Sparse network embedding for community detection and sign prediction in signed social networks
暂无分享,去创建一个
Hong Wang | Xiaomei Yu | Weihua Yuan | Baofang Hu | Tianwen He | Hong Wang | Xiaomei Yu | Baofang Hu | Weihua Yuan | Tianwen He
[1] J. Davis. Clustering and Structural Balance in Graphs , 1967 .
[2] S. Shen-Orr,et al. Network motifs: simple building blocks of complex networks. , 2002, Science.
[3] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[4] Nitin Chiluka,et al. Leveraging trust and distrust for sybil-tolerant voting in online social media , 2012, PSOSM '12.
[5] Pablo Jensen,et al. Analysis of community structure in networks of correlated data. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Luo Chao,et al. Controllability of Boolean control networks under asynchronous stochastic update with time delay , 2016 .
[7] Wenwu Zhu,et al. Structural Deep Network Embedding , 2016, KDD.
[8] Sahin Albayrak,et al. Spectral Analysis of Signed Graphs for Clustering, Prediction and Visualization , 2010, SDM.
[9] Lin Xiao,et al. Dual Averaging Methods for Regularized Stochastic Learning and Online Optimization , 2009, J. Mach. Learn. Res..
[10] H. Kitano,et al. A comprehensive pathway map of epidermal growth factor receptor signaling , 2005, Molecular systems biology.
[11] Yukiko Matsuoka,et al. Molecular Interaction Map of a Macrophage , 2004 .
[12] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[13] Hong Wang,et al. Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments , 2016, Int. J. Ad Hoc Ubiquitous Comput..
[14] David B. Skillicorn,et al. Spectral Embedding of Signed Networks , 2015, SDM.
[15] Nagarajan Natarajan,et al. Prediction and clustering in signed networks: a local to global perspective , 2013, J. Mach. Learn. Res..
[16] Kan-Jian Zhang,et al. Optimal control of switching time in switched stochastic systems with multi-switching times and different costs , 2017, Int. J. Control.
[17] F. Radicchi,et al. Benchmark graphs for testing community detection algorithms. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] S. Shen-Orr,et al. Network motifs in the transcriptional regulation network of Escherichia coli , 2002, Nature Genetics.
[19] Xiangnan He,et al. Attributed Social Network Embedding , 2017, IEEE Transactions on Knowledge and Data Engineering.
[20] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[21] Hong Liu,et al. Social recommendation model combining trust propagation and sequential behaviors , 2015, Applied Intelligence.
[22] Hong Liu,et al. A cooperative coevolutionary biogeography-based optimizer , 2015, Applied Intelligence.
[23] Jin Li,et al. Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.
[24] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[25] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[26] Jure Leskovec,et al. Signed networks in social media , 2010, CHI.
[27] Hong Liu,et al. Model and algorithm for heterogeneous scheduling integrated with energy-efficiency awareness , 2016 .
[28] Omer Levy,et al. Improving Distributional Similarity with Lessons Learned from Word Embeddings , 2015, TACL.
[29] Yang Xiang,et al. SNE: Signed Network Embedding , 2017, PAKDD.
[30] Omer Levy,et al. Neural Word Embedding as Implicit Matrix Factorization , 2014, NIPS.
[31] Fang Wu,et al. Finding communities in linear time: a physics approach , 2003, ArXiv.
[32] F. Heider. Attitudes and cognitive organization. , 1946, The Journal of psychology.
[33] Charu C. Aggarwal,et al. Signed Network Embedding in Social Media , 2017, SDM.
[34] K. E. Read,et al. Cultures of the Central Highlands, New Guinea , 1954, Southwestern Journal of Anthropology.
[35] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[36] H. Brendan McMahan,et al. Follow-the-Regularized-Leader and Mirror Descent: Equivalence Theorems and L1 Regularization , 2011, AISTATS.
[37] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[38] Jure Leskovec,et al. Predicting positive and negative links in online social networks , 2010, WWW '10.