期刊文献+
共找到43篇文章
< 1 2 3 >
每页显示 20 50 100
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview
1
作者 Yue Zhou Xin Luo MengChu Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1105-1121,共17页
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C... Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field. 展开更多
关键词 Big data analysis cryptocurrency transaction network embedding(CTNE) dynamic network network embedding network representation static network
下载PDF
Heterogeneous Network Embedding: A Survey
2
作者 Sufen Zhao Rong Peng +1 位作者 Po Hu Liansheng Tan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期83-130,共48页
Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the stru... Real-world complex networks are inherently heterogeneous;they have different types of nodes,attributes,and relationships.In recent years,various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks(HINs)into low-dimensional embeddings;this task is called heterogeneous network embedding(HNE).Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification,recommender systems,and information retrieval.Here,we provide a comprehensive survey of key advancements in the area of HNE.First,we define an encoder-decoder-based HNE model taxonomy.Then,we systematically overview,compare,and summarize various state-of-the-art HNE models and analyze the advantages and disadvantages of various model categories to identify more potentially competitive HNE frameworks.We also summarize the application fields,benchmark datasets,open source tools,andperformance evaluation in theHNEarea.Finally,wediscuss open issues and suggest promising future directions.We anticipate that this survey will provide deep insights into research in the field of HNE. 展开更多
关键词 Heterogeneous information networks representation learning heterogeneous network embedding graph neural networks machine learning
下载PDF
Role-Based Network Embedding via Quantum Walk with Weighted Features Fusion
3
作者 Mingqiang Zhou Mengjiao Li +1 位作者 Zhiyuan Qian Kunpeng Li 《Computers, Materials & Continua》 SCIE EI 2023年第8期2443-2460,共18页
Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networ... Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networks with similar structural patterns and functions.However,the rolesimilar nodes may be far away or even disconnected from each other.Meanwhile,the neighborhood node features and noise also affect the result of the role-based network embedding,which are also challenges of current network embedding work.In this paper,we propose a Role-based network Embedding via Quantum walk with weighted Features fusion(REQF),which simultaneously considers the influence of global and local role information,node features,and noise.Firstly,we capture the global role information of nodes via quantum walk based on its superposition property which emphasizes the local role information via biased quantum walk.Secondly,we utilize the quantum walkweighted characteristic function to extract and fuse features of nodes and their neighborhood by different distributions which contain role information implicitly.Finally,we leverage the Variational Auto-Encoder(VAE)to reduce the effect of noise.We conduct extensive experiments on seven real-world datasets,and the results show that REQF is more effective at capturing role information in the network,which outperforms the best baseline by up to 14.6% in role classification,and 23% in role detection on average. 展开更多
关键词 Role-based network embedding quantum walk quantum walk weighted characteristic function complex networks
下载PDF
Multiplex network infomax:Multiplex network embedding via information fusion
4
作者 Qiang Wang Hao Jiang +3 位作者 Ying Jiang Shuwen Yi Qi Nie Geng Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1157-1168,共12页
For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most ... For networking of big data applications,an essential issue is how to represent networks in vector space for further mining and analysis tasks,e.g.,node classification,clustering,link prediction,and visualization.Most existing studies on this subject mainly concentrate on monoplex networks considering a single type of relation among nodes.However,numerous real-world networks are naturally composed of multiple layers with different relation types;such a network is called a multiplex network.The majority of existing multiplex network embedding methods either overlook node attributes,resort to node labels for training,or underutilize underlying information shared across multiple layers.In this paper,we propose Multiplex Network Infomax(MNI),an unsupervised embedding framework to represent information of multiple layers into a unified embedding space.To be more specific,we aim to maximize the mutual information between the unified embedding and node embeddings of each layer.On the basis of this framework,we present an unsupervised network embedding method for attributed multiplex networks.Experimental results show that our method achieves competitive performance on not only node-related tasks,such as node classification,clustering,and similarity search,but also a typical edge-related task,i.e.,link prediction,at times even outperforming relevant supervised methods,despite that MNI is fully unsupervised. 展开更多
关键词 network embedding Multiplex network Mutual information maximization
下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
5
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
下载PDF
A Survey of Embedding Algorithm for Virtual Network Embedding 被引量:6
6
作者 Haotong Cao Shengchen Wu +2 位作者 Yue Hu Yun Liu Longxiang Yang 《China Communications》 SCIE CSCD 2019年第12期1-33,共33页
Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Intern... Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded. 展开更多
关键词 network virtualization virtual network embedding embedding algorithms key future research aspects
下载PDF
Node Ranking Strategy in Virtual Network Embedding: An Overview 被引量:4
7
作者 Shengchen Wu Hao Yin +2 位作者 Haotong Cao Longxiang Yang Hongbo Zhu 《China Communications》 SCIE CSCD 2021年第6期114-136,共23页
Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been w... Network virtualization(NV)is a highprofile way to solve the ossification problem of the nowadays Internet,and be able to support the diversified network naturally.In NV,Virtual Network Embedding(VNE)problem has been widely considered as a crucial issue,which is aimed to embed Virtual Networks(VNs)onto the shared substrate networks(SNs)efficiently.Recently,some VNE approaches have developed Node Ranking strategies to drive and enhance the embedding efficiency.Node Ranking Strategy rank/sort the nodes according to the attributes of the node,including both residual local attributes(CPU,Bandwidth,storage,Etc.)and the global topology attributes(Number of neighborhood Nodes,Delay to other nodes,Etc.).This paper presents an overview of Node Ranking Strategies in Virtual Network Embedding,and possible directions of VNE Node Ranking Strategy. 展开更多
关键词 network virtualization virtual network embedding global topology attribute node ranking
下载PDF
An Exact Virtual Network Embedding Algorithm Based on Integer Linear Programming for Virtual Network Request with Location Constraint 被引量:3
8
作者 Zeheng Yang Yongan Guo 《China Communications》 SCIE CSCD 2016年第8期177-183,共7页
Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in net... Network virtualization is known as a promising technology to tackle the ossification of current Internet and will play an important role in the future network area. Virtual network embedding(VNE) is a key issue in network virtualization. VNE is NP-hard and former VNE algorithms are mostly heuristic in the literature.VNE exact algorithms have been developed in recent years. However, the constraints of exact VNE are only node capacity and link bandwidth.Based on these, this paper presents an exact VNE algorithm, ILP-LC, which is based on Integer Linear Programming(ILP), for embedding virtual network request with location constraints. This novel algorithm is aiming at mapping virtual network request(VNR) successfully as many as possible and consuming less substrate resources.The topology of each VNR is randomly generated by Waxman model. Simulation results show that the proposed ILP-LC algorithm outperforms the typical heuristic algorithms in terms of the VNR acceptance ratio, at least 15%. 展开更多
关键词 network virtualization virtual network embedding exact VNE algorithm integer linear Programming location constraint VNR acceptance ratio
下载PDF
Using Network Embedding to Obtain a Richer and More Stable Network Layout for a Large Scale Bibliometric Network 被引量:3
9
作者 Ting Chen Guopeng Li +1 位作者 Qiping Deng Xiaomei Wang 《Journal of Data and Information Science》 CSCD 2021年第1期154-177,共24页
Purpose: The goal of this study is to explore whether deep learning based embed ded models can provide a better visualization solution for large citation networks. De sign/methodology/approach: Our team compared the v... Purpose: The goal of this study is to explore whether deep learning based embed ded models can provide a better visualization solution for large citation networks. De sign/methodology/approach: Our team compared the visualization approach borrowed from the deep learning community with the well-known bibliometric network visualization for large scale data. 47,294 highly cited papers were visualized by using three network embedding models plus the t-SNE dimensionality reduction technique. Besides, three base maps were created with the same dataset for evaluation purposes. All base maps used the classic Open Ord method with different edge cutting strategies and parameters. Findings: The network embedded maps with t-SNE preserve a very similar global structure to the full edges classic force-directed map, while the maps vary in local structure. Among them, the Node2Vec model has the best overall visualization performance, the local structure has been significantly improved and the maps' layout has very high stability.Research limitations: The computational and time costs of training are very high for network em bedded models to obtain high dimensional latent vector. Only one dimensionality reduction technique was tested. Practical implications: This paper demonstrates that the network embedding models are able to accurately reconstruct the large bibliometric network in the vector space. In the future, apart from network visualization, many classical vector-based machine learning algorithms can be applied to network representations for solving bibliomet ric analysis tasks. Originality/value: This paper provides the first systematic comparison of classical science mapping visualization with network embedding based visualization on a large scale dataset. We showed deep learning based network embedding model with t-SNE can provide a richer,more stable science map. We also designed a practical evaluation method to investigate and compare maps. 展开更多
关键词 SCIENTOMETRICS Visualization Essential science indicators Bibliometric networks network embedding Science mapping
下载PDF
Academic Collaborator Recommendation Based on Attributed Network Embedding 被引量:2
10
作者 Ouxia Du Ya Li 《Journal of Data and Information Science》 CSCD 2022年第1期37-56,共20页
Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator... Purpose:Based on real-world academic data,this study aims to use network embedding technology to mining academic relationships,and investigate the effectiveness of the proposed embedding model on academic collaborator recommendation tasks.Design/methodology/approach:We propose an academic collaborator recommendation model based on attributed network embedding(ACR-ANE),which can get enhanced scholar embedding and take full advantage of the topological structure of the network and multi-type scholar attributes.The non-local neighbors for scholars are defined to capture strong relationships among scholars.A deep auto-encoder is adopted to encode the academic collaboration network structure and scholar attributes into a low-dimensional representation space.Findings:1.The proposed non-local neighbors can better describe the relationships among scholars in the real world than the first-order neighbors.2.It is important to consider the structure of the academic collaboration network and scholar attributes when recommending collaborators for scholars simultaneously.Research limitations:The designed method works for static networks,without taking account of the network dynamics.Practical implications:The designed model is embedded in academic collaboration network structure and scholarly attributes,which can be used to help scholars recommend potential collaborators.Originality/value:Experiments on two real-world scholarly datasets,Aminer and APS,show that our proposed method performs better than other baselines. 展开更多
关键词 Academic relationships mining Collaborator recommendation Attributed network embedding Deep learning
下载PDF
MINE:A Method of Multi-Interaction Heterogeneous Information Network Embedding
11
作者 Dongjie Zhu Yundong Sun +6 位作者 Xiaofang Li Haiwen Du Rongning Qu Pingping Yu Xuefeng Piao Russell Higgs Ning Cao 《Computers, Materials & Continua》 SCIE EI 2020年第6期1343-1356,共14页
Interactivity is the most significant feature of network data,especially in social networks.Existing network embedding methods have achieved remarkable results in learning network structure and node attributes,but do ... Interactivity is the most significant feature of network data,especially in social networks.Existing network embedding methods have achieved remarkable results in learning network structure and node attributes,but do not pay attention to the multi-interaction between nodes,which limits the extraction and mining of potential deep interactions between nodes.To tackle the problem,we propose a method called Multi-Interaction heterogeneous information Network Embedding(MINE).Firstly,we introduced the multi-interactions heterogeneous information network and extracted complex heterogeneous relation sequences by the multi-interaction extraction algorithm.Secondly,we use a well-designed multi-relationship network fusion model based on the attention mechanism to fuse multiple interactional relationships.Finally,applying a multitasking model makes the learned vector contain richer semantic relationships.A large number of practical experiments prove that our proposed method outperforms existing methods on multiple data sets. 展开更多
关键词 network embedding network representation learning interactive network data mining
下载PDF
Identity-Preserving Adversarial Training for Robust Network Embedding
12
作者 岑科廷 沈华伟 +2 位作者 曹婍 徐冰冰 程学旗 《Journal of Computer Science & Technology》 SCIE EI CSCD 2024年第1期177-191,共15页
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network e... Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network embed-ding models are vulnerable to random or adversarial perturbations,which may degrade the performance of network em-bedding when being applied to downstream tasks.To achieve robust network embedding,researchers introduce adversari-al training to regularize the embedding learning process by training on a mixture of adversarial examples and original ex-amples.However,existing methods generate adversarial examples heuristically,failing to guarantee the imperceptibility of generated adversarial examples,and thus limit the power of adversarial training.In this paper,we propose a novel method Identity-Preserving Adversarial Training(IPAT)for network embedding,which generates imperceptible adversarial exam-ples with explicit identity-preserving regularization.We formalize such identity-preserving regularization as a multi-class classification problem where each node represents a class,and we encourage each adversarial example to be discriminated as the class of its original node.Extensive experimental results on real-world datasets demonstrate that our proposed IPAT method significantly improves the robustness of network embedding models and the generalization of the learned node representations on various downstream tasks. 展开更多
关键词 network embedding identity-preserving adversarial training adversarial the example
原文传递
Network Embedding Algorithm for Vulnerability Assessment of Power Transmission Lines Using Integrated Structure and Attribute Information
13
作者 Xianglong Lian Tong Qian +3 位作者 Zepeng Li Xingyu Chen Wenhu Tang Q.H.Wu 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第1期351-360,共10页
In power systems,failures of vulnerable lines can trigger large-scale cascading failures,and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures.Based on a structure a... In power systems,failures of vulnerable lines can trigger large-scale cascading failures,and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures.Based on a structure and attribute network embedding(SANE)algorithm,a novel quantitative vulnerability analysis method is proposed to identify vulnerable lines in this research.First,a two-layered random walk network with topological and electrical properties of transmission lines is established.Subsequently,based on the weighted degree of nodes in the two-layered network,the inter-layer and intra-layer walking transition probabilities are developed to obtain walk sequences.Then,a Word2Vec algorithm is applied to obtain lowdimension vectors representing transmission lines,according to obtained walk sequences for calculating the vulnerability index of transmissions lines.Finally,the proposed method is compared with three widely used methods in two test systems.Results show the network embedding based method is superior to those comparison methods and can provide guidance for identifying vulnerable lines. 展开更多
关键词 network embedding random walk transmission lines vulnerability assessment
原文传递
Relational Topology-based Heterogeneous Network Embedding for Predicting Drug-Target Interactions
14
作者 Linlin Zhang Chunping Ouyang +2 位作者 Fuyu Hu Yongbin Liu Zheng Gao 《Data Intelligence》 EI 2023年第2期475-493,共19页
Predicting interactions between drugs and target proteins has become an essential task in the drug discovery process.Although the method of validation via wet-lab experiments has become available,experimental methods ... Predicting interactions between drugs and target proteins has become an essential task in the drug discovery process.Although the method of validation via wet-lab experiments has become available,experimental methods for drug-target interaction(DTI)identification remain either time consuming or heavily dependent on domain expertise.Therefore,various computational models have been proposed to predict possible interactions between drugs and target proteins.However,most prediction methods do not consider the topological structures characteristics of the relationship.In this paper,we propose a relational topologybased heterogeneous network embedding method to predict drug-target interactions,abbreviated as RTHNE_DTI.We first construct a heterogeneous information network based on the interaction between different types of nodes,to enhance the ability of association discovery by fully considering the topology of the network.Then drug and target protein nodes can be represented by the other types of nodes.According to the different topological structure of the relationship between the nodes,we divide the relationship in the heterogeneous network into two categories and model them separately.Extensive experiments on the realworld drug datasets,RTHNE_DTI produces high efficiency and outperforms other state-of-the-art methods.RTHNE_DTI can be further used to predict the interaction between unknown interaction drug-target pairs. 展开更多
关键词 Link prediction Heterogeneous information network Drug-target interaction network embedding Feature representation
原文传递
Improving Link Prediction Accuracy of Network Embedding Algorithms via Rich Node Attribute Information
15
作者 Weiwei Gu Jinqiang Hou Weiyi Gu 《Journal of Social Computing》 EI 2023年第4期326-336,共11页
Complex networks are widely used to represent an abundance of real-world relations ranging from social networks to brain networks. Inferring missing links or predicting future ones based on the currently observed netw... Complex networks are widely used to represent an abundance of real-world relations ranging from social networks to brain networks. Inferring missing links or predicting future ones based on the currently observed network is known as the link prediction task. Recent network embedding based link prediction algorithms have demonstrated ground-breaking performance on link prediction accuracy. Those algorithms usually apply node attributes as the initial feature input to accelerate the convergence speed during the training process. However, they do not take full advantage of node feature information. In this paper, besides applying feature attributes as the initial input, we make better utilization of node attribute information by building attributable networks and plugging attributable networks into some typical link prediction algorithms and name this algorithm Attributive Graph Enhanced Embedding (AGEE). AGEE is able to automatically learn the weighting trades-off between the structure and the attributive networks. Numerical experiments show that AGEE can improve the link prediction accuracy by around 3% compared with SEAL, Variational Graph AutoEncoder (VGAE), and node2vec. 展开更多
关键词 attributive network link prediction network embedding
原文传递
Binary Program Vulnerability Mining Based on Neural Network
16
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 Vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
下载PDF
Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks 被引量:6
17
作者 Lei Guo Yu-Fei Wen Xin-Hua Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第4期682-696,共15页
Recommender systems as one of the most efficient information filtering techniques have been widely studied in recent years. However, traditional recommender systems only utilize user-item rating matrix for recommendat... Recommender systems as one of the most efficient information filtering techniques have been widely studied in recent years. However, traditional recommender systems only utilize user-item rating matrix for recommendations, and the social connections and item sequential patterns are ignored. But in our real life, we always turn to our friends for recommendations, and often select the items that have similar sequential patterns. In order to overcome these challenges, many studies have taken social connections and sequential information into account to enhance recommender systems. Although these existing studies have achieved good results, most of them regard social influence and sequential information as regularization terms, and the deep structure hidden in social networks and rating patterns has not been fully explored. On the other hand, neural network based embedding methods have shown their power in many recommendation tasks with their ability to extract high-level representations from raw data. Motivated by the above observations, we take the advantage of network embedding techniques and propose an embedding-based recommendation method, which is composed of the embedding model and the collaborative filtering model. Specifically, to exploit the deep structure hidden in social networks and rating patterns, a neural network based embedding model is first pre-trained, where the external user and item representations are extracted. Then, we incorporate these extracted factors into a collaborative filtering model by fusing them with latent factors linearly, where our method not only can leverage the external information to enhance recommendation, but also can exploit the advantage of collaborative filtering techniques. Experimental results on two real-world datasets demonstrate the effectiveness of our proposed method and the importance of these external extracted factors. 展开更多
关键词 social recommendation network embedding matrix factorization item sequential pattern
原文传递
Topology-aware virtual network embedding based on closeness centrality 被引量:5
18
作者 Zihou WANG Yanni HAN +3 位作者 Tao LIN Yuemei XU Song CI Hui TANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第3期446-457,共12页
Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtua... Network virtualization aims to provide a way to overcome ossification of the Internet. However, making efficient use of substrate resources requires effective techniques for embedding virtual networks: mapping virtual nodes and virtual edges onto substrate networks. Previous research has presented several heuristic algorithms, which fail to consider that the attributes of the substrate topology and virtual net- works affect the embedding process. In this paper, for the first time, we introduce complex network centrality analysis into the virtual network embedding, and propose virtual network embedding algorithms based on closeness centrality. Due to considering of the attributes of nodes and edges in the topology, our studies are more reasonable than existing work. In addition, with the guidance of topology quantitative evalua- tion, the proposed network embedding approach largely improves the network utilization efficiency and decreases the embedding complexity. We also investigate our algorithms on real network topologies (e.g., AT&T, DFN) and random network topologies. Experimental results demonstrate the usability and capability of the proposed approach. 展开更多
关键词 network virtualization virtual network embedding complex networks closeness centrality
原文传递
Efficient Algorithm for Energy-Aware Virtual Network Embedding 被引量:4
19
作者 Shuxian Jia Guiyuan Jiang +1 位作者 Peilan He Jigang Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第4期407-414,共8页
Network virtualization is a promising approach for resource management that allows customized Virtual Networks (VNs) to be multiplexed on a shared physical infrastructure. A key function that network virtualization ... Network virtualization is a promising approach for resource management that allows customized Virtual Networks (VNs) to be multiplexed on a shared physical infrastructure. A key function that network virtualization can provide is Virtual Network Embedding (VNE), which maps virtual networks requested by users to a shared substrate network maintained by an Internet service provider. Existing research has worked on this, but has primarily focused on maximizing the revenue of the Internet service provider. In this paper, we consider energy-aware virtual network embedding, which aims at minimizing the energy consumption for embedding virtual networks in a substrate network. In our optimization model, we consider energy consumption of both links and nodes. We propose an efficient heuristic to assign virtual nodes to appropriate substrate nodes based on priority, where existing activated nodes have higher priority for hosting newly arrived virtual nodes. In addition, our proposed algorithm can take advantage of activated links for embedding virtual links so as to minimize total energy consumption. The simulation results show that, for all the cases considered, our algorithm can improve upon previous work by an average of 12.6% on acceptance rate, while the consumed energy can be reduced by 12.34% on average. 展开更多
关键词 virtualization technology virtual network embedding energy efficient optimization algorithm
原文传递
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
20
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部