• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Yao, Shen Derong, Kou Yue, Nie Tiezheng, Yu Ge. Heterogeneous Information Networks Embedding Based on Multiple Meta-Graph Fusion[J]. Journal of Computer Research and Development, 2020, 57(9): 1928-1938. DOI: 10.7544/issn1000-1239.2020.20190553
Citation: Wu Yao, Shen Derong, Kou Yue, Nie Tiezheng, Yu Ge. Heterogeneous Information Networks Embedding Based on Multiple Meta-Graph Fusion[J]. Journal of Computer Research and Development, 2020, 57(9): 1928-1938. DOI: 10.7544/issn1000-1239.2020.20190553

Heterogeneous Information Networks Embedding Based on Multiple Meta-Graph Fusion

Funds: This work was supported by the National Natural Science Foundation of China (61672142, U1435216), the National Key Research and Development Program of China (2018YFB1003404), the National Natural Science Foundation of China Joint Fund Project (U1811261), and the Fundamental Research Funds for the Central Universities (N171606005).
More Information
  • Published Date: August 31, 2020
  • Network embedding methods based on meta-structures (such as meta-path or meta-graph) can effectively utilize heterogeneous network structures. Compared with the meta-path, the meta-graph can capture more complex structural information and help improve the accuracy of similar node matching in heterogeneous information networks. However, the existing meta-graph-based embedding method typically has the following limitations: 1)Most of the meta-graph types are specified by experts, and are not applicable in the application environment of large complex networks; 2)Although multiple meta-graphs are integrated for embedding, the weights of meta-graphs are not considered; 3)Some models use the users expected semantic relationship to generate a combination of meta-graphs that can preserve specific semantics, but such models are over-reliant on meta-pattern selection and samples used to supervise learning, lacking versatility. Based on this, this paper proposes a heterogeneous network embedding method based on multiple meta-graph fusion. The method includes two parts. The first part is graph discovery. The purpose of graph discovery is to mine important meta-graphs representing the current network structure and semantic features. The second part is node embedding based on multiple meta graph fusion. The main content is to propose a general graph similarity measure method based on meta-graphs, and use the neural network to embed the meta-graph features of nodes. Experimental results show that the proposed method has higher accuracy and efficiency compared with other network embedding methods.
  • Related Articles

    [1]Deng Xiangtian, Qian Haifeng. Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2222-2237. DOI: 10.7544/issn1000-1239.2021.20210596
    [2]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [3]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [4]Zhang Minqing, Du Weidong, Yang Xiaoyuan, HanYiliang. A Fully Secure KP-ABE Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2015, 52(8): 1893-1901. DOI: 10.7544/issn1000-1239.2015.20140605
    [5]Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    [6]Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng. Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
    [7]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [8]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [9]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.
  • Cited by

    Periodical cited type(9)

    1. 薛庆水,时雪磊,王俊华,薛震,王晨阳. 基于属性加密的个人医疗数据共享方案. 计算机应用研究. 2023(02): 589-594+600 .
    2. 刘源,柳欣,李超会,王思雨,邢玉杰. 隐私保护的电子健康档案安全共享系统. 信息技术与信息化. 2023(04): 111-114 .
    3. 李雨霏,梁妍景,吴媚,陈卫宏,侯黎莉. 移动医疗在口腔癌病人延续性康复护理中的应用进展. 护理研究. 2023(11): 1961-1965 .
    4. 王浩,胡艳珂,郜勇. 医院移动电子签名的应用研究. 中国卫生信息管理杂志. 2023(03): 471-474+481 .
    5. 牛淑芬,宋蜜,方丽芝,王彩芬. 智慧医疗中基于属性加密的云存储数据共享. 电子与信息学报. 2022(01): 107-117 .
    6. 朱文,裴小芹,徐慧. 移动医疗在压力性损伤患者中的应用进展. 中华现代护理杂志. 2022(04): 433-437 .
    7. 陈春燕. 医院内网在线档案云存储隐私信息加密技术研究. 自动化技术与应用. 2022(06): 51-54+61 .
    8. 韩普,顾亮,张嘉明. 隐私保护视角下医疗数据共享意愿研究——基于三方演化博弈分析. 现代情报. 2021(03): 148-158 .
    9. 邓安远,史姣丽,黄定,何凯. 支持关键词隐私保护的密文共享系统. 软件导刊. 2020(10): 228-232 .

    Other cited types(4)

Catalog

    Article views (1037) PDF downloads (453) Cited by(13)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return