A survey on heterogeneous graph embedding: methods, techniques, applications and sources

X Wang, D Bo, C Shi, S Fan, Y Ye… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Heterogeneous graphs (HGs) also known as heterogeneous information networks have
become ubiquitous in real-world scenarios; therefore, HG embedding, which aims to learn …

Network alignment

R Tang, Z Yong, S Jiang, X Chen, Y Liu, YC Zhang… - Physics Reports, 2025 - Elsevier
Complex networks are frequently employed to model physical or virtual complex systems.
When certain entities exist across multiple systems simultaneously, unveiling their …

Key player identification in underground forums over attributed heterogeneous information network embedding framework

Y Zhang, Y Fan, Y Ye, L Zhao, C Shi - Proceedings of the 28th ACM …, 2019 - dl.acm.org
Online underground forums have been widely used by cybercriminals to exchange
knowledge and trade in illicit products or services, which have played a central role in the …

Higitclass: Keyword-driven hierarchical classification of github repositories

Y Zhang, FF Xu, S Li, Y Meng, X Wang… - … Conference on Data …, 2019 - ieeexplore.ieee.org
GitHub has become an important platform for code sharing and scientific exchange. With the
massive number of repositories available, there is a pressing need for topic-based search …

MFLink: User identity linkage across online social networks via multimodal fusion and adversarial learning

S Li, D Lu, Q Li, X Wu, S Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As an essential step in the online social network research, user identity linkage aims to
identify different accounts belonging to the same natural person. Many existing methods rely …

Vulnerability intelligence alignment via masked graph attention networks

Y Qin, Y **ao, X Liao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Cybersecurity vulnerability information is often sourced from multiple channels, such as
government vulnerability repositories, individually maintained vulnerability-gathering …

Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach

B Lazarine, S Samtani, M Patton, H Zhu… - … on Intelligence and …, 2020 - ieeexplore.ieee.org
The scientific cyberinfrastructure community heavily relies on public internet-based systems
(eg, GitHub) to share resources and collaborate. GitHub is one of the most powerful and …

A heterogeneous network structure publishing security framework based on cloud-edge collaboration

L Qu, Y Wang, J Yang, M Zhao - Computer Networks, 2023 - Elsevier
With the integration of different fields, a large amount of heterogeneous data converges into
a heterogeneous network with different types of nodes and edges. Then it is published by …

Metagraph aggregated heterogeneous graph neural network for illicit traded product identification in underground market

Y Fan, Y Ye, Q Peng, J Zhang, Y Zhang… - … Conference on Data …, 2020 - ieeexplore.ieee.org
The emerging underground markets (eg, Hack Forums) have been widely used by
cybercriminals to trade in illicit products or services, which have played a vital role in the …

HUNA: A method of hierarchical unsupervised network alignment for IoT

D Zhu, Y Sun, H Du, N Cao, T Baker… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
With the advent of the era of the Internet of Things (IoT), a large number of interconnected
smart devices form a huge network. The network can be abstracted as a graph, and we …