語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Graph Data Mining = Algorithm, Secur...
~
Min, Yong.
Graph Data Mining = Algorithm, Security and Application /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Graph Data Mining/ edited by Qi Xuan, Zhongyuan Ruan, Yong Min.
其他題名:
Algorithm, Security and Application /
其他作者:
Min, Yong.
面頁冊數:
XVI, 243 p. 92 illus., 67 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Privacy. -
電子資源:
https://doi.org/10.1007/978-981-16-2609-8
ISBN:
9789811626098
Graph Data Mining = Algorithm, Security and Application /
Graph Data Mining
Algorithm, Security and Application /[electronic resource] :edited by Qi Xuan, Zhongyuan Ruan, Yong Min. - 1st ed. 2021. - XVI, 243 p. 92 illus., 67 illus. in color.online resource. - Big Data Management,2522-0187. - Big Data Management,.
Chapter 1. Information Source Estimation with Multi-Channel Graph Neural Network -- Chapter 2. Link Prediction based on Hyper-Substructure Network -- Chapter 3. Broad Learning Based on Subgraph Networks for Graph Classification -- Chapter 4. Subgraph Augmentation with Application to Graph Mining -- 5. Adversarial Attacks on Graphs: How to Hide Your Structural Information -- Chapter 6. Adversarial Defenses on Graphs: Towards Increasing the Robustness of Algorithms -- Chapter 7. Understanding Ethereum Transactions via Network Approach -- Chapter 8. Find Your Meal Pal: A Case Study on Yelp Network -- Chapter 9. Graph convolutional recurrent neural networks: a deep learning framework for traffic prediction -- Chapter 10. Time Series Classification based on Complex Network -- Chapter 11. Exploring the Controlled Experiment by Social Bots.
Graph data is powerful, thanks to its ability to model arbitrary relationship between objects and is encountered in a range of real-world applications in fields such as bioinformatics, traffic network, scientific collaboration, world wide web and social networks. Graph data mining is used to discover useful information and knowledge from graph data. The complications of nodes, links and the semi-structure form present challenges in terms of the computation tasks, e.g., node classification, link prediction, and graph classification. In this context, various advanced techniques, including graph embedding and graph neural networks, have recently been proposed to improve the performance of graph data mining. This book provides a state-of-the-art review of graph data mining methods. It addresses a current hot topic – the security of graph data mining – and proposes a series of detection methods to identify adversarial samples in graph data. In addition, it introduces readers to graph augmentation and subgraph networks to further enhance the models, i.e., improve their accuracy and robustness. Lastly, the book describes the applications of these advanced techniques in various scenarios, such as traffic networks, social and technical networks, and blockchains. .
ISBN: 9789811626098
Standard No.: 10.1007/978-981-16-2609-8doiSubjects--Topical Terms:
575491
Privacy.
LC Class. No.: QA76.9.D343
Dewey Class. No.: 006.312
Graph Data Mining = Algorithm, Security and Application /
LDR
:03564nam a22004215i 4500
001
1048575
003
DE-He213
005
20210921231814.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811626098
$9
978-981-16-2609-8
024
7
$a
10.1007/978-981-16-2609-8
$2
doi
035
$a
978-981-16-2609-8
050
4
$a
QA76.9.D343
072
7
$a
UNF
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
072
7
$a
UNF
$2
thema
072
7
$a
UYQE
$2
thema
082
0 4
$a
006.312
$2
23
245
1 0
$a
Graph Data Mining
$h
[electronic resource] :
$b
Algorithm, Security and Application /
$c
edited by Qi Xuan, Zhongyuan Ruan, Yong Min.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
XVI, 243 p. 92 illus., 67 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Big Data Management,
$x
2522-0187
505
0
$a
Chapter 1. Information Source Estimation with Multi-Channel Graph Neural Network -- Chapter 2. Link Prediction based on Hyper-Substructure Network -- Chapter 3. Broad Learning Based on Subgraph Networks for Graph Classification -- Chapter 4. Subgraph Augmentation with Application to Graph Mining -- 5. Adversarial Attacks on Graphs: How to Hide Your Structural Information -- Chapter 6. Adversarial Defenses on Graphs: Towards Increasing the Robustness of Algorithms -- Chapter 7. Understanding Ethereum Transactions via Network Approach -- Chapter 8. Find Your Meal Pal: A Case Study on Yelp Network -- Chapter 9. Graph convolutional recurrent neural networks: a deep learning framework for traffic prediction -- Chapter 10. Time Series Classification based on Complex Network -- Chapter 11. Exploring the Controlled Experiment by Social Bots.
520
$a
Graph data is powerful, thanks to its ability to model arbitrary relationship between objects and is encountered in a range of real-world applications in fields such as bioinformatics, traffic network, scientific collaboration, world wide web and social networks. Graph data mining is used to discover useful information and knowledge from graph data. The complications of nodes, links and the semi-structure form present challenges in terms of the computation tasks, e.g., node classification, link prediction, and graph classification. In this context, various advanced techniques, including graph embedding and graph neural networks, have recently been proposed to improve the performance of graph data mining. This book provides a state-of-the-art review of graph data mining methods. It addresses a current hot topic – the security of graph data mining – and proposes a series of detection methods to identify adversarial samples in graph data. In addition, it introduces readers to graph augmentation and subgraph networks to further enhance the models, i.e., improve their accuracy and robustness. Lastly, the book describes the applications of these advanced techniques in various scenarios, such as traffic networks, social and technical networks, and blockchains. .
650
2 4
$a
Privacy.
$3
575491
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Machine Learning.
$3
1137723
650
1 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
0
$a
Computer security.
$3
557122
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Machine learning.
$3
561253
650
0
$a
Data mining.
$3
528622
700
1
$a
Min, Yong.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1352496
700
1
$a
Ruan, Zhongyuan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1352495
700
1
$a
Xuan, Qi.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1352494
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811626081
776
0 8
$i
Printed edition:
$z
9789811626104
776
0 8
$i
Printed edition:
$z
9789811626111
830
0
$a
Big Data Management,
$x
2522-0179
$3
1313442
856
4 0
$u
https://doi.org/10.1007/978-981-16-2609-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入