Portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 2
Published in KDD, 2016
Key words: graph embedding, asymmetric transitivity, Generalized SVD (GSVD)
Recommended citation: Ou, Mingdong, et al. "Asymmetric transitivity preserving graph embedding." Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2016. https://zw-zhang.github.io/files/2016_KDD_HOPE.pdf
Published in AAAI, 2018
Key words: dynamic networks, Singular Value Decomposition (SVD), restarts, matrix perturbation
Recommended citation: Zhang, Ziwei, et al. "TIMERS: Error-Bounded SVD Restart on Dynamic Networks." Proceedings of the 32nd AAAI Conference on Artificial Intelligence (2018). https://zw-zhang.github.io/files/2018_AAAI_TIMERS.pdf
Published in TKDE, 2018
Key words: network embedding, dynamic networks, Generalized SVD (GSVD), matrix perturbation
Recommended citation: Zhu, Dingyuan, et al. "High-order Proximity Preserved Embedding For Dynamic Networks." IEEE Transactions on Knowledge and Data Engineering (2018). https://zw-zhang.github.io/files/2018_TKDE_DHPE.pdf
Published in IJCAI, 2018
Key words: trust prediction, sparse component, high-order proximity, matrix factorization
Recommended citation: Wang, Xiao, et al. "Power-law Distribution Aware Trust Prediction." IJCAI. 2018. https://zw-zhang.github.io/files/2018_IJCAI_Trust.pdf
Published in KDD, 2018
Key words: network embedding, arbitrary-order proximity, SVD, eigen-decomposition
Recommended citation: Zhang, Ziwei, et al. "Arbitrary-Order Proximity Preserved Network Embedding." Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2018. https://zw-zhang.github.io/files/2018_KDD_AROPE.pdf
Published in ICDM, 2018
Key words: network embedding, billion-scale, random projection, distributed algorithm, dynamic networks
Recommended citation: Zhang, Ziwei, et al. "Billion-scale Network Embedding with Iterative Random Projection." Data Mining (ICDM), 2018 IEEE International Conference on. IEEE, 2018. https://zw-zhang.github.io/files/2018_ICDM_RandNE.pdf
Published in KDD, 2019
Key words: Graph Convolutional Networks, Robustness, Adversarial Attacks, Deep Learning
Recommended citation: Zhu, Dingyuan, et al. "Robust Graph Convolutional Networks Against Adversarial Attacks". Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2019. https://zw-zhang.github.io/files/2019_KDD_RGCN.pdf
Published:
Graph embedding algorithms embed a graph into a vector space where the structure and the inherent properties of the graph are preserved. The existing graph embedding methods cannot preserve the asymmetric transitivity well, which is a critical property of directed graphs. Asymmetric transitivity depicts the correlation among directed edges, that is, if there is a directed path from u to v, then there is likely a directed edge from u to v. Asymmetric transitivity can help in capturing structures of graphs and recovering from partially observed graphs. To tackle this challenge, we propose the idea of preserving asymmetric transitivity by approximating high-order proximity which are based on asymmetric transitivity. In particular, we develop a novel graph embedding algorithm, High-Order Proximity preserved Embedding (HOPE for short), which is scalable to preserve high-order proximities of large scale graphs and capable of capturing the asymmetric transitivity. More specifically, we first derive a general formulation that cover multiple popular highorder proximity measurements, then propose a scalable embedding algorithm to approximate the high-order proximity measurements based on their general formulation. Moreover, we provide a theoretical upper bound on the RMSE (Root Mean Squared Error) of the approximation. Our empirical experiments on a synthetic dataset and three realworld datasets demonstrate that HOPE can approximate the high-order proximities significantly better than the state-ofart algorithms and outperform the state-of-art algorithms in tasks of reconstruction, link prediction and vertex recommendation.
Published:
Network embedding, which represents nodes in the network by low dimensional vectors, has attracted increasing research attention in the past few years. Despite remarkable progress, many key problems in network embedding remain unexplored, especially when handling large-scale networks. In this talk, I will present our recent works on large-scale network embedding, including how to preserve arbitrary-order proximity, how to handle dynamic networks and how to conduct distributed computing. Possible future directions will also be discussed.
Published:
Network embedding has received increasing research attention in recent years. The existing methods show that the high-order proximity plays a key role in capturing the underlying structure of the network. However, two fundamental problems in preserving the high-order proximity remain unsolved. First, all the existing methods can only preserve fixed-order proximities, despite that proximities of different orders are often desired for distinct networks and target applications. Second, given a certain order proximity, the existing methods cannot guarantee accuracy and efficiency simultaneously.
Published:
Network embedding has received increasing research attention in recent years. The existing methods show that the high-order proximity plays a key role in capturing the underlying structure of the network. However, two fundamental problems in preserving the high-order proximity remain unsolved. First, all the existing methods can only preserve fixed-order proximities, despite that proximities of different orders are often desired for distinct networks and target applications. Second, given a certain order proximity, the existing methods cannot guarantee accuracy and efficiency simultaneously.
Published:
Network embedding has attracted considerable research attention recently. However, the existing methods are incapable of handling billion-scale networks, because they are computationally expensive and, at the same time, difficult to be accelerated by distributed computing schemes.
Published:
In the last decade, deep learning has been a ‘crown jewel’ in artificial intelligence and machine learning. However, utilizing deep learning methods for analyzing the ubiquitous graph data is a non-trivial problem, which attracted considerable research attention in the past few years. In this talk, I will present the categorization of graph-based deep learning methods and review these methods following their history of developments and how these methods solve challenges of graphs. The differences of these models and how to composite different architectures will also be discussed. Finally, I will discuss potential future directions. More details can be found in our survey paper: https://arxiv.org/abs/1812.04202.
Published:
In the last decade, deep learning has been a ‘crown jewel’ in artificial intelligence and machine learning. However, utilizing deep learning methods for analyzing the ubiquitous graph data is a non-trivial problem, which attracted considerable research attention in the past few years. In this guest lecture, I will present the categorization of graph-based deep learning methods and review these methods following their history of developments and how these methods solve challenges of graphs. Finally, I will discuss potential future directions. More details can be found in our survey paper: https://arxiv.org/abs/1812.04202.
Student Instructor, Office of Undergraduate Admissions, Tsinghua University, 2013
A summer program for excellent high school students. Instructors will coordinate different activities such as visiting labs and talks with professors as well as planning for group activities and team building.
Teaching Assistant, Department of Computer Science and Technology, Tsinghua University, 2018
Create and grade course assessments, help lectures preparing for class materials and Q&A after class.