An evolving learning style detection approach for online education using bipartite graph embedding

BA Muhammad, C Qi, Z Wu, HK Ahmad - Applied Soft Computing, 2024 - Elsevier
The increasingly widespread online education recently enabled a new form of teaching,
learning, and overall educational outcome. However, the need of personalization is required …

Deep attributed network embedding via weisfeiler-lehman and autoencoder

AT Al-Furas, MF Alrahmawy, WM Al-Adrousy… - IEEE …, 2022 - ieeexplore.ieee.org
Network embedding plays a critical role in many applications. Node classification, link
prediction, and network visualization are examples of such applications. Attributed network …

BotScan: an unsupervised bot detection based on adversarial learning and social perception

H Lin, N Chen, Y Chen, X Li, C Li - 2024 14th Asian Control …, 2024 - ieeexplore.ieee.org
Within online social networks, the rapid expansion of automated accounts, known as social
bots, poses a significant challenge. This dynamic has sparked a strategic contest between …

The Effects of Network Structure Attributes on Growth Performance of Logistics Service Integrators in Logistics Service Supply Chain: Empirical Evidence

X Xu, C He - Sustainability, 2022 - mdpi.com
The purpose of this paper is to investigate the relationship between network structure
attributes, sensing capability and growth performance of logistics service integrators for …

Variational Graph Autoencoder Based on High-Order Attention Mechanism

L Ge, Y Lin, H Li, J Xie - 2023 IEEE 29th International …, 2023 - ieeexplore.ieee.org
Network embedding aims to learn low-dimensional representations of nodes by integrating
the graph structure and node attribute information. In recent years, high-order information …

Self-Supervised Network Embedding for Attribute Networks with Outliers Using High-Order Proximity

Z Wu, Y Wang, K Wu, G Lin, X Xu - Available at SSRN 4851067 - papers.ssrn.com
Real-world networks contain rich semantic information, making attribute network embedding
a vital tool for their analysis and exploitation. Nevertheless, this embedding process …