Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2019
DOI: 10.1145/3341161.3342890
|View full text |Cite
|
Sign up to set email alerts
|

Gemsec

Abstract: Modern graph embedding procedures can efficiently process graphs with millions of nodes. In this paper, we propose GEMSEC -a graph embedding algorithm which learns a clustering of the nodes simultaneously with computing their embedding. GEMSEC is a general extension of earlier work in the domain of sequence-based graph embedding. GEMSEC places nodes in an abstract feature space where the vertex features minimize the negative log-likelihood of preserving sampled vertex neighborhoods, and it incorporates known s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 185 publications
(30 citation statements)
references
References 22 publications
(25 reference statements)
0
16
0
1
Order By: Relevance
“…Large real networks. We also tested our algorithm on a number of large real networks across a wide range of magnitude, including the DBLP network and Amazon product network [51], the Enron email network [52], the Facebook user network [53], the five Arxiv collaboration networks [54], the recent data from two digital platforms (Deezer, 3 networks; Facebook, 8 networks) [55], and the Gowalla network and the Brightkite network, both location-based social networks [56]. Detection results are summarized in table 1, and a few critical metrics are visualized in figure 5 and 6.…”
Section: Resultsmentioning
confidence: 99%
“…Large real networks. We also tested our algorithm on a number of large real networks across a wide range of magnitude, including the DBLP network and Amazon product network [51], the Enron email network [52], the Facebook user network [53], the five Arxiv collaboration networks [54], the recent data from two digital platforms (Deezer, 3 networks; Facebook, 8 networks) [55], and the Gowalla network and the Brightkite network, both location-based social networks [56]. Detection results are summarized in table 1, and a few critical metrics are visualized in figure 5 and 6.…”
Section: Resultsmentioning
confidence: 99%
“…Download the real datasets from the network repository to experiments. According to the data information required for data transmission in opportunistic social networks, and choose pages-government [43], wiki-elec [44], advogato [45], and slashdot [46] four datasets for simulation experiments. e characteristic information of the four experimental datasets is shown in Table 1.…”
Section: Simulation and Analysismentioning
confidence: 99%
“…The infection dynamics match those used in equations (3.10)–(3.12) tuned to be just slightly above the percolation threshold, with strains 1, 2 and 3 marked by +, ° and , respectively. The networks used are ( a ) a trust network of 75 879 nodes from the Epinions social network [28], ( b ) a friendship network from the music streaming service Deezer [29] and ( c ) a network of internal email communication within the company Enron [30]. (Online version in colour.)…”
Section: Co-infectionmentioning
confidence: 99%