期刊文献+
共找到62篇文章
< 1 2 4 >
每页显示 20 50 100
TCM-HIN2Vec:A strategy for uncovering biological basis of heart qi deficiency pattern based on network embedding and transcriptomic experiment
1
作者 Lihong Diao Xinyi Fan +5 位作者 Jiang Yu Kai Huang Edouard C.Nice Chao Liu Dong Li Shuzhen Guo 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第3期264-274,共11页
Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD patt... Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results: Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion: Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine. 展开更多
关键词 Qi deficiency pattern Heart failure Biological basis network embedding Transcriptome
暂未订购
Optimisation of sparse deep autoencoders for dynamic network embedding
2
作者 Huimei Tang Yutao Zhang +4 位作者 Lijia Ma Qiuzhen Lin Liping Huang Jianqiang Li Maoguo Gong 《CAAI Transactions on Intelligence Technology》 2024年第6期1361-1376,共16页
Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature space.However,the existing deep learningbased NE methods are time-consuming as they need to tra... Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature space.However,the existing deep learningbased NE methods are time-consuming as they need to train a dense architecture for deep neural networks with extensive unknown weight parameters.A sparse deep autoencoder(called SPDNE)for dynamic NE is proposed,aiming to learn the network structures while preserving the node evolution with a low computational complexity.SPDNE tries to use an optimal sparse architecture to replace the fully connected architecture in the deep autoencoder while maintaining the performance of these models in the dynamic NE.Then,an adaptive simulated algorithm to find the optimal sparse architecture for the deep autoencoder is proposed.The performance of SPDNE over three dynamical NE models(i.e.sparse architecture-based deep autoencoder method,DynGEM,and ElvDNE)is evaluated on three well-known benchmark networks and five real-world networks.The experimental results demonstrate that SPDNE can reduce about 70%of weight parameters of the architecture for the deep autoencoder during the training process while preserving the performance of these dynamical NE models.The results also show that SPDNE achieves the highest accuracy on 72 out of 96 edge prediction and network reconstruction tasks compared with the state-of-the-art dynamical NE algorithms. 展开更多
关键词 deep autoencoder dynamic networks low-dimensional feature space network embedding sparse structure
在线阅读 下载PDF
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview 被引量:2
3
作者 Yue Zhou Xin Luo MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1105-1121,共17页
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C... Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field. 展开更多
关键词 Big data analysis cryptocurrency transaction network embedding(CTNE) dynamic network network embedding network representation static network
在线阅读 下载PDF
A Topology-Cognitive Algorithm Framework for Virtual Network Embedding Problem 被引量:7
4
作者 HUANG Tao LIU Jiang +1 位作者 CHEN Jianya LIU Yunjie 《China Communications》 SCIE CSCD 2014年第4期73-84,共12页
The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SD... The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SDN flows,onto a shared substrate network automatically and efficiently.Previous researches mainly focus on developing heuristic algorithms for general topology virtual network.In practice however,the virtual network is usually generated with specific topology for specific purpose.Thus,it is a challenge to optimize the heuristic algorithms with these topology information.In order to deal with this problem,we propose a topology-cognitive algorithm framework,which is composed of a guiding principle for topology algorithm developing and a compound algorithm.The compound algorithm is composed of several subalgorithms,which are optimized for specific topologies.We develop star,tree,and ring topology algorithms as examples,other subalgorithms can be easily achieved following the same framework.The simulation results show that the topology-cognitive algorithm framework is effective in developing new topology algorithms,and the developed compound algorithm greatly enhances the performance of the Revenue/Cost(R/C) ratio and the Runtime than traditional heuristic algorithms for multi-topology virtual network embedding problem. 展开更多
关键词 network virtualization software- defined networking virtual network embedding topology-cognitive
在线阅读 下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
5
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
在线阅读 下载PDF
Node Ranking Strategy in Virtual Network Embedding: An Overview 被引量:5
6
作者 Shengchen Wu Hao Yin +2 位作者 Haotong Cao Longxiang Yang Hongbo Zhu 《China Communications》 SCIE CSCD 2021年第6期114-136,共23页
Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been w... Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been widely considered as a crucial issue,which is aimed to embed Virtual Networks(VNs)onto the shared substrate networks(SNs)efficiently.Recently,some VNE approaches have developed Node Ranking strategies to drive and enhance the embedding efficiency.Node Ranking Strategy rank/sort the nodes according to the attributes of the node,including both residual local attributes(CPU,Bandwidth,storage,Etc.)and the global topology attributes(Number of neighborhood Nodes,Delay to other nodes,Etc.).This paper presents an overview of Node Ranking Strategies in Virtual Network Embedding,and possible directions of VNE Node Ranking Strategy. 展开更多
关键词 network virtualization virtual network embedding global topology attribute node ranking
在线阅读 下载PDF
Using Network Embedding to Obtain a Richer and More Stable Network Layout for a Large Scale Bibliometric Network 被引量:4
7
作者 Ting Chen Guopeng Li +1 位作者 Qiping Deng Xiaomei Wang 《Journal of Data and Information Science》 CSCD 2021年第1期154-177,共24页
Purpose: The goal of this study is to explore whether deep learning based embed ded models can provide a better visualization solution for large citation networks. De sign/methodology/approach: Our team compared the v... Purpose: The goal of this study is to explore whether deep learning based embed ded models can provide a better visualization solution for large citation networks. De sign/methodology/approach: Our team compared the visualization approach borrowed from the deep learning community with the well-known bibliometric network visualization for large scale data. 47,294 highly cited papers were visualized by using three network embedding models plus the t-SNE dimensionality reduction technique. Besides, three base maps were created with the same dataset for evaluation purposes. All base maps used the classic Open Ord method with different edge cutting strategies and parameters. Findings: The network embedded maps with t-SNE preserve a very similar global structure to the full edges classic force-directed map, while the maps vary in local structure. Among them, the Node2Vec model has the best overall visualization performance, the local structure has been significantly improved and the maps' layout has very high stability.Research limitations: The computational and time costs of training are very high for network em bedded models to obtain high dimensional latent vector. Only one dimensionality reduction technique was tested. Practical implications: This paper demonstrates that the network embedding models are able to accurately reconstruct the large bibliometric network in the vector space. In the future, apart from network visualization, many classical vector-based machine learning algorithms can be applied to network representations for solving bibliomet ric analysis tasks. Originality/value: This paper provides the first systematic comparison of classical science mapping visualization with network embedding based visualization on a large scale dataset. We showed deep learning based network embedding model with t-SNE can provide a richer,more stable science map. We also designed a practical evaluation method to investigate and compare maps. 展开更多
关键词 SCIENTOMETRICS Visualization Essential science indicators Bibliometric networks network embedding Science mapping
在线阅读 下载PDF
A Survey of Embedding Algorithm for Virtual Network Embedding 被引量:6
8
作者 Haotong Cao Shengchen Wu +2 位作者 Yue Hu Yun Liu Longxiang Yang 《China Communications》 SCIE CSCD 2019年第12期1-33,共33页
Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Intern... Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded. 展开更多
关键词 network virtualization virtual network embedding embedding algorithms key future research aspects
在线阅读 下载PDF
Robust Virtual Network Embedding Based on Component Connectivity in Large-Scale Network 被引量:4
9
作者 Xiaojuan Wang Mei Song +1 位作者 Deyu Yuan Xiangru Liu 《China Communications》 SCIE CSCD 2017年第10期164-179,共16页
Virtual network embedding problem which is NP-hard is a key issue for implementing software-defined network which is brought about by network virtualization.Compared with other studies which focus on designing heurist... Virtual network embedding problem which is NP-hard is a key issue for implementing software-defined network which is brought about by network virtualization.Compared with other studies which focus on designing heuristic algorithms to reduce the hardness of the NP-hard problem we propose a robust VNE algorithm based on component connectivity in large-scale network.We distinguish the different components and embed VN requests onto them respectively.And k-core is applied to identify different VN topologies so that the VN request can be embedded onto its corresponding component.On the other hand,load balancing is also considered in this paper.It could avoid blocked or bottlenecked area of substrate network.Simulation experiments show that compared with other algorithms in large-scale network,acceptance ratio,average revenue and robustness can be obviously improved by our algorithm and average cost can be reduced.It also shows the relationship between the component connectivity including giant component and small components and the performance metrics. 展开更多
关键词 large-scale network component connectivity virtual network embedding SDN
在线阅读 下载PDF
An Exact Virtual Network Embedding Algorithm Based on Integer Linear Programming for Virtual Network Request with Location Constraint 被引量:3
10
作者 Zeheng Yang Yongan Guo 《China Communications》 SCIE CSCD 2016年第8期177-183,共7页
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net... Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%. 展开更多
关键词 network virtualization virtual network embedding exact VNE algorithm integer linear Programming location constraint VNR acceptance ratio
在线阅读 下载PDF
Academic Collaborator Recommendation Based on Attributed Network Embedding 被引量:2
11
作者 Ouxia Du Ya Li 《Journal of Data and Information Science》 CSCD 2022年第1期37-56,共20页
Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator... Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator recommendation tasks.Design/methodology/approach:We propose an academic collaborator recommendation model based on attributed network embedding(ACR-ANE),which can get enhanced scholar embedding and take full advantage of the topological structure of the network and multi-type scholar attributes.The non-local neighbors for scholars are defined to capture strong relationships among scholars.A deep auto-encoder is adopted to encode the academic collaboration network structure and scholar attributes into a low-dimensional representation space.Findings:1.The proposed non-local neighbors can better describe the relationships among scholars in the real world than the first-order neighbors.2.It is important to consider the structure of the academic collaboration network and scholar attributes when recommending collaborators for scholars simultaneously.Research limitations:The designed method works for static networks,without taking account of the network dynamics.Practical implications:The designed model is embedded in academic collaboration network structure and scholarly attributes,which can be used to help scholars recommend potential collaborators.Originality/value:Experiments on two real-world scholarly datasets,Aminer and APS,show that our proposed method performs better than other baselines. 展开更多
关键词 Academic relationships mining Collaborator recommendation Attributed network embedding Deep learning
在线阅读 下载PDF
Topology Based Reliable Virtual Network Embedding from a QoE Perspective 被引量:2
12
作者 Peiying Zhang Sheng Wu +2 位作者 Miao Wang Haipeng Yao Yunjie Liu 《China Communications》 SCIE CSCD 2018年第10期38-50,共13页
In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual ne... In the network virtualization environments, one of the most challenges is how to map the virtual networks(VNs) onto a shared substrate network managed by an infrastructure provider(In P), which is termed as virtual network embedding problem. Prior studies on this issue only emphasize on maximizing the revenue or minimizing the energy consumption while ignoring the reliability requirements of end-users. In our work, we incorporate the reliability probability into the virtual network embedding process with an aim to improve the Qo S/Qo E of end users from a new perspective. We devised two novel reliable virtual network embedding algorithms called RRW-Max Match and RDCC-VNE based on RW-Max Match and DCC-VNE, respectively. Extensive simulations demonstrated that the efficiency of our proposed algorithms is better than those of two primitive algorithms in terms of the reliability demands, the acceptance ratio of virtual networks and the long-term average revenue. 展开更多
关键词 virtual network embedding reliability probability node mapping procedure link mapping procedure node ranking metric
在线阅读 下载PDF
Efficient Virtual Network Embedding Algorithm Based on Restrictive Selection and Optimization Theory Approach 被引量:2
13
作者 Haotong Cao Zhicheng Qu +1 位作者 Yishi Xue Longxiang Yang 《China Communications》 SCIE CSCD 2017年第10期39-60,共22页
Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One ... Network virtualization(NV) is widely considered as a key component of the future network and promises to allow multiple virtual networks(VNs) with different protocols to coexist on a shared substrate network(SN). One main challenge in NV is virtual network embedding(VNE). VNE is a NPhard problem. Previous VNE algorithms in the literature are mostly heuristic, while the remaining algorithms are exact. Heuristic algorithms aim to find a feasible embedding of each VN, not optimal or sub-optimal, in polynomial time. Though presenting the optimal or sub-optimal embedding per VN, exact algorithms are too time-consuming in smallscaled networks, not to mention moderately sized networks. To make a trade-off between the heuristic and the exact, this paper presents an effective algorithm, labeled as VNE-RSOT(Restrictive Selection and Optimization Theory), to solve the VNE problem. The VNERSOT can embed virtual nodes and links per VN simultaneously. The restrictive selection contributes to selecting candidate substrate nodes and paths and largely cuts down on the number of integer variables, used in the following optimization theory approach. The VNE-RSOT fights to minimize substrate resource consumption and accommodates more VNs. To highlight the efficiency of VNERSOT, a simulation against typical and stateof-art heuristic algorithms and a pure exact algorithm is made. Numerical results reveal that virtual network request(VNR) acceptance ratio of VNE-RSOT is, at least, 10% higher than the best-behaved heuristic. Other metrics, such as the execution time, are also plotted to emphasize and highlight the efficiency of VNE-RSOT. 展开更多
关键词 network virtualization virtual network embedding NP-hard heuristic exact restrictive selection optimization theory
在线阅读 下载PDF
Heterogeneous Network Embedding: A Survey
14
作者 Sufen Zhao Rong Peng +1 位作者 Po Hu Liansheng Tan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期83-130,共48页
Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the stru... Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks(HINs)into low-dimensional embeddings;this task is called heterogeneous network embedding(HNE).Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification,recommender systems,and information retrieval.Here,we provide a comprehensive survey of key advancements in the area of HNE.First,we define an encoder-decoder-based HNE model taxonomy.Then,we systematically overview,compare,and summarize various state-of-the-art HNE models and analyze the advantages and disadvantages of various model categories to identify more potentially competitive HNE frameworks.We also summarize the application fields,benchmark datasets,open source tools,andperformance evaluation in theHNEarea.Finally,wediscuss open issues and suggest promising future directions.We anticipate that this survey will provide deep insights into research in the field of HNE. 展开更多
关键词 Heterogeneous information networks representation learning heterogeneous network embedding graph neural networks machine learning
在线阅读 下载PDF
MINE:A Method of Multi-Interaction Heterogeneous Information Network Embedding
15
作者 Dongjie Zhu Yundong Sun +6 位作者 Xiaofang Li Haiwen Du Rongning Qu Pingping Yu Xuefeng Piao Russell Higgs Ning Cao 《Computers, Materials & Continua》 SCIE EI 2020年第6期1343-1356,共14页
Interactivity is the most significant feature of network data,especially in social networks.Existing network embedding methods have achieved remarkable results in learning network structure and node attributes,but do ... Interactivity is the most significant feature of network data,especially in social networks.Existing network embedding methods have achieved remarkable results in learning network structure and node attributes,but do not pay attention to the multi-interaction between nodes,which limits the extraction and mining of potential deep interactions between nodes.To tackle the problem,we propose a method called Multi-Interaction heterogeneous information Network Embedding(MINE).Firstly,we introduced the multi-interactions heterogeneous information network and extracted complex heterogeneous relation sequences by the multi-interaction extraction algorithm.Secondly,we use a well-designed multi-relationship network fusion model based on the attention mechanism to fuse multiple interactional relationships.Finally,applying a multitasking model makes the learned vector contain richer semantic relationships.A large number of practical experiments prove that our proposed method outperforms existing methods on multiple data sets. 展开更多
关键词 network embedding network representation learning interactive network data mining
在线阅读 下载PDF
Role-Based Network Embedding via Quantum Walk with Weighted Features Fusion
16
作者 Mingqiang Zhou Mengjiao Li +1 位作者 Zhiyuan Qian Kunpeng Li 《Computers, Materials & Continua》 SCIE EI 2023年第8期2443-2460,共18页
Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networ... Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networks with similar structural patterns and functions.However,the rolesimilar nodes may be far away or even disconnected from each other.Meanwhile,the neighborhood node features and noise also affect the result of the role-based network embedding,which are also challenges of current network embedding work.In this paper,we propose a Role-based network Embedding via Quantum walk with weighted Features fusion(REQF),which simultaneously considers the influence of global and local role information,node features,and noise.Firstly,we capture the global role information of nodes via quantum walk based on its superposition property which emphasizes the local role information via biased quantum walk.Secondly,we utilize the quantum walkweighted characteristic function to extract and fuse features of nodes and their neighborhood by different distributions which contain role information implicitly.Finally,we leverage the Variational Auto-Encoder(VAE)to reduce the effect of noise.We conduct extensive experiments on seven real-world datasets,and the results show that REQF is more effective at capturing role information in the network,which outperforms the best baseline by up to 14.6% in role classification,and 23% in role detection on average. 展开更多
关键词 Role-based network embedding quantum walk quantum walk weighted characteristic function complex networks
在线阅读 下载PDF
Multiplex network infomax:Multiplex network embedding via information fusion
17
作者 Qiang Wang Hao Jiang +3 位作者 Ying Jiang Shuwen Yi Qi Nie Geng Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1157-1168,共12页
For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most ... For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most existing studies on this subject mainly concentrate on monoplex networks considering a single type of relation among nodes.However,numerous real-world networks are naturally composed of multiple layers with different relation types;such a network is called a multiplex network.The majority of existing multiplex network embedding methods either overlook node attributes,resort to node labels for training,or underutilize underlying information shared across multiple layers.In this paper,we propose Multiplex Network Infomax(MNI),an unsupervised embedding framework to represent information of multiple layers into a unified embedding space.To be more specific,we aim to maximize the mutual information between the unified embedding and node embeddings of each layer.On the basis of this framework,we present an unsupervised network embedding method for attributed multiplex networks.Experimental results show that our method achieves competitive performance on not only node-related tasks,such as node classification,clustering,and similarity search,but also a typical edge-related task,i.e.,link prediction,at times even outperforming relevant supervised methods,despite that MNI is fully unsupervised. 展开更多
关键词 network embedding Multiplex network Mutual information maximization
在线阅读 下载PDF
Identity-Preserving Adversarial Training for Robust Network Embedding
18
作者 岑科廷 沈华伟 +2 位作者 曹婍 徐冰冰 程学旗 《Journal of Computer Science & Technology》 SCIE EI CSCD 2024年第1期177-191,共15页
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network e... Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network embed-ding models are vulnerable to random or adversarial perturbations,which may degrade the performance of network em-bedding when being applied to downstream tasks.To achieve robust network embedding,researchers introduce adversari-al training to regularize the embedding learning process by training on a mixture of adversarial examples and original ex-amples.However,existing methods generate adversarial examples heuristically,failing to guarantee the imperceptibility of generated adversarial examples,and thus limit the power of adversarial training.In this paper,we propose a novel method Identity-Preserving Adversarial Training(IPAT)for network embedding,which generates imperceptible adversarial exam-ples with explicit identity-preserving regularization.We formalize such identity-preserving regularization as a multi-class classification problem where each node represents a class,and we encourage each adversarial example to be discriminated as the class of its original node.Extensive experimental results on real-world datasets demonstrate that our proposed IPAT method significantly improves the robustness of network embedding models and the generalization of the learned node representations on various downstream tasks. 展开更多
关键词 network embedding identity-preserving adversarial training adversarial the example
原文传递
Network Embedding Algorithm for Vulnerability Assessment of Power Transmission Lines Using Integrated Structure and Attribute Information
19
作者 Xianglong Lian Tong Qian +3 位作者 Zepeng Li Xingyu Chen Wenhu Tang Q.H.Wu 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第1期351-360,共10页
In power systems,failures of vulnerable lines can trigger large-scale cascading failures,and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures.Based on a structure a... In power systems,failures of vulnerable lines can trigger large-scale cascading failures,and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures.Based on a structure and attribute network embedding(SANE)algorithm,a novel quantitative vulnerability analysis method is proposed to identify vulnerable lines in this research.First,a two-layered random walk network with topological and electrical properties of transmission lines is established.Subsequently,based on the weighted degree of nodes in the two-layered network,the inter-layer and intra-layer walking transition probabilities are developed to obtain walk sequences.Then,a Word2Vec algorithm is applied to obtain lowdimension vectors representing transmission lines,according to obtained walk sequences for calculating the vulnerability index of transmissions lines.Finally,the proposed method is compared with three widely used methods in two test systems.Results show the network embedding based method is superior to those comparison methods and can provide guidance for identifying vulnerable lines. 展开更多
关键词 network embedding random walk transmission lines vulnerability assessment
原文传递
Unsupervised social network embedding via adaptive specific mappings
20
作者 Youming GE Cong HUANG +2 位作者 Yubao LIU Sen ZHANG Weiyang KONG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第3期61-71,共11页
In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional space.In recent methods,the fusion mechanism of no... In this paper,we address the problem of unsuperised social network embedding,which aims to embed network nodes,including node attributes,into a latent low dimensional space.In recent methods,the fusion mechanism of node attributes and network structure has been proposed for the problem and achieved impressive prediction performance.However,the non-linear property of node attributes and network structure is not efficiently fused in existing methods,which is potentially helpful in learning a better network embedding.To this end,in this paper,we propose a novel model called ASM(Adaptive Specific Mapping)based on encoder-decoder framework.In encoder,we use the kernel mapping to capture the non-linear property of both node attributes and network structure.In particular,we adopt two feature mapping functions,namely an untrainable function for node attributes and a trainable function for network structure.By the mapping functions,we obtain the low dimensional feature vectors for node attributes and network structure,respectively.Then,we design an attention layer to combine the learning of both feature vectors and adaptively learn the node embedding.In encoder,we adopt the component of reconstruction for the training process of learning node attributes and network structure.We conducted a set of experiments on seven real-world social network datasets.The experimental results verify the effectiveness and efficiency of our method in comparison with state-of-the-art baselines. 展开更多
关键词 network embedding specific kernel mapping attention mechanism
原文传递
上一页 1 2 4 下一页 到第
使用帮助 返回顶部