期刊文献+

一种基于孪生神经网络的深度异构网络嵌入算法 被引量:2

A Deep Heterogeneous Network Embedding AlgorithmBased on Twin Neural Network
下载PDF
导出
摘要 针对现有异构网络嵌入方法导致的捕获关系冗余和模糊的问题,提出了一种基于孪生神经网络的深度异构网络嵌入模型。首先,基于面向关系的深度嵌入(Relation-Oriented Deep Embedding,RODE)框架构建了异构网络嵌入模型,以区分同型节点和异型节点之间的关系;其次,将同型节点与异类节点之间的相似性近似到低维空间,通过构建多任务的孪生神经网络来实现节点之间结构和语义关系的深度嵌入;最后,选取四个数据集执行典型网络挖掘任务,并与其他六种算法进行实验对比分析。实验结果表明,保持相同类型节点之间的相似性有助于提高节点分类效率,且损失函数在提高异构网络嵌入质量方面具有良好的优越性;RODE模型能够有效提高稀疏网络的嵌入质量,且具有良好的稳定性和鲁棒性。 For the problem of redundancy and ambiguity of capturing relationship caused by existing heterogeneous network embedding methods,a deep heterogeneous network embedding based on twin neural network is proposed.First,a heterogeneous network embedding model is constructed based on the relation-oriented deep embedding(RODE)framework.The relationship between homogeneous nodes and heterogeneous nodes is distinguished by a heterogeneous network model.Second,the similarity between nodes of the same type and nodes of different types is approximated to a low-dimensional space.The deep embedding of the structure and semantic relationship between nodes is realized by constructing a multi-task twin neural network.Finally,four data sets are selected to perform typical network mining tasks,and compared with other six algorithms.Experimental results show that the similarity between nodes of the same type is maintained to improve the efficiency of node classification,and the loss function has good advantages in improving the quality of heterogeneous network embedding.RODE model can effectively improve the embedding quality of sparse networks,and has good stability and robustness.
作者 李熊 韩鑫泽 王朝亮 蒋群 胡瑛俊 LI Xiong;HAN Xinze;WANG Zhaoliang;JIANG Qun;HU Yingjun(State Grid Zhejiang Electric Power Co.,Ltd.,Hangzhou 310007,China)
出处 《电讯技术》 北大核心 2020年第11期1271-1277,共7页 Telecommunication Engineering
基金 国家电网科技项目(1100-201919158A-0-0-00)。
关键词 异构信息网络 孪生神经网络 元路径 异构网络嵌入 heterogeneous information network twin neural network meta path heterogeneous network embedding
  • 相关文献

参考文献7

二级参考文献59

  • 1Bertino E, Kamra A, Terzi E, et al. Intrusion detectionin RBAC-administered databases [ C ]// 21st Annual Computer Security Applications Conference. 2005 : 5 -9.
  • 2Lee S Y, Low W L, Wong P Y. Learning fingerprints tor adatabase intrusion detection system[ C 1//the 7th European Symposiumon Research in Computer Security. 2002 : 264 - 279.
  • 3Cho Y H, Mangione-Smith W H. A pattern matching coprocessor for network security[ C //Proceedings of the 42nd Annual Conference on De- sign Automation. 2005 : 234 - 239.
  • 4Valeur F, Mutz D, Vigna G. A learning-based approach tothe detection of SQL attacks [ C 1//Proceedings of the Contrence on Detection of Intru- sions and Malware & Vulnerability Assessment. 2005 : 123 - 140.
  • 5Chung C, Gertz M, Demids K L. A misuse detection systeln fur database systems [ C 1//Proceedings of Integrity and Internal Control in lnfornmtion Systems: Strategic Views on the Need for Control. IF1P TCI 1 WG11.5 Third Working Conference. 2000:159 -178.
  • 6Domingos P, Pazzani M J. On the optimality of the simple Bayesian classifier under zero-one loss [ J 1. Machine Learning, 1997, 29 (2/3) : 103 - 130.
  • 7Hu Y, Panda B. Identification of malicious transactionsin database systemsI C//Proceedings nfthe International Database Engineering and Ap- plications Symposium. 2003:329 - 335.
  • 8He Q F, Ant6n 1 A. Requirements-based access control analysis and policy specification[ J 1- lnformalion and Software Technology, 2009, 51 (6) : 993 - 1009.
  • 9Shi L, Chadwick D W. A controlled natur',d language interface for authoring access control policies[ C]//Proceedings of the 2011 ACM Symposi- um on Applied Computing. 2011 : 1524 -1530.
  • 10Po L, Sorrentino S. Automatic generation of probabilistic relationships for improving sehema matching J ]. Infirmation Systems, 2011,36 (2) : 192 - 208.

共引文献25

同被引文献30

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部