• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Yiqi, Qian Tieyun, Li Wanli, Liang Yile. Exploiting Composite Relation Graph Convolution for Attributed Network Embedding[J]. Journal of Computer Research and Development, 2020, 57(8): 1674-1682. DOI: 10.7544/issn1000-1239.2020.20200206
Citation: Chen Yiqi, Qian Tieyun, Li Wanli, Liang Yile. Exploiting Composite Relation Graph Convolution for Attributed Network Embedding[J]. Journal of Computer Research and Development, 2020, 57(8): 1674-1682. DOI: 10.7544/issn1000-1239.2020.20200206

Exploiting Composite Relation Graph Convolution for Attributed Network Embedding

Funds: This work was supported by the National Natural Science Foundation of China (61572376, 91646206) and the State Grid Technology Project (5700-202072180A-0-00-00).
More Information
  • Published Date: July 31, 2020
  • Network embedding aims at learning a low-dimensional dense vector for each node in the network. It has attracted much attention from researchers in recent years. Most existing studies mainly focus on modeling graph structure and neglect the attribute information. Though attributed network embedding methods take node attribute into account, the informative relations between nodes and their attributes are still under-exploited. In this paper, we propose a novel framework to employ the abundant relation information for attributed network embedding. To this end, we first present to construct the composite relations between the nodes and their attributes in attributed networks. We then develop a composite relation graph convolution network (CRGCN) to encode the composite relations in both types of networks. We conduct extensive experiments on real world datasets and results demonstrate the effectiveness of our model on various network analysis tasks.
  • Related Articles

    [1]Li Xinran, Li Rongshou, Qin Chuan, Qian Zhenxing, Zhang Xinpeng. Generative Information Hiding Method Based on Couplet Carrier[J]. Journal of Computer Research and Development, 2025, 62(3): 779-789. DOI: 10.7544/issn1000-1239.202330663
    [2]Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu. Intelligent and Efficient Method for Optimal Penetration Path Generation[J]. Journal of Computer Research and Development, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    [3]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, Li Qingan. Bus-Invert Encoding Oriented Low Power Scheduling Method[J]. Journal of Computer Research and Development, 2014, 51(8): 1773-1780. DOI: 10.7544/issn1000-1239.2014.20130066
    [4]Wang Changjing, Luo Haimei, Zuo Zhengkang. Formal Software Specification Generation Approach Based on Problem Patterns[J]. Journal of Computer Research and Development, 2013, 50(2): 352-360.
    [5]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [6]Luo Zuying, Pan Yuedou. Transistor-Level Methodology on Power Optimization for CMOS Circuits[J]. Journal of Computer Research and Development, 2008, 45(4): 734-740.
    [7]Zhou Hongwei, Zhang Chengyi, and Zhang Minxuan. A Method of Statistics-Based Cache Leakage Power Estimation[J]. Journal of Computer Research and Development, 2008, 45(2): 367-374.
    [8]Wen Dongxin, Yang Xiaozong, and Wang Ling. A High Level Synthesis Scheme and Its Realization for Low Power Design in VLSI[J]. Journal of Computer Research and Development, 2007, 44(7): 1259-1264.
    [9]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low Power Data Cache Design Based on Very Narrow-Width Value[J]. Journal of Computer Research and Development, 2007, 44(5): 775-781.
    [10]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low-Power Instruction Cache Design Based on Record Buffer[J]. Journal of Computer Research and Development, 2006, 43(4): 744-751.

Catalog

    Article views (1084) PDF downloads (596) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return