-
141
Interdependent-path Recurrent Embedding for Knowledge Graph-aware Recommendation
Published 2025-06-01“…Knowledge graphs (KGs) have demonstrated their effectiveness in providing high-quality recommendations by incorporating rich semantic relationships between entities. …”
Get full text
Article -
142
Encrypted traffic classification encoder based on lightweight graph representation
Published 2025-08-01“…The lightweight graph representation serves as the network input, and the design mainly includes an embedding layer, a traffic encoder layer based on graph neural networks, and a time information extraction layer, which can separately embed headers and payloads. …”
Get full text
Article -
143
MEN: leveraging explainable multimodal encoding network for precision prediction of CYP450 inhibitors
Published 2025-07-01“…Specifically, the Fingerprint Encoder Network (FEN) processes molecular fingerprints, the Graph Encoder Network (GEN) extracts structural features from graph-based representations, and the Protein Encoder Network (PEN) captures sequential patterns from protein sequences. …”
Get full text
Article -
144
-
145
-
146
Efficient resource allocation for D2D-enabled social IoT networks: A tripartite and time-scale optimization approach
Published 2024-12-01“…The problem is solved in two stages: a tripartite graph-based resource allocation stage and a time-scale optimization stage. …”
Get full text
Article -
147
A Flexible and Configurable System to Author Name Disambiguation
Published 2025-01-01“…This paper introduces a configurable and scalable AND system that combines transformer-based embeddings (MiniLM), Graph Convolutional Networks (GCN), and hierarchical clustering. …”
Get full text
Article -
148
Integrating IT and OT for Cybersecurity: A Stochastic Optimization Approach via Attack Graphs
Published 2025-01-01“…This work addresses this gap by presenting an approach to represent a manufacturing IT and OT network as an attack graph that captures vulnerabilities in components, such as the motion control system, spindle, tool changer, sensors, network interfaces, and connectivity through potential vectors. …”
Get full text
Article -
149
The Laplacian Energy of an Intuitionistic Fuzzy Rough Graph and its Utilisation in Decision-Making
Published 2025-01-01“…It uses lower and upper approximation spaces in various fields, including science, technology, database systems, computer networks, and expert system architecture. The matrix of adjacency of an intuitionistic fuzzy rough graph is described in the article. …”
Get full text
Article -
150
-
151
A LEO Satellite Handover Strategy Based on Graph and Multiobjective Multiagent Path Finding
Published 2023-01-01“…Low earth orbit (LEO) satellite network can provide services to users anywhere on the earth. …”
Get full text
Article -
152
Assessing the interactions between time series signals using weighted horizontal visibility graphs
Published 2025-01-01“…The visibility graph algorithm is used to map recorded time series signals to complex networks. …”
Get full text
Article -
153
GBsim: A Robust GCN-BERT Approach for Cross-Architecture Binary Code Similarity Analysis
Published 2025-04-01“…Recent advances in graph neural networks have transformed structural pattern learning in domains ranging from social network analysis to biomolecular modeling. …”
Get full text
Article -
154
Contrastive learning of similarity meta-path clustering for multi-behavior recommendation
Published 2025-07-01“…Finally, CSMC jointly optimizes multi-behavior and meta-path contrastive objectives to extract both local and high-order semantic signals within a heterogeneous information network graph. Extensive experiments conducted on three real-world benchmark datasets—including ablation and sparsity analyses—demonstrate the superiority of CSMC, achieving average performance gains of 22.27% in Recall and 21.42% in NDCG compared to the strongest baselines.…”
Get full text
Article -
155
-
156
D2D cooperative caching strategy based on graph collaborative filtering model
Published 2023-07-01“…A D2D cooperative caching strategy based on graph collaborative filtering model was proposed for the problem of difficulty in obtaining sufficient data to predict user preferences in device-to-device (D2D) caching due to the limited signal coverage of base stations.Firstly, a graph collaborative filtering model was constructed, which captured the higher-order connectivity information in the user-content interaction graph through a multilayer graph convolutional neural network, and a multilayer perceptron was used to learn the nonlinear relationship between users and content to predict user preferences.Secondly, in order to minimize the average access delay, considering user preference and cache delay benefit, the cache content placement problem was modeled as a Markov decision process model, and a cooperative cache algorithm based on deep reinforcement learning was designed to solve it.Simulation experiments show that the proposed caching strategy achieves optimal performance compared with existing caching strategies for different content types, user densities, and D2D communication distance parameters.…”
Get full text
Article -
157
Design of an Iterative Method for Time Series Forecasting Using Temporal Attention and Hybrid Deep Learning Architectures
Published 2025-01-01“…Additionally, by representing the multivariate time series data as a graph in which variables are nodes connected by edges denoting temporal relationships, TGAMTSA leverages Graph Neural Networks (GNNs) to decode complex inter-variable dependencies, resulting in a 20% improvement in prediction accuracy over traditional methods. …”
Get full text
Article -
158
GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection
Published 2025-06-01“…Ablation studies further validate the synergistic effect between the graph attention network (GAT) and the Dilated Encoder. …”
Get full text
Article -
159
STGLR: A Spacecraft Anomaly Detection Method Based on Spatio-Temporal Graph Learning
Published 2025-01-01“…It then constructs a spatio-temporal feature extraction module to capture complex spatio-temporal dependencies among variables, leveraging a graph sample and aggregation network to learn embedded features and incorporating an attention mechanism to adaptively select salient features. …”
Get full text
Article -
160
Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games
Published 2024-01-01“…This technique reduces the belief and action spaces, making it possible to manage large-scale networks more efficiently. By focusing the analysis on the core attack graph, our approach minimizes the necessity to process the entire network, leading to substantial reductions in time and memory requirements while maintaining solution accuracy. …”
Get full text
Article