Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    Position-Aware and Subgraph Enhanced Dynamic Graph Contrastive Learning on Discrete-Time Dynamic Graph

    Jian Feng*, Tian Liu, Cailing Du

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2895-2909, 2024, DOI:10.32604/cmc.2024.056434 - 18 November 2024

    Abstract Unsupervised learning methods such as graph contrastive learning have been used for dynamic graph representation learning to eliminate the dependence of labels. However, existing studies neglect positional information when learning discrete snapshots, resulting in insufficient network topology learning. At the same time, due to the lack of appropriate data augmentation methods, it is difficult to capture the evolving patterns of the network effectively. To address the above problems, a position-aware and subgraph enhanced dynamic graph contrastive learning method is proposed for discrete-time dynamic graphs. Firstly, the global snapshot is built based on the historical snapshots… More >

  • Open Access

    ARTICLE

    PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data

    Gang Long, Zhaoxin Zhang*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 327-343, 2024, DOI:10.32604/cmc.2024.054558 - 15 October 2024

    Abstract Network anomaly detection plays a vital role in safeguarding network security. However, the existing network anomaly detection task is typically based on the one-class zero-positive scenario. This approach is susceptible to overfitting during the training process due to discrepancies in data distribution between the training set and the test set. This phenomenon is known as prediction drift. Additionally, the rarity of anomaly data, often masked by normal data, further complicates network anomaly detection. To address these challenges, we propose the PUNet network, which ingeniously combines the strengths of traditional machine learning and deep learning techniques… More >

  • Open Access

    ARTICLE

    Masked Autoencoders as Single Object Tracking Learners

    Chunjuan Bo1,*, Xin Chen2, Junxing Zhang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1105-1122, 2024, DOI:10.32604/cmc.2024.052329 - 18 July 2024

    Abstract Significant advancements have been witnessed in visual tracking applications leveraging ViT in recent years, mainly due to the formidable modeling capabilities of Vision Transformer (ViT). However, the strong performance of such trackers heavily relies on ViT models pretrained for long periods, limiting more flexible model designs for tracking tasks. To address this issue, we propose an efficient unsupervised ViT pretraining method for the tracking task based on masked autoencoders, called TrackMAE. During pretraining, we employ two shared-parameter ViTs, serving as the appearance encoder and motion encoder, respectively. The appearance encoder encodes randomly masked image data,… More >

  • Open Access

    ARTICLE

    HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning

    Zhihui Song, Jinchen Xu, Kewei Li, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4573-4601, 2024, DOI:10.32604/cmc.2024.049310 - 20 June 2024

    Abstract Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations. However, due to limitations in code representation and neural network design, the validity and practicality of the model still need to be improved. Additionally, due to differences in programming languages, most methods lack cross-language detection generality. To address these issues, in this paper, we analyze the shortcomings of previous code representations and neural networks. We propose a novel hierarchical code representation that combines Concrete Syntax Trees (CST)… More >

  • Open Access

    ARTICLE

    GNN Representation Learning and Multi-Objective Variable Neighborhood Search Algorithm for Wind Farm Layout Optimization

    Yingchao Li1,*, Jianbin Wang1, Haibin Wang2

    Energy Engineering, Vol.121, No.4, pp. 1049-1065, 2024, DOI:10.32604/ee.2023.045228 - 26 March 2024

    Abstract With the increasing demand for electrical services, wind farm layout optimization has been one of the biggest challenges that we have to deal with. Despite the promising performance of the heuristic algorithm on the route network design problem, the expressive capability and search performance of the algorithm on multi-objective problems remain unexplored. In this paper, the wind farm layout optimization problem is defined. Then, a multi-objective algorithm based on Graph Neural Network (GNN) and Variable Neighborhood Search (VNS) algorithm is proposed. GNN provides the basis representations for the following search algorithm so that the expressiveness… More >

  • Open Access

    ARTICLE

    Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism

    Lanze Zhang, Yijun Gu*, Jingjie Peng

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1701-1731, 2024, DOI:10.32604/cmes.2023.045129 - 29 January 2024

    Abstract Graph Neural Networks (GNNs) play a significant role in tasks related to homophilic graphs. Traditional GNNs, based on the assumption of homophily, employ low-pass filters for neighboring nodes to achieve information aggregation and embedding. However, in heterophilic graphs, nodes from different categories often establish connections, while nodes of the same category are located further apart in the graph topology. This characteristic poses challenges to traditional GNNs, leading to issues of “distant node modeling deficiency” and “failure of the homophily assumption”. In response, this paper introduces the Spatial-Frequency domain Adaptive Heterophilic Graph Neural Networks (SFA-HGNN), which… More >

  • Open Access

    ARTICLE

    LC-NPLA: Label and Community Information-Based Network Presentation Learning Algorithm

    Shihu Liu, Chunsheng Yang*, Yingjie Liu

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 203-223, 2023, DOI:10.32604/iasc.2023.040818 - 27 February 2024

    Abstract Many network presentation learning algorithms (NPLA) have originated from the process of the random walk between nodes in recent years. Despite these algorithms can obtain great embedding results, there may be also some limitations. For instance, only the structural information of nodes is considered when these kinds of algorithms are constructed. Aiming at this issue, a label and community information-based network presentation learning algorithm (LC-NPLA) is proposed in this paper. First of all, by using the community information and the label information of nodes, the first-order neighbors of nodes are reconstructed. In the next, the More >

  • Open Access

    REVIEW

    Heterogeneous Network Embedding: A Survey

    Sufen Zhao1,2, Rong Peng1,*, Po Hu2, Liansheng Tan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 83-130, 2023, DOI:10.32604/cmes.2023.024781 - 23 April 2023

    Abstract Real-world complex networks are inherently heterogeneous; they have different types of nodes, attributes, and relationships. In recent years, various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks (HINs) into low-dimensional embeddings; this task is called heterogeneous network embedding (HNE). Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification, recommender systems, and information retrieval. Here, we provide a comprehensive survey of key advancements in the area of HNE. First, we define an encoder-decoder-based HNE model taxonomy. Then, we systematically More > Graphic Abstract

    Heterogeneous Network Embedding: A Survey

  • Open Access

    ARTICLE

    Community Discovery Algorithm Based on Multi-Relationship Embedding

    Dongming Chen, Mingshuo Nie, Jie Wang, Dongqi Wang*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2809-2820, 2023, DOI:10.32604/csse.2023.035494 - 03 April 2023

    Abstract Complex systems in the real world often can be modeled as network structures, and community discovery algorithms for complex networks enable researchers to understand the internal structure and implicit information of networks. Existing community discovery algorithms are usually designed for single-layer networks or single-interaction relationships and do not consider the attribute information of nodes. However, many real-world networks consist of multiple types of nodes and edges, and there may be rich semantic information on nodes and edges. The methods for single-layer networks cannot effectively tackle multi-layer information, multi-relationship information, and attribute information. This paper proposes… More >

  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694 - 31 March 2023

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific… More >

Displaying 1-10 on page 1 of 21. Per Page