Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on subgraph counting: concepts, algorithms, and applications to network motifs and graphlets
Computing subgraph frequencies is a fundamental task that lies at the core of several
network analysis methodologies, such as network motifs and graphlet-based metrics, which …
network analysis methodologies, such as network motifs and graphlet-based metrics, which …
Improving graph neural network expressivity via subgraph isomorphism counting
While Graph Neural Networks (GNNs) have achieved remarkable results in a variety of
applications, recent studies exposed important shortcomings in their ability to capture the …
applications, recent studies exposed important shortcomings in their ability to capture the …
A comprehensive survey and experimental study of subgraph matching: trends, unbiasedness, and interaction
Subgraph matching is a fundamental problem in graph analysis. In recent years, many
subgraph matching algorithms have been proposed, making it pressing and challenging to …
subgraph matching algorithms have been proposed, making it pressing and challenging to …
Higher-order organization of complex networks
Networks are a fundamental tool for understanding and modeling complex systems in
physics, biology, neuroscience, engineering, and social science. Many networks are known …
physics, biology, neuroscience, engineering, and social science. Many networks are known …
Martinize2 and vermouth: Unified framework for topology generation
Ongoing advances in force field and computer hardware development enable the use of
molecular dynamics (MD) to simulate increasingly complex systems with the ultimate goal of …
molecular dynamics (MD) to simulate increasingly complex systems with the ultimate goal of …
Smurf-based anti-money laundering in time-evolving transaction networks
Money laundering refers to the criminal attempt of concealing the origins of illegally obtained
money, usually by passing it through a complex sequence of seemingly legitimate financial …
money, usually by passing it through a complex sequence of seemingly legitimate financial …
Fast local subgraph counting
We study local subgraph counting queries, Q=(p, o), to count how many times a given k-
node pattern graph p appears around every node υ in a data graph G when the given center …
node pattern graph p appears around every node υ in a data graph G when the given center …
Political representation and effects of municipal mergers
We study the effects of municipal mergers using novel geocoded data on local public sector
jobs and local politicians' place of residence. We find that the mergers had no effects on …
jobs and local politicians' place of residence. We find that the mergers had no effects on …
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network
Binary code similarity detection, which answers whether two pieces of binary code are
similar, has been used in a number of applications, such as vulnerability detection and …
similar, has been used in a number of applications, such as vulnerability detection and …
Community detection by motif-aware label propagation
Community detection (or graph clustering) is crucial for unraveling the structural properties
of complex networks. As an important technique in community detection, label propagation …
of complex networks. As an important technique in community detection, label propagation …