期刊文献+
共找到9,041篇文章
< 1 2 250 >
每页显示 20 50 100
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
1
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
3D multipath planning for UAV based on network graph 被引量:1
2
作者 Xin Liu Chengping Zhou Mingyue Ding 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第4期640-646,共7页
According to the characteristic and the requirement of multipath planning, a new multipath planning method is proposed based on network. This method includes two steps: the construction of network and multipath searc... According to the characteristic and the requirement of multipath planning, a new multipath planning method is proposed based on network. This method includes two steps: the construction of network and multipath searching. The construction of network proceeds in three phases: the skeleton extraction of the configuration space, the judgment of the cross points in the skeleton and how to link the cross points to form a network. Multipath searching makes use of the network and iterative penalty method (IPM) to plan multi-paths, and adjusts the planar paths to satisfy the requirement of maneuverability of unmanned aerial vehicle (UAV). In addition, a new height planning method is proposed to deal with the height planning of 3D route. The proposed algorithm can find multiple paths automatically according to distribution of terrain and threat areas with high efficiency. The height planning can make 3D route following the terrain. The simulation experiment illustrates the feasibility of the proposed method. 展开更多
关键词 path planning skeleton graph iterative penaltymethod (IPM) network graph.
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
3
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
4
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Personalized Differential Privacy Graph Neural Network
5
作者 Yanli Yuan Dian Lei +3 位作者 Chuan Zhang Zehui Xiong Chunhai Li Liehuang Zhu 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期498-500,共3页
Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving g... Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving graph learning.However,its application often diminishes data utility,especially for nodes with fewer neighbors in graph neural networks(GNNs). 展开更多
关键词 graph neural networks gnns personalized differential privacy graph learning privacy preservation data utility preserving privacy graph neural network
在线阅读 下载PDF
Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features
6
作者 Ghadah Naif Alwakid Samabia Tehsin +3 位作者 Mamoona Humayun Asad Farooq Ibrahim Alrashdi Amjad Alsirhani 《Computers, Materials & Continua》 2026年第1期1964-1984,共21页
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ... Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems. 展开更多
关键词 graph neural network image classification DermaMNIST dataset graph representation
在线阅读 下载PDF
Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks
7
作者 Haoxin Sun XiaoYu +5 位作者 Jiale Li Yitong Xu JieYu Huanhuan Li Yuanzhang Li Yu-An Tan 《Computers, Materials & Continua》 2026年第2期1474-1488,共15页
Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequ... Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities. 展开更多
关键词 Smart contracts graph neural networks symbolic execution vulnerability detection
在线阅读 下载PDF
Log-Based Anomaly Detection of System Logs Using Graph Neural Network
8
作者 Eman Alsalmi Abeer Alhuzali Areej Alhothali 《Computers, Materials & Continua》 2026年第2期1265-1284,共20页
Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted featur... Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems.In this study,we propose a hybrid model,BertGCN,that integrates BERT-based contextual embedding with Graph Convolutional Networks(GCNs)to identify anomalies in raw system logs,thereby eliminating the need for log parsing.TheBERT module captures semantic representations of log messages,while the GCN models the structural relationships among log entries through a text-based graph.This combination enables BertGCN to capture both the contextual and semantic characteristics of log data.BertGCN showed excellent performance on the HDFS and BGL datasets,demonstrating its effectiveness and resilience in detecting anomalies.Compared to multiple baselines,our proposed BertGCN showed improved precision,recall,and F1 scores. 展开更多
关键词 Log anomaly detection BERT graph convolutional network systemlogs explainable anomaly detection
在线阅读 下载PDF
Multi-Task Disaster Tweet Classification Using Hybrid TF-IDF and Graph Convolutional Networks
9
作者 Basudev Nath Deepak Sahoo +4 位作者 Sudhansu Shekhar Patra Hassan Alkhiri Subrata Chowdhury Sheraz Aslam Kainat Mustafa 《Computers, Materials & Continua》 2026年第5期2077-2099,共23页
Accurate,up to date,and quick information related to any disaster supports disaster management team/authorities to perform quick,easy,and cost-effective response to enhance rescue operations to alleviate the possible ... Accurate,up to date,and quick information related to any disaster supports disaster management team/authorities to perform quick,easy,and cost-effective response to enhance rescue operations to alleviate the possible loss of lives,financial risks,and properties.Due to damaged infrastructure in disaster-affected areas,social media is the only way to share/exchange real time information.Therefore,‘X’(formerly Twitter)has become a major platform for disseminating real-time information during disaster events or emergencies,i.e.,floods and earthquake.Rapid identification of actionable content is critical for effective humanitarian response;however,the brief and noisy nature of tweets makes automated classification challenging.To tackle this problem,this study proposes a hybrid classification framework that integrates term frequency–inverse document frequency(TF-IDF)features with graph convolutional networks(GCNs)to enhance disaster-related tweet analysis.The proposed model performs three classification tasks:identifying disaster-related tweets(achieving 94.47%accuracy),categorizing disaster types(earthquake,flood,and non-disaster)with 91.78%accuracy,and detecting aid requests such as food,donations,and medical assistance(94.64%accuracy).By combining the statistical strengths of TF-IDF with the relational learning capabilities of GCNs,the model attains high accuracy while maintaining computational efficiency and interpretability.The results demonstrate the framework’s strong potential for real-time disaster response,offering valuable insights to support emergency management systems and humanitarian decision-making. 展开更多
关键词 Natural language processing tweet classification graph neural networks deep learning
在线阅读 下载PDF
Physics-constrained graph neural networks for solving adjoint equations
10
作者 Jinpeng Xiang Shufang Song +2 位作者 Wenbo Cao Kuijun Zuo Weiwei Zhang 《Acta Mechanica Sinica》 2026年第1期178-191,共14页
The adjoint method is widely used in gradient-based optimization with high-dimensional design variables.However,the cost of solving the adjoint equations in each iteration is comparable to that of solving the flow fie... The adjoint method is widely used in gradient-based optimization with high-dimensional design variables.However,the cost of solving the adjoint equations in each iteration is comparable to that of solving the flow field,resulting in expensive computational costs.To improve the efficiency of solving adjoint equations,we propose a physics-constrained graph neural networks for solving adjoint equations,named ADJ-PCGN.ADJ-PCGN establishes a mapping relationship between flow characteristics and adjoint vector based on data,serving as a replacement for the computationally expensive numerical solution of adjoint equations.A physics-based graph structure and message-passing mechanism are designed to endow its strong fitting and generalization capabilities.Taking transonic drag reduction and maximum lift-drag ratio of the airfoil as examples,results indicate that ADJ-PCGN attains a similar optimal shape as the classical direct adjoint loop method.In addition,ADJ-PCGN demonstrates strong generalization capabilities across different mesh topologies,mesh densities,and out-of-distribution conditions.It holds the potential to become a universal model for aerodynamic shape optimization involving states,geometries,and meshes. 展开更多
关键词 Adjoint method Deep learning graph neural network Physics-constrained Fast aerodynamic analysis
原文传递
Multi-Leakage Detection Using Graph Attention Networks and Restoration Prioritization in Water Distribution Systems
11
作者 Ryul Kim Young Hwan Choi 《Computer Modeling in Engineering & Sciences》 2026年第3期784-805,共22页
Leakage events occurring at multiple locations simultaneously generate overlapping and topologydependent pressure signatures,making reliable detection and subsequent restoration planning a persistent challenge in wate... Leakage events occurring at multiple locations simultaneously generate overlapping and topologydependent pressure signatures,making reliable detection and subsequent restoration planning a persistent challenge in water distribution systems(WDSs).While recent data-driven techniques have improved the ability to identify anomalous hydraulic behavior,most approaches remain limited to the detection stage and offer little guidance on how utilities should prioritize repairs once multiple failures are identified.To bridge this gap,this study proposes an integrated framework that links topology-aware leakage detection with quantitative restoration prioritization.First,a multi-task learning framework based on Graph Attention Networks(GAT)is employed to jointly detect both the location and magnitude of multiple leakages by explicitly incorporating hydraulic responses and network topology into the learning process.The model’s detection robustness is evaluated across networks with contrasting looped,branched,and hybrid topologies to examine how structural characteristics influence detection accuracy under multievent conditions.Second,the study develops a restoration-planning module that constructs a two-objective decision space combining restoration cost and segment vulnerability,where the latter accounts for disruption potential arising from hydraulic importance and local service connectivity.Non-dominated sorting is used to derive Pareto-optimal restoration sequences,enabling explicit quantification of the trade-offs between operational cost and service disruption.This provides decision-makers with a ranked set of restoration orders that reflect both hydraulic impact and functional risk,rather than relying on heuristics or cost-only criteria.Notably,the proposed framework separates offline training from online inference,requiring only a single forward pass for real-time decision-making without the need for iterative hydraulic simulations.Results demonstrate that topology strongly governs both detection performance and the structure of optimal repair sequences,underscoring the importance of integrating network-aware learning with multi-criteria restoration evaluation. 展开更多
关键词 graph attention network(GAT) topology-aware detection multi-leakage restoration
在线阅读 下载PDF
TopoMSG:A Topology-Aware Multi-Scale Graph Network for Social Bot Detection
12
作者 Junhui Xu Qi Wang +1 位作者 Chichen Lin Weijian Fan 《Computers, Materials & Continua》 2026年第3期1164-1178,共15页
Social bots are automated programs designed to spread rumors and misinformation,posing significant threats to online security.Existing research shows that the structure of a social network significantly affects the be... Social bots are automated programs designed to spread rumors and misinformation,posing significant threats to online security.Existing research shows that the structure of a social network significantly affects the behavioral patterns of social bots:a higher number of connected components weakens their collaborative capabilities,thereby reducing their proportion within the overall network.However,current social bot detection methods still make limited use of topological features.Furthermore,both graph neural network(GNN)-based methods that rely on local features and those that leverage global features suffer from their own limitations,and existing studies lack an effective fusion of multi-scale information.To address these issues,this paper proposes a topology-aware multi-scale social bot detection method,which jointly learns local and global representations through a co-training mechanism.At the local level,topological features are effectively embedded into node representations,enhancing expressiveness while alleviating the over-smoothing problem in GNNs.At the global level,a clustering attention mechanism is introduced to learn global node representations,mitigating the over-globalization problem.Experimental results demonstrate that our method effectively overcomes the limitations of single-scale approaches.Our code is publicly available at https://anonymous.4open.science/r/TopoMSG-2C41/(accessed on 27 October 2025). 展开更多
关键词 Social bot detection graph neural network topological data analysis
在线阅读 下载PDF
Spatio-Temporal Graph Neural Networks with Elastic-Band Transform for Solar Radiation Prediction
13
作者 Guebin Choi 《Computer Modeling in Engineering & Sciences》 2026年第1期848-872,共25页
This study proposes a novel forecasting framework that simultaneously captures the strong periodicity and irregular meteorological fluctuations inherent in solar radiation time series.Existing approaches typically def... This study proposes a novel forecasting framework that simultaneously captures the strong periodicity and irregular meteorological fluctuations inherent in solar radiation time series.Existing approaches typically define inter-regional correlations using either simple correlation coefficients or distance-based measures when applying spatio-temporal graph neural networks(STGNNs).However,such definitions are prone to generating spurious correlations due to the dominance of periodic structures.To address this limitation,we adopt the Elastic-Band Transform(EBT)to decompose solar radiation into periodic and amplitude-modulated components,which are then modeled independently with separate graph neural networks.The periodic component,characterized by strong nationwide correlations,is learned with a relatively simple architecture,whereas the amplitude-modulated component is modeled with more complex STGNNs that capture climatological similarities between regions.The predictions from the two components are subsequently recombined to yield final forecasts that integrate both periodic patterns and aperiodic variability.The proposed framework is validated with multiple STGNN architectures,and experimental results demonstrate improved predictive accuracy and interpretability compared to conventional methods. 展开更多
关键词 Spatio-temporal graph neural network(STGNN) elastic-band transform(EBT) solar radiation fore-casting spurious correlation time series decomposition
在线阅读 下载PDF
Advanced High-Order Graph Convolutional Networks With Assorted Time-Frequency Transforms
14
作者 Ling Wang Ye Yuan Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期394-408,共15页
A dynamic graph(DG)is adopted to portray the evolving interplay between nodes in real-world scenarios prevalently.A high-order graph convolutional network(HGCN)is equipped with the ability to represent a DG by the spa... A dynamic graph(DG)is adopted to portray the evolving interplay between nodes in real-world scenarios prevalently.A high-order graph convolutional network(HGCN)is equipped with the ability to represent a DG by the spatial-temporal message passing mechanism built on tensor product.Concretely,an HGCN utilizes the discrete Fourier transform(DFT)to implement temporal message passing and then employs face-wise product to realize spatial message passing.However,DFT is only a special case of assorted time-frequency transforms,which considers the complex temporal patterns partially,thereby resulting in an inaccurate temporal message passing possibly.To address this issue,this study proposes six advanced time-frequency transform-incorporated HGCNs(TF-HGCNs)with discrete Fourier,discrete Hartley,discrete cosine,Haar wavelet,Walsh Hadamard,and slant transforms.In addition,a potent ensemble is built regarding the proposed six TF-HGCNs as the bases.Finally,the corresponding theoretical proof is presented.Empirical studies on six DG datasets demonstrate that owing to diverse time-frequency transforms,the proposed six TF-HGCNs significantly outperform state-of-the-art models in addressing the task of link weight estimation.Moreover,their ensemble outstrips each base's performance. 展开更多
关键词 Dynamic graph(DG)learning ENSEMBLE graph representation learning high-order graph convolution network(HGCN) time-frequency transform tensor product
在线阅读 下载PDF
KIG:A Knowledge Graph-Guided Iterative-Updating Graph Neural Network for Multisensor Time Series Time-Delay Estimation
15
作者 Siyuan Xu Dong Pan +3 位作者 Zhaohui Jiang Zhiwen Chen Haoyang Yu Weihua Gui 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期327-345,共19页
Temporal alignment of multisensor time series(MTS)is a critical prerequisite for accurate modeling and optimal control in subsequent data-driven applications.Nevertheless,many approaches frequently neglect to consider... Temporal alignment of multisensor time series(MTS)is a critical prerequisite for accurate modeling and optimal control in subsequent data-driven applications.Nevertheless,many approaches frequently neglect to consider the complex interdependencies between different sensors in MTS,and temporal alignment in many methods is typically treated as an isolated task disconnected from the downstream objectives,leading to unsatisfactory performances in follow-up applications.To address these challenges,this paper proposes a novel knowledge graph(KG)-guided iterative-updating graph neural network(GNN)for time-delay estimation(TDE)in MTS.Initially,a domain-specific KG is constructed from domain mechanism knowledge,providing a foundation for GNN's initialization.Next,capitalizing on the inherent structure of the graph topology,a GNN-based TDE method is developed.Then,a customized loss function is constructed,which synthesizes both the performances of downstream tasks and graph-based constraints.Moreover,an innovative algorithm for GNN structure learning and iterative-updating is proposed to renovate the graph structure further.Finally,experimental results across various regression and classification tasks on numerical simulation,public datasets,and the real blast furnace ironmaking dataset demonstrate that the proposed method can achieve accurate temporal alignment of MTS. 展开更多
关键词 Blast furnace ironmaking process graph neural network(GNN) knowledge graph(KG) multisensor time series(MTS) temporal alignment time-delay estimation(TDE)
在线阅读 下载PDF
Edge-weighted anonymity for directed network graph
16
作者 Yanze Huang Jianghong Lin +2 位作者 Wei Li Jiaru Wang Limei Lin 《Intelligent and Converged Networks》 2025年第3期223-233,共11页
In social networks,weighted graph anonymity is gaining more and more attention.But fan-following graphs like Twitter’s are not protected by anonymity.Privacy protection based on directed graphs should arouse everyone... In social networks,weighted graph anonymity is gaining more and more attention.But fan-following graphs like Twitter’s are not protected by anonymity.Privacy protection based on directed graphs should arouse everyone’s importance,thus it requires effective anonymization techniques.In this paper,we propose a directed edge weighted graph anonymity scheme to model the shortest path in a directed network graph by Floyd algorithm and Dijkstra algorithm.Also,we execute the experiments on the number of anonymity solutions and time with different edge weights to verify their anonymity feasibility.Finally,we analyze the anonymity of two algorithms and to some extent concluded that Floyd algorithm is more suitable for anonymity of directed network graphs. 展开更多
关键词 privacy protection edge weight anonymization directed network graph
原文传递
基于GraphSAGE的井震数据岩相预测
17
作者 陈国军 耿润田 +1 位作者 顾雅慧 于丽香 《计算机与数字工程》 2026年第1期281-286,共6页
为了充分利用三维空间的地震信息,提出一种基于图神经网络GraphSAGE算法的岩相预测方法,利用网络对数据的聚合能力,聚合目标点邻域内的地震数据特征,以固定的时窗提取多个相邻采样点的地震数据,建立其与岩相的非线性映射关系。实验表明... 为了充分利用三维空间的地震信息,提出一种基于图神经网络GraphSAGE算法的岩相预测方法,利用网络对数据的聚合能力,聚合目标点邻域内的地震数据特征,以固定的时窗提取多个相邻采样点的地震数据,建立其与岩相的非线性映射关系。实验表明:提出的方法可以很好地拟合三维地震数据特征,并具有良好的薄层岩相抗噪性。应用该方法在工区不同区域进行实验,岩相预测准确率80%以上,预测结果与测井岩相基本吻合,地震道剖面岩相图清晰连续。 展开更多
关键词 岩相预测 图神经网络 graphSAGE 地震属性 平面特征聚合 时窗采样
在线阅读 下载PDF
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks 被引量:1
18
作者 Baoquan Liu Xi Chen +2 位作者 Qingjun Yuan Degang Li Chunxiang Gu 《Computers, Materials & Continua》 2025年第2期3179-3201,共23页
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not only reflects the time characteristics of the packet but also strengthens the relationship between the client or server packets. According to FMG, a Traffic Mapping Classification model (TMC-GCN) is designed, which can automatically capture and learn the characteristics and structure information of the top vertex in FMG. The TMC-GCN model is used to classify the encrypted traffic. The encryption stream classification problem is transformed into a graph classification problem, which can effectively deal with data from different data sources and application scenarios. By comparing the performance of TMC-GCN with other classical models in four public datasets, including CICIOT2023, ISCXVPN2016, CICAAGM2017, and GraphDapp, the effectiveness of the FMG algorithm is verified. The experimental results show that the accuracy rate of the TMC-GCN model is 96.13%, the recall rate is 95.04%, and the F1 rate is 94.54%. 展开更多
关键词 Encrypted traffic classification deep learning graph neural networks multi-layer perceptron graph convolutional networks
在线阅读 下载PDF
DIGNN-A:Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph
19
作者 Jizhao Liu Minghao Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期817-842,共26页
The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are cr... The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics. 展开更多
关键词 Intrusion detection graph neural networks attention mechanisms line graphs dynamic graph neural networks
在线阅读 下载PDF
Quantifying compatibility mechanisms in traditional Chinese medicine with interpretable graph neural networks 被引量:2
20
作者 Jingqi Zeng Xiaobin Jia 《Journal of Pharmaceutical Analysis》 2025年第8期1887-1901,共15页
Traditional Chinese medicine(TCM)features complex compatibility mechanisms involving multicomponent,multi-target,and multi-pathway interactions.This study presents an interpretable graph artificial intelligence(GraphA... Traditional Chinese medicine(TCM)features complex compatibility mechanisms involving multicomponent,multi-target,and multi-pathway interactions.This study presents an interpretable graph artificial intelligence(GraphAI)framework to quantify such mechanisms in Chinese herbal formulas(CHFs).A multidimensional TCM knowledge graph(TCM-MKG;https://zenodo.org/records/13763953)was constructed,integrating seven standardized modules:TCM terminology,Chinese patent medicines(CPMs),Chinese herbal pieces(CHPs),pharmacognostic origins(POs),chemical compounds,biological targets,and diseases.A neighbor-diffusion strategy was used to address the sparsity of compound-target associations,increasing target coverage from 12.0%to 98.7%.Graph neural networks(GNNs)with attention mechanisms were applied to 6,080 CHFs,modeled as graphs with CHPs as nodes.To embed domain-specific semantics,virtual nodes medicinal properties,i.e.,therapeutic nature,flavor,and meridian tropism,were introduced,enabling interpretable modeling of inter-CHP relationships.The model quantitatively captured classical compatibility roles such as“monarch-minister-assistant-guide”,and uncovered TCM etiological types derived from diagnostic and efficacy patterns.Model validation using 215 CHFs used for coronavirus disease 2019(COVID-19)management highlighted Radix Astragali-Rhizoma Phragmitis as a high-attention herb pair.Mass spectrometry(MS)and target prediction identified three active compounds,i.e.,methylinissolin-3-O-glucoside,corydalin,and pingbeinine,which converge on pathways such as neuroactive ligand-receptor interaction,xenobiotic response,and neuronal function,supporting their neuroimmune and detoxification potential.Given their high safety and dietary compatibility,this herb pair may offer therapeutic value for managing long COVID-19.All data and code are openly available(https://github.com/ZENGJingqi/GraphAI-for-TCM),providing a scalable and interpretable platform for TCM mechanism research and discovery of bioactive herbal constituents. 展开更多
关键词 Traditional Chinese medicine graph neural networks Knowledge graph Compatibility mechanism Artificial intelligence Coronavirus disease 2019
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部