Computer Science ›› 2024, Vol. 51 ›› Issue (10): 218-226.doi: 10.11896/jsjkx.230900145

• Database & Big Data & Data Science • Previous Articles     Next Articles

Risk Assessment Model for Industrial Chain Based on Neighbor Sampling and GraphAttention Mechanism

SUN Pengzhao1, BI Kejun2, TANG Chao3, LI Dongfen4, YING Shi5, WANG Ruijin1   

  1. 1 School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
    2 School of Computer Science,Sichuan University,Chengdu 610065,China
    3 Sichuan Changhong Electronic Holding Group Co.Ltd,Mianyang,Sichuan 621000,China
    4 College of Computer Science and Cyber Security,Chengdu University of Technology,Chengdu 610059,China
    5 School of Computer Science,Wuhan University,Wuhan 430072,China
  • Received:2023-09-26 Revised:2024-03-08 Online:2024-10-15 Published:2024-10-11
  • About author:SUN Pengzhao,born in 1999,postgra-duate,is a member of CCF(No.67770G).His main research interests include graph neural network and artificial intelligence.
    WANG Ruijin,born in 1980,Ph.D,associate professor,is a member of CCF(No.22983S).Hismain research intere-sts include edge computing,artificial intelligence and information security.
  • Supported by:
    National Key R&D Program of China(2022YFB3304300,2022YFB3304303).

Abstract: Risk assessment is an important way to improve the resilience of the industrial chain and also an effective method to reduce the instability of the industrial chain.However,existing research on risk assessment is based on supply chain structure and neglects other factors,which can not accurately depict the correlation between upstream and downstream nodes in the industrial chain,resulting in biased evaluation results.In response to the above issues,considering the interconnected nature of various nodes within the industry chain,diverse risk situations,and the existence of risk transmission,this paper proposes an industry chain risk assessment model based on graph attention mechanism and neighbor sampling(GANS).Firstly,a heterogeneous graph of the industrial chain is constructed,using “product-company” and “product-product” to depict the correlation between nodes in the industrial chain,and financial data and other data features are extracted from the industrial chain as nodes' data features.Se-condly,a company relationship graph generation module based on meta paths and company investment and financing association rules is proposed to achieve efficient transformation of company node relationships and efficient learning of structural features in the industrial chain.Next,an industry chain risk assessment module based on neighbor sampling and graph attention mechanism is designed for various generated company graphs.The features of node neighbors are randomly sampled and aggregated,and attention mechanism is used to adaptively aggregate node features based on multiple company graphs.Through the classifier,node-level risk assessment is realized.Finally,risk assessment of the industrial chain is conducted based on the risk level and structural features of nodes.Experiments show that GANS outperforms existing models in terms of accuracy and F1 scores on real indu-strial chain datasets.These results demonstrate the accuracy and effectiveness of GANS in implementing industrial chain risk assessment.

Key words: Industry chain, Risk assessment, Heterogeneous graph, Neighbourhood sampling, Graph attention mechanism

CLC Number: 

  • TP391
[1]ZHAO Z Y,TIAN Y X,ZILLANTE G.Modeling and evaluationof the wind power industry chain:A China study[J].Renewable and Sustainable Energy Reviews,2014,31:397-406.
[2]LIU J,DU Z,MA L,et al.Identification and assessment of subway construction risk:an integration of AHP and experts gra-ding method[J].Advances in Civil Engineering,2021,2021:1-18.
[3]SAFAVIAN S R,LANDGREBE D.A survey of decision tree classifier methodology[J].IEEE Transactions on Systems,Man,Cnd cybernetics,1991,21(3):660-674.
[4]XU X.Risk factor analysis combined with deep learning in the risk assessment of overseas investment of enterprises[J].Plos One,2020,15(10):e0239635.
[5]SHARMA S K,BHAT A.Supply Chain Risk Assessment Tools and Techniques in the Automobile Industry:A Survey.[J].IUP Journal of Supply Chain Management,2014,11(1):67-76.
[6]TUMMALA R,SCHOENHERR T.Assessing and managingrisks using the supply chain risk management process(SCRMP)[J].Supply Chain Management:An International Journal,2011,16(6):474-483.
[7]ABDELGAWAD M,FAYEK A R.Fuzzy reliability analyzer:Quantitative assessment of risk events in the construction industry using fuzzy fault-tree analysis[J].Journal of Construction Engineering and Management,2011,137(4):294-302.
[8]MARKMANN C,DARKOW I L,VON DER GRACHT H.ADelphi-based risk analysis Identifying and assessing future challenges for supply chain security in a multi-stakeholder environment[J].Technological Forecasting and Social Change,2013,80(9):1815-1833.
[9]DONG Q,COOPER O.An orders-of-magnitude AHP supplychain risk assessment framework[J].International Journal of Production Economics,2016,182:144-156.
[10]ZHANG D,TANG Y,YAN X.Supply chain risk management of badminton supplies company using decision tree model assisted by fuzzy comprehensive evaluation[J].Expert Systems,2024,41(5):e13275.
[11]DELERIS L A,ERHUN F.Risk management in supply net-works using Monte-Carlo simulation[C]//Proceedings of the Winter Simulation Conference,2005.IEEE,2005.
[12]ZHANG L,HU H,ZHANG D.A credit risk assessment model based on SVM for small and medium enterprises in supply chain finance[J].Financial Innovation,2015,1(1):1-21.
[13]LU S.Enterprise supply chain risk assessment based on im-proved neural network algorithm and machine learning[J].Journal of Intelligent & Fuzzy Systems,2021,40(4):7013-7024.
[14]DUNDULIENE· I,ALZBUTAS R,BALTRUŠONE· K.Traderisk identification and prediction using experts' knowledge and machine learning[C]//2021 IEEE International Conference on Technology and Entrepreneurship(ICTE).IEEE,2021:1-5.
[15]WANG J,LIU S,SU J.Identifying vulnerable nodes in supply chain based on the risk transmission model[C]//2017 6th International Conference on Industrial Technology and Management(ICITM).IEEE,2017:1-5.
[16]HO W,ZHENG T,YILDIZ H,et al.Supply chain risk management:a literature review[J].International Journal of Production Research,2015,53(16):5031-5069.
[17]HE M,JI H,WANG Q,et al.Big data fueled process manage-ment of supply risks:sensing,prediction,evaluation and mitigation[C]//Proceedings of the Winter Simulation Conference 2014.IEEE,2014:1005-1013.
[18]GORI M,MONFARDINI G,SCARSELLI F.A new model for learning in graph domains[C]//Proceedings of the International Joint Conference on Neural Networks,2005.IEEE,2005:729-734.
[19]BRUNA J,ZAREMBA W,SZLAM A,et al.Spectral networks and locally connected networks on graphs[J].arXiv:1312.6203,2013.
[20]HENAFF M,BRUNA J,LECUN Y.Deep Convolutional Net-works on Graph-Structured Data[J].arXiv:1506.05163,2015.
[21]KIPF T N,WELLING M.Semi-supervised classification withgraph convolutional networks[J].arXiv:1609.02907,2016.
[22]DUVENAUD D,MACLAURIN D,AGUILERA-IPARRAGUIRRE J,et al.Convolutional Networks on Graphs for Learning Molecular Fingerprints[J].Advances in Neural Information Processing Systems,2015,28:2224-2232.
[23]ATWOOD J,TOWSLEY D.Diffusion-Convolutional NeuralNetworks[J].Advances in Neural Information Processing Systems,2016,9:2001-2009.
[24]HAMILTON W,YING Z,LESKOVEC J.Inductive representation learning on large graphs[C]//Proceedings of the 31st International Conference on Neural Information Processing Systems(NIPS'17).San Diego:NIPS,2017:1025-1035.
[25]DONG Y,CHAWLA N V,SWAMI A.metapath2vec:ScalableRepresentation Learning for Heterogeneous Networks[C]//Proceedings of the 23rd ACM SIGKDD International Confe-rence on Knowledge Discovery and Data Mining.Halifax NS Canada:ACM,2017:135-144.
[26]SUN Y,HAN J,YAN X,et al.Pathsim:Meta path-based top-k similarity search in heterogeneous information networks[J].Proceedings of the VLDB Endowment,2011,4(11):992-1003.
[27]BI W,XU B,SUN X,et al.Company-as-Tribe:Company Financial Risk Assessment on Tribe-Style Graph with Hierarchical Graph Neural Networks[C]//Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining.2022:2712-2720.
[28]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems(NIPS'17).San Diego:NIPS,2017:6000-6010.
[29]VELIČKOVIĆ P,CUCURULL G,CASANOVA A,et al.Graph attention networks[J].arXiv:1710.10903,2017.
[30]WANG X,JI H,SHI C,et al.Heterogeneous graph attention network[C]//The world wide web conference(WWW'19).New York:Association for Computing Machinery,2019:2022-2032.
[31]MA Y Y,ZHUANG X T,LI L X.Research on the relationships of the domestic mutual investment of China Based on the cross-shareholding networks of the listed companies[J].Physica A:Statistical Mechanics and its Applications,2011,390(4):749-759.
[32]MANNERS B J.Supply chain risk management:understandingemerging threats to global supply chains[M].Kogan Page Publishers,2017:12-14.
[33]WANG L J,CHEN J.Research on Risk Assessment of Equipment Manufacturing Industry Chain Based on Grey Cluster Analysis[J].Modern Business,2017,33:44-45.
[1] YAN Qiuyan, SUN Hao, SI Yuqing, YUAN Guan. Multimodality and Forgetting Mechanisms Model for Knowledge Tracing [J]. Computer Science, 2024, 51(7): 133-139.
[2] MAO Xingjing, WEI Yong, YANG Yurui, JU Shenggen. KHGAS:Keywords Guided Heterogeneous Graph for Abstractive Summarization [J]. Computer Science, 2024, 51(7): 278-286.
[3] PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5.
[4] WANG Xiaolong, WANG Yanhui, ZHANG Shunxiang, WANG Caiqin, ZHOU Yuhao. Gender Discrimination Speech Detection Model Fusing Post Attributes [J]. Computer Science, 2024, 51(6): 338-345.
[5] LIAO Jinzhi, ZHAO Hewei, LIAN Xiaotong, JI Wenliang, SHI Haiming, ZHAO Xiang. Contrastive Graph Learning for Cross-document Misinformation Detection [J]. Computer Science, 2024, 51(3): 14-19.
[6] SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243.
[7] MA Zigang, MA Rongkuan, LI Beibei, XIE Yaobin, WEI Qiang, PENG Minwei. SSPN-RA:Security Integration Risk Assessment Method for ICS Based on SS-petri Net [J]. Computer Science, 2024, 51(10): 380-390.
[8] WU Jiawei, FANG Quan, HU Jun, QIAN Shengsheng. Pre-training of Heterogeneous Graph Neural Networks for Multi-label Document Classification [J]. Computer Science, 2024, 51(1): 143-149.
[9] SHAN Xiaohuan, SONG Rui, LI Haihai, SONG Baoyan. Event Recommendation Method with Multi-factor Feature Fusion in EBSN [J]. Computer Science, 2023, 50(7): 60-65.
[10] XU Changqian, WANG Dong, SU Feng, ZHANG Jun, BIAN Haifeng, LI Long. Image Recognition Method of Transmission Line Safety Risk Assessment Based on MultidimensionalData Coupling [J]. Computer Science, 2023, 50(6A): 220500032-6.
[11] ZHANG Hu, ZHANG Guangjun. Document-level Event Extraction Based on Multi-granularity Entity Heterogeneous Graph [J]. Computer Science, 2023, 50(5): 255-261.
[12] XIAO Yang, QIN Jianyang, LI Kenli, WANG Ge, LI Rui, LIAO Qing. Co-Forecasting for Multi-modal Traffic Flow Based on Graph Contrastive Learning [J]. Computer Science, 2023, 50(10): 135-145.
[13] PU Jinyao, BU Lingmei, LU Yongmei, YE Ziming, CHEN Li, YU Zhonghua. Utilizing Heterogeneous Graph Neural Network to Extract Emotion-Cause Pairs Effectively [J]. Computer Science, 2023, 50(1): 205-212.
[14] SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69.
[15] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!