1017\/nws.2012.6"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1078087418791775"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986214553377"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128707309718"},{"key":"e_1_2_9_29_1","unstructured":"IBM ILOG CPLEX Optimization Studio User's manual for CPLEX version 20.1.https:\/\/www.ibm.com\/docs\/en\/icos\/20.1.0?topic=cplex\u2010users\u2010manual 2020."},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-010-9126-2"},{"key":"e_1_2_9_31_1","volume-title":"The Stanford GraphBase: A platform for combinatorial computing","author":"Knuth D. E.","year":"1993"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-003-0651-y"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427810391535"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012704"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01580665"},{"key":"e_1_2_9_36_1","first-page":"25","article-title":"Modeling the communication network in a sawmill","volume":"47","author":"Michael J. H.","year":"1997","journal-title":"Forest Products J."},{"key":"e_1_2_9_37_1","unstructured":"P.Mohanty A computational approach to identify covertness and collusion in social networks Ph.D. thesis University of Minnesota 2020."},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09526-4"},{"key":"e_1_2_9_39_1","first-page":"273","article-title":"Understanding the structure of a drug trafficking organization: A conversational analysis","volume":"11","author":"Natarajan M.","year":"2000","journal-title":"Crime Prev. Stud."},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-006-9007-x"},{"key":"e_1_2_9_41_1","first-page":"35","volume-title":"Handbook of graphs and networks","author":"Newman M. E.","year":"2003"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.94.052315"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-009-0273-x"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.50.5.810.370"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139164849"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.110"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602352"},{"key":"e_1_2_9_50_1","unstructured":"B.SerranoandT.Vidal Community detection in the stochastic block model by mixed integer programming 2020. arXiv preprint arXiv:2101.12336."},{"key":"e_1_2_9_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2011.548955"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"e_1_2_9_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04147-6_1"},{"key":"e_1_2_9_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996595"},{"key":"e_1_2_9_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-008-9057-6"},{"key":"e_1_2_9_56_1","doi-asserted-by":"publisher","DOI":"10.1086\/jar.33.4.3629752"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.22084","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/net.22084","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.22084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T23:37:34Z","timestamp":1692747454000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/net.22084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10.1002\/net.22084"],"URL":"https:\/\/doi.org\/10.1002\/net.22084","archive":["Portico"],"relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"2021-07-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}