skip to main content
10.1145/3209542.3209571acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
short-paper
Public Access

Embedding Networks with Edge Attributes

Authors Info & Claims
Published:03 July 2018Publication History

ABSTRACT

Predicting links in information networks requires deep understanding and careful modeling of network structure. Network embedding, which aims to learn low-dimensional representations of nodes, has been used successfully for the task of link prediction in the past few decades. Existing methods utilize the observed edges in the network to model the interactions between nodes and learn representations which explain the behavior. In addition to the presence of edges, networks often have information which can be used to improve the embedding. For example, in author collaboration networks, the bag of words representing the abstract of co-authored paper can be used as edge attributes. In this paper, we propose a novel approach, which uses the edges and their associated labels to learn node embeddings. Our model jointly optimizes higher order node neighborhood, social roles and edge attributes reconstruction error using deep architecture which can model highly non-linear interactions. We demonstrate the efficacy of our model over existing state-of-the-art methods on two real world data sets. We observe that such attributes can improve the quality of embedding and yield better performance in link prediction.

References

  1. Lada A Adamic and Eytan Adar. 2003. Friends and neighbors on the web. Social networks, Vol. 25, 3 (2003), 211--230.Google ScholarGoogle Scholar
  2. Amr Ahmed, Nino Shervashidze, Shravan Narayanamurthy, Vanja Josifovski, and Alexander J Smola. 2013. Distributed large-scale natural graph factorization Proceedings of the 22nd international conference on World Wide Web. ACM, 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Réka Albert, Hawoong Jeong, and Albert-László Barabási. 2000. Error and attack tolerance of complex networks. nature, Vol. 406, 6794 (2000), 378--382.Google ScholarGoogle Scholar
  4. Lars Backstrom and Jure Leskovec. 2011. Supervised random walks: predicting and recommending links in social networks Proceedings of the fourth ACM international conference on Web search and data mining. ACM, 635--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. Grarep: Learning graph representations with global structural information. 891--900. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Shiyu Chang, Wei Han, Jiliang Tang, Guo-Jun Qi, Charu C Aggarwal, and Thomas S Huang. 2015. Heterogeneous network embedding via deep architectures Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 119--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Linton C Freeman. 2000. Visualizing social networks. Journal of social structure Vol. 1, 1 (2000), 4.Google ScholarGoogle Scholar
  8. Johannes Gehrke, Paul Ginsparg, and Jon Kleinberg. 2003. Overview of the 2003 KDD Cup. ACM SIGKDD Explorations Vol. 5, 2 (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Palash Goyal and Emilio Ferrara. 2018. Graph embedding techniques, applications, and performance: A survey. Knowledge-Based Systems (2018).Google ScholarGoogle ScholarCross RefCross Ref
  10. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining. ACM, 855--864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Keith Henderson, Brian Gallagher, Tina Eliassi-Rad, Hanghang Tong, Sugato Basu, Leman Akoglu, Danai Koutra, Christos Faloutsos, and Lei Li. 2012. Rolx: structural role extraction & mining in large graphs Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 1231--1239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Xiao Huang, Jundong Li, and Xia Hu. 2017. Accelerated attributed network embedding. In Proceedings of the 2017 SIAM International Conference on Data Mining. SIAM, 633--641.Google ScholarGoogle ScholarCross RefCross Ref
  13. Xiao Huang, Jundong Li, and Xia Hu. 2017. Label informed attributed network embedding. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. ACM, 731--739. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ramon Ferrer i Cancho and Richard V Solé. 2001. The small world of human language. Proceedings of the Royal Society of London B: Biological Sciences, Vol. 268, 1482 (2001), 2261--2265.Google ScholarGoogle ScholarCross RefCross Ref
  15. Paul Jaccard. 1901. Etude comparative de la distribution florale dans une portion des Alpes et du Jura. Impr. Corbaz.Google ScholarGoogle Scholar
  16. Leo Katz. 1953. A new status index derived from sociometric analysis. Psychometrika, Vol. 18, 1 (1953), 39--43.Google ScholarGoogle ScholarCross RefCross Ref
  17. Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google ScholarGoogle Scholar
  18. Bryan Klimt and Yiming Yang. 2004. The enron corpus: A new dataset for email classification research European Conference on Machine Learning. 217--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. David Liben-Nowell and Jon Kleinberg. 2007. The link-prediction problem for social networks. journal of the Association for Information Science and Technology, Vol. 58, 7 (2007), 1019--1031. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kurt Miller, Michael I Jordan, and Thomas L Griffiths. 2009. Nonparametric latent feature models for link prediction Advances in neural information processing systems. 1276--1284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Mark EJ Newman. 2001. Clustering and preferential attachment in growing networks. Physical review E, Vol. 64, 2 (2001), 025102.Google ScholarGoogle Scholar
  22. Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. 2016. Asymmetric transitivity preserving graph embedding Proc. of ACM SIGKDD. 1105--1114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Christopher C Paige and Michael A Saunders. 1981. Towards a generalized singular value decomposition. SIAM J. Numer. Anal. Vol. 18, 3 (1981), 398--405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations Proceedings 20th international conference on Knowledge discovery and data mining. 701--710. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1988. Neurocomputing: Foundations of research. JA Anderson and E. Rosenfeld, Eds (1988), 696--699. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Suvrit Sra and Inderjit S Dhillon. 2006. Generalized nonnegative matrix approximations with Bregman divergences Advances in neural information processing systems. 283--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. Proceedings 24th International Conference on World Wide Web. 1067--1077. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Athanasios Theocharidis, Stjin Van Dongen, Anton Enright, and Tom Freeman. 2009. Network visualization and analysis of gene expression data using BioLayout Express3D. Nature protocols Vol. 4 (2009), 1535--1550.Google ScholarGoogle Scholar
  29. Daixin Wang, Peng Cui, and Wenwu Zhu. 2016. Structural deep network embedding. In Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining. ACM, 1225--1234. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Embedding Networks with Edge Attributes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        HT '18: Proceedings of the 29th on Hypertext and Social Media
        July 2018
        266 pages
        ISBN:9781450354271
        DOI:10.1145/3209542

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 July 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        HT '18 Paper Acceptance Rate19of69submissions,28%Overall Acceptance Rate378of1,158submissions,33%

        Upcoming Conference

        HT '24
        35th ACM Conference on Hypertext and Social Media
        September 10 - 13, 2024
        Poznan , Poland

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader