AI Article Synopsis

  • Clustering techniques group similar objects into clusters, with a focus on attributed graph clustering that combines node attributes and structural data.
  • Oversmoothing in graph convolutional networks (GCNs) can lead to indistinguishable node representations, reducing the number of clusters and degrading performance.
  • This study introduces a smoothness sensor that adapts graph convolutions to prevent oversmoothing, along with a new method for fine-grained smoothness assessment and a self-supervision criterion to improve cluster tightness and separation, achieving superior results compared to existing methods.

Article Abstract

Clustering techniques attempt to group objects with similar properties into a cluster. Clustering the nodes of an attributed graph, in which each node is associated with a set of feature attributes, has attracted significant attention. Graph convolutional networks (GCNs) represent an effective approach for integrating the two complementary factors of node attributes and structural information for attributed graph clustering. Smoothness is an indicator for assessing the degree of similarity of feature representations among nearby nodes in a graph. Oversmoothing in GCNs, caused by unnecessarily high orders of graph convolution, produces indistinguishable representations of nodes, such that the nodes in a graph tend to be grouped into fewer clusters, and pose a challenge due to the resulting performance drop. In this study, we propose a smoothness sensor for attributed graph clustering based on adaptive smoothness-transition graph convolutions, which senses the smoothness of a graph and adaptively terminates the current convolution once the smoothness is saturated to prevent oversmoothing. Furthermore, as an alternative to graph-level smoothness, a novel fine-grained nodewise-level assessment of smoothness is proposed, in which smoothness is computed in accordance with the neighborhood conditions of a given node at a certain order of graph convolution. In addition, a self-supervision criterion is designed considering both the tightness within clusters and the separation between clusters to guide the entire neural network training process. The experiments show that the proposed methods significantly outperform 13 other state-of-the-art baselines in terms of different metrics across five benchmark datasets. In addition, an extensive study reveals the reasons for their effectiveness and efficiency.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2021.3088880DOI Listing

Publication Analysis

Top Keywords

attributed graph
16
graph
12
graph clustering
12
smoothness
8
smoothness sensor
8
adaptive smoothness-transition
8
smoothness-transition graph
8
graph convolutions
8
nodes graph
8
graph convolution
8

Similar Publications

In the realm of access control mechanisms, Attribute-Based Access Control (ABAC) stands out for its dynamic and fine-grained approach, enabling permissions to be allocated based on attributes of subjects, objects, and the environment. This paper introduces a graph model for ABAC, named . The leverages directional flow capacities to enforce access control policies, mapping the potential pathways between a subject and an object to ascertain access rights.

View Article and Find Full Text PDF

New developments in the field of chemical graph theory have made it easier to comprehend how chemical structures relate to the graphs that underlie them on a more profound level using the ideas of classical graph theory. Chemical graphs can be effectively probed with the help of quantitative structure-property relationship (QSPR) analysis. In order to statistically correlate physical attributes.

View Article and Find Full Text PDF

Detecting anomalies in attributed networks has become a subject of interest in both academia and industry due to its wide spectrum of applications. Although most existing methods achieve desirable performance by the merit of various graph neural networks, the way they bundle node-affiliated multidimensional attributes into a whole for embedding calculation hinders their ability to model and analyze anomalies at the fine-grained feature level. To characterize anomalies from each feature dimension, we propose Eagle, a deep framework based on bipartitE grAph learninG for anomaLy dEtection.

View Article and Find Full Text PDF

With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging. Methods based on machine learning and deep learning have achieved remarkable results, but they heavily rely on the distribution of training data, which makes them ineffective in handling unseen samples. In this paper, we propose AG-ZSL, a zero-shot learning framework based on traffic behavior and attribute representations for general encrypted traffic classification.

View Article and Find Full Text PDF

While deep learning techniques have been extensively employed in malware detection, there is a notable challenge in effectively embedding malware features. Current neural network methods primarily capture superficial characteristics, lacking in-depth semantic exploration of functions and failing to preserve structural information at the file level. Motivated by the aforementioned challenges, this paper introduces MalHAPGNN, a novel framework for malware detection that leverages a hierarchical attention pooling graph neural network based on enhanced call graphs.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!