Showing 41 - 60 results of 980 for search 'sample graphs', query time: 0.07s Refine Results
  1. 41

    An Order-Independent Algorithm for Learning Chain Graphs by Mohammad Ali Javidian, Marco Valtorta, Pooyan Jamshidi

    Published 2021-04-01
    “…LWF chain graphs combine directed acyclic graphs and undirected graphs. …”
    Get full text
    Article
  2. 42

    Measuring the Inferential Values of Relations in Knowledge Graphs by Xu Zhang, Xiaojun Kang, Hong Yao, Lijun Dong

    Published 2024-12-01
    “…Knowledge graphs, as an important research direction in artificial intelligence, have been widely applied in many fields and tasks. …”
    Get full text
    Article
  3. 43

    Edge and Node Enhancement Graph Convolutional Network: Imbalanced Graph Node Classification Method Based on Edge-Node Collaborative Enhancement by Jiadong Tian, Jiali Lin, Dagang Li

    Published 2025-03-01
    “…Experimental comparisons on four public graph datasets reveal that, compared to baseline methods, our proposed method achieves notable improvements in Recall and AUC metrics, particularly in sparsely connected datasets.…”
    Get full text
    Article
  4. 44

    Improving drug-induced liver injury prediction using graph neural networks with augmented graph features from molecular optimisation by Taeyeub Lee, Joram M. Posma

    Published 2025-08-01
    “…Methods We evaluated several GNN architectures, including Graph Convolutional Networks (GCNs), Graph Attention Networks (GATs), Graph Sample and Aggregation (GraphSAGE), and Graph Isomorphism Networks (GINs), using the latest FDA DILI dataset and other molecular property prediction datasets. …”
    Get full text
    Article
  5. 45

    Generating graph perturbations to enhance the generalization of GNNs by Sofiane Ennadir, Giannis Nikolentzos, Michalis Vazirgiannis, Henrik Boström

    Published 2024-01-01
    “…This work aims to improve the generalization ability of GNNs by increasing the size of the training set of a given problem. The new samples are generated using an iterative contrastive learning procedure that augments the dataset during the training, in a task-relevant approach, by manipulating the graph topology. …”
    Get full text
    Article
  6. 46

    MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network by Wenjie Guo, Wenbiao Du, Xiuqi Yang, Jingfeng Xue, Yong Wang, Weijie Han, Jingjing Hu

    Published 2025-01-01
    “…Firstly, to ensure semantic richness, a Bidirectional Encoder Representations from Transformers-based (BERT) attribute-enhanced function embedding method is proposed for the extraction of node attributes in the function call graph. Subsequently, this work designs a hierarchical graph neural network that integrates attention mechanisms and pooling operations, complemented by function node sampling and structural learning strategies. …”
    Get full text
    Article
  7. 47

    Pattern Recognition in Urban Maps Based on Graph Structures by Xiaomin Lu, Zhiyi Zhang, Haoran Song, Haowen Yan

    Published 2025-04-01
    “…Experimental validation utilized building and road network data from multiple cities, constructing a dataset of 600 samples divided into two subsets: Sample Set 1 (for parameter threshold calibration and rule generation) and Sample Set 2 (for algorithm performance validation and transferability testing). …”
    Get full text
    Article
  8. 48

    Property Graph Framework for Geographical Routes in Sports Training by Alen Rajšp, Iztok Fister

    Published 2025-01-01
    “…The research concludes by presenting a case study in which a property graph that enables cycling route generation was created for the country of Slovenia, and a sample training route was generated.…”
    Get full text
    Article
  9. 49

    Graph Contrastive Pre-training for Anti-money Laundering by Hanbin Lu, Haosen Wang

    Published 2024-12-01
    “…At present, many studies model the AML task as the graph and leverage graph neural network (GNN) for node/edge classification. …”
    Get full text
    Article
  10. 50

    Constructing ancestral recombination graphs through reinforcement learning by Mélanie Raymond, Marie-Hélène Descary, Cédric Beaulac, Fabrice Larribe

    Published 2025-04-01
    “…IntroductionOver the years, many approaches have been proposed to build ancestral recombination graphs (ARGs), graphs used to represent the genetic relationship between individuals. …”
    Get full text
    Article
  11. 51

    Spatio-Temporal Graphs in Transportation: Challenges, Optimization, and Prospects by Aleksandr Rakhmangulov, Nikita Osintsev, Pavel Mishkurov

    Published 2025-04-01
    “…The purpose of the study is to identify trends in the use of spatio-temporal graphs for solving various problems in transportation, as well as the most common methods of optimization of such graphs. …”
    Get full text
    Article
  12. 52

    Active Learning Framework for Improving Knowledge Graph Accuracy by Donghyun Kim, Hyeongjun Yang, Seokju Hwang, Kyuhwan Yeom, Midan Shim, Kyong-Ho Lee

    Published 2025-01-01
    “…Extensive experimental results demonstrate the effectiveness of the proposed active learning framework and sampling strategies in improving knowledge graph accuracy. …”
    Get full text
    Article
  13. 53

    Nonequilibrium steady-state dynamics of Markov processes on graphs by Stefano Crotti, Thomas Barthel, Alfredo Braunstein

    Published 2025-08-01
    “…The method provides access to precise temporal correlations, which, in some regimes, would be virtually impossible to estimate by sampling.…”
    Get full text
    Article
  14. 54

    Stealthy graph backdoor attack based on feature trigger by Yang Chen, Zhou Bin, Haixing Zhao

    Published 2025-06-01
    “…Abstract Recent studies have shown that Graph Neural Networks (GNNs) are vulnerable to backdoor attacks. …”
    Get full text
    Article
  15. 55

    Double difference earthquake location with graph neural networks by Ian W. McBrearty, Gregory C. Beroza

    Published 2025-08-01
    “…Our architecture uses one graph to represent the stations, a second graph to represent the sources, and creates the Cartesian product graph between the two graphs to capture the relationships between the sources and stations (e.g., the residuals and travel time partial derivatives). …”
    Get full text
    Article
  16. 56

    BERT-GraphSAGE: hybrid approach to spam detection by F. Zouak, O. El Beqqali, J. Riffi

    Published 2025-05-01
    “…This enables GraphSAGE to generalize to unseen emails by sampling and aggregating the characteristics of neighboring emails to produce robust node representations. …”
    Get full text
    Article
  17. 57

    One-Step Graph Fusion Fuzzy Clustering Network by Bin Tang, Zhongyang Zhou, Xuewen Liu, Feiyu Chen

    Published 2025-01-01
    “…Graph clustering plays a crucial role in uncovering implicit information within data which can be used to rationally classify potential data samples in unsupervised scenarios. …”
    Get full text
    Article
  18. 58

    Graph contrastive learning with node-level accurate difference by Pengfei Jiao, Kaiyan Yu, Qing Bao, Ying Jiang, Xuan Guo, Zhidong Zhao

    Published 2025-03-01
    “…Therefore, we argue that it is necessary to design a method that can quantify the dissimilarity between the original and augmented graphs to more accurately capture the relationships between samples. …”
    Get full text
    Article
  19. 59

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  20. 60

    Kolmogorov–Smirnov-Based Edge Centrality Measure for Metric Graphs by Christina Durón, Hannah Kravitz, Moysey Brio

    Published 2025-05-01
    “…We compare the proposed measure with eight vertex centrality measures applied to a line graph representation of each metric graph, as well as with two edge centrality measures applied directly to each metric graph. …”
    Get full text
    Article