期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
CoLM^(2)S:Contrastive self‐supervised learning on attributed multiplex graph network with multi‐scale information
2
作者 Beibei Han Yingmei Wei +1 位作者 Qingyong Wang Shanshan Wan 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1464-1479,共16页
Contrastive self‐supervised representation learning on attributed graph networks with Graph Neural Networks has attracted considerable research interest recently.However,there are still two challenges.First,most of t... Contrastive self‐supervised representation learning on attributed graph networks with Graph Neural Networks has attracted considerable research interest recently.However,there are still two challenges.First,most of the real‐word system are multiple relations,where entities are linked by different types of relations,and each relation is a view of the graph network.Second,the rich multi‐scale information(structure‐level and feature‐level)of the graph network can be seen as self‐supervised signals,which are not fully exploited.A novel contrastive self‐supervised representation learning framework on attributed multiplex graph networks with multi‐scale(named CoLM^(2)S)information is presented in this study.It mainly contains two components:intra‐relation contrast learning and interrelation contrastive learning.Specifically,the contrastive self‐supervised representation learning framework on attributed single‐layer graph networks with multi‐scale information(CoLMS)framework with the graph convolutional network as encoder to capture the intra‐relation information with multi‐scale structure‐level and feature‐level selfsupervised signals is introduced first.The structure‐level information includes the edge structure and sub‐graph structure,and the feature‐level information represents the output of different graph convolutional layer.Second,according to the consensus assumption among inter‐relations,the CoLM^(2)S framework is proposed to jointly learn various graph relations in attributed multiplex graph network to achieve global consensus node embedding.The proposed method can fully distil the graph information.Extensive experiments on unsupervised node clustering and graph visualisation tasks demonstrate the effectiveness of our methods,and it outperforms existing competitive baselines. 展开更多
关键词 attributed multiplex graph network contrastive self‐supervised learning graph representation learning multiscale information
下载PDF
Academic Collaborator Recommendation Based on Attributed Network Embedding 被引量:2
3
作者 Ouxia Du Ya Li 《Journal of Data and Information Science》 CSCD 2022年第1期37-56,共20页
Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator... Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator recommendation tasks.Design/methodology/approach:We propose an academic collaborator recommendation model based on attributed network embedding(ACR-ANE),which can get enhanced scholar embedding and take full advantage of the topological structure of the network and multi-type scholar attributes.The non-local neighbors for scholars are defined to capture strong relationships among scholars.A deep auto-encoder is adopted to encode the academic collaboration network structure and scholar attributes into a low-dimensional representation space.Findings:1.The proposed non-local neighbors can better describe the relationships among scholars in the real world than the first-order neighbors.2.It is important to consider the structure of the academic collaboration network and scholar attributes when recommending collaborators for scholars simultaneously.Research limitations:The designed method works for static networks,without taking account of the network dynamics.Practical implications:The designed model is embedded in academic collaboration network structure and scholarly attributes,which can be used to help scholars recommend potential collaborators.Originality/value:Experiments on two real-world scholarly datasets,Aminer and APS,show that our proposed method performs better than other baselines. 展开更多
关键词 Academic relationships mining Collaborator recommendation Attributed network embedding Deep learning
下载PDF
Homogeneity Analysis of Multiairport System Based on Airport Attributed Network Representation Learning 被引量:1
4
作者 LIU Caihua CAI Rui +1 位作者 FENG Xia XU Tao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第4期616-624,共9页
The homogeneity analysis of multi-airport system can provide important decision-making support for the route layout and cooperative operation.Existing research seldom analyzes the homogeneity of multi-airport system f... The homogeneity analysis of multi-airport system can provide important decision-making support for the route layout and cooperative operation.Existing research seldom analyzes the homogeneity of multi-airport system from the perspective of route network analysis,and the attribute information of airport nodes in the airport route network is not appropriately integrated into the airport network.In order to solve this problem,a multi-airport system homogeneity analysis method based on airport attribute network representation learning is proposed.Firstly,the route network of a multi-airport system with attribute information is constructed.If there are flights between airports,an edge is added between airports,and regional attribute information is added for each airport node.Secondly,the airport attributes and the airport network vector are represented respectively.The airport attributes and the airport network vector are embedded into the unified airport representation vector space by the network representation learning method,and then the airport vector integrating the airport attributes and the airport network characteristics is obtained.By calculating the similarity of the airport vectors,it is convenient to calculate the degree of homogeneity between airports and the homogeneity of the multi-airport system.The experimental results on the Beijing-Tianjin-Hebei multi-airport system show that,compared with other existing algorithms,the homogeneity analysis method based on attributed network representation learning can get more consistent results with the current situation of Beijing-Tianjin-Hebei multi-airport system. 展开更多
关键词 air transportation multi-airport system homogeneity analysis network representation learning airport attribute network
下载PDF
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
5
作者 Wasim Khan Shafiqul Abidin +5 位作者 Mohammad Arif Mohammad Ishrat Mohd Haleem Anwar Ahamed Shaikh Nafees Akhtar Farooqui Syed Mohd Faisal 《Data Science and Management》 2024年第2期89-98,共10页
Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence i... Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence is to identify illustrations that deviate significantly from the main distribution of data or that differ from known cases. Anomalous nodes in node-attributed networks can be identified with greater precision if both graph and node attributes are taken into account. Almost all of the studies in this area focus on supervised techniques for spotting outliers. While supervised algorithms for anomaly detection work well in theory, they cannot be applied to real-world applications owing to a lack of labelled data. Considering the possible data distribution, our model employs a dual variational autoencoder (VAE), while a generative adversarial network (GAN) assures that the model is robust to adversarial training. The dual VAEs are used in another capacity: as a fake-node generator. Adversarial training is used to ensure that our latent codes have a Gaussian or uniform distribution. To provide a fair presentation of the graph, the discriminator instructs the generator to generate latent variables with distributions that are more consistent with the actual distribution of the data. Once the model has been learned, the discriminator is used for anomaly detection via reconstruction loss which has been trained to distinguish between the normal and artificial distributions of data. First, using a dual VAE, our model simultaneously captures cross-modality interactions between topological structure and node characteristics and overcomes the problem of unlabeled anomalies, allowing us to better understand the network sparsity and nonlinearity. Second, the proposed model considers the regularization of the latent codes while solving the issue of unregularized embedding techniques that can quickly lead to unsatisfactory representation. Finally, we use the discriminator reconstruction loss for anomaly detection as the discriminator is well-trained to separate the normal and generated data distributions because reconstruction-based loss does not include the adversarial component. Experiments conducted on attributed networks demonstrate the effectiveness of the proposed model and show that it greatly surpasses the previous methods. The area under the curve scores of our proposed model for the BlogCatalog, Flickr, and Enron datasets are 0.83680, 0.82020, and 0.71180, respectively, proving the effectiveness of the proposed model. The result of the proposed model on the Enron dataset is slightly worse than other models;we attribute this to the dataset’s low dimensionality as the most probable explanation. 展开更多
关键词 Anomaly detection deep learning Attributed networks autoencoder Dual variational-autoencoder Generative adversarial networks
下载PDF
Improving Link Prediction Accuracy of Network Embedding Algorithms via Rich Node Attribute Information
6
作者 Weiwei Gu Jinqiang Hou Weiyi Gu 《Journal of Social Computing》 EI 2023年第4期326-336,共11页
Complex networks are widely used to represent an abundance of real-world relations ranging from social networks to brain networks. Inferring missing links or predicting future ones based on the currently observed netw... Complex networks are widely used to represent an abundance of real-world relations ranging from social networks to brain networks. Inferring missing links or predicting future ones based on the currently observed network is known as the link prediction task. Recent network embedding based link prediction algorithms have demonstrated ground-breaking performance on link prediction accuracy. Those algorithms usually apply node attributes as the initial feature input to accelerate the convergence speed during the training process. However, they do not take full advantage of node feature information. In this paper, besides applying feature attributes as the initial input, we make better utilization of node attribute information by building attributable networks and plugging attributable networks into some typical link prediction algorithms and name this algorithm Attributive Graph Enhanced Embedding (AGEE). AGEE is able to automatically learn the weighting trades-off between the structure and the attributive networks. Numerical experiments show that AGEE can improve the link prediction accuracy by around 3% compared with SEAL, Variational Graph AutoEncoder (VGAE), and node2vec. 展开更多
关键词 attributive network link prediction network embedding
原文传递
Virtual network embedding through node connectivity 被引量:1
7
作者 Ding Jian Huang Tao +3 位作者 Wang Jian Hu Wenbo Liu Jiang Liu Yunjie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第1期17-23,56,共8页
Virtual network embedding (VNE) is an essential part of network virtualization, which is considered as one of the most promising way for the future network. Its main object is to efficiently assign the nodes and lin... Virtual network embedding (VNE) is an essential part of network virtualization, which is considered as one of the most promising way for the future network. Its main object is to efficiently assign the nodes and links of a virtual network (VN) to a shared substrate network (SN), The NP-hard and exiting studies have put forward several heuristic algorithms. However, most of the algorithms only consider the local resource of nodes, such as CPU and bandwidth (BW), to decide the embedding, and ignore the significant impact of network attributes. Based on the attributes of entire network, a model of the connectivity between each pair of nodes was formulated to measure the resource ranking of the nodes, and a new two-stage embedding algorithm was proposed. Thereafter, the node mapping and link mapping can be jointly considered. Extensive simulation shows that the proposed algorithm improves the performance of VNE by increasing the revenue/cost ratio and acceptance ratio of VN requests while reducing the runtime. 展开更多
关键词 virtual network virtualization VNE attributes of entire network CONNECTIVITY
原文传递
Semi-supervised community detection on attributed networks using non-negative matrix tri-factorization with node popularity
8
作者 Di JIN Jing HE +1 位作者 Bianfang CHAI Dongxiao HE 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第4期61-71,共11页
The World Wide Web generates more and more data with links and node contents,which are always modeled as attributed networks.The identification of network communities plays an important role for people to understand a... The World Wide Web generates more and more data with links and node contents,which are always modeled as attributed networks.The identification of network communities plays an important role for people to understand and utilize the semantic functions of the data.A few methods based on non-negative matrix factorization(NMF)have been proposed to detect community structure with semantic information in attributed networks.However,previous methods have not modeled some key factors(which affect the link generating process together),including prior information,the heterogeneity of node degree,as well as the interactions among communities.The three factors have been demonstrated to primarily affect the results.In this paper,we propose a semi-supervised community detection method on attributed networks by simultaneously considering these three factors.First,a semi-supervised non-negative matrix tri-factorization model with node popularity(i.e.,PSSNMTF)is designed to detect communities on the topology of the network.And then node contents are integrated into the PSSNMTF model to find the semantic communities more accurately,namely PSSNMTFC.Parameters of the PSSNMTFC model is estimated by using the gradient descent method.Experiments on some real and artificial networks illustrate that our new method is superior over some related stateof-the-art methods in terms of accuracy. 展开更多
关键词 community detection non-negative matrix trifactorization node popularity attributed networks
原文传递
Countering DNS Amplification Attacks Based on Analysis of Outgoing Traffic
9
作者 Evgeny Sagatov Samara Mayhoub +1 位作者 Andrei Sukhov Prasad Calyam 《Journal of Communications and Information Networks》 EI CSCD 2023年第2期111-121,共11页
Domain name system(DNS)amplification distributed denial of service(DDoS)attacks are one of the popular types of intrusions that involve accessing DNS servers on behalf of the victim.In this case,the size of the respon... Domain name system(DNS)amplification distributed denial of service(DDoS)attacks are one of the popular types of intrusions that involve accessing DNS servers on behalf of the victim.In this case,the size of the response is many times greater than the size of the request,in which the source of the request is substituted for the address of the victim.This paper presents an original method for countering DNS amplification DDoS attacks.The novelty of our approach lies in the analysis of outgoing traffic from the victim’s server.DNS servers used for amplification attacks are easily detected in Internet control message protocol(ICMP)packet headers(type 3,code 3)in outgoing traffic.ICMP packets of this type are generated when accessing closed user datagram protocol(UDP)ports of the victim,which are randomly assigned by the Saddam attack tool.To prevent such attacks,we used a Linux utility and a software-defined network(SDN)module that we previously developed to protect against port scanning.The Linux utility showed the highest efficiency of 99.8%,i.e.,only two attack packets out of a thousand reached the victim server. 展开更多
关键词 DNS amplification attacks outgoing traffic analysis port scanning attack network intrusion qualification attributes
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部