2023
DOI: 10.26599/tst.2021.9010090
|View full text |Cite
|
Sign up to set email alerts
|

Discovering Association Rules with Graph Patterns in Temporal Networks

Abstract: Discovering regularities between entities in temporal graphs is vital for many real-world applications (e.g., social recommendation, emergency event detection, and cyberattack event detection). This paper proposes temporal graph association rules (TGARs) that extend traditional graph-pattern association rules in a static graph by incorporating the unique temporal information and constraints. We introduce quality measures (e.g., support, confidence, and diversification) to characterize meaningful TGARs that are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…It is worth noting that temporal graph-based methods can hardly generate node representations directly using the adjacency matrix to aggregate neighbor information like a static graph-based method [8], [9]. Due to the special data form of the temporal graph that sorts node interactions by time, temporal methods are trained in batches of data [10]. Thus these methods typically store neighbors in interaction sequences and model future interactions from historical information.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth noting that temporal graph-based methods can hardly generate node representations directly using the adjacency matrix to aggregate neighbor information like a static graph-based method [8], [9]. Due to the special data form of the temporal graph that sorts node interactions by time, temporal methods are trained in batches of data [10]. Thus these methods typically store neighbors in interaction sequences and model future interactions from historical information.…”
Section: Introductionmentioning
confidence: 99%
“…More related to this work, are techniques for rule discovery in property graphs. Examples of some notable works in this area include: 1) [17,27,55,56,57], which investigated the discovery of association rules in property graphs; and 2) [12,16,22,58] on mining keys and dependencies in property graphs-closest to this work. In particular, [12] presents a frequent sub-graph expansion based approach for mining keys in property graphs, whiles [16] proposes efficient parallel graph functional dependency discovery for large property graphs.…”
Section: Rule Discovery In Property Graphsmentioning
confidence: 98%
“…The complete information of a user can build a user profile that reveals significant meta relations [73] . The user profiles, together with the knowledge graph, are typically used for recommendation systems [74,75] . However, massive users' privacy is at risk of being leaked from user profiling.…”
Section: Real World-building Related Security and Privacy Issues And ...mentioning
confidence: 99%
“…Sensory data leakage [61][62][63] , Biometrics leakage [68][69][70] Firewall [59] , Static scan [60] , End-to-end authentication protocol [64] , Two-factor [66] or three-factor [67] Authentication, local storage [72] Real world building Meta user relations [73][74][75] Graph-based framework for privacy preservation [77] , Differential privacy [78] Expandability Third-party tracking [81] , Cross-app tracking [79] Third-party tracking/cross-app tracking analysis tools and detection algorithms [83] , Machine learning based blocking model [84] Combination Virtual economy security [85] , Data security and privacy in digital twin [90] ,…”
Section: Socializationmentioning
confidence: 99%