Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis
暂无分享,去创建一个
[1] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[2] Mohammad Al Hasan,et al. DyLink2Vec: Effective Feature Representation for Link Prediction in Dynamic Networks , 2018, ArXiv.
[3] Conrad Bock,et al. SysML and UML 2 support for activity modeling , 2006, Syst. Eng..
[4] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[5] Edward A. Lee,et al. A model-based design methodology for cyber-physical systems , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[6] Arquimedes Canedo,et al. QUILT: quality inference from living digital twins in IoT-enabled manufacturing systems , 2019, IoTDI.
[7] Palash Goyal,et al. DynamicGEM: A Library for Dynamic Graph Embedding Methods , 2018, ArXiv.
[8] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[9] David He,et al. A PHM Approach to Additive Manufacturing Equipment Health Monitoring, Fault Diagnosis, and Quality Control , 2014, Annual Conference of the PHM Society.
[10] Kurt Mehlhorn,et al. Weisfeiler-Lehman Graph Kernels , 2011, J. Mach. Learn. Res..
[11] Sujit Rokka Chhetri,et al. Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing , 2018, IEEE Transactions on Information Forensics and Security.
[12] Mohammad Abdullah Al Faruque,et al. GAN-Sec: Generative Adversarial Network Modeling for the Security Analysis of Cyber-Physical Production Systems , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] Yann LeCun,et al. Dimensionality Reduction by Learning an Invariant Mapping , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[14] M. A. Faruque. Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .
[15] Jana Fuhrmann,et al. The Engineering Design Process , 2016 .
[16] Mikell P. Groover,et al. Automation, Production Systems, and Computer-Integrated Manufacturing , 1987 .
[17] Palash Goyal,et al. Recommending Teammates with Deep Neural Networks , 2018, HT.
[18] Nitish Talasu,et al. A link prediction based approach for recommendation systems , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[19] Craig A. Knoblock,et al. PDDL-the planning domain definition language , 1998 .
[20] Zhe Gan,et al. Variational Autoencoder for Deep Learning of Images, Labels and Captions , 2016, NIPS.
[21] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[22] Purnamrita Sarkar,et al. Nonparametric Link Prediction in Dynamic Networks , 2012, ICML.
[23] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[24] Yuchung J. Wang,et al. Stochastic Blockmodels for Directed Graphs , 1987 .
[25] Lucas C. Parra,et al. A SURVEY OF CONVOLUTIVE BLIND SOURCE SEPARATION METHODS , 2007 .
[26] Alexander J. Smola,et al. Distributed large-scale natural graph factorization , 2013, WWW.
[27] Mohammad Abdullah Al Faruque,et al. Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[28] Jules White,et al. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .
[29] Manish Pandey,et al. Machine learning and systems for building the next generation of EDA tools , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).
[30] Mohammad Abdullah Al Faruque,et al. Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[31] Johannes Gehrke,et al. SECRET: a scalable linear regression tree algorithm , 2002, KDD.
[32] Joan Bruna,et al. Deep Convolutional Networks on Graph-Structured Data , 2015, ArXiv.
[33] Mohammad Abdullah Al Faruque,et al. Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0 , 2018, J. Hardw. Syst. Secur..
[34] Samuel H. Huang,et al. System health monitoring and prognostics — a review of current paradigms and practices , 2006 .
[35] Alec Yasinsac,et al. Security Challenges of Additive Manufacturing with Metals and Alloys , 2015, Critical Infrastructure Protection.
[36] Palash Goyal,et al. dyngraph2vec: Capturing Network Dynamics using Dynamic Graph Representation Learning , 2018, Knowl. Based Syst..
[37] Kristian Kersting,et al. Learning Continuous-Time Bayesian Networks in Relational Domains: A Non-Parametric Approach , 2016, AAAI.
[38] Kewei Cheng,et al. Streaming Link Prediction on Dynamic Attributed Networks , 2018, WSDM.
[39] Jiafu Wan,et al. A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).
[40] Todd R. Andel,et al. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.
[41] J Elith,et al. A working guide to boosted regression trees. , 2008, The Journal of animal ecology.
[42] Brian Evans,et al. Practical 3D Printers: The Science and Art of 3D Printing , 2012 .
[43] Nektarios Georgios Tsoutsos,et al. Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering , 2017, CPSS@AsiaCCS.
[44] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[45] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[46] Dimitri P. Solomatine,et al. Data-Driven Modelling: Concepts, Approaches and Experiences , 2009 .
[47] T. Mukherjee,et al. A digital twin for rapid qualification of 3D printed metallic components , 2019, Applied Materials Today.
[48] Ulises Cortés,et al. A visual embedding for the unsupervised extraction of abstract semantics , 2015, Cognitive Systems Research.
[49] Carlos Eduardo Pereira,et al. Digital Twin Data Modeling with AutomationML and a Communication Methodology for Data Exchange , 2016 .
[50] Wenyao Xu,et al. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.
[51] Wei Zhang,et al. Building digital twins of 3D printing machines , 2017 .
[52] Joseph C. S. Lai,et al. Noise of Polyphase Electric Motors , 2005 .
[53] Palash Goyal,et al. Embedding Networks with Edge Attributes , 2018, HT.
[54] U. Feige,et al. Spectral Graph Theory , 2015 .
[55] Edward A. Lee. The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.
[56] Nektarios Georgios Tsoutsos,et al. INVITED: ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[57] Palash Goyal,et al. Future Automation Engineering using Structural Graph Convolutional Neural Networks , 2018, ArXiv.
[58] Brian Randell,et al. An Acoustic Side Channel Attack on Enigma , 2015 .
[59] B. Heller,et al. Harmonic field effects in induction machines , 1977 .
[60] Arquimedes Canedo,et al. KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[61] Lior Horesh,et al. Should You Derive, Or Let the Data Drive? An Optimization Framework for Hybrid First-Principles Data-Driven Modeling , 2017, 1711.04374.
[62] Xavier Bresson,et al. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering , 2016, NIPS.
[63] François-Xavier Standaert,et al. Mutual Information Analysis: How, When and Why? , 2009, CHES.
[64] Jon M. Kleinberg,et al. Overview of the 2003 KDD Cup , 2003, SKDD.
[65] Dan Barry,et al. Real-time Sound Source Separation: Azimuth Discrimination and Resynthesis , 2004 .
[66] Arquimedes Canedo,et al. Cyber–Physical Codesign at the Functional Level for Multidomain Automotive Systems , 2017, IEEE Systems Journal.
[67] Stefan Boschert,et al. Digital Twin—The Simulation Aspect , 2016 .
[68] Annika Kangas,et al. Methods based on k-nearest neighbor regression in the prediction of basal area diameter distribution , 1998 .
[69] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[70] Yan Wang,et al. Real-time FDM machine condition monitoring and diagnosis based on acoustic emission and hidden semi-Markov model , 2017 .
[71] Lihui Wang,et al. Adaptive tool-path generation of rapid prototyping for complex product models , 2011 .
[72] Ismail Fidan,et al. Cyber acoustic analysis of additively manufactured objects , 2018 .
[73] Yang Liu,et al. subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs , 2016, ArXiv.
[74] Luca Fumagalli,et al. Flexible Automation and Intelligent Manufacturing , FAIM 2017 , 27-30 June 2017 , Modena , Italy A review of the roles of Digital Twin in CPS-based production systems , 2017 .
[75] Christopher D. Wickens,et al. A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[76] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[77] S. Milz,et al. Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing , 2005, Journal of materials science. Materials in medicine.
[78] Paul D. Franzon,et al. Machine learning in physical design , 2016, 2016 IEEE 25th Conference on Electrical Performance Of Electronic Packaging And Systems (EPEPS).
[79] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[80] Wei Lu,et al. Deep Neural Networks for Learning Graph Representations , 2016, AAAI.
[81] Jeremy Straub,et al. Identifying positioning-based attacks against 3D printed objects and the 3D printing process , 2017, Defense + Security.
[82] Sergios Theodoridis,et al. Introduction to Pattern Recognition: A Matlab Approach , 2010 .
[83] Samuel H. Huang,et al. System health monitoring and prognostics — a review of current paradigms and practices , 2006 .
[84] Mohammad Abdullah Al Faruque. Digital Twin of Manufacturing Systems , 2017 .
[85] Bruce M. McMillin,et al. Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..
[86] Yoram Singer,et al. Logistic Regression, AdaBoost and Bregman Distances , 2000, Machine Learning.
[87] Jia Liu,et al. Online Real-Time Quality Monitoring in Additive Manufacturing Processes Using Heterogeneous Sensors , 2015 .
[88] D. Wall,et al. Intellectual property crime and the Internet , 2009 .
[89] Max Welling,et al. Variational Graph Auto-Encoders , 2016, ArXiv.
[90] Edward H. Glaessgen,et al. The Digital Twin Paradigm for Future NASA and U.S. Air Force Vehicles , 2012 .
[91] Linton C. Freeman,et al. Carnegie Mellon: Journal of Social Structure: Visualizing Social Networks Visualizing Social Networks , 2022 .
[92] Jian Pei,et al. TIMERS: Error-Bounded SVD Restart on Dynamic Networks , 2017, AAAI.
[93] Jian Pei,et al. Asymmetric Transitivity Preserving Graph Embedding , 2016, KDD.
[94] Jay Lee,et al. Introduction to cyber manufacturing , 2016 .
[95] Qiongkai Xu,et al. GraRep: Learning Graph Representations with Global Structural Information , 2015, CIKM.
[96] Jay Lee,et al. Recent advances and trends in predictive manufacturing systems in big data environment , 2013 .
[97] Daniel R. Figueiredo,et al. struc2vec: Learning Node Representations from Structural Identity , 2017, KDD.
[98] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[99] Timothy R. Holbrook,et al. Digital Patent Infringement in an Era of 3D Printing , 2014 .
[100] Jaime A. Camelio,et al. Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .
[101] Dave Thomas,et al. The AADL behaviour annex -- experiments and roadmap , 2007, 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007).
[102] Yan Wang,et al. In situ monitoring of FDM machine condition via acoustic emission , 2015 .
[103] Michael W. Grieves,et al. Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems , 2017 .
[104] Li Zhu,et al. Key performance indicators for manufacturing operations management in the process industry , 2017, 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).
[105] Mohammad Abdullah Al Faruque,et al. Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing , 2017, IEEE Des. Test.
[106] Anton J. Enright,et al. Network visualization and analysis of gene expression data using BioLayout Express3D , 2009, Nature Protocols.
[107] Sandeep Neema,et al. OpenMETA: A Model- and Component-Based Design Tool Chain for Cyber-Physical Systems , 2014, FPS@ETAPS.
[108] Rubaiat Habib Kazi,et al. DreamSketch: Early Stage 3D Design Explorations with Sketching and Generative Design , 2017, UIST.
[109] Nektarios Georgios Tsoutsos,et al. Manufacturing and Security Challenges in 3D Printing , 2016 .
[110] Anku Adhikari,et al. Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets , 2016, CCS.
[111] Yu Wang,et al. Graph regularized nonnegative matrix factorization for temporal link prediction in dynamic networks , 2018 .
[112] S. Shevchik,et al. Acoustic emission for in situ quality monitoring in additive manufacturing using spectral convolutional neural networks , 2017 .
[113] J. S. Zuback,et al. Building blocks for a digital twin of additive manufacturing , 2017 .
[114] Gerd Heber,et al. On the Effects of Modeling As-Manufactured Geometry: Toward Digital Twin , 2014 .
[115] Alan V. Oppenheim,et al. Discrete-time Signal Processing. Vol.2 , 2001 .
[116] Zhenyu Kong,et al. An online sparse estimation-based classification approach for real-time monitoring in advanced manufacturing processes from heterogeneous sensor data , 2016 .
[117] Frederica Darema,et al. Dynamic Data Driven Applications Systems: A New Paradigm for Application Simulations and Measurements , 2004, International Conference on Computational Science.
[118] Yuan He,et al. From Surveillance to Digital Twin: Challenges and Recent Advances of Signal Processing for Industrial Internet of Things , 2018, IEEE Signal Processing Magazine.
[119] Arquimedes Canedo,et al. Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[120] P. J. Lawrenson,et al. Electromagnetic damping in stepping motors , 1975 .
[121] Wenwu Zhu,et al. Structural Deep Network Embedding , 2016, KDD.
[122] Mohammad Abdullah Al Faruque,et al. Cross-domain security of cyber-physical systems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[123] Palash Goyal,et al. Graph Embedding Techniques, Applications, and Performance: A Survey , 2017, Knowl. Based Syst..
[124] Kilian Wasmer,et al. In Situ and Real-Time Monitoring of Powder-Bed AM by Combining Acoustic Emission and Artificial Intelligence , 2017 .
[125] Xavier Bresson,et al. CayleyNets: Graph Convolutional Neural Networks With Complex Rational Spectral Filters , 2017, IEEE Transactions on Signal Processing.
[126] Mikhail Belkin,et al. Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.
[127] Roland Rosen,et al. About The Importance of Autonomy and Digital Twins for the Future of Manufacturing , 2015 .
[128] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[129] Abdulmotaleb El Saddik,et al. C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems , 2017, IEEE Access.
[130] M. Brand,et al. Fast low-rank modifications of the thin singular value decomposition , 2006 .
[131] Joonseok Lee,et al. N-GCN: Multi-scale Graph Convolution for Semi-supervised Node Classification , 2018, UAI.
[132] Simone Paolo Ponzetto,et al. Knowledge-based graph document modeling , 2014, WSDM.
[133] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[134] Guofei Jiang,et al. Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.
[135] Edward A. Lee,et al. Ptolemy: A Framework for Simulating and Prototyping Heterogenous Systems , 2001, Int. J. Comput. Simul..
[136] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[137] László Monostori,et al. ScienceDirect Variety Management in Manufacturing . Proceedings of the 47 th CIRP Conference on Manufacturing Systems Cyber-physical production systems : Roots , expectations and R & D challenges , 2014 .
[138] Yuval Elovici,et al. Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing , 2017, ArXiv.
[139] Dieter Roller,et al. Concept Development of a Sensor Array for 3D Printer , 2016 .
[140] Eric Feron,et al. Foundations of Intelligent Additive Manufacturing , 2017, ArXiv.
[141] Andreas W. Kempa-Liehr,et al. Distributed and parallel time series feature extraction for industrial big data applications , 2016, ArXiv.
[142] Ying Peng,et al. A prognosis method using age-dependent hidden semi-Markov model for equipment health prediction , 2011 .
[143] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[144] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[145] S. Michael Spottswood,et al. Reengineering Aircraft Structural Life Prediction Using a Digital Twin , 2011 .
[146] Jure Leskovec,et al. Inductive Representation Learning on Large Graphs , 2017, NIPS.
[147] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[148] Mohammad Abdullah Al Faruque,et al. Design Automation Using Structural Graph Convolutional Neural Networks , 2019, Design Automation of Cyber-Physical Systems.
[149] Yao Zhang,et al. Sub2Vec: Feature Learning for Subgraphs , 2018, PAKDD.
[150] Petr V. Chetyrbok,et al. The IIoT/IoT device control model based on narrow-band IoT (NB-IoT) , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[151] Reinhard Schneider,et al. A survey of visualization tools for biological network analysis , 2008, BioData Mining.
[152] L. Di Angelo,et al. Surface quality prediction in FDM additive manufacturing , 2017 .
[153] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[154] Alberto Boschetto,et al. Accuracy prediction in fused deposition modeling , 2014 .
[155] Philip Brisk,et al. Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines , 2019, NDSS.
[156] Yueting Zhuang,et al. Dynamic Network Embedding by Modeling Triadic Closure Process , 2018, AAAI.
[157] Arquimedes Canedo,et al. Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems , 2017, ACM Trans. Cyber Phys. Syst..
[158] Scott D. Applegate. The dawn of Kinetic Cyber , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[159] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[160] Yongbin Zhou,et al. Multi-Channel Fusion Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[161] Ron Jamieson,et al. Direct slicing of CAD models for rapid prototyping , 1995 .
[162] Tamara G. Kolda,et al. Temporal Link Prediction Using Matrix and Tensor Factorizations , 2010, TKDD.
[163] Alberto Boschetto,et al. Integration of FDM surface quality modeling with process design , 2016 .
[164] Edward M. Kraft,et al. The Air Force Digital Thread/Digital Twin - Life Cycle Integration and Use of Computational and Experimental Knowledge , 2016 .
[165] Mohammad Abdullah Al Faruque,et al. Fix the leak! an information leakage aware secured cyber-physical manufacturing system , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[166] Joan Bruna,et al. Spectral Networks and Locally Connected Networks on Graphs , 2013, ICLR.
[167] Z Q Liu,et al. Scale space approach to directional analysis of images. , 1991, Applied optics.
[168] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[169] Takashi Kenjo,et al. Stepping Motors and Their Microprocessor Controls , 1984 .
[170] Fei Chen,et al. Security features embedded in computer aided design (CAD) solid models for additive manufacturing , 2017 .
[171] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[172] R.G.D. Williams,et al. A simple model to calculate the stator radial vibration of a hybrid stepping motor , 1993, Conference Record of the 1993 IEEE Industry Applications Conference Twenty-Eighth IAS Annual Meeting.
[173] Mikhail Belkin,et al. Laplacian Eigenmaps for Dimensionality Reduction and Data Representation , 2003, Neural Computation.
[174] Jens Lehmann,et al. DBpedia: A Nucleus for a Web of Open Data , 2007, ISWC/ASWC.
[175] L. Sturm,et al. CYBER-PHYSICAL VUNERABILITIES IN ADDITIVE MANUFACTURING SYSTEMS , 2014 .
[176] James A. Anderson,et al. Neurocomputing: Foundations of Research , 1988 .
[177] Weiyi Qi. IC Design Analysis, Optimization and Reuse via Machine Learning. , 2017 .
[178] Leonidas J. Guibas,et al. SyncSpecCNN: Synchronized Spectral CNN for 3D Shape Segmentation , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[179] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[180] Miroslav Pajic,et al. Design methodologies for securing cyber-physical systems , 2015, 2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[181] Ran Jin,et al. Functional Quantitative and Qualitative Models for Quality Modeling in a Fused Deposition Modeling Process , 2018, IEEE Transactions on Automation Science and Engineering.
[182] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[183] Christos Faloutsos,et al. Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.
[184] Frédo Durand,et al. The visual microphone , 2014, ACM Trans. Graph..
[185] Yan Liu,et al. DynGEM: Deep Embedding Method for Dynamic Graphs , 2018, ArXiv.