About
49
Publications
7,259
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,116
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (49)
Differential equations are widely used to describe complex dynamical systems with evolving parameters in nature and engineering. Effectively learning a family of maps from the parameter function to the system dynamics is of great significance. In this study, we propose a novel learning framework of symbolic continuous-depth neural networks, termed...
Differential equations are widely used to describe complex dynamical systems with evolving parameters in nature and engineering. Effectively learning a family of maps from the parameter function to the system dynamics is of great significance. In this study, we propose a novel learning framework of symbolic continuous-depth neural networks, termed...
Modeling complex systems using standard neural ordinary differential equations (NODEs) often faces some essential challenges, including high computational costs and susceptibility to local optima. To address these challenges, we propose a simulation-free framework, called Fourier NODEs (FNODEs), that effectively trains NODEs by directly matching th...
Modeling complex systems using standard neu-ral ordinary differential equations (NODEs) often faces some essential challenges, including high computational costs and susceptibility to local optima. To address these challenges, we propose a simulation-free framework, called Fourier NODEs (FNODEs), that effectively trains NODEs by directly matching t...
In many fields, accurate prediction of cascade outbreaks during their early stages of propagation is of paramount importance. Based on percolation theory, we propose a global propagation probability algorithm that effectively estimates the probability of information spreading from source nodes to the giant component. Building on this, we further in...
Recently, machine learning methods, including reservoir computing (RC), have been tremendously successful in predicting complex dynamics in many fields. However, a present challenge lies in pushing for the limit of prediction accuracy while maintaining the low complexity of the model. Here, we design a data-driven, model-free framework named higher...
Detection in high fidelity of tipping points, the emergence of which is often induced by invisible changes in internal structures or/and external interferences, is paramountly beneficial to understanding and predicting complex dynamical systems (CDSs). Detection approaches, which have been fruitfully developed from several perspectives (e.g., stati...
Science and technology capability refers to the comprehensive capability of all factors that affect the development of science and technology, mainly referring to human and material factors related to science and technology, among which human resources are the foundation and driving force. Therefore, researchers become a unique research perspective...
Event detection is one of the most important areas of complex network research. It aims to identify abnormal points in time corresponding to social events. Traditional methods of event detection, based on first-order network models, are poor at describing the multivariate sequential interactions of components in complex systems and at accurately id...
The social network is closely related to people’s lives. And social events are the products of the human subjective initiative during the evolution of networks. Therefore, there is a close correlation between social events and network evolution. This paper studies the characteristics of network evolution corresponding to social events from the pers...
Identification of multiple influential spreaders on complex networks is of great significance, which can help us speed up information diffusion and prevent disease from spreading to some extent. The traditional top-k strategy to solve an influence maximization problem based on node centrality is unsuitable for selecting several spreaders simultaneo...
We propose a novel dynamic link weight adjustment model, in which link weights on static network will be dynamically adjusted according to agents’ influence during the evolutionary process. To be specific, when an agent’s strategy is learned by one of his direct neighbors, his influence will be expanded by one unit β. Then link weights between agen...
Anomaly detection is a classic problem on complex networks. An anomaly detection method based on network projection is proposed in this study on networks with fundamental bipartite connection relationships and repeated interactions, such as the Internet and computer networks. First of all, two network partition algorithms are advanced to discover t...
With the increasing network threat, network anomaly detection has become a very challenging and indispensable task. In this article, we propose an anomaly detection algorithm through modeling computer network as temporal network. The active subnetwork is extracted from the original computer communication network and then projected to an undirected...
Based on percolation theory and the independent cascade model, this paper considers the selection of the optimal propagation source when the propagation probability is greater than the percolation threshold. First, based on the percolation characteristics of real networks, this paper presents an iterative algorithm of linear complexity to solve the...
Intention usually refers to the intention to achieve a certain purpose, which is the realistic power to motivate people to act. At present, with the development of the Internet and social media, the scope of human activities is becoming larger and deeper. In the academic circle, the cooperation between scientific research workers is becoming closer...
Source localization is a typical inverse problem in complex networks, which is widely used in disease outbreak, rumor propagation and pollutants spread. In this paper, we propose that, based on network topology and the times at which the diffusion reached partial nodes, it is easy to identify the source. The results show that in six different netwo...
Simultaneous outbreaks of contagion are a great threat against human life, resulting in great panic in society. It is urgent for us to find an efficient multiple sources localization method with the aim of studying its pathogenic mechanism and minimizing its harm. However, our ability to locate multiple sources is strictly limited by incomplete inf...
Locating the source that undergoes a diffusion-like process is a fundamental and challenging problem in complex network, which can help inhibit the outbreak of epidemics among humans, suppress the spread of rumors on the Internet, prevent cascading failures of power grids, etc. However, our ability to accurately locate the diffusion source is stric...
Epidemic source localization is one of the most meaningful areas of research in complex networks, which helps solve the problem of infectious disease spread. Limited by incomplete information of nodes and inevitable randomness of the spread process, locating the epidemic source becomes a little difficult. In this paper, we propose an efficient algo...
With the deep understanding of the time-varying characteristics of real systems, research studies focusing on the temporal network spring up like mushrooms. Community detection is an accompanying and meaningful problem in the temporal network, but the analysis of this problem is still in its developing stage. In this paper, we proposed a temporal s...
Identification of multiple influential seed spreaders is one of the most promising domain in the research area of complex networks, which is also called the influence maximization problem in sociology domains. In order to evaluate the spreading ability of nodes in networks, many centrality-based indices have been proposed and achieved relatively go...
Multiplex networks are a special class of multilayered networks in which a fixed set of nodes is connected by different types of links. The core organization, the residual graph from recursively removing dead-end nodes and their nearest neighbor, plays a significant role in a wide range of typical problems. However previous study about core structu...
The study of identifying important nodes in networks has a wide application in different fields. However, the current researches are mostly based on static or aggregated networks. Recently, the increasing attention to networks with time-varying structure promotes the study of node centrality in temporal networks. In this paper, we define a supra-ev...
How to effectively identify a set of influential spreaders in complex networks is of great theoretical and practical value, which can help to inhibit the rapid spread of epidemics, promote the sales of products by word-of-mouth advertising, and so on. A naive strategy is to select the top ranked nodes as identified by some centrality indices, and o...
The topological structure of many real networks changes with time. Thus, locating the sources of a temporal network is a creative and challenging problem, as the enormous size of many real networks makes it unfeasible to observe the state of all nodes. In this paper, we propose an algorithm to solve this problem, named the backward temporal diffusi...
It is a crucial and fundamental issue to identify a small subset of influential spreaders that can control the spreading process in networks. In previous studies, a degree-based heuristic called DegreeDiscount has been shown to effectively identify multiple influential spreaders and has severed as a benchmark method. However, the basic assumption o...
Gnutella.
Data of Gnutella peer-to-peer network.
(RAR)
Cond-mat.
Data of Cond-mat collaboration network.
(RAR)
Epinions.
Data of Epinions social network.
(RAR)
Enron.
Data of Enron email communication network.
(RAR)
Link prediction plays a significant role in explaining the evolution of networks. However it is still a challenging problem that has been addressed only with topological information in recent years. Based on the belief that network nodes with a great number of common neighbors are more likely to be connected, many similarity indices have achieved c...
Recent years, the studies of link prediction have been overwhelmingly emphasizing on undirected networks. Compared with it, how to identify missing and spurious interactions in directed networks has received less attention and still is not well understood. In this paper, we make use of classical link prediction indices for undirected networks, adap...
Link prediction in directed network is attracting growing interest among many network scientists. Compared with predicting the existence of a link, determining its direction is more complicated. In this paper, we propose an efficient solution named Local Directed Path to predict link direction. By adding an extra ground node to the network, we solv...
In practice, complex systems often change over time, and the temporal characteristics of a complex network make their behavior difficult to predict. Traditional link prediction methods based on structural similarity are good for mining underlying information from static networks, but do not always capture the temporal relevance of dynamic networks....
Mining how network evolves is a crucial topic in extracting underlying information from networks. Among all the mechanisms, Common Neighbor (CN) and Preferential Attachment (PA) are basic and efficient. Recently, a new framework named Local-Community-Paradigm (LCP) provides a self-organized mechanism about the evolution of networks. Via using commu...
Plenty of algorithms for link prediction have been proposed to extract
missing information, identify spurious interactions, reconstruct
networks, and so on. Stochastic block models are one of the most
accurate methods among all of them. However, this algorithm is designed
only for simple graphs and ignores the variation in node degree which is
typi...
In this paper we give three methods on the constructions of vectorial bent functions from F2n to F2n2, where n is a positive even integer. The first two kinds of functions are based on monomial bent functions. The third kind of functions are based on partial spreads bent functions, and those vectorial bent functions can achieve the largest algebrai...
In this project we compare communication structure and content exchanged by members of creative, interdisciplinary teams of medical researchers, physicians, patients and caretakers with their creative output. We find that longitudinal social networking patterns and word usage predict creative performance. We collected the e-mail archives of 60 memb...
This paper describes early work trying to predict financial market movement such as gold price, crude oil price, currency exchange rates and stock market indicators by analyzing Twitter posts. We collected Twitter feeds for 5 months obtaining a large set of emotional retweets originating from within the US, from which six public opinion time series...
In this paper, we formally define and study the event graph model based on set theory and multi-relations theory, and discuss the methods of modeling event and event relations in detail. The event graph model is mainly designed to extract the potential events and the relationships between events from massive text streams, and further discover the t...
This paper describes early work trying to predict stock market indicators such as Dow Jones, NASDAQ and S&P 500 by analyzing Twitter posts. We collected the twitter feeds for six months and got a randomized subsample of about one hundredth of the full volume of all tweets. We measured collective hope and fear on each day and analyzed the correlatio...
Massive text stream is a very important source of information. There are rich graph structures contained in massive texts, which can be used as an effective method to mine trends embodied in the contents in text streams. This paper formally defines the event graph model based on systems science theory, and discusses its properties. This model aims...
In this paper, we propose a general framework for content mining, which combines statistical model and network structure to leverages the power of both statistical topic models and network method. This method is a novel view to both text oriented method and network oriented method. The proposed framework is general, it can be applied to any text co...