<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Discovering Balance-Aware Polarized Communities in Signed Networks with Graph Neural Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>(Discussion Paper)</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Gullo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Mandaglio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Tagarelli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. Computer Engineering</institution>
          ,
          <addr-line>Modeling, Electronics, and Systems Engineering</addr-line>
          ,
          <institution>University of Calabria</institution>
          ,
          <addr-line>Rende (CS)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dept. Information Engineering</institution>
          ,
          <addr-line>Computer Science, and Mathematics</addr-line>
          ,
          <institution>University of L'Aquila</institution>
          ,
          <addr-line>Coppito (AQ)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Signed graphs model interactions among users, where nodes represent individuals and edges are labeled as positive for friendly relationships and negative for antagonistic ones. The 2-Polarized-Communities (2pc) problem aims to identify two disjoint polarized communities in a signed network so as to satisfy three conditions: the majority of intra-community edges should be positive, the majority of intercommunity edges should be negative, and the ratio of edges satisfying these conditions to the number of nodes in the communities should be maximized. Existing 2pc methods sufer from two key limitations: () they rely on a single optimal solution to a continuous relaxation of the problem, later rounded to obtain the final pair of polarized communities, and ( ) the standard 2pc objective function does not impose any constraints on the balance between community sizes. In this paper, we discuss a method that addresses both limitations and introduce two key contributions: (i) a Graph Neural Network-based approach that systematically explores multiple suboptimal solutions to the relaxed 2pc problem, selecting the one that yields the best 2pc solution after rounding; and (ii) a generalization of the 2pc objective function which explicitly encourages size-balanced communities. Extensive experiments on real-world and synthetic signed graphs have shown the high accuracy of our approach, its superiority over existing methods, and the efectiveness of  -polarity in producing high-quality, well-balanced polarized communities.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;polarization</kwd>
        <kwd>signed graphs</kwd>
        <kwd>graph neural networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The widespread use of modern social media has created a huge amount of online social
interactions, fostered the formation of communities [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ] and facilitating discussions about a
variety of topics. Users establish positive relationships such as friendships, agreements, and
trust, as well as negative relationships such as foes, disagreements, and distrusts. The existence
of such mixed interactions has led to an ever-growing polarization phenomenon, i.e., a division
of the set of users into groups with opposite view on controversial topics (e.g., politics, religion).
      </p>
      <p>
        Signed graphs are graphs whose edges are assigned either a positive or a negative label,
denoting whether the interaction depicted by an edge is friendly or antagonistic, respectively [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Signed graphs are used to model a variety of data and study numerous (social) phenomena, such
as emergence of polarized discussions in social media, or analysis of trust/distrust in review
platforms [
        <xref ref-type="bibr" rid="ref10 ref6 ref7 ref8 ref9">6, 7, 8, 9, 10</xref>
        ]. Bonchi et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] defined the 2-Polarized-Communities (for short,
2pc) problem on signed graphs, aiming to find two subsets of nodes, generally referred to as
communities, such that there are (R1) mostly positive edges within each community and (R2)
mostly negative edges between the two communities, and (R3) the subgraph induced by these
two communities is as much dense as possible. Also, the two communities are required to
be non-overlapping, but they do not necessarily need to cover the entire node set. The rationale
of the latter is to comply the most with real-world situations, where polarized communities
are concealed within a body of other graph nodes which do not (yet) have a strongly formed
opinion, and, as such, they are neutral in terms of polarization.
      </p>
      <p>
        Motivation. The above R1–R3 requirements for the 2pc problem are jointly pursued by
maximizing a single objective function, termed polarity. Maximizing polarity is NP-hard [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
but a continuous relaxation of that problem is solvable in polynomial time. Existing methods
rely on rounding (i.e., discretizing) the optimal solution of the relaxed problem, but this approach
has two key limitations. First, deriving a solution to 2pc starting from the optimal solution of
the relaxed problem may be limiting in terms of polarity as suboptimal solutions to the relaxed
problem can lead to better solutions to 2pc after rounding. Second, polarity maximization does
not require or foster size-balanced communities, often leading to one dominant and one nearly
empty group, even when naturally balanced polarized communities exist. Identifying such
balanced groups is crucial across various domains, from social media and politics to market
research, as it fosters constructive debates, reduces echo chambers, and identifies harmful
situations. Thus, methods that can detect balanced polarized communities are needed.
Contributions. In this paper, we discuss our recent advancement [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] in the 2pc problem
that properly addresses the above limitations. Our contributions are twofold. First, to address
the first limitation and leveraging the recent success of Graph Neural Networks (GNNs) in
graph learning tasks [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ], we propose a novel GNN-based approach, dubbed Neural2PC,
that systematically explores multiple suboptimal solutions to the relaxed problem, ultimately
selecting the one that yields the best discrete 2pc solution after rounding. Second, to overcome
the second limitation, we define a generalization of the polarity function, named  -polarity that
is designed to produce polarized communities that, depending on the setting of  , can be either
more balanced or larger than those yielded by standard polarity.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>Let  = (, +, − ) be an undirected signed graph, where  is a set of nodes, and +, − ⊆
 × , + ∩− = ∅, are sets of positive and negative edges, respectively. We assign each node in
 a unique integer ID in 1, . . . , | | and use  ∈  interchangeably for the node and its position,
simplifying matrix/vector notation. A ∈ {−1, 0, 1} | |×| | is the signed adjacency matrix of ,
defined as A[, ] = 1 if (, ) ∈ +, A[, ] = −1 if (, ) ∈ − , and A[, ] = 0 otherwise.</p>
      <p>
        Given a signed graph  = (, +, − ), the 2-Polarized-Communities [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] problem (for
short, 2pc) finds two disjoint subsets 1, 2 ⊆  of nodes such that (R1) there are as many
positive edges and as few negative edges as possible within 1 and within 2; (R2) there are
as many negative edges and as few positive edges as possible across 1 and 2; and (R3) there
should be a large number of edges complying with (R1) and (R2) within 1 and 2 relative to
the total number of nodes in these groups.
      </p>
      <p>1 and 2 are regarded as polarized communities, i.e., groups of nodes which are cohesive in
terms of both intra-group positive relationships (edges) and inter-group negative relationships.
Nodes included into neither 1 nor 2, denoted as 0, form the set of neutral nodes. A partition
{0, 1, 2} of  can alternatively be represented by a (column) vector x ∈ {−1, 0, 1} | |,
whose -th coordinate is x = 0 if  ∈ 0, x = 1 if  ∈ 1, and x = −1 if  ∈  2.</p>
      <p>
        The above R1–R3 requirements are altogether encoded into a single function, termed polarity:
Definition 1 (Polarity [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]). Given a vector x ∈ {−1, 0, 1} | | and a matrix A
{−1, 0, 1} | |×| | , the polarity (x, A) of x with respect to A is defined as:
∈
(1)
(x, A) =
x⊤A x
x⊤x
.
      </p>
      <p>
        The numerator of (·, ·) accounts for R1 and R2, while numerator and denominator altogether
model R3. In this regard, note that x⊤x = |1 ∪ 2|. The 2pc problem is formulated as follows:
Problem 1 (2pc [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]). Given a signed graph  = (, +, − ) with signed adjacency matrix
A, find
x* =
      </p>
      <p>arg max
x∈{−1,0,1} | |
(x, A).</p>
      <p>
        Relaxing node-to-community assignments to be in [
        <xref ref-type="bibr" rid="ref1">−1, 1</xref>
        ] results in the following problem:
Problem 2 (2PC-relaxed [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]). Given a signed graph  = (, +, − ) with signed
adjacency matrix A, find
z* = arg max (z, A),
      </p>
      <p>
        z∈[
        <xref ref-type="bibr" rid="ref1">−1,1</xref>
        ] | |
where polarity (z, A) = z⊤A z/z⊤z of a vector z ∈ [
        <xref ref-type="bibr" rid="ref1">−1, 1</xref>
        ] | | is defined as in Definition 1.
State of the art in 2pc. 2pc is shown to be NP-hard, while 2PC-relaxed can be solved in
polynomial time by finding the eigenvector of the signed adjacency matrix corresponding to
the largest eigenvalue [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Bonchi et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] exploit the latter to devise two approximation
algorithms for 2pc. The first (deterministic) algorithm simply rounds the optimal solution z* to
2PC-relaxed as x* = sgn(z*), for all  ∈  , where sgn(·) is the sign function. The second
(randomized) algorithm sets, for all  ∈  , x* = sgn(z*) if a Bernoulli experiment with success
probability |z*| succeeds, otherwise x* = 0.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>
        Representation learning for signed graphs. Graph representation learning is the problem of
assigning elements of a graph (e.g., nodes, edges, subgraphs) to numerical vectors (embeddings)
such that the similarity between those elements in the graph is preserved in the embedding
space. This field spans shallow methods, which optimize specific criteria (e.g., -hop reachability,
random-walk co-occurrence) and deep approaches based on graph neural networks (GNNs) [
        <xref ref-type="bibr" rid="ref14 ref16">16,
14</xref>
        ]. Representation learning has been studied for signed graphs as well, both undirected [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref20 ref21">17, 18,
19, 20, 21</xref>
        ] and directed [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ]. In this work, we regard signed graph representation learning
as a building block of the proposed framework. Note that our approach is versatile w.r.t. the
choice of graph representation learning model.
      </p>
      <p>
        Clustering signed graphs has also received attention in the literature [
        <xref ref-type="bibr" rid="ref24 ref25 ref26 ref27 ref28">24, 25, 26, 27, 28</xref>
        ].
However, those methods require every node to be part of an output cluster, hence they are not
designed to detect neutral nodes and left them out of evaluation, unlike our approach. Also,
signed graph clustering methods optimize criteria other than polarity.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. The Neural2PC approach</title>
      <p>
        Overview. Unlike existing methods [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] which find the optimal solution z* to 2PC-relaxed
(Problem 2) directly, we let a neural-network model  – with parameters  – produce a set
{z |  = 1, . . . , } of feasible solutions to 2PC-relaxed during multiple epochs 1, . . . , 
of training. All the various z are rounded in order to yield feasible discrete solutions x to 2pc.
The best (in terms of polarity, Definition 1) of such x  solutions is the definitive output.
      </p>
      <p>The rationale of our approach is that it allows for exploring a variety of suboptimal solutions
to 2PC-relaxed. This favors obtaining ultimate discrete solutions (after rounding) which exhibit
higher polarity than the one derived by rounding the optimal solution to 2PC-relaxed. The
goal is to find the model parameters  that maximize the polarity of the (relaxed) solutions
computed via  (or, equivalently, minimize a loss defined based on the negative polarity). As
parameter learning goes on, it is expected to get a deeper exploration of the space of relaxed
solutions, and hence a higher likelihood of getting an efective discrete solution after rounding.</p>
      <p>The proposed neural approach is named Neural2PC. A graphical illustration of its main
components is shown in Figure 1. Next, we delve into its technical details.</p>
      <p>
        Neural model. Our  model takes as input a signed graph  = (, +, − ), and a matrix
H0 ∈ R| |×  containing a  -dimensional (real-valued) vector of features for every node. If
such features are not available, H0 can be initialized by considering structural information
derived from  [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The first block of  is a (-layer) signed GNN [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref20 ref21">17, 18, 19, 20, 21</xref>
        ]
sgnn(· ), with parameters  sgnn. sgnn(· ) properly processes ’s topology and (possibly) node
features H0, and outputs a matrix H ∈ R| |×  = [h ∈ R ]∈ containing a hidden vector
representation h of every node  ∈  . This operation can be described as H = sgnn(, H0).
Then, vector representations produced by sgnn(· ) feed into fully-connected neural-network
linear layers nn(· ), with parameters  nn. Ultimately, a tanh activation function is used to cast
the (node-to-community assignment) scores for every node to the desired [
        <xref ref-type="bibr" rid="ref1">−1, 1</xref>
        ] range (cf.
Problem 2). This operation can be written as z = tanh(nn(H)). As a result, the overall 
model, with parameters  = { sgnn,  nn}, is as follows:
 (, H0) = tanh(nn(sgnn(, H0))),
(2)
Loss function. To optimize model parameters  , we employ a loss function ℒ2PC defined as a
combination of (the negative of) polarity (·, ·) and a regularization term. The latter enforces the
model produce continuous scores that are as close as possible to the ultimately desired discrete
{−1, 0, 1} scores. Specifically, we denfie the regularization term as the || · || 2 L2-norm of a vector
 ∈ R | |, whose entries [] , for all  ∈  , are set to the diference min{|z[]|, 1 − |z[]|}
between z[] and the closest valid discrete score. The intuition is that minimizing the norm of
 (together with the other loss component) is expected to produce the desired efect of yielding
output continuous z scores not too far from the valid discrete ones.
      </p>
      <p>
        Given z =  (, H0), the signed adjacency matrix A of , and a hyperparameter  ∈ R
which weighs the importance of the regularization term, the ℒ2PC loss function is defined as:
ℒ2PC(z, A, ) = −(z, A) + ||||
Rounding. To round a continuous solution z ∈ [
        <xref ref-type="bibr" rid="ref1">−1, 1</xref>
        ] | | onto a valid discrete x ∈
{−1, 0, 1} | | solution to 2pc, we borrow the procedure adopted by Bonchi et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Specifically,
given a threshold  ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] , for all  ∈  , x[] = sgn(z[]) if |[]| ≥  , x[] = 0 otherwise.
Let  = {⌈z[]⌋ |  ∈  } be a set of candidate thresholds, where ⌈·⌋  denotes approximating
a real number at the -th decimal digit (we use  = 3). In order to avoid sticking to a single  ,
we follow [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and try all the thresholds  ∈  . Given a threshold  ∈  , we yield a discrete
solution x as follows: ∀ ∈ , x [] = sgn(z[]) if |z[]| ≥  ; 0 otherwise. The final solution
corresponds to the discrete solution with highest polarity:
round(z) = arg max
x ∈ {x | ∈ }
(x, A).
      </p>
      <p>Algorithm. The algorithm we employ to produce a solution to 2pc simply consists in optimizing
the  = { sgnn,  nn} parameters of the  neural model end-to-end, via standard gradient
descent, for a number  of training epochs. Specifically, the algorithm alternates a forward
phase, which produces a continuous solution z given the current  parameters, and a backward
phase, where parameters  are updated via gradient descent, using the ℒ2PC loss function, with a
certain learning rate  . The continuous solution z yielded in every epoch is rounded according
to the round(· ) procedure described above. The discrete rounded solution with the highest
polarity score out of all the ones produced in the various epochs is ultimately output. Rounding
and evaluating polarity in every epoch is necessary because the best discrete solution’s epoch
is hard to predict in advance.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Balancing the size of the communities</title>
      <p>
        A known issue with the polarity measure (Definition 1) is its bias toward size-imbalanced
communities, sometimes leading to one dominant community and the other empty [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. To address
this, we propose  -polarity, a generalized measure that promotes more balanced polarized
(3)
(4)
communities by adjusting the parameter  . We define  -polarity by modifying the denominator
of the polarity measure while keeping the numerator unchanged. Given a node-to-community
assignment vector x ∈ {−1, 0, 1} | |, let 1 = ∑︀∈,x[]&lt;0 |x[]| and 2 = ∑︀∈,x[]&gt;0 x[]
be the size of the two communities, with  = max{1, 2},  = min{1, 2}. The
denominator of the polarity measure is x⊤x =  + , which can be rewritten as
( −  ) + 2. The key idea behind  -polarity is to weight the size imbalance term
( −  ) by a factor  &gt; 0, leading to the following definition:
Definition 2 (-polarity). Given a vector x ∈ {−1, 0, 1} | |, a matrix A ∈ {−1, 0, 1} | |×| | ,
and a real number  &gt; 0, the -polarity   (x, A) of x with respect to A is defined as:
 (x, A) =
      </p>
      <p>x⊤A x
( −  ) + 2 
.</p>
      <p>(5)</p>
      <p>For  &gt; 1 , the size-diference ( −  ) term is amplified: maximizing  enforces such
a term to be small, encouraging balanced communities. For  ∈ (0, 1) , the efect is reversed,
while  = 1 recovers standard polarity.</p>
      <p>
        The relaxed version of  -polarity replaces x with a continuous vector z ∈ [
        <xref ref-type="bibr" rid="ref1">−1, 1</xref>
        ] | | in
Equation (5). It can be integrated into Neural2PC by substituting (z, A) with  (z, A) in the
ℒ2PC loss (Equation (3)).
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Experimental Methodology</title>
      <p>
        Evaluation goals. We evaluated Neural2PC and competitors/baselines on (1) real datasets, and
(2) synthetic datasets; (3) impact of diferent signed GNNs in Neural2PC; (4) runtimes of the
considered methods; (5) an ablation study on the Neural2PC components; (6) efectiveness of
the -polarity measure in yielding communities that are both size-balanced and high-quality.
Real datasets. We selected publicly-available real-world signed graphs of varying sizes and
types. Bitcoin [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] (5.9k nodes, 21.5k edges), Epinions [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] (131.6k nodes, 711.2k edges) are
trust-distrust networks. Cloister [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] (18 nodes, 125 edges), Congress [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] (219 nodes, 521 edges),
and HTribes [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] (16 nodes, 58 edges) are social networks. Larger networks include Slashdot [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]
(82.1k nodes, 500.5k edges), a friend-foe network, TwitterRef [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] (10.9k nodes, 251.4k edges), a
stance network, WikiCon [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] (116.7k nodes, 2.03M edges), an edit-conflict network, WikiEle [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]
(7.1k nodes, 100.7k edges), a voting network, and WikiPol [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] (138.6k nodes, 715.9k edges), a
political discussion network.
      </p>
      <p>
        Synthetic datasets. We used synthetic signed graphs to test methods in recovering
groundtruth polarized communities, generated by the modified signed stochastic block model
(mSSBM) [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. The model has three parameters: the total number of nodes , the size  =
|1| = |2| of the polarized communities, and a noise parameter  ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] , with polarized
communities emerging when  ≤ 2/3.
      </p>
      <p>
        We used diferent synthetic graphs by varying number of nodes ( ), community size , and
 ∈ {0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6}. For each configuration, we generated 10 diferent graphs.
Competing methods. We compared our Neural2PC against state-of-the-art methods for
polarized community detection and relevant baselines from related problems. Our primary
competitors are Eigen and its randomized variant R-Eigen [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], as they address the same 2pc
optimization problem.
      </p>
      <p>
        We included Pivot, a baseline inspired by a correlation clustering algorithm [
        <xref ref-type="bibr" rid="ref33 ref34 ref35">33, 34, 35</xref>
        ] and
Greedy [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], a method based on a 2-approximation algorithm for densest subgraph [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]. We also
considered the signed graph clustering algorithms BNC [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], SPONGE [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], and SSSNet [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
Experimental setting. We used SGDNET [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], SNEA [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and SGNN [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] as GNN models for
our Neural2PC. All signed GNN models were trained on CPUs with uniform settings: node
embeddings size  = 64,  = 2 layers, the final embedding of a signed spectral embedding
model [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] as the input feature matrix ( = 64) and default values for other parameters. Model
training was carried out with the Adam optimizer for  = 300 epochs, using grid search
for the learning rate  ∈ {0.01, 0.005, 0.001} and regularization factor  ∈ {0.1, 0.01, 0.001} .
Results are averaged over 30 runs.
      </p>
    </sec>
    <sec id="sec-7">
      <title>7. Results</title>
      <p>Results on real datasets. Table 1 reports the polarity values, along with the sizes of the two
resulting polarized communities. Concerning Neural2PC, we only report the results obtained
by the best-performing (in terms of polarity) graph representation learning method.</p>
      <p>Neural2PC is generally the most competitive in polarity. The exceptions (Slashdot, WikiEle,
WikiPol) occur when Greedy selects an overly dense subgraph as one polarized community,
leaving the other empty—an undesirable outcome. In contrast, our method returns both
nonempty communities with high polarity in WikiEle and WikiPol. Among competitors, Eigen and
R-Eigen, achieve strong polarity, with Eigen outperforming R-Eigen. Pivot as well as BNC and
SPONGE performs poorly, with the latter two often producing very imbalanced communities.
SSSNet performs slightly better but still lags behind.</p>
      <p>Results on synthetic datasets. We analyzed the average 1-scores and polarity scores
over 10 synthetic graphs for each noise level  , considering varying network sizes ( ∈
250, 500, 1000, 2000) and community sizes ( ∈ 25, 50, 100, 200). Our experiments (results not
shown) revealed that Neural2PC remains robust to increasing noise, consistently outperforming
competitors in both 1-score and polarity.</p>
      <p>Impact of diferent signed GNNs. We analyzed polarity and community size values yielded
by Neural2PC using diferent signed GNN models (results not shown). Our experiments revealed
that the polarity of the solutions provided by Neural2PC does not significantly change across
the various GNNs, which indicates robustness of the approach in terms of this main component.
Execution times. The average runtime performance of the methods was measured across the
diferent runs (results not shown). The learning-based methods, SSSNet and Neural2PC, have
the highest runtimes, primarily due to the number of training epochs (max = 300). Nonetheless,
Neural2PC ’s per-epoch time is comparable to the fastest methods. Among the other methods,
SPONGE performs best, followed by BNC and Eigen. R-Eigen is slightly slower than Eigen
due to its randomized nature, while Pivot and Greedy are ineficient.</p>
      <p>Ablation study. To assess the impact of Neural2PC components, we conducted an ablation
study on two simplified versions of Neural2PC: (i) NN, which removes the sgnn (·) block,
retaining only nn(·) , and (ii) Direct, which optimizes the z assignments by minimizing the
ℒ2PC loss via projected gradient descent. For each variant, we measured (results not shown)
polarity, solution size, and execution time. The full Neural2PC is crucial for optimal polarity
across all datasets or at least matching Direct (TwitterRef, WikiEle). However, Direct is less
eficient, requiring significantly more epochs (at least twice as many) than Neural2PC (and NN,
too), as the latter leverages sgnn(·) to assigns more similar scores within communities, reducing
the number of thresholds tested in rounding and improving eficiency. Also, Neural2PC and
Direct yield larger communities than NN. Overall, the outcomes of this ablation study justify
the need for all components of the Neural2PC framework.
 -polarity results. We analyzed the impact of  on the size and quality of solutions found by
Neural2PC using the  -polarity loss. We tested multiple  values above 1 (up to 20) and their
reciprocals to explore a symmetric range below 1. Neural2PC consistently achieves (results
not shown) the best  -polarity. Higher  leads to more balanced communities, while lower 
creates imbalance, sometimes leaving one community empty. Competing methods often yield
highly unbalanced solutions. Overall,  -polarity proves useful, allowing users to inspect and
select the most suitable communities for their needs.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusion</title>
      <p>
        We discussed a recent advancement in 2pc [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], which relies on a GNN-based neural approach
and introduces the notion of  -polarity to improve the balance in the size of the polarized
communities. Future work includes detecting more than two communities [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], leveraging
clustering ensemble techniques [
        <xref ref-type="bibr" rid="ref37 ref38">37, 38</xref>
        ] and improving the training eficiency [39].
Acknowledgements: D. Mandaglio and A. Tagarelli are partly supported by the PNRR Future
AI Research (FAIR) project (H23C22000860006, M4C21.3 spoke 9).
      </p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
452–511. doi:10.1007/S10618-012-0266-X.
[39] F. Scala, S. Flesca, L. Pontieri, Play it straight: An intelligent data pruning
technique for green-ai, in: Proc. DS Conf., volume 15243, 2024, pp. 69–85. doi:10.1007/
978-3-031-78977-9\_5.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          <article-title>Gullo, In and out: Optimizing overall interaction in probabilistic graphs under clustering constraints</article-title>
          ,
          <source>in: Proc. KDD Conf</source>
          .,
          <year>2020</year>
          , pp.
          <fpage>1371</fpage>
          -
          <lpage>1381</lpage>
          . doi:
          <volume>10</volume>
          .1145/3394486.3403190.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Ghoshal</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. Das</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Das</surname>
          </string-name>
          ,
          <article-title>Disjoint and overlapping community detection in small-world networks leveraging mean path length</article-title>
          ,
          <source>TCSS</source>
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>406</fpage>
          -
          <lpage>418</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>Dynamic consensus community detection and combinatorial multi-armed bandit</article-title>
          ,
          <source>in: Proc. ASONAM Conf</source>
          .,
          <year>2019</year>
          , pp.
          <fpage>184</fpage>
          -
          <lpage>187</lpage>
          . doi:
          <volume>10</volume>
          .1145/3341161. 3342910.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>A combinatorial multi-armed bandit based method for dynamic consensus community detection in temporal networks</article-title>
          ,
          <source>in: Proc. DS Conf</source>
          .,
          <year>2019</year>
          , pp.
          <fpage>412</fpage>
          -
          <lpage>427</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -33778-0\_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Harary</surname>
          </string-name>
          ,
          <article-title>On the notion of balance of a signed graph</article-title>
          ,
          <source>Michigan Mathematical Journal</source>
          <volume>2</volume>
          (
          <year>1953</year>
          )
          <fpage>143</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Beigi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          , H. Liu,
          <article-title>Signed link analysis in social media networks</article-title>
          ,
          <source>in: Proc. ICWSM Conf</source>
          .,
          <year>2016</year>
          , pp.
          <fpage>539</fpage>
          -
          <lpage>542</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T.</given-names>
            <surname>Derr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <article-title>Signed network modeling based on structural balance theory</article-title>
          ,
          <source>in: Proc. CIKM Conf</source>
          .,
          <year>2018</year>
          , pp.
          <fpage>557</fpage>
          -
          <lpage>566</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <article-title>Computing maximum structural balanced cliques in signed graphs</article-title>
          ,
          <source>in: Proc. ICDE Conf</source>
          .,
          <year>2022</year>
          , pp.
          <fpage>1004</fpage>
          -
          <lpage>1016</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. D.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Social balance in signed networks</article-title>
          ,
          <source>Inf. Syst. Frontiers</source>
          <volume>17</volume>
          (
          <year>2015</year>
          )
          <fpage>1077</fpage>
          -
          <lpage>1095</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L. L.</given-names>
            <surname>Cava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>Polarization in decentralized online social networks</article-title>
          ,
          <source>in: Proc. WebSci Conf</source>
          .,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1145/3614419.3644013.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Galimberti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gionis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ordozgoiti</surname>
          </string-name>
          , G. Rufo,
          <article-title>Discovering polarized communities in signed networks</article-title>
          ,
          <source>in: Proc. CIKM Conf</source>
          .,
          <year>2019</year>
          , pp.
          <fpage>961</fpage>
          -
          <lpage>970</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gullo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>Neural discovery of balance-aware polarized communities</article-title>
          ,
          <source>Mach. Learn</source>
          .
          <volume>113</volume>
          (
          <year>2024</year>
          )
          <fpage>6611</fpage>
          -
          <lpage>6644</lpage>
          . doi:
          <volume>10</volume>
          .1007/S10994-024-06581-4.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tsitsulin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Palowitch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Perozzi</surname>
          </string-name>
          , E. Müller,
          <article-title>Graph clustering with graph neural networks</article-title>
          ,
          <source>JMLR</source>
          <volume>24</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <source>Graph Neural Networks: Foundations, Frontiers, and Applications</source>
          , Springer Singapore, Singapore,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zangari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>Link prediction on multilayer networks through learning of within-layer and across-layer node-pair structural features and node embedding similarity</article-title>
          ,
          <source>in: Proc. WWW Conf</source>
          .,
          <year>2024</year>
          , pp.
          <fpage>924</fpage>
          -
          <lpage>935</lpage>
          . doi:
          <volume>10</volume>
          .1145/3589334.3645646.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>A comprehensive survey of graph embedding: Problems, techniques, and applications</article-title>
          ,
          <source>TKDE</source>
          <volume>30</volume>
          (
          <year>2018</year>
          )
          <fpage>1616</fpage>
          -
          <lpage>1637</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T.</given-names>
            <surname>Derr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ma</surname>
          </string-name>
          , J. Tang,
          <article-title>Signed graph convolutional networks</article-title>
          ,
          <source>in: Proc. ICDM Conf</source>
          .,
          <year>2018</year>
          , pp.
          <fpage>929</fpage>
          -
          <lpage>934</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , P. Cui,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Cui</surname>
          </string-name>
          , J. Liu, W. Zhu,
          <article-title>Signed graph neural network with latent groups</article-title>
          ,
          <source>in: Proc. KDD Conf</source>
          .,
          <year>2021</year>
          , pp.
          <fpage>1066</fpage>
          -
          <lpage>1075</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>Learning signed network embedding via graph attention</article-title>
          ,
          <source>in: Proc. AAAI Conf.</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>4772</fpage>
          -
          <lpage>4779</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          , H. Liu,
          <article-title>Signed network embedding in social media</article-title>
          ,
          <source>in: Proc. SDM Conf</source>
          .,
          <year>2017</year>
          , pp.
          <fpage>327</fpage>
          -
          <lpage>335</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-E.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <article-title>Side: representation learning in signed directed networks</article-title>
          ,
          <source>in: Proc. WWW Conf</source>
          .,
          <year>2018</year>
          , pp.
          <fpage>509</fpage>
          -
          <lpage>518</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hou</surname>
          </string-name>
          , X. Cheng,
          <article-title>SDGNN: learning node representation for signed directed networks</article-title>
          ,
          <source>in: Proc. AAAI Conf.</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>196</fpage>
          -
          <lpage>203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hou</surname>
          </string-name>
          , X. Cheng,
          <article-title>Signed graph attention networks</article-title>
          ,
          <source>in: Proc. ICANN Work</source>
          .,
          <year>2019</year>
          , pp.
          <fpage>566</fpage>
          -
          <lpage>577</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>K.-Y. Chiang</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          <string-name>
            <surname>Whang</surname>
            ,
            <given-names>I. S.</given-names>
          </string-name>
          <string-name>
            <surname>Dhillon</surname>
          </string-name>
          ,
          <article-title>Scalable clustering of signed networks using balance normalized cut</article-title>
          ,
          <source>in: Proc. CIKM Conf</source>
          .,
          <year>2012</year>
          , pp.
          <fpage>615</fpage>
          -
          <lpage>624</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cucuringu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Davies</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Glielmo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          ,
          <article-title>SPONGE: A generalized eigenproblem for clustering signed networks</article-title>
          ,
          <source>in: Proc. AISTATS Conf</source>
          .,
          <year>2019</year>
          , pp.
          <fpage>1088</fpage>
          -
          <lpage>1098</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Reinert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Cucuringu, SSSNET: semi-supervised signed network clustering</article-title>
          ,
          <source>in: Proc. SDM Conf</source>
          .,
          <year>2022</year>
          , pp.
          <fpage>244</fpage>
          -
          <lpage>252</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kunegis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lommatzsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lerner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. W. D.</given-names>
            <surname>Luca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Albayrak</surname>
          </string-name>
          ,
          <article-title>Spectral analysis of signed graphs for clustering, prediction and visualization</article-title>
          ,
          <source>in: Proc. SDM Conf</source>
          .,
          <year>2010</year>
          , pp.
          <fpage>559</fpage>
          -
          <lpage>570</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mercado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tudisco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hein</surname>
          </string-name>
          ,
          <article-title>Clustering signed networks with the geometric mean of laplacians</article-title>
          ,
          <source>in: Proc. NIPS Conf</source>
          .,
          <year>2016</year>
          , pp.
          <fpage>4421</fpage>
          -
          <lpage>4429</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krevl</surname>
          </string-name>
          , SNAP Datasets:
          <article-title>Stanford large network dataset collection</article-title>
          , http: //snap.stanford.edu/data,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kunegis</surname>
          </string-name>
          , KONECT - The Koblenz Network Collection,
          <source>in: Proc. WWW Conf</source>
          .,
          <year>2013</year>
          , pp.
          <fpage>1343</fpage>
          -
          <lpage>1350</lpage>
          . http://konect.cc.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          , G. Rufo,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          ,
          <article-title>Stance evolution and twitter interactions in an Italian political debate</article-title>
          ,
          <source>in: Proc. NLDB Conf</source>
          .,
          <year>2018</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>R.-C. Tzeng</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Ordozgoiti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Gionis</surname>
          </string-name>
          ,
          <article-title>Discovering conflicting groups in signed networks</article-title>
          ,
          <source>Proc. NIPS Conf</source>
          .
          <volume>33</volume>
          (
          <year>2020</year>
          )
          <fpage>10974</fpage>
          -
          <lpage>10985</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>N.</given-names>
            <surname>Bansal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Blum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chawla</surname>
          </string-name>
          , Correlation clustering,
          <source>Machine Learning</source>
          <volume>56</volume>
          (
          <year>2004</year>
          )
          <fpage>89</fpage>
          -
          <lpage>113</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gullo</surname>
          </string-name>
          ,
          <article-title>Correlation clustering with global weight bounds</article-title>
          ,
          <source>in: Proc. ECML PKDD Conf.</source>
          , volume
          <volume>12976</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>499</fpage>
          -
          <lpage>515</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>030</fpage>
          -86520-7\_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gullo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mandaglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>A combinatorial multi-armed bandit approach to correlation clustering</article-title>
          ,
          <source>DAMI</source>
          <volume>37</volume>
          (
          <year>2023</year>
          )
          <fpage>1630</fpage>
          -
          <lpage>1691</lpage>
          . doi:
          <volume>10</volume>
          .1007/S10618-023-00937-5.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>M.</given-names>
            <surname>Charikar</surname>
          </string-name>
          ,
          <article-title>Greedy approximation algorithms for finding dense components in a graph</article-title>
          ,
          <source>in: Proc. APPROX Work</source>
          .,
          <year>2003</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gullo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <article-title>Diversity-based weighting schemes for clustering ensembles</article-title>
          ,
          <source>in: Proc. SDM Conf., SIAM</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>437</fpage>
          -
          <lpage>448</lpage>
          . doi:
          <volume>10</volume>
          .1137/1.9781611972795.38.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gullo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Domeniconi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tagarelli</surname>
          </string-name>
          ,
          <article-title>Projective clustering ensembles</article-title>
          ,
          <source>DAMI</source>
          <volume>26</volume>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>