Please use this identifier to cite or link to this item: https://repository.cihe.edu.hk/jspui/handle/cihe/242
DC FieldValueLanguage
dc.contributor.authorZhao, Yingchaoen_US
dc.contributor.authorXie, Haoran-
dc.contributor.authorWang, Philips Fu Lee-
dc.contributor.otherChen, R.-
dc.contributor.otherChen, J.-
dc.contributor.otherRao, Y.-
dc.date.accessioned2021-03-17T02:20:37Z-
dc.date.available2021-03-17T02:20:37Z-
dc.date.issued2018-
dc.identifier.urihttps://repository.cihe.edu.hk/jspui/handle/cihe/242-
dc.description.abstractNetwork embedding has attracted more and more researchers recently. Although many algorithms focus on topological information, there exists a disadvantage. Nodes in many real-world network often have their own attributes, which are potentially valuable information, but algorithms focusing on structure ignore these messages, which will decrease the accuracy of the embedding space. To solve this problem, we consider a deep learning model. In this paper, we propose a novel model named Extractive Adversarial Networks for network embedding, which aims to extract the latent space from labels, attributed information and topological structure (e.g. low-order proximity), based on generative adversarial network model in Domain-Adversarial Training of Neural Networks. The goal of EAN is extracting the same features from the topological structure and attributed information according to our extractive network, while distinguishing the extractive features from either the topological structure or attributed information, which becomes an adversarial models. First, we train our extractive network with labels information, which is feeded with attributed information and nodes structure in vector forms. The second step is training the adversarial network to distinguish the embedding representation from either the topological structure or attributed information, where the embedding representation is from the hidden layer in extractive network. We conduct experiments on six real-world datasets, which illustrates that the proposed models outperforms state-of-The-Art embedding algorithms.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.titleExtractive adversarial networks for network embeddingen_US
dc.typeconference proceedingsen_US
dc.relation.publicationProceedings of the 2018 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC)en_US
dc.contributor.affiliationSchool of Computing and Information Sciencesen_US
dc.relation.isbn9781728102085en_US
dc.description.startpage162en_US
dc.description.endpage167en_US
dc.cihe.affiliatedYes-
item.languageiso639-1en-
item.openairetypeconference proceedings-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
crisitem.author.deptYam Pak Charitable Foundation School of Computing and Information Sciences-
crisitem.author.deptYam Pak Charitable Foundation School of Computing and Information Sciences-
crisitem.author.deptRita Tong Liu School of Business and Hospitality Management-
crisitem.author.orcid0000-0001-8362-6735-
Appears in Collections:CIS Publication
SFX Query Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.