Journal of Guangxi Normal University(Natural Science Edition) ›› 2021, Vol. 39 ›› Issue (2): 21-31.doi: 10.16088/j.issn.1001-6600.2020082601
Previous Articles Next Articles
ZHUO Ming1, LIU Leyuan1, ZHOU Shijie1*, YANG Peng1,2, WAN Simin2
CLC Number:
[1] PADMAVATHI G,SHANMUGAPRIYA D.A survey of attacks,security mechanisms and challenges in wireless sensor networks[J].International Journal of Computer Science and Information Security,2009,4(1/2):1-9. [2] RYZHOV Y,SAKOVYCH L,VANKEVYCH P,et al.Optimization of requirements for measuring instruments at metrological service of communication tools[J].Measurement,2018,123:19-25.DOI:10.1016/j.measurement.2018.03.055. [3] 张殷,肖先勇,陈晶,等.信息网受损对电网过载主导型连锁故障的影响[J].电力系统自动化,2017,41(13):14-21. [4] 谭跃进,吴俊,邓宏钟.复杂网络中节点重要度评估的节点收缩方法[J].系统工程理论与实践,2006,26(11):79-83,102. [5] 吴俊,谭跃进,邓宏钟,等.考虑级联失效的复杂负载网络节点重要度评估[J].小型微型计算机系统,2007,28(4):627-630. [6] 刘艳,顾雪平.基于节点重要度评价的骨架网络重构[J].中国电机工程学报,2007,27(10):20-27. [7] WEST D B.Introduction to graph Theory[M].2nd ed.Upper Saddle River:Prentice Hall,2001. [8] CALLAWAY D S,NEWMAN M E J,STROGATZ S H,et al.Network robustness and fragility:percolation on random graphs[J].Physical Review Letters,2000,85(25):5468-5471.DOI:10.1103/PhysRevLett.85.5468. [9] BORGATTI S P.Centrality and network flow[J].Social Networks,2005,27(1):55-71.DOI:10.1016/j.socnet.2004.11.008. [10] BRANDES U.A faster algorithm for betweenness centrality[J].Journal of Mathematical Sociology,2001,25(2):163-177.DOI:10.1080/0022250X.2001.9990249. [11] 张凯,马英红.基于网络结构的节点中心性排序优化算法[J].计算机应用研究,2016,33(9):2596-2600,2605. [12] BUDANITSKY A,HIRST G.Evaluating WordNet-based measures of semantic distance[J].Computational Linguistics,2006,32(1):13-47. [13] NEWMAN M E J.Mathematics of networks[M]//VERNENGO M,CALDENTEY E P,ROSSER JR B J.The New Palgrave Dictionary of Economics.London:Palgrave Macmillan,2016:1-8.DOI:10.1057/978-1-349-95121-5_2565-1. [14] NEGRE C F A,MORZAN U N,HENDRICKSON H P,et al.Eigenvector centrality for characterization of protein allosteric pathways[J].Proceedings of the National Academy of Sciences of the United States of America,2018,115(52):E12201-E12208.DOI:10.1073/pnas.1810452115. [15] KITSAK M,GALLOS L K,HAVLIN S,et al.Identification of influential spreaders in complex networks[J].Nature Physics,2010,6(11):888-893.DOI:10.1038/nphys1746. [16] ESTRADA E,RODRÍGUEZ-VELÁZQUEZ J A.Subgraph centrality in complex networks[J].Physical Review E Statistical Nonlinear and Soft Matter Physics,2005,71(5):056103.DOI:10.1103/PhysRevE.71.056103. [17] FRANK H,FRISCH I T.Analysis and design of survivable networks[J].IEEE Transactions on Communication Technology,1970,18(5):501-519.DOI:10.1109/TCOM.1970.1090419. [18] WANG B,TANG H W,GUO C H,et al.Optimization of network structure to random failures [J].Physica A:Statistical Mechanics and its Applications,2006,368(2):607-614. [19] ALBERT R,JEONG H,BARABÁSI A L.Error and attack tolerance of complex networks[J].2000,406:378-382. [20] 郭伟.野战地域通信网可靠性的评价方法[J].电子学报,2000,28(1):3-6. [21] 饶育萍,林竞羽,侯德亭.基于最短路径数的网络抗毁评价方法[J].通信学报,2009,30(4):113-117. [22] 吴俊,谭索怡,谭跃进,等.基于自然连通度的复杂网络抗毁性分析[J].复杂系统与复杂性科学,2014,11(1):77-86.DOI:10.13306/j.1672-3813.2014.01.010. [23] GOODFELLOW I J,POUGET-ABADIE J,MIRZA M,et al.Generative adversarial networks[EB/OL].(2014-06-10)[2020-08-26].https://arxiv.org/pdf/1406.2661.pdf. [24] DUVENAUD D,MACLAURIN D,AGUILERA-IPARRAGUIRRE J,et al.Convolutional networks on graphs for learning molecular fingerprints[EB/OL].(2015-11-03)[2020-08-26].https://arxiv.org/pdf/1509.09292.pdf. [25] LI Y J,ZEMEL R,BROCKSCHMIDT M,et al.Gated graph sequence neural networks[EB/OL].(2017-09-22)[2020-08-26].https://arxiv.org/pdf/1511.05493.pdf. [26] JAIN A,ZAMIR A R,SAVARESE S,et al.Structural-RNN:deep learning on spatio-temporal graphs[EB/OL].(2016-04-11)[2020-08-26].https://arxiv.org/pdf/1511.05298.pdf. [27] BRUNA J,ZAREMBA W,SZLAM A,et al.Spectral networks and locally connected networks on graphs[EB/OL].(2014-05-21)[2020-08-26].https://arxiv.org/pdf/1312.6203.pdf. [28] HENAFF M,BRUNA J,LECUN Y.Deep convolutional networks on graph-structured Data[EB/OL].(2015-06-16)[2020-08-26].https://arxiv.org/pdf/1506.05163.pdf. [29] DEFFERRARD M,BRESSON X,VANDERGHEYNST P.Convolutional neural networks on graphs with fast localized spectral filtering[EB/OL].(2017-02-05)[2020-08-26].https://arxiv.org/pdf/1606.09375.pdf. [30] KIPF T N,WELLING M.Semi-supervised classification with graph convolutional networks[EB/OL].(2017-02-22)[2020-08-26].https://arxiv.org/pdf/1609.02907.pdf. [31] 杨红娃,王敏,潘高峰.基于网络割裂度的优化链路攻击方法[J].通信对抗,2010(4):39-42. [32] 王彦鹏.卫星网络拓扑的抗毁性研究[D].大连:大连理工大学,2018. [33] LEISERSON C E.Fat-trees:universal networks for hardware-efficient supercomputing[J].IEEE Transactions on Computers,1985,C-34(10):892-901.DOI:10.1109/TC.1985.6312192. [34] YANG Z L,COHEN W W,SALAKHUTDINOV R.Revisiting semi-supervised learning with graph embeddings[EB/OL].(2016-05-26)[2020-08-26].https://arxiv.org/pdf/1603.08861.pdf. [35] BELKIN M,NIYOGI P,SINDHWANI V.Manifold regularization:a geometric framework for learning from labeled and unlabeled examples[J].Journal of Machine Learning Research,2006,7:2399-2434. [36] PEROZZI B,AL-RFOU R,SKIENA S.DeepWalk:online learning of social representations[C]//Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining.New York,NY:Association for Computing Machinery,2014:701-710.DOI:10.1145/2623330.2623732. [37] ZHU X J,GHAHRAMANI Z,LAFFERTY J.Semi-supervised learning using gaussian fields and harmonic functions[C]//Proceedings of the Twentieth International Conference on Machine Learning(ICML 2003).Palo Alto,CA:AAAI Press,2003:912-919. |
[1] | ZOU Yanli, WANG Yang, LIU Shusheng, YAO Fei. Study of Cascading Failure in the Grid under the Capacity Load Model with Neighbors Degree Information [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(4): 27-36. |
|