Computer Science ›› 2018, Vol. 45 ›› Issue (7): 38-41, 77.doi: 10.11896/j.issn.1002-137X.2018.07.006

• CCF Big Data 2017 • Previous Articles     Next Articles

Network Representation Model Based on Multi-architectures and Text Fusion

LI Jia-yi1,ZHAO Yu1,WANG Li2   

  1. College of Information and Computer,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China1;
    College of Data Science,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China2
  • Received:2017-07-22 Online:2018-07-30 Published:2018-07-30

Abstract: Network representation obtains the vector representations of nodes by deeply learning network structure,and mines the potential information on the network,which is an important method of reducing dimension in social computing.As for TADW,which is a network representation method based on matrix decomposition and combining text and structure,this paper first analyzed and discussed the influence of the location of text attributes matrix on network representation.Then,it proposed a social network representation method that incorporates relationship structure,interaction structure and textual attributes.Experimental results on multiple datasets show that the proposed method outperforms other classical network representation methods in classification tasks.

Key words: Social network, Representation learning, Multi-network structures, Matrix factorization

CLC Number: 

  • TP181
[1]COYAL A,BONCHI F,LAKSHMANAN L.Learning influence probabilities in social networks[C]∥ACM International Conference on Web Search & Data Mining.ACM,2010:241-250.
[2]CRANMER S,DESMARAIS B.Inferential Network Analysiswith Exponential Random Graph Models[J].Political Analysis,2011,19(1):66-86.
[3]FAN W.Graph pattern matching revised for social network analysis[C]∥International Conference on Database Theory.ACM,2012:8-21.
[4]MIKOLOV T,SUTSKEVER I,CHEN K,et al.Distributed Rep-resentations of Words and Phrases and their Compositiona-lity[J].Advances in Neural Information Processing Systems,2013,26:3111-3119.
[5]KUANG L W,HAO F,YANG L,et al.A Tensor-Based Approach for Big Data Representation and Dimensionality Reduction[J].IEEE Transactions on Emerging Topics in Computing,2017,2(3):280-291.
[6]CUNNINGHAM J,YU B.Dimensionality reduction for large-scale neural recordings[J].Nature Neuroscience,2014,17(11):1500-1509.
[7]MEI Q Z,CAI D,ZHANG D,et al.Topic modeling with net-work regularizations[C]∥Proceedings of the 17th International Conference on World Wide Web.2008:101-110.
[8]PEROZZI B,AL-RFOU’ R,SKIENA S.DeepWalk:online lear-ning of social representations[C]∥Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Disco-very and Data Mining.2014:701-710.
[9]TANG J,QU M,WANG M,et al.LINE:Large-scale Information Network Embedding[C]∥Proceedings of the 24th International Conference on World Wide Web.2015:1067-1077.
[10]GROVER A,LESKOVEC J.node2vec:Scalable Feature Lear-ning for Networks[C]∥Proceedings of International Conference on Knowledge Discovery & Data Mining(KDD).2016:855-864.
[11]TU C C,LIU H,LIU Z Y,et al.CANE:Context-Aware Network Embedding for Relation Modeling[C]∥Meeting of the Association for Computational Linguistics.2017:1722-1731.
[12]PAN S R,WU J,ZHU X Q,et al.Tri-Party Deep Network Representation[C]∥Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence.2016:1895-1901.
[13]HUANG X,LI J D,HU X.Label Informed Attributed Network Embedding[C]∥Proceedings of the Tenth ACM International Conference on Web Search and Data Mining.2017:731-739.
[14]YANG C,LIU Z Y,ZHAO D L,et al.Network Representation Learning with Rich Text Information[C]∥International Conference on Artificial Intelligence.AAAI Press,2015:2111-2117.
[15]NATARAJAN N,DHILLON I.Inductive matrix completion for predicting gene-disease associations[J].Bioinformatics,2014,30(12):60-68.
[16]HOU C P,NIE F P,ZHANG C S,et al.Multiple rank multi-li-near SVM for matrix data classification[J].Pattern Recognition,2014,47(1):454-469.
[1] SUN Yong-yue, LI Hong-yan, ZHANG Jin-bo. RAISE:Efficient Influence Cost Minimizing Algorithm in Social Network [J]. Computer Science, 2019, 46(9): 59-65.
[2] CHEN Xiao-jun, XIANG Yang. STransH:A Revised Translation-based Model for Knowledge Representation [J]. Computer Science, 2019, 46(9): 184-189.
[3] LIU Xiao-jie, LV Xiao-qiang, WANG Xiao-ling, ZHANG Wei, ZHAO An. Mining User Interests on Twitter Using Wikipedia Category Graph [J]. Computer Science, 2019, 46(9): 79-84.
[4] ZHANG Zheng, WANG Hong-zhi, DING Xiao-ou, LI Jian-zhong, GAO Hong. Identification of Same User in Social Networks [J]. Computer Science, 2019, 46(9): 93-98.
[5] KANG Lin-yao, TANG Bing, XIA Yan-min, ZHANG Li. GPU-accelerated Non-negative Matrix Factorization-based Parallel Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2019, 46(8): 106-110.
[6] SHI Jun-ling,WANG Xing-wei,HUANG Min. Content-centric Routing Scheme in Vehicular Social Networks [J]. Computer Science, 2019, 46(7): 50-55.
[7] LIU Chang-yun,YANG Yu-di,ZHOU Li-hua,ZHAO Li-hong. Discovering Popular Social Location with Time Label [J]. Computer Science, 2019, 46(7): 186-194.
[8] SHI Xiao-ling, CHEN Zhi, YANG Li-gong, SHEN Wei. Matrix Factorization Recommendation Algorithm Based on Adaptive Weighted Samples [J]. Computer Science, 2019, 46(6A): 488-492.
[9] HE Xiao-wen, HU Yi-fei, WANG Hai-ping, CHEN Mo. Online Learning Nonnegative Matrix Factorization [J]. Computer Science, 2019, 46(6A): 473-477.
[10] HUANG Meng-ting, ZHANG Ling, JIANG Wen-chao. Multi-type Relational Data Co-clustering Approach Based on Manifold Regularization [J]. Computer Science, 2019, 46(6): 64-68.
[11] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
[12] YUAN De-yu, GAO Jian, YE Meng-xi, WANG Xiao-juan,. Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network [J]. Computer Science, 2019, 46(5): 129-134.
[13] LI Hong-mei, DIAO Xing-chun, CAO Jian-jun, FENG Qin, ZHANG Lei. Tag-aware Recommendation Method with Implicit Feedback [J]. Computer Science, 2019, 46(4): 36-43.
[14] HUANG Jian-yi, LI Jian-jiang, WANG Zheng, FANG Ming-zhe. Single-Pass Short Text Clustering Based on Context Similarity Matrix [J]. Computer Science, 2019, 46(4): 50-56.
[15] HAN Zhong-ming, ZHENG Chen-ye, DUAN Da-gao, DONG Jian. Associated Users Mining Algorithm Based on Multi-information Fusion Representation Learning [J]. Computer Science, 2019, 46(4): 77-82.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .