Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining 2018
DOI: 10.1145/3159652.3159706
|View full text |Cite
|
Sign up to set email alerts
|

Network Embedding as Matrix Factorization

Abstract: Since the invention of word2vec [28,29], the skip-gram model has significantly advanced the research of network embedding, such as the recent emergence of the DeepWalk, LINE, PTE, and node2vec approaches. In this work, we show that all of the aforementioned models with negative sampling can be unified into the matrix factorization framework with closed forms. Our analysis and proofs reveal that: (1) DeepWalk [31] empirically produces a low-rank transformation of a network's normalized Laplacian matrix;(2) LINE… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
78
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 559 publications
(102 citation statements)
references
References 34 publications
1
78
0
Order By: Relevance
“…We use seven datasets in our experiment. Some data is widely used to benchmark the network embedding algorithms [2][3][4][6][7][8][9]. The statistics of the datasets are listed in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…We use seven datasets in our experiment. Some data is widely used to benchmark the network embedding algorithms [2][3][4][6][7][8][9]. The statistics of the datasets are listed in Table 1.…”
Section: Methodsmentioning
confidence: 99%
“…Improving NLP tasks with social graphs An emerging line of research makes use of social interactions to derive information about the userrepresenting each user as a node in a social graph and creating low dimensional user embeddings induced by neural architecture (Grover and Leskovec, 2016;Qiu et al, 2018). Including network information improves performance on profiling tasks such as predicting user gender (Farnadi et al, 2018) or occupation , as well as on detecting online behavior such as cyberbullying (Mathur et al, 2018), abusive language use (Qian et al, 2018;Mishra et al, 2018) or suicide ideation (Mishra et al, 2019).…”
Section: User Traits and Nlp Modelsmentioning
confidence: 99%
“…Following the standard factorization approach for network embedding [6], the latent representations for nodes of G = (V, E) are obtained from the SVD ofM G = log(max(M G , 1)), where M G is the Pointwise Mutual Information (PMI) matrix. More recently, Qiu et al [9] show that M G can be posed in the following terms…”
Section: Mobility Graphs and Radiation Modelmentioning
confidence: 99%