期刊文献+
共找到631篇文章
< 1 2 32 >
每页显示 20 50 100
Multi-graph Networks with Graph Pooling for COVID-19 Diagnosis
1
作者 Chaosheng Tang Wenle Xu +3 位作者 Junding Sun Shuihua Wang Yudong Zhang Juan Manuel Górriz 《Journal of Bionic Engineering》 CSCD 2024年第6期3179-3200,共22页
Convolutional Neural Networks(CNNs)have shown remarkable capabilities in extracting local features from images,yet they often overlook the underlying relationships between pixels.To address this limitation,previous ap... Convolutional Neural Networks(CNNs)have shown remarkable capabilities in extracting local features from images,yet they often overlook the underlying relationships between pixels.To address this limitation,previous approaches have attempted to combine CNNs with Graph Convolutional Networks(GCNs)to capture global features.However,these approaches typically neglect the topological structure information of the graph during the global feature extraction stage.This paper proposes a novel end-to-end hybrid architecture called the Multi-Graph Pooling Network(MGPN),which is designed explicitly for chest X-ray image classification.Our approach sequentially combines CNNs and GCNs,enabling the learning of both local and global features from individual images.Recognizing that different nodes contribute differently to the final graph representation,we introduce an NI-GTP module to enhance the extraction of ultimate global features.Additionally,we introduce a G-LFF module to fuse the local and global features effectively. 展开更多
关键词 Convolutional neural networks graph convolutional networks graph pooling COVID-19
暂未订购
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
2
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Physics-constrained graph neural networks for solving adjoint equations
3
作者 Jinpeng Xiang Shufang Song +2 位作者 Wenbo Cao Kuijun Zuo Weiwei Zhang 《Acta Mechanica Sinica》 2026年第1期178-191,共14页
The adjoint method is widely used in gradient-based optimization with high-dimensional design variables.However,the cost of solving the adjoint equations in each iteration is comparable to that of solving the flow fie... The adjoint method is widely used in gradient-based optimization with high-dimensional design variables.However,the cost of solving the adjoint equations in each iteration is comparable to that of solving the flow field,resulting in expensive computational costs.To improve the efficiency of solving adjoint equations,we propose a physics-constrained graph neural networks for solving adjoint equations,named ADJ-PCGN.ADJ-PCGN establishes a mapping relationship between flow characteristics and adjoint vector based on data,serving as a replacement for the computationally expensive numerical solution of adjoint equations.A physics-based graph structure and message-passing mechanism are designed to endow its strong fitting and generalization capabilities.Taking transonic drag reduction and maximum lift-drag ratio of the airfoil as examples,results indicate that ADJ-PCGN attains a similar optimal shape as the classical direct adjoint loop method.In addition,ADJ-PCGN demonstrates strong generalization capabilities across different mesh topologies,mesh densities,and out-of-distribution conditions.It holds the potential to become a universal model for aerodynamic shape optimization involving states,geometries,and meshes. 展开更多
关键词 Adjoint method Deep learning graph neural network Physics-constrained Fast aerodynamic analysis
原文传递
Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features
4
作者 Ghadah Naif Alwakid Samabia Tehsin +3 位作者 Mamoona Humayun Asad Farooq Ibrahim Alrashdi Amjad Alsirhani 《Computers, Materials & Continua》 2026年第1期1964-1984,共21页
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ... Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems. 展开更多
关键词 graph neural network image classification DermaMNIST dataset graph representation
在线阅读 下载PDF
Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks
5
作者 Haoxin Sun XiaoYu +5 位作者 Jiale Li Yitong Xu JieYu Huanhuan Li Yuanzhang Li Yu-An Tan 《Computers, Materials & Continua》 2026年第2期1474-1488,共15页
Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequ... Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities. 展开更多
关键词 Smart contracts graph neural networks symbolic execution vulnerability detection
在线阅读 下载PDF
Multi-Task Disaster Tweet Classification Using Hybrid TF-IDF and Graph Convolutional Networks
6
作者 Basudev Nath Deepak Sahoo +4 位作者 Sudhansu Shekhar Patra Hassan Alkhiri Subrata Chowdhury Sheraz Aslam Kainat Mustafa 《Computers, Materials & Continua》 2026年第5期2077-2099,共23页
Accurate,up to date,and quick information related to any disaster supports disaster management team/authorities to perform quick,easy,and cost-effective response to enhance rescue operations to alleviate the possible ... Accurate,up to date,and quick information related to any disaster supports disaster management team/authorities to perform quick,easy,and cost-effective response to enhance rescue operations to alleviate the possible loss of lives,financial risks,and properties.Due to damaged infrastructure in disaster-affected areas,social media is the only way to share/exchange real time information.Therefore,‘X’(formerly Twitter)has become a major platform for disseminating real-time information during disaster events or emergencies,i.e.,floods and earthquake.Rapid identification of actionable content is critical for effective humanitarian response;however,the brief and noisy nature of tweets makes automated classification challenging.To tackle this problem,this study proposes a hybrid classification framework that integrates term frequency–inverse document frequency(TF-IDF)features with graph convolutional networks(GCNs)to enhance disaster-related tweet analysis.The proposed model performs three classification tasks:identifying disaster-related tweets(achieving 94.47%accuracy),categorizing disaster types(earthquake,flood,and non-disaster)with 91.78%accuracy,and detecting aid requests such as food,donations,and medical assistance(94.64%accuracy).By combining the statistical strengths of TF-IDF with the relational learning capabilities of GCNs,the model attains high accuracy while maintaining computational efficiency and interpretability.The results demonstrate the framework’s strong potential for real-time disaster response,offering valuable insights to support emergency management systems and humanitarian decision-making. 展开更多
关键词 Natural language processing tweet classification graph neural networks deep learning
在线阅读 下载PDF
Multi-Leakage Detection Using Graph Attention Networks and Restoration Prioritization in Water Distribution Systems
7
作者 Ryul Kim Young Hwan Choi 《Computer Modeling in Engineering & Sciences》 2026年第3期784-805,共22页
Leakage events occurring at multiple locations simultaneously generate overlapping and topologydependent pressure signatures,making reliable detection and subsequent restoration planning a persistent challenge in wate... Leakage events occurring at multiple locations simultaneously generate overlapping and topologydependent pressure signatures,making reliable detection and subsequent restoration planning a persistent challenge in water distribution systems(WDSs).While recent data-driven techniques have improved the ability to identify anomalous hydraulic behavior,most approaches remain limited to the detection stage and offer little guidance on how utilities should prioritize repairs once multiple failures are identified.To bridge this gap,this study proposes an integrated framework that links topology-aware leakage detection with quantitative restoration prioritization.First,a multi-task learning framework based on Graph Attention Networks(GAT)is employed to jointly detect both the location and magnitude of multiple leakages by explicitly incorporating hydraulic responses and network topology into the learning process.The model’s detection robustness is evaluated across networks with contrasting looped,branched,and hybrid topologies to examine how structural characteristics influence detection accuracy under multievent conditions.Second,the study develops a restoration-planning module that constructs a two-objective decision space combining restoration cost and segment vulnerability,where the latter accounts for disruption potential arising from hydraulic importance and local service connectivity.Non-dominated sorting is used to derive Pareto-optimal restoration sequences,enabling explicit quantification of the trade-offs between operational cost and service disruption.This provides decision-makers with a ranked set of restoration orders that reflect both hydraulic impact and functional risk,rather than relying on heuristics or cost-only criteria.Notably,the proposed framework separates offline training from online inference,requiring only a single forward pass for real-time decision-making without the need for iterative hydraulic simulations.Results demonstrate that topology strongly governs both detection performance and the structure of optimal repair sequences,underscoring the importance of integrating network-aware learning with multi-criteria restoration evaluation. 展开更多
关键词 graph attention network(GAT) topology-aware detection multi-leakage restoration
在线阅读 下载PDF
Advanced High-Order Graph Convolutional Networks With Assorted Time-Frequency Transforms
8
作者 Ling Wang Ye Yuan Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期394-408,共15页
A dynamic graph(DG)is adopted to portray the evolving interplay between nodes in real-world scenarios prevalently.A high-order graph convolutional network(HGCN)is equipped with the ability to represent a DG by the spa... A dynamic graph(DG)is adopted to portray the evolving interplay between nodes in real-world scenarios prevalently.A high-order graph convolutional network(HGCN)is equipped with the ability to represent a DG by the spatial-temporal message passing mechanism built on tensor product.Concretely,an HGCN utilizes the discrete Fourier transform(DFT)to implement temporal message passing and then employs face-wise product to realize spatial message passing.However,DFT is only a special case of assorted time-frequency transforms,which considers the complex temporal patterns partially,thereby resulting in an inaccurate temporal message passing possibly.To address this issue,this study proposes six advanced time-frequency transform-incorporated HGCNs(TF-HGCNs)with discrete Fourier,discrete Hartley,discrete cosine,Haar wavelet,Walsh Hadamard,and slant transforms.In addition,a potent ensemble is built regarding the proposed six TF-HGCNs as the bases.Finally,the corresponding theoretical proof is presented.Empirical studies on six DG datasets demonstrate that owing to diverse time-frequency transforms,the proposed six TF-HGCNs significantly outperform state-of-the-art models in addressing the task of link weight estimation.Moreover,their ensemble outstrips each base's performance. 展开更多
关键词 Dynamic graph(DG)learning ENSEMBLE graph representation learning high-order graph convolution network(HGCN) time-frequency transform tensor product
在线阅读 下载PDF
Spatio-Temporal Graph Neural Networks with Elastic-Band Transform for Solar Radiation Prediction
9
作者 Guebin Choi 《Computer Modeling in Engineering & Sciences》 2026年第1期848-872,共25页
This study proposes a novel forecasting framework that simultaneously captures the strong periodicity and irregular meteorological fluctuations inherent in solar radiation time series.Existing approaches typically def... This study proposes a novel forecasting framework that simultaneously captures the strong periodicity and irregular meteorological fluctuations inherent in solar radiation time series.Existing approaches typically define inter-regional correlations using either simple correlation coefficients or distance-based measures when applying spatio-temporal graph neural networks(STGNNs).However,such definitions are prone to generating spurious correlations due to the dominance of periodic structures.To address this limitation,we adopt the Elastic-Band Transform(EBT)to decompose solar radiation into periodic and amplitude-modulated components,which are then modeled independently with separate graph neural networks.The periodic component,characterized by strong nationwide correlations,is learned with a relatively simple architecture,whereas the amplitude-modulated component is modeled with more complex STGNNs that capture climatological similarities between regions.The predictions from the two components are subsequently recombined to yield final forecasts that integrate both periodic patterns and aperiodic variability.The proposed framework is validated with multiple STGNN architectures,and experimental results demonstrate improved predictive accuracy and interpretability compared to conventional methods. 展开更多
关键词 Spatio-temporal graph neural network(STGNN) elastic-band transform(EBT) solar radiation fore-casting spurious correlation time series decomposition
在线阅读 下载PDF
Quantifying compatibility mechanisms in traditional Chinese medicine with interpretable graph neural networks 被引量:2
10
作者 Jingqi Zeng Xiaobin Jia 《Journal of Pharmaceutical Analysis》 2025年第8期1887-1901,共15页
Traditional Chinese medicine(TCM)features complex compatibility mechanisms involving multicomponent,multi-target,and multi-pathway interactions.This study presents an interpretable graph artificial intelligence(GraphA... Traditional Chinese medicine(TCM)features complex compatibility mechanisms involving multicomponent,multi-target,and multi-pathway interactions.This study presents an interpretable graph artificial intelligence(GraphAI)framework to quantify such mechanisms in Chinese herbal formulas(CHFs).A multidimensional TCM knowledge graph(TCM-MKG;https://zenodo.org/records/13763953)was constructed,integrating seven standardized modules:TCM terminology,Chinese patent medicines(CPMs),Chinese herbal pieces(CHPs),pharmacognostic origins(POs),chemical compounds,biological targets,and diseases.A neighbor-diffusion strategy was used to address the sparsity of compound-target associations,increasing target coverage from 12.0%to 98.7%.Graph neural networks(GNNs)with attention mechanisms were applied to 6,080 CHFs,modeled as graphs with CHPs as nodes.To embed domain-specific semantics,virtual nodes medicinal properties,i.e.,therapeutic nature,flavor,and meridian tropism,were introduced,enabling interpretable modeling of inter-CHP relationships.The model quantitatively captured classical compatibility roles such as“monarch-minister-assistant-guide”,and uncovered TCM etiological types derived from diagnostic and efficacy patterns.Model validation using 215 CHFs used for coronavirus disease 2019(COVID-19)management highlighted Radix Astragali-Rhizoma Phragmitis as a high-attention herb pair.Mass spectrometry(MS)and target prediction identified three active compounds,i.e.,methylinissolin-3-O-glucoside,corydalin,and pingbeinine,which converge on pathways such as neuroactive ligand-receptor interaction,xenobiotic response,and neuronal function,supporting their neuroimmune and detoxification potential.Given their high safety and dietary compatibility,this herb pair may offer therapeutic value for managing long COVID-19.All data and code are openly available(https://github.com/ZENGJingqi/GraphAI-for-TCM),providing a scalable and interpretable platform for TCM mechanism research and discovery of bioactive herbal constituents. 展开更多
关键词 Traditional Chinese medicine graph neural networks Knowledge graph Compatibility mechanism Artificial intelligence Coronavirus disease 2019
暂未订购
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks 被引量:1
11
作者 Baoquan Liu Xi Chen +2 位作者 Qingjun Yuan Degang Li Chunxiang Gu 《Computers, Materials & Continua》 2025年第2期3179-3201,共23页
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not only reflects the time characteristics of the packet but also strengthens the relationship between the client or server packets. According to FMG, a Traffic Mapping Classification model (TMC-GCN) is designed, which can automatically capture and learn the characteristics and structure information of the top vertex in FMG. The TMC-GCN model is used to classify the encrypted traffic. The encryption stream classification problem is transformed into a graph classification problem, which can effectively deal with data from different data sources and application scenarios. By comparing the performance of TMC-GCN with other classical models in four public datasets, including CICIOT2023, ISCXVPN2016, CICAAGM2017, and GraphDapp, the effectiveness of the FMG algorithm is verified. The experimental results show that the accuracy rate of the TMC-GCN model is 96.13%, the recall rate is 95.04%, and the F1 rate is 94.54%. 展开更多
关键词 Encrypted traffic classification deep learning graph neural networks multi-layer perceptron graph convolutional networks
在线阅读 下载PDF
Two-Phase Software Fault Localization Based on Relational Graph Convolutional Neural Networks 被引量:1
12
作者 Xin Fan Zhenlei Fu +2 位作者 Jian Shu Zuxiong Shen Yun Ge 《Computers, Materials & Continua》 2025年第2期2583-2607,共25页
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu... Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments. 展开更多
关键词 Software fault localization graph neural network RankNet inter-class dependency class imbalance
在线阅读 下载PDF
BlastGraphNet:An Intelligent Computational Method for the Precise and Rapid Prediction of Blast Loads on Complex 3D Buildings Using Graph Neural Networks 被引量:1
13
作者 Zhiqiao Wang Jiangzhou Peng +6 位作者 Jie Hu Mingchuan Wang Xiaoli Rong Leixiang Bian Mingyang Wang Yong He Weitao Wu 《Engineering》 2025年第6期205-224,共20页
Accurate and efficient prediction of the distribution of surface loads on buildings subjected to explosive effects is crucial for rapidly calculating structural dynamic responses,establishing effective protective meas... Accurate and efficient prediction of the distribution of surface loads on buildings subjected to explosive effects is crucial for rapidly calculating structural dynamic responses,establishing effective protective measures,and designing civil defense engineering solutions.Current state-of-the-art methods face several issues:Experimental research is difficult and costly to implement,theoretical research is limited to simple geometries and lacks precision,and direct simulations require substantial computational resources.To address these challenges,this paper presents a data-driven method for predicting blast loads on building surfaces.This approach increases both the accuracy and computational efficiency of load predictions when the geometry of the building changes while the explosive yield remains constant,significantly improving its applicability in complex scenarios.This study introduces an innovative encoder-decoder graph neural network model named BlastGraphNet,which uses a message-passing mechanism to predict the overpressure and impulse load distributions on buildings with conventional and complex geometries during explosive events.The model also facilitates related downstream applications,such as damage mode identification and rapid assessment of virtual city explosions.The calculation results indicate that the prediction error of the model for conventional building tests is less than 2%,and its inference speed is 3-4 orders of magnitude faster than that of state-of-the-art numerical methods.In extreme test cases involving buildings with complex geometries and building clusters,the method achieved high accuracy and excellent generalizability.The strong adaptability and generalizability of BlastGraphNet confirm that this novel method enables precise real-time prediction of blast loads and provides a new paradigm for damage assessment in protective engineering. 展开更多
关键词 Blast load prediction graph neural networks Data-driven learning Real-time prediction Protective engineering
在线阅读 下载PDF
DIGNN-A:Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph
14
作者 Jizhao Liu Minghao Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期817-842,共26页
The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are cr... The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics. 展开更多
关键词 Intrusion detection graph neural networks attention mechanisms line graphs dynamic graph neural networks
在线阅读 下载PDF
Graph Neural Networks and Multimodal DTI Features for Schizophrenia Classification:Insights from Brain Network Analysis and Gene Expression
15
作者 Jingjing Gao Heping Tang +25 位作者 Zhengning Wang Yanling Li Na Luo Ming Song Sangma Xie Weiyang Shi Hao Yan Lin Lu Jun Yan Peng Li Yuqing Song Jun Chen Yunchun Chen Huaning Wang Wenming Liu Zhigang Li Hua Guo Ping Wan Luxian Lv Yongfeng Yang Huiling Wang Hongxing Zhang Huawang Wu Yuping Ning Dai Zhang Tianzi Jiang 《Neuroscience Bulletin》 2025年第6期933-950,共18页
Schizophrenia(SZ)stands as a severe psychiatric disorder.This study applied diffusion tensor imaging(DTI)data in conjunction with graph neural networks to distinguish SZ patients from normal controls(NCs)and showcases... Schizophrenia(SZ)stands as a severe psychiatric disorder.This study applied diffusion tensor imaging(DTI)data in conjunction with graph neural networks to distinguish SZ patients from normal controls(NCs)and showcases the superior performance of a graph neural network integrating combined fractional anisotropy and fiber number brain network features,achieving an accuracy of 73.79%in distinguishing SZ patients from NCs.Beyond mere discrimination,our study delved deeper into the advantages of utilizing white matter brain network features for identifying SZ patients through interpretable model analysis and gene expression analysis.These analyses uncovered intricate interrelationships between brain imaging markers and genetic biomarkers,providing novel insights into the neuropathological basis of SZ.In summary,our findings underscore the potential of graph neural networks applied to multimodal DTI data for enhancing SZ detection through an integrated analysis of neuroimaging and genetic features. 展开更多
关键词 SCHIZOPHRENIA Magnetic resonance imaging CLASSIFICATION Deep learning graph neural network
原文传递
PIAFGNN:Property Inference Attacks against Federated Graph Neural Networks
16
作者 Jiewen Liu Bing Chen +2 位作者 Baolu Xue Mengya Guo Yuntao Xu 《Computers, Materials & Continua》 2025年第2期1857-1877,共21页
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and so... Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack (PIA) against FedGNNs. Compared with prior works on centralized GNNs, in PIAFGNN, the attacker can only obtain the global embedding gradient distributed by the central server. The attacker converts the task of stealing the target user’s local embeddings into a regression problem, using a regression model to generate the target graph node embeddings. By training shadow models and property classifiers, the attacker can infer the basic property information within the target graph that is of interest. Experiments on three benchmark graph datasets demonstrate that PIAFGNN achieves attack accuracy of over 70% in most cases, even approaching the attack accuracy of inference attacks against centralized GNNs in some instances, which is much higher than the attack accuracy of the random guessing method. Furthermore, we observe that common defense mechanisms cannot mitigate our attack without affecting the model’s performance on mainly classification tasks. 展开更多
关键词 Federated graph neural networks GNNs privacy leakage regression model property inference attacks EMBEDDINGS
在线阅读 下载PDF
Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks
17
作者 Wasim Khan Afsaruddin Mohd +3 位作者 Mohammad Suaib Mohammad Ishrat Anwar Ahamed Shaikh Syed Mohd Faisal 《Data Science and Management》 2025年第2期137-146,共10页
In the burgeoning field of anomaly detection within attributed networks,traditional methodologies often encounter the intricacies of network complexity,particularly in capturing nonlinearity and sparsity.This study in... In the burgeoning field of anomaly detection within attributed networks,traditional methodologies often encounter the intricacies of network complexity,particularly in capturing nonlinearity and sparsity.This study introduces an innovative approach that synergizes the strengths of graph convolutional networks with advanced deep residual learning and a unique residual-based attention mechanism,thereby creating a more nuanced and efficient method for anomaly detection in complex networks.The heart of our model lies in the integration of graph convolutional networks that capture complex structural relationships within the network data.This is further bolstered by deep residual learning,which is employed to model intricate nonlinear connections directly from input data.A pivotal innovation in our approach is the incorporation of a residual-based attention mech-anism.This mechanism dynamically adjusts the importance of nodes based on their residual information,thereby significantly enhancing the sensitivity of the model to subtle anomalies.Furthermore,we introduce a novel hypersphere mapping technique in the latent space to distinctly separate normal and anomalous data.This mapping is the key to our model’s ability to pinpoint anomalies with greater precision.An extensive experimental setup was used to validate the efficacy of the proposed model.Using attributed social network datasets,we demonstrate that our model not only competes with but also surpasses existing state-of-the-art methods in anomaly detection.The results show the exceptional capability of our model to handle the multifaceted nature of real-world networks. 展开更多
关键词 Anomaly detection Deep learning Hypersphere learning Residual modeling graph convolution network Attention mechanism
在线阅读 下载PDF
DSGNN:Dual-Shield Defense for Robust Graph Neural Networks
18
作者 Xiaohan Chen Yuanfang Chen +2 位作者 Gyu Myoung Lee Noel Crespi Pierluigi Siano 《Computers, Materials & Continua》 2025年第10期1733-1750,共18页
Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),t... Graph Neural Networks(GNNs)have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models,such as Large Language Models(LLMs),to enhance structural reasoning,knowledge retrieval,and memory management.The expansion of their application scope imposes higher requirements on the robustness of GNNs.However,as GNNs are applied to more dynamic and heterogeneous environments,they become increasingly vulnerable to real-world perturbations.In particular,graph data frequently encounters joint adversarial perturbations that simultaneously affect both structures and features,which are significantly more challenging than isolated attacks.These disruptions,caused by incomplete data,malicious attacks,or inherent noise,pose substantial threats to the stable and reliable performance of traditional GNN models.To address this issue,this study proposes the Dual-Shield Graph Neural Network(DSGNN),a defense model that simultaneously mitigates structural and feature perturbations.DSGNN utilizes two parallel GNN channels to independently process structural noise and feature noise,and introduces an adaptive fusion mechanism that integrates information from both pathways to generate robust node representations.Theoretical analysis demonstrates that DSGNN achieves a tighter robustness boundary under joint perturbations compared to conventional single-channel methods.Experimental evaluations across Cora,CiteSeer,and Industry datasets show that DSGNN achieves the highest average classification accuracy under various adversarial settings,reaching 81.24%,71.94%,and 81.66%,respectively,outperforming GNNGuard,GCN-Jaccard,GCN-SVD,RGCN,and NoisyGNN.These results underscore the importance of multi-view perturbation decoupling in constructing resilient GNN models for real-world applications. 展开更多
关键词 graph neural networks adversarial attacks dual-shield defense certified robustness node classification
在线阅读 下载PDF
Spectral graph convolution networks for microbialite lithology identification based on conventional well logs
19
作者 Ke-Ran Li Jin-Min Song +9 位作者 Han Wang Hai-Jun Yan Shu-Gen Liu Yang Lan Xin Jin Jia-Xin Ren Ling-Li Zhao Li-Zhou Tian Hao-Shuang Deng Wei Chen 《Petroleum Science》 2025年第4期1513-1533,共21页
Machine learning algorithms are widely used to interpret well logging data.To enhance the algorithms'robustness,shuffling the well logging data is an unavoidable feature engineering before training models.However,... Machine learning algorithms are widely used to interpret well logging data.To enhance the algorithms'robustness,shuffling the well logging data is an unavoidable feature engineering before training models.However,latent information stored between different well logging types and depth is destroyed during the shuffle.To investigate the influence of latent information,this study implements graph convolution networks(GCNs),long-short temporal memory models,recurrent neural networks,temporal convolution networks,and two artificial neural networks to predict the microbial lithology in the fourth member of the Dengying Formation,Moxi gas field,central Sichuan Basin.Results indicate that the GCN model outperforms other models.The accuracy,F1-score,and area under curve of the GCN model are 0.90,0.90,and 0.95,respectively.Experimental results indicate that the time-series data facilitates lithology prediction and helps determine lithological fluctuations in the vertical direction.All types of logs from the spectral in the GCN model and also facilitates lithology identification.Only on condition combined with latent information,the GCN model reaches excellent microbialite classification resolution at the centimeter scale.Ultimately,the two actual cases show tricks for using GCN models to predict potential microbialite in other formations and areas,proving that the GCN model can be adopted in the industry. 展开更多
关键词 graph convolution network Mirobialite Lithology forecasting Well log
原文传递
Intelligent Medical Diagnosis Model Based on Graph Neural Networks for Medical Images
20
作者 Ashutosh Sharma Amit Sharma Kai Guo 《CAAI Transactions on Intelligence Technology》 2025年第4期1201-1216,共16页
Recently,numerous estimation issues have been solved due to the developments in data-driven artificial neural networks(ANN)and graph neural networks(GNN).The primary limitation of previous methodologies has been the d... Recently,numerous estimation issues have been solved due to the developments in data-driven artificial neural networks(ANN)and graph neural networks(GNN).The primary limitation of previous methodologies has been the dependence on data that can be structured in a grid format.However,physiological recordings often exhibit irregular and unordered patterns,posing a significant challenge in conceptualising them as matrices.As a result,GNNs which comprise interactive nodes connected by edges whose weights are defined by anatomical junctions or temporal relationships have received a lot of consideration by leveraging implicit data that exists in a biological system.Additionally,our study incorporates a structural GNN to effectively differentiate between different degrees of infection in both the left and right hemispheres of the brain.Subsequently,demographic data are included,and a multi-task learning architecture is devised,integrating classification and regression tasks.The trials used an authentic dataset,including 800 brain x-ray pictures,consisting of 560 instances classified as moderate cases and 240 instances classified as severe cases.Based on empirical evidence,our methodology demonstrates superior performance in classification,surpassing other comparison methods with a notable achievement of 92.27%in terms of area under the curve as well as a correlation coefficient of 0.62. 展开更多
关键词 artificial intelligence disease prediction electronic medical records graph neural networks medical imaging
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部