E. Adar and C. Re, Managing uncertainty in social networks, IEEE Data Eng. Bull, vol.30, issue.2, pp.15-22, 2007.

A. Hasan, M. Zaki, and M. J. , A survey of link prediction in social networks, Social network data analytics, pp.243-275, 2011.

N. S. Altman, An introduction to kernel and nearest-neighbor nonparametric regression, The American Statistician, vol.46, issue.3, pp.175-185, 1992.

L. A. Amaral, A. Scala, M. Barthelemy, and H. E. Stanley, Classes of small-world networks, Proceedings of the national academy of sciences, vol.97, pp.11149-11152, 2000.

P. Arora, S. Varshney, and D. Deepali, Analysis of k-means and k-medoids algorithm for big data, Procedia Computer Science, vol.78, pp.507-512, 2016.

A. Barabási and R. Albert, Emergence of scaling in random networks, science, vol.286, issue.5439, pp.509-512, 1999.

A. Bavelas, Communication patterns in task-oriented groups, The Journal of the Acoustical Society of America, vol.22, issue.6, pp.725-730, 1950.

S. Ben-dhaou, M. Kharoune, A. Martin, and B. Ben-yaghlane, Belief approach for social networks, International conference on belief functions, pp.115-123, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01105259

S. Ben-dhaou, M. Kharoune, A. Martin, and B. Ben-yaghlane, An evidential method for correcting noisy information in social network, Online Social Networks and Media Journal, vol.7, pp.30-44, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01868866

S. Ben-dhaou, M. Kharoune, A. Martin, and B. Ben-yaghlane, A belief approach for detecting spammed links in social networks, Proceedings of the 11th international conference on agents and artificial intelligence, vol.2, pp.602-609, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02064966

S. Ben-dhaou, K. Zhou, M. Kharoune, A. Martin, and B. Ben-yaghlane, The advantage of evidential attributes in social networks, 20th international conference on information fusion, pp.1-8, 2017.

A. P. Dempster, Upper and lower probabilities induced by a multivalued mapping. The annals of mathematical statistics, pp.325-339, 1967.

T. Denceux, The cautious rule of combination for belief functions and some extensions, 9th international conference on information fusion, pp.1-8, 2006.

T. Denoeux, A k-nearest neighbor classification rule based on dempstershafer theory. Classic works of the Dempster-Shafer theory of belief functions, pp.737-760, 2008.

D. Dubois and H. Prade, Representation and combination of uncertainty with belief functions and possibility measures, Computational intelligence, vol.4, issue.3, pp.244-264, 1988.

D. Easley and J. Kleinberg, Networks, crowds, and markets: Reasoning about a highly connected world, 2010.

P. Erdos and A. Rényi, On the evolution of random graphs, Publ. Math. Inst. Hung. Acad. Sci, vol.5, issue.1, pp.17-60, 1960.

A. Essaid, A. Martin, G. Smits, and B. Ben-yaghlane, A Distance-Based Decision in the Credal Level, International Conference on Artificial Intelligence and Symbolic Computation, pp.147-156, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01110349

S. Fortunato, Community detection in graphs, Physics reports, vol.486, issue.3, pp.75-174, 2010.

L. C. Freeman, Centrality in social networks conceptual clarification, Social networks, vol.1, issue.3, pp.215-239, 1978.

M. Girvan and M. E. Newman, Community structure in social and biological networks, Proceedings of the national academy of sciences, vol.99, pp.7821-7826, 2002.

R. Guimerà and M. Sales-pardo, Missing and spurious interactions and the reconstruction of complex networks, Proceedings of the National Academy of Sciences, vol.106, issue.52, pp.22073-22078, 2009.

P. W. Holland and S. Leinhardt, Transitivity in structural models of small groups, Comparative group studies, vol.2, issue.2, pp.107-124, 1971.

Y. Hu, H. Chen, P. Zhang, M. Li, Z. Di et al., Comparative definition of community and corresponding identifying algorithm, Physical Review E, vol.78, issue.2, p.26121, 2008.

L. Hubert and P. Arabie, Comparing partitions, Journal of classification, References, vol.2, issue.1, pp.193-218, 1985.
DOI : 10.1007/bf01908075

A. Jousselme, D. Grenier, and É. Bossé, A new distance between two bodies of evidence. Information fusion, vol.2, pp.91-101, 2001.
DOI : 10.1016/s1566-2535(01)00026-4

L. Kaufman and P. J. Rousseeuw, Finding groups in data: an introduction to cluster analysis, vol.344, 2009.

A. Khan, F. Bonchi, A. Gionis, and F. Gullo, Fast reliability search in uncertain graphs, 17th international conference on extending database technology (edbt), pp.535-546, 2014.

Z. F. Knops, J. A. Maintz, M. A. Viergever, and J. P. Pluim, Normalized mutual information based registration using k-means clustering and shading correction, Medical image analysis, vol.10, issue.3, pp.432-439, 2006.
DOI : 10.1016/j.media.2005.03.009

A. Lancichinetti, S. Fortunato, and F. Radicchi, Benchmark graphs for testing community detection algorithms, Physical review E, vol.78, issue.4, p.46110, 2008.
DOI : 10.1103/physreve.78.046110

URL : http://arxiv.org/pdf/0805.4770

H. Lee, Context Reasoning Under Uncertainty Based On Evidential Fusion Networks In Home-based Care, 2011.
DOI : 10.5772/17684

URL : https://www.intechopen.com/citation-pdf-url/15909

K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: social honeypots+ machine learning, Proceedings of the 33rd international acm sigir conference on research and development in information retrieval, pp.435-442, 2010.
DOI : 10.1145/1835449.1835522

J. Leskovec, L. Backstrom, R. Kumar, and A. Tomkins, Microscopic evolution of social networks, Proceedings of the 14th acm sigkdd international conference on knowledge discovery and data mining, pp.462-470, 2008.

J. Leskovec and J. J. Mcauley, Learning to discover social circles in ego networks, Advances in neural information processing systems, pp.539-547, 2012.

M. Liu, M. E. Matheny, Y. Hu, and H. Xu, Data mining methodologies for pharmacovigilance, ACM SIGKDD Explorations Newsletter, vol.14, issue.1, pp.35-42, 2012.
DOI : 10.1145/2408736.2408742

Z. Liu, Q. Pan, G. Mercier, and J. Dezert, A new incomplete pattern classification method based on evidential reasoning, IEEE transactions on cybernetics, vol.45, issue.4, pp.635-646, 2015.
DOI : 10.1109/tcyb.2014.2332037

URL : https://hal.archives-ouvertes.fr/hal-01162207

D. Lusseau, The emergent properties of a dolphin social network. Proceedings of the, Royal Society of London B: Biological Sciences, vol.270, issue.2, pp.186-188, 2003.

S. Mallek, I. Boukhris, Z. Elouedi, and E. Lefevre, The link prediction problem under a belief function framework, International conference on tools with artificial intelligence (ictai), pp.1013-1020, 2015.
DOI : 10.1109/ictai.2015.145

P. V. Marsden, Homogeneity in confiding relations, Social networks, vol.10, issue.1, pp.57-76, 1988.
DOI : 10.1016/0378-8733(88)90010-x

A. Martin, Implementing general belief function framework with a practical codification for low complexity, Advances and applications of DSmT for Information Fusion-Collected works, vol.3, pp.217-273, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00304125

A. Martin and C. Osswald, Human experts fusion for image classification, Information and Security, vol.20, pp.122-143, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00518656

A. Martin and C. Osswald, Toward a combination rule to deal with partial conflict and specificity in belief functions theory, 10th international conference on information fusion, pp.1-8, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00281897

J. Martinez-romo and L. Araujo, Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, pp.2992-3000, 2013.

M. Mcpherson, L. Smith-lovin, and J. M. Cook, Birds of a feather: Homophily in social networks, Annual review of sociology, vol.27, issue.1, pp.415-444, 2001.

M. Meil?, Comparing clusterings by the variation of information, Learning theory and kernel machines, pp.173-187, 2003.

P. Mika, Social networks and the semantic web, Proceedings of the 2004 ieee/wic/acm international conference on web intelligence, pp.285-291, 2004.

B. Moradabadi and M. R. Meybodi, Link prediction in fuzzy social networks using distributed learning automata, Applied Intelligence, vol.47, issue.3, pp.837-849, 2017.

M. E. Newman, Fast algorithm for detecting community structure in networks, Physical review E, vol.69, issue.6, p.66133, 2004.

M. E. Newman and M. Girvan, Finding and evaluating community structure in networks, Physical review E, vol.69, issue.2, p.26113, 2004.

R. T. Ng and J. Han, Clarans: A method for clustering objects for spatial data mining, IEEE transactions on knowledge and data engineering, vol.14, issue.5, pp.1003-1016, 2002.

P. Parchas, F. Gullo, D. Papadias, and F. Bonchi, The pursuit of a good possible world: extracting representative instances of uncertain graphs, Proceedings of the 2014 acm sigmod international conference on management of data, pp.967-978, 2014.

P. Pons and M. Latapy, Computing communities in large networks using random walks, International symposium on computer and information sciences, pp.284-293, 2005.

C. Prell, Social network analysis: History, theory and methodology, 2012.

F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi, Defining and identifying communities in networks, Proceedings of the National Academy of Sciences of the United States of America, vol.101, issue.9, pp.2658-2663, 2004.

W. M. Rand, Objective criteria for the evaluation of clustering methods, Journal of the American Statistical association, vol.66, issue.336, pp.846-850, 1971.

R. K. Roul, S. R. Asthana, M. Shah, and D. Parikh, Detecting spam web pages using content and link-based techniques, Sadhana, vol.41, issue.2, pp.193-202, 2016.

J. Scott, Social network analysis, Sage, 2017.

D. S. Seong, H. S. Kim, and K. H. Park, Incremental clustering of attributed graphs, IEEE transactions on systems, man, and cybernetics, vol.23, pp.1399-1411, 1993.

G. Shafer, A mathematical theory of evidence, vol.1, 1976.

P. Smets, The combination of evidence in the transferable belief model, IEEE Transactions, vol.12, issue.5, pp.447-458, 1990.

P. Smets, Belief functions: The disjunctive rule of combination and the generalized bayesian theorem, International Journal of Approximate Reasoning, vol.9, issue.1, pp.1-35, 1993.

P. Smets, The canonical decomposition of a weighted belief, In Ijcai, vol.95, pp.1896-1901, 1995.

P. Smets, Decision making in the tbm: the necessity of the pignistic transformation, International Journal of Approximate Reasoning, vol.38, issue.2, pp.133-147, 2005.

G. Stringhini, C. Kruegel, and G. Vigna, Detecting spammers on social networks, Proceedings of the 26th annual computer security applications conference, pp.1-9, 2010.

A. Trabelsi, Z. Elouedi, and E. Lefevre, Handling uncertain attribute values in decision tree classifier using the belief function theory, International conference on artificial intelligence: Methodology, systems, and applications, pp.26-35, 2016.

J. Travers and S. Milgram, The small world problem, Phychology Today, vol.1, issue.1, pp.61-67, 1967.

N. Vuokko and E. Terzi, Reconstructing randomized social networks, Proceedings of the 2010 siam international conference on data mining, pp.49-59, 2010.

P. Wang, B. Xu, Y. Wu, and X. Zhou, Link prediction in social networks: the state-of-the-art, Science China Information Sciences, vol.58, issue.1, pp.1-38, 2015.

M. Washha, Information Quality in Online Social Media and Big Data Collection: An Example of Twitter Spam Detection, 2018.

M. Washha, A. Qaroush, and F. Sedes, Leveraging time for spammers detection on twitter, Proceedings of the 8th international conference on management of digital ecosystems, pp.109-116, 2016.

S. Wasserman and K. Faust, Social network analysis: Methods and applications, vol.8, 1994.

D. J. Watts and S. H. Strogatz, Collective dynamics of smallworldnetworks, nature, vol.393, issue.6684, p.440, 1998.

D. Wei, X. Deng, X. Zhang, Y. Deng, and S. Mahadevan, Identifying influential nodes in weighted networks based on evidence theory, Physica A: Statistical Mechanics and its Applications, vol.392, issue.10, pp.2564-2575, 2013.

J. Xie, S. Kelley, and B. K. Szymanski, Overlapping community detection in networks: The state-of-the-art and comparative study, Acm computing surveys (csur), vol.45, issue.4, p.43, 2013.

R. R. Yager, On the dempster-shafer framework and new combination rules. Information sciences, vol.41, pp.93-137, 1987.

L. Yang, X. Cao, D. He, C. Wang, X. Wang et al., Modularity based community detection with deep learning, Ijcai, pp.2252-2258, 2016.

Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao et al., Uncovering social network sybils in the wild, ACM Transactions on Knowledge Discovery from Data (TKDD), vol.8, issue.1, 2014.

W. W. Zachary, An information flow model for conflict and fission in small groups, Journal of anthropological research, pp.452-473, 1977.

L. A. Zadeh, Fuzzy sets as a basis for a theory of possibility. Fuzzy sets and systems, vol.100, pp.9-34, 1999.

X. Zheng, Z. Zeng, Z. Chen, Y. Yu, and C. Rong, Detecting spammers on social networks, Neurocomputing, vol.159, pp.27-34, 2015.

K. Zhou, A. Martin, and Q. Pan, A belief combination rule for a large number of sources, Journal of Advances in Information Fusion, vol.13, issue.2, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01883239

K. Zhou, A. Martin, Q. Pan, and Z. Liu, Selp: Semi-supervised evidential label propagation algorithm for graph data clustering, International Journal of Approximate Reasoning, vol.92, pp.139-154, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01668379

K. Zhou, A. Martin, Q. Pan, and Z. Liu, Ecmdd: Evidential c-medoids clustering with multiple prototypes, Pattern Recognition, vol.60, pp.239-257, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01326332

Y. Zhou, H. Cheng, and J. X. Yu, Graph clustering based on structural/attribute similarities, Proceedings of the VLDB Endowment, vol.2, 2009.