Please use this identifier to cite or link to this item:
https://repository.cihe.edu.hk/jspui/handle/cihe/242
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Yingchao | en_US |
dc.contributor.author | Xie, Haoran | - |
dc.contributor.author | Wang, Philips Fu Lee | - |
dc.contributor.other | Chen, R. | - |
dc.contributor.other | Chen, J. | - |
dc.contributor.other | Rao, Y. | - |
dc.date.accessioned | 2021-03-17T02:20:37Z | - |
dc.date.available | 2021-03-17T02:20:37Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | https://repository.cihe.edu.hk/jspui/handle/cihe/242 | - |
dc.description.abstract | Network embedding has attracted more and more researchers recently. Although many algorithms focus on topological information, there exists a disadvantage. Nodes in many real-world network often have their own attributes, which are potentially valuable information, but algorithms focusing on structure ignore these messages, which will decrease the accuracy of the embedding space. To solve this problem, we consider a deep learning model. In this paper, we propose a novel model named Extractive Adversarial Networks for network embedding, which aims to extract the latent space from labels, attributed information and topological structure (e.g. low-order proximity), based on generative adversarial network model in Domain-Adversarial Training of Neural Networks. The goal of EAN is extracting the same features from the topological structure and attributed information according to our extractive network, while distinguishing the extractive features from either the topological structure or attributed information, which becomes an adversarial models. First, we train our extractive network with labels information, which is feeded with attributed information and nodes structure in vector forms. The second step is training the adversarial network to distinguish the embedding representation from either the topological structure or attributed information, where the embedding representation is from the hidden layer in extractive network. We conduct experiments on six real-world datasets, which illustrates that the proposed models outperforms state-of-The-Art embedding algorithms. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.title | Extractive adversarial networks for network embedding | en_US |
dc.type | conference proceedings | en_US |
dc.relation.publication | Proceedings of the 2018 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC) | en_US |
dc.contributor.affiliation | School of Computing and Information Sciences | en_US |
dc.relation.isbn | 9781728102085 | en_US |
dc.description.startpage | 162 | en_US |
dc.description.endpage | 167 | en_US |
dc.cihe.affiliated | Yes | - |
item.languageiso639-1 | en | - |
item.openairetype | conference proceedings | - |
item.cerifentitytype | Publications | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
crisitem.author.dept | Yam Pak Charitable Foundation School of Computing and Information Sciences | - |
crisitem.author.dept | Yam Pak Charitable Foundation School of Computing and Information Sciences | - |
crisitem.author.dept | Rita Tong Liu School of Business and Hospitality Management | - |
crisitem.author.orcid | 0000-0001-8362-6735 | - |
Appears in Collections: | CIS Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.