2
|
Zhang C, Li Q, Lei Y, Qian M, Shen X, Cheng D, Yu W. The Absence of a Weak-Tie Effect When Predicting Large-Weight Links in Complex Networks. ENTROPY (BASEL, SWITZERLAND) 2023; 25:422. [PMID: 36981311 PMCID: PMC10047936 DOI: 10.3390/e25030422] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/28/2023] [Revised: 02/22/2023] [Accepted: 02/23/2023] [Indexed: 06/18/2023]
Abstract
Link prediction is a hot issue in information filtering. Link prediction algorithms, based on local similarity indices, are widely used in many fields due to their high efficiency and high prediction accuracy. However, most existing link prediction algorithms are available for unweighted networks, and there are relatively few studies for weighted networks. In the previous studies on weighted networks, some scholars pointed out that links with small weights play a more important role in link prediction and emphasized that weak-ties theory has a significant impact on prediction accuracy. On this basis, we studied the edges with different weights, and we discovered that, for edges with large weights, this weak-ties theory actually does not work; Instead, the weak-ties theory works in the prediction of edges with small weights. Our discovery has instructive implications for link predictions in weighted networks.
Collapse
Affiliation(s)
- Chengjun Zhang
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Qi Li
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Yi Lei
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Ming Qian
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Xinyu Shen
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Di Cheng
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| | - Wenbin Yu
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CI-CAEET), Nanjing University of Information Science and Technology, Nanjing 210044, China
- Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing 210044, China
| |
Collapse
|
3
|
Selection of a solar water heater for large-scale group decision making with hesitant fuzzy linguistic preference relations based on the best-worst method. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03688-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
|
4
|
Wen Y, Lin J, Chen K, Chen CLP, Jia K. Geometry-Aware Generation of Adversarial Point Clouds. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2020; 44:2984-2999. [PMID: 33320808 DOI: 10.1109/tpami.2020.3044712] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/10/2023]
Abstract
Machine learning models are vulnerable to adversarial examples. While most of the existing adversarial methods are on 2D image, a few recent ones extend the studies to 3D point clouds data. These methods generate point outliers, which are noticeable and easy to defend against using the simple technique of outlier removal. Motivated by the different mechanisms humans perceive by 2D images and 3D shapes, we propose the new design of geometry-aware objectives, whose solutions favor the desired surface properties of smoothness and fairness. To generate adversarial point clouds, we use a misclassification loss that supports continuous pursuit of malicious signals. Regularizing the attack loss with our proposed geometry-aware objectives results in our proposed method, Geometry-Aware Adversarial Attack (GeoA3). The results of GeoA3 tend to be more harmful, harder to defend against, and of the key adversarial characterization of being imperceptible. We also present a simple but effective algorithm termed GeoA+3-IterNormPro towards surface-level adversarial attacks via generation of adversarial point clouds. We evaluate our methods on both synthetic and physical objects. For a qualitative evaluation, we conduct subjective studies by collecting human preferences from Amazon Mechanical Turk. Comparative results in comprehensive experiments confirm the advantages of our proposed methods. Our source codes are publicly available at https://github.com/Yuxin-Wen/GeoA3.
Collapse
|