Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g., node classification and link prediction. Unfortunately, existing network embedding models are vulnerable to random or adversarial perturbations, which may degrade the performance of network embedding when being applied to downstream tasks. To achieve robust network embedding, researchers introduce adversarial training to regularize the embedding learning process by training on a mixture of adversarial examples and original examples. However, existing methods generate adversarial examples heuristically, failing to guarantee the imperceptibility of generated adversarial examples, and thus limit the power of adversarial training. In this paper, we propose a novel method Identity-Preserving Adversarial Training (IPAT) for network embedding, which generates imperceptible adversarial examples with explicit identity-preserving regularization. We formalize such identity-preserving regularization as a multi-class classification problem where each node represents a class, and we encourage each adversarial example to be discriminated as the class of its original node. Extensive experimental results on real-world datasets demonstrate that our proposed IPAT method significantly improves the robustness of network embedding models and the generalization of the learned node representations on various downstream tasks.
Cui P, Wang X, Pei J, Zhu W W. A survey on network embedding. IEEE Trans. Knowledge and Data Engineering , 2019, 31(5): 833–852. DOI: 10.1109/TKDE.2018.2849 727.
Ruan C Y, Wang Y, Ma J G, Zhang Y C, Chen X T. Adversarial heterogeneous network embedding with metapath attention mechanism. Journal of Computer Science and Technology , 2019, 34(6): 1217–1229. DOI: 10.1007/s11390-019-1971-3.
Sen P, Namata G, Bilgic M, Getoor L, Gallagher B, Eliassi-Rad T. Collective classification in network data. AI Magazine , 2008, 29(3): 93–106. DOI: 10.1609/aimag.v29i3.2157.
Golub G H, Reinsch C. Singular value decomposition and least squares solutions. Numerische Mathematik , 1970, 14(5): 403–420. DOI: 10.1007/BF02163027.
Noble W S. What is a support vector machine? Nature Biotechnology , 2006, 24(12): 1565–1567. DOI: 10.1038/nbt 1206-1565.
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, VanderPlas J T, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay É. Scikit-learn: Machine learning in Python. The Journal of Machine Learning Research , 2011, 12: 2825–2830. DOI: 10.5555/1953048.2078195.
Van Der Maaten L, Hinton G. Visualizing data using t-SNE. Journal of Machine Learning Research , 2008, 9(86): 2579–2605.
Hu W B, Chen C, Chang Y M, Zheng Z B, Du Y F. Robust graph convolutional networks with directional graph adversarial training. Applied Intelligence , 2021, 51(11): 7812–7826. DOI: 10.1007/s10489-021-02272-y.