• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A novel method for identifying influential nodes in complex networks based on gravity model

    2022-05-16 07:12:34YuanJiang蔣沅SongQingYang楊松青YuWeiYan嚴玉為TianChiTong童天馳andJiYangDai代冀陽
    Chinese Physics B 2022年5期

    Yuan Jiang(蔣沅) Song-Qing Yang(楊松青) Yu-Wei Yan(嚴玉為)Tian-Chi Tong(童天馳) and Ji-Yang Dai(代冀陽)

    1School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China

    2School of Automation,Nanjing University of Technology,Nanjing 210094,China

    Keywords: influential nodes,gravity model,structural hole,K-shell

    1. Introduction

    With the rapid development of network information technology, studies on complex networks has attracted attention in many fields.[1–4]As one of the core elements of a complex network, influential nodes have a significant impact on the structure and function of the network and are widely studied and applied, such as inhibiting disease spreading,[5]rumor controlling,[6]information dissemination,[7]and traffic network analysis.[8]

    In different research backgrounds, scientists have proposed many measures to identify the influence of nodes. At present, degree centrality[9]is the commonly used measure,which is simple but not accurate. Betweenness centrality[10]and closeness centrality[11]are based on the number of shortest paths between nodes and the average shortest distance respectively, however, the information flow does not always transmit through the shortest path and its time complexity is high. Brockmanet al.[12]proposed a probabilistically motivated effective distance to replace the shortest distance,which can effectively mine the dynamic interaction information between nodes. Kitsaket al.[13]proposed the K-shell decomposition method to determine the locations of nodes in the network, which has low time complexity, however its discrimination is too coarse. To improve the discrimination, Zenget al.[14]proposed a mixed degree decomposition method,which decomposes K-shell based on the mixing degree of the remaining neighbors and the deleted neighbors in the network.Bae and Kimet al.[15]introduced the concept of neighborhood coreness in their improvement of the K-shell method,using the sum of K-shell values of nodes and their neighbors to identify the influence of nodes in the network. Wanget al.[16]proposed a vector centrality method based on the number of multi-order neighbor shells,using the form of vectors to represent the relative influence of nodes in a network. Burtet al.[17]proposed the theory of structural holes and designed the network constraint index to quantify the constraints that nodes are subjected to when they form structural holes,which can identify the bridging nodes in a network. Suet al.[18]proposed a method based on the structural holes of nodes and their neighbors,which considers both the degree centrality and topology of nodes and their neighbors and can effectively identify influential nodes in a network. Yanget al.[19]quantified the complexity of the network based on Tsallis entropy and combined the structural holes and global location information of nodes to identify influential nodes in the network.

    Gravity model is derived from Newton’s law of gravitation, which can represent the interaction between nodes in a complex network. If a node has more interaction with others, the node should be more influential. Based on gravity model, Liet al.[20]considered both neighborhood information and path information to identify influential nodes. Maet al.[21]proposed a gravity model that regards the K-shell value of each node as its mass. Yanet al.[22]proposed a method to identify influential spreaders based on entropy weight method and gravity law.

    Based on the above research works, we propose a novel method for identifying influential nodes in complex networks based on gravity model, called EGMS. The EGMS method considers both the local topology and the global location of nodes in a network. In the EGMS method, the K-shell centrality is used to reflect the global location of nodes and the structure hole characteristics are used to represent the local topology of nodes. At the same time, to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network, the shortest distance is replaced by a probabilistically motivated effective distance.Then this method fully considers the influence of nodes and their neighbors from the aspect of gravity. By using the monotonicity index, susceptible-infected-recovered (SIR) model,and Kendall’s tau coefficient as evaluation criteria, we compare the proposed method with seven existing identification methods on eight real-world networks. The experimental results show the excellent performance of the proposed method and the relationship between different methods.

    The structure of this paper is as follows. In Section 2,we briefly introduce several existing identification methods and the concept of effective distance. In Section 3,a novel method for identifying influential nodes in complex networks based on gravity model is then proposed and presented.In Section 4,the details and results of experiments are then presented. Finally,conclusions will be given in Section 5.

    2. Preliminaries

    Given a complex networkG=(V,E),whereVandErepresent the set of nodes and edges inGrespectively.nandmare the number of nodes and edges. The adjacency matrix of networkGis denoted asAn×n=(ai j)n×n, whereai j=1 if there is a connective relationship between nodeviand nodevj,andai j=0 otherwise.

    2.1. Degree centrality

    Degree centrality[9](DC)is a simple measure for identifying influential nodes. The more DC a node possesses, the more influential it is. It is defined as follows:

    wherekiis the degree of nodevi. Hence nodevi’s degree of next-nearest neighbors isQ(i)=∑ω∈Γ(i)kω,whereΓ(i)is the set ofvi’s nearest neighbors.

    2.2. Betweenness centrality

    Betweenness centrality[10](BC)focuses on the degree of clustering of the shortest path through a node. It is defined as follows:

    2.3. Closeness centrality

    Closeness centrality[11](CC)is defined as the reciprocal of the sum of the shortest distances between a node and all other nodes in the network. It is expressed as follows:

    wheredijdenotes the shortest distance between nodesviandvj.

    2.4. Mixed degree decomposition method

    whereλis an adjustable parameter in range[0, 1], the MDD is consistent with the K-shell decomposition method ifλ=0,and it is equivalent to degree centrality ifλ=1. In this paper,we set the parameterλ=0.7 consistent with Ref.[11].

    2.5. Structural holes theory

    Structural hole theory was put forward by Burt in 1992 when he studied the competitive relationship in social networks.[17]In social networks,structural holes refer to nonredundant relationships between individuals,and there is a gap in complementary information. In order to quantify the control of the structural hole nodes on these relationships, Burt uses the network constraint index (NC) to measure the constraints formed by the nodes in the structural hole. The node is more likely to form structural holes if the index is smaller,and the influence of the node is greater. The network constraint index of nodeviis defined as follows:

    When calculating the network constraint index of nodevi,considering the degree of the node and its neighbors,as well as the topological structure of the node, the weight ratioLijcan be defined as follows:

    2.6. Gravity model

    Gravity model[20](GM) is inspired by Newton’s law of gravity,and it identifies influential nodes by considering both degree centrality and the shortest distance,which is defined as follows:

    2.7. Effective distance

    Effective distance[12](Edis)was proposed by Brockmann and Helbing in 2013 when studying the impact of complex networkdriven on the spreading process of epidemic diseases.Unlike conventional geographic distance and the shortest path distance,effective distance is a probabilistically motivated abstract distance. In the network where information flow is the interaction,it can effectively measure the mutual influence between nodes. The effective lengthdj|ifrom nodevito a directly connected nodevjis defined as follows:

    wherePj|idenotes the ratio of information flow from nodevito nodevj,which can be calculated as follows:

    wherekidenotes the degree of nodeviin the undirected network and the out-degree of nodeviin the directed network,ai jis the element in the adjacency matrixAn×n. For indirectly connected nodeviand nodevj,the effective length between them will be transmitted along the shortest path,e.g.,dj|i=dk|i+dj|klike form.

    The effective distance is defined by the shortest one of all effective lengths from nodevito nodevj, which is expressed as follows:

    whereλ(Γ) andΓdenote the set of all effective lengths and the sum of all the probably paths from nodevito nodevjrespectively. Usually,in the real-world networks,thedj|i/=di|jandDj|i/=Di|j.

    3. Proposed method

    3.1. The EGMS method

    Based on the gravity model, a novel method is proposed for identifying influential nodes in terms of the local topology and the global location,called EGMS.The EGMS method comprehensively examines the structural hole characteristics and K-shell centrality of nodes,replaces the shortest distance with a probabilistically motivated effective distance,and fully considers the influence of nodes and their neighbors from the aspect of gravity. A flowchart of the proposed method is shown in Fig.1,and the further details are as follows:

    Step 1 Calculating the joint K-shell centrality of node pairs

    K-shell centrality is a global measure describing the location of a node in a network,it can reflect both the relationship between each node and the whole network as well as the interaction between distinct nodes. In this paper, the K-shell centrality of each node is obtained by the MDD method mentioned in Subsection 2.4, and the joint K-shell centrality of node pairs can be obtained as follows:

    Step 2 Calculating the joint network constraint index of node pairs

    The network constraint index in structural hole theory is an identification metric based on local topological information of the network,it can be calculate by Eqs.(5)–(7),and the joint network constraint index between nodeviand nodevjcan be calculated as follows:

    Step 3 Calculating the effective distance between all node pairs

    In our proposed EGMS method, the shortest distance is replaced by the probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. The effective distance from one node to another node can be obtained using Eqs.(9)–(11).

    Step 4 Calculating the combined forces of nodes

    By comprehensively considering the K-shell centrality,network constraints and effective distances, the interaction forces between node pairs can be obtained. Thus, the combined force of nodeviis defined as follows:

    Step 5 Getting the final influence of nodes

    Bae and Kim[15]introduced the concept of neighborhood coreness (Cnc+) in improving the K-shell method, which measures the influence of nodes in a network by summing the K-shell values of their neighbors. In this paper, we borrow this concept and fully consider the influence of nodes’neighbors from the aspect of gravity. Based on the above,the final influence of nodevican be calculated as follows:

    Fig.1. The flow chart of our proposed EGMS method.

    3.2. A simpe example

    To better illustrate how the EGMS method works and to initially assess its validity and accuracy,a simple example network with 10 nodes and 14 edges is given in Fig.2,and some properties of each node in the example network are shown in Table 1.

    Fig.2. A simple example network with 10 nodes and 14 edges. Nodes with larger degrees have darker colors.

    Firstly, we calculate the joint K-shell centrality of node pairs by Eq. (12) and the joint network constraint index of node pairs by Eq. (13) respectively. The joint K-shell centrality and the joint network constraint index between nodev4and nodev9can be obtained as follows:

    Secondly, by using Eqs. (9)–(11), the effective distance between nodev4and nodev9can be obtained as follows:

    The above results clearly show thatD4|9andD9|4are not equal, as mentioned in Subsection 2.7. The results of the effective distance from nodev4to the others are shown in Table 2.

    Table 1. Properties of each node in the example network,including DC,MDD,and NC.

    Table 2. Effective distance from node v4 to the others in the example network.

    Table 3. The combined forces of nodes in the example network.

    Table 4. The final influence of nodes in the example network.

    Then,the combined force of nodev4can be obtained by Eq.(14)as follows:

    The final influence of nodes are shown in Table 4.

    According to Table 1 and Table 4, the ranking lists of nodes in the example network measured by different methods are shown in Table 5. As shown in Table 5, the ranking lists of nodes measured by the EGMS method is is similar to other methods, indicating that the EGMS method can effectively identify the influence of nodes. Compared with DC and MDD,the influence of nodev7and nodev8is further discriminated in the EGMS method. And compared with NC,nodev2and nodev6are re-ranked in the EGMS method by considering the influence of their neighbors. Based on the above, the validity and accuracy of EGMS method is initially verified.

    Table 5. The ranking lists of nodes in the example network measured by different methods.

    4. Experimental analysis

    4.1. Dataset

    In this section, eight real-world networks from different fields are chosen for experiments, including the Dolphins,[23]Polbooks,[24]Jazz,[25]USAir,[26]NetScience,[27]C.Elegans,[28]Email,[29]PowerGrid.[30]The statistical characteristics of eight real-world networks are shown in Table 6. The table includes information on the number of nodesn, the number of edgesm, the average degree〈k〉,the clustering coefficientc,the average shortest path length〈d〉, the epidemic thresholdβthin SIR model, and the fixed infection probabilityβ.

    Table 6. Statistical characteristics of eight real-world networks.

    4.2. Comparison methods

    To verify the validity and accuracy of our proposed EGMS method, seven methods are used as comparisons,including degree centrality (DC),[9]betweenness centrality(BC),[10]closeness centrality (CC),[11]mixed degree decomposition method (MDD),[14]network constraint index(NC),[18]neighborhood coreness (Cnc+),[15]and gravity model(GM).[20]

    4.3. Evaluation criteria

    To evaluate the performance of difference methods, several evaluation criteria are presented in this section,including monotonicity index,[15]susceptible–infected–recovered(SIR)model,[31]and Kendall’s tau coefficient.[32]

    The monotonicity indexM(R)is used to quantify the resolution of different identification methods,which is defined as follows:

    whereRis the influence ranking vector of each node obtained by the influence identification method,nis the total number of nodes,andnris the number of nodes with the same influence.The value ofM(R)in range[0,1],which will be higher if the identification method can better distinguish the influence of all nodes in the network.

    The SIR model[31]is used to examine the spreading ability of nodes. In this model, each node in the network can be in one of the following three states: susceptible, infected, or recovered. In the initial stage of spreading,only one infected node in the network, and all other nodes are susceptible. In each timestamp, each one infected node to infect its susceptible neighbors with the infection probabilityβ. At the same time,the infected node recovers with probabilityμ. This process is repeated until there are no susceptible nodes in the network. At the end of SIR spreading process, the number of recovered nodes is regarded as the spreading ability of nodes.For simplicity, the value of the recovery probability is set toμ=1. The spreading process cannot be carried out normally if the infection probabilityβis too small or too large, do the spreading ability of each node cannot be measured accurately.Therefore, we set the epidemic threshold isβth≈〈k〉/〈k2〉,where〈k〉and〈k2〉denote the average degree and average second-order degree of the nodes respectively. The value ofβis set nearβth. As show in Table 6,theβthandβfor different networks are given.

    In order to evaluate the accuracy of the identification method, Kendall’s tau coefficient[32]is used to measure the correlation between the ranking list of nodes’ influence obtained by each identification method and the ranking list of nodes’ spreading ability obtained from the SIR model. Suppose there are two sequencesXandYcontainingnnodes,whereX=(x1,x2,...,xn)andY=(y1,y2,...,yn),and the elements in sequenceXand sequenceYare constructed into a new sequenceXY=((x1,y1),...,(xi,yi),...,(xn,yn)). For any pair of elementsXYi=(xi,yi)andXYj=(xj,yj)in the sequenceXY,if(xi >xjandxi >yj)or(xi <xjandxi <yj),the pair is considered to be concordant.On the contrary,if(xi >xjandxi <yj)or(xi <xjandxi >yj),this pair is considered to be discordant. If (xi=xjandxi=yj), it is considered that the pair is neither concordant nor discordant. Kendall’s tau coefficientτis defined as wherencandndare the numbers of concordant pairs and discordant pairs respectively.The value ofτin range[-1,1].The two sequences are completely positively correlated ifτ=1,that is to say, the closer the value ofτis to 1, the higher the accuracy. On the contrary, the two sequences are completely negatively correlated.

    4.4. Experiments

    4.4.1. Examining the resolution of different identification methods

    In this experiment, the monotonicity index[13]Mis used to examine the resolution of the seven identification methods and our proposed EGMS method,i.e.,the ability to distinguish the influence of nodes. Table 7 records the resolution of the different methods in eight real-world networks, and figure 3 shows the difference more intuitively. As shown in Fig.3,the EGMS method performs very well in the eight networks. In addition, the resolution of CC and GM is also good. Compared with others, the EGMS method gives a higherMvalue in most cases, and the value ofM(EGMS) is very close to or even equal to 1 in all cases. Therefore,the EGMS method performs excellent in distinguish the influence of nodes.

    Fig. 3. The monotonicity index M of eight identification methods in eight real-world networks.

    Table 7. The monotonicity index M of different identification methods.

    4.4.2. The comparisons of different identification methods and SIR model

    In this experiment, the SIR model is used to obtain the spreading ability of nodes and Kendall’s tau coefficient is used to quantify the correlation between the spreading ability and influence of nodes in the networks. The stronger the correlation,the more accurate the identification method is.Due to the randomness of the spreading process of the SIR model,this experiment repeats the spreading process for each node and then takes the average value. For networks|V|<100, the independent experiment is executed 104times; for|V|<103, the independent experiment is executed 103times. Table 8 shows Kendall’s tau coefficient between different identification methods and the SIR model with the fixed infection probability in eight real-world networks, whereσdenotes the ranking lists of the spreading ability of nodes in the networks. The values of the fixed infection probability are shown in Table 6.

    In order to further verify the accuracy and reliability of the proposed method,a series of Kendall’s tau coefficients between different identification methods and SIR model can be obtained by changing the infection probabilityβ. The results are shown in Fig. 4, where the black dashed line denotes the epidemic thresholdβth. From which we can see, the EGMS method outperforms all the methods when the infection probabilityβtakes values near the epidemic thresholdβth. This indicates that the influence of nodes identified by the EGMS method has a significant correlation with the spreading ability of nodes. When the infection probability is far greater than or far less than the epidemic threshold,DC,MDD and GM show better correlation than EGMS in six networks except USAir and PowerGrid. In addition, Cnc+ performed slightly worse than EGMS in most networks and BC performed worst in all cases.According to the above analysis,the EGMS method can identify the influence of nodes more accurately and reliably.

    Table 8. Kendall’s tau coefficient between different identification methods and SIR model with the fixed infection probability.

    4.4.3. Kendall’s τ coefficient for different identification methods to varying scales of topranking nodes

    In this experiment, the scale of nodes examined by Kendall’s tau coefficient is adjusted, which is changed from whole nodes to partial nodes. The correlation results between the top nodes in different scales obtained by different identification methods and the ranking list of the spreading ability of nodes are further studied. The scale of topranking nodes is denotes asL,which is set to 0.05–1.Figure 5 shows the values of Kendall’s tau coefficient for different identification methods to varying scales of topranking nodes nodes. As shown in Fig.5,the EGMS method performs well at various scales of topranking nodes and performs better than all other methods at higher values ofL.

    4.4.4. The relationship between EGMS and other identification methods

    In the final experiment, the relationship between the EGMS method and other identification methods is analyzed.The results are shown in Fig. 6, where each point denotes one node in the network, the color of each point denotes the spreading ability derived by the SIR model,and the horizontal and vertical axes are denote the values of nodes’influence in the network obtained by the EGMS method and other methods respectively. The EGMS method has a strong correlation with one method if the nodes in the figure are linearly distributed.As shown in the distribution of the nodes in Fig. 6, strong correlations are found between EGMS and DC, CC, MMD,and NC, respectively. This indicates that the EGMS method not only takes into account the degree centrality, location information and the closeness between nodes sufficiently, but also has the ability to identify bridging nodes in the network.Moreover,the apparent linear relationship between EGMS and Cnc+and GM indicates that the node rankings are overall similar, and it also demonstrates that EGMS can identify the influence of nodes effectively. From Fig.6,it can also find that some nodes have large values of BC,but their spreading ability is not very strong, so it is not accurate enough to identify the influence of nodes by BC alone.Therefore,the EGMS method is more advantageous than other methods in identifying the influence of nodes in the network.

    Fig.5. Kendall’s τ coefficient for different identification methods to varying scales of top-ranking nodes: (a)Dolphins;(b)Polbooks;(c)Jazz;(d)USAir;(e)NetScience;(f)C.Elegans;(g)Email;(h)PowerGrid.

    Fig. 6. The relationship between EGMS and other identification methods: (a1)–(a7) Dolphins, β =0.15; (b1)–(b7) Polbooks, β =0.1; (c1)–(c7)Jazz,β =0.04;(d1)–(d7)USAir,β =0.03.

    5. Conclusions and discussion

    In this paper,we proposed a novel method for identifying influential nodes in complex networks based on gravity model,called EGMS. For the shortcoming that the existing methods concentrate only on only one aspect,the EGMS method considers both the local topology and the global location information,comprehensively examines the structural hole characteristics and K-shell centrality of nodes At the same time,the shortest distance is replaced by a probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. Then the EGMS method fully considers the influence of nodes and their neighbors from the aspect of gravity to optimize the utilization of available resources. In addition,the EGMS method also has the ability to identify bridging nodes in the network. From the experimental results, the EGMS method can better distinguish differences in the influence of nodes than other identification methods. Further, the EGMS method performs excellent in identifying influential nodes at various scales of topranking nodes. Finding a more effective method combining network topology and propagation dynamics to identify influential nodes in the network is still an open issue. How to improve our proposed EGMS method to reduce its time complexity is our future work.

    Acknowledgment

    Project supported by the National Natural Science Foundation of China(Grant Nos.61663030 and 61663032).

    国产亚洲av嫩草精品影院| 亚洲av成人精品一二三区| 中文字幕av在线有码专区| 久久久久网色| 青青草视频在线视频观看| 日本wwww免费看| 边亲边吃奶的免费视频| 人妻制服诱惑在线中文字幕| 成人欧美大片| 啦啦啦啦在线视频资源| 一区二区三区四区激情视频| 我的女老师完整版在线观看| 国产亚洲5aaaaa淫片| 少妇高潮的动态图| 美女被艹到高潮喷水动态| 久久草成人影院| 国产老妇伦熟女老妇高清| 国产精品日韩av在线免费观看| 91aial.com中文字幕在线观看| 人妻制服诱惑在线中文字幕| 大又大粗又爽又黄少妇毛片口| 麻豆乱淫一区二区| 在线观看美女被高潮喷水网站| 精品久久久久久久久亚洲| 国产免费福利视频在线观看| 看黄色毛片网站| 蜜桃亚洲精品一区二区三区| 午夜激情福利司机影院| 日韩欧美精品免费久久| 一级毛片电影观看 | 高清午夜精品一区二区三区| 欧美变态另类bdsm刘玥| 亚洲精品乱码久久久v下载方式| 在现免费观看毛片| 日韩成人av中文字幕在线观看| 免费电影在线观看免费观看| 日日啪夜夜撸| 99视频精品全部免费 在线| 人人妻人人看人人澡| 国产在线一区二区三区精 | 天天躁日日操中文字幕| 男女啪啪激烈高潮av片| 免费观看在线日韩| 99久久九九国产精品国产免费| 国产欧美日韩精品一区二区| av线在线观看网站| 桃色一区二区三区在线观看| 毛片女人毛片| 国产免费视频播放在线视频 | 又粗又爽又猛毛片免费看| av福利片在线观看| 国产伦理片在线播放av一区| 国产亚洲av片在线观看秒播厂 | 精品午夜福利在线看| 婷婷色综合大香蕉| ponron亚洲| 在线观看66精品国产| 欧美人与善性xxx| 久久久久久久久中文| 在线播放国产精品三级| 极品教师在线视频| 亚洲国产色片| 欧美xxxx黑人xx丫x性爽| 一个人观看的视频www高清免费观看| 色综合站精品国产| 搡女人真爽免费视频火全软件| 国产精品国产三级专区第一集| 精品一区二区三区人妻视频| 黄色日韩在线| 人妻制服诱惑在线中文字幕| 免费av观看视频| 亚洲天堂国产精品一区在线| 亚洲国产成人一精品久久久| 国产中年淑女户外野战色| 国模一区二区三区四区视频| 91久久精品国产一区二区成人| 欧美一区二区亚洲| 色哟哟·www| 又粗又硬又长又爽又黄的视频| 免费电影在线观看免费观看| 精品午夜福利在线看| 亚州av有码| 亚洲av.av天堂| 26uuu在线亚洲综合色| 精品久久久久久久久亚洲| 91久久精品电影网| 日本黄色视频三级网站网址| www.av在线官网国产| 国产探花极品一区二区| 色5月婷婷丁香| 日韩欧美在线乱码| 大又大粗又爽又黄少妇毛片口| 日韩欧美国产在线观看| 别揉我奶头 嗯啊视频| 麻豆精品久久久久久蜜桃| 熟女人妻精品中文字幕| 非洲黑人性xxxx精品又粗又长| 国产亚洲精品久久久com| 国产在视频线精品| 嫩草影院入口| 免费搜索国产男女视频| 91在线精品国自产拍蜜月| 国产一区二区亚洲精品在线观看| 亚洲av成人av| 日韩三级伦理在线观看| 在线免费观看的www视频| 菩萨蛮人人尽说江南好唐韦庄 | 九九久久精品国产亚洲av麻豆| 深夜a级毛片| 国产精品无大码| 日日啪夜夜撸| 亚洲精品久久久久久婷婷小说 | 亚洲精品成人久久久久久| 国产午夜精品久久久久久一区二区三区| 日韩精品青青久久久久久| 欧美三级亚洲精品| 成年女人看的毛片在线观看| 人人妻人人澡人人爽人人夜夜 | 欧美成人精品欧美一级黄| a级毛色黄片| 日本黄色片子视频| 久久久国产成人精品二区| 婷婷色av中文字幕| 欧美另类亚洲清纯唯美| 晚上一个人看的免费电影| 中文字幕制服av| 晚上一个人看的免费电影| 欧美极品一区二区三区四区| 久久久久久久国产电影| 99久国产av精品| 国产一区二区在线观看日韩| 国产乱人视频| 国产三级中文精品| 日韩av在线免费看完整版不卡| 中文亚洲av片在线观看爽| 白带黄色成豆腐渣| 岛国毛片在线播放| 免费无遮挡裸体视频| 国语自产精品视频在线第100页| 看十八女毛片水多多多| av天堂中文字幕网| 国产亚洲5aaaaa淫片| 国产成年人精品一区二区| 午夜福利在线观看吧| 成年免费大片在线观看| 亚洲av中文字字幕乱码综合| 国产白丝娇喘喷水9色精品| 日本与韩国留学比较| 成年女人永久免费观看视频| 亚洲高清免费不卡视频| 国产黄片视频在线免费观看| 国产在视频线精品| 午夜激情福利司机影院| 91精品国产九色| 日韩视频在线欧美| 日韩成人伦理影院| 三级经典国产精品| 日韩一本色道免费dvd| 91午夜精品亚洲一区二区三区| 亚洲av成人精品一二三区| 国产成人福利小说| 青春草亚洲视频在线观看| 99九九线精品视频在线观看视频| 嫩草影院精品99| 成人漫画全彩无遮挡| 91久久精品国产一区二区成人| 亚洲国产精品成人综合色| 淫秽高清视频在线观看| 日本免费a在线| 一个人免费在线观看电影| 免费观看性生交大片5| 一区二区三区四区激情视频| 国产免费视频播放在线视频 | 国产高清视频在线观看网站| 长腿黑丝高跟| 久久久久久国产a免费观看| 久久精品综合一区二区三区| 观看美女的网站| 国产免费视频播放在线视频 | 91在线精品国自产拍蜜月| 国产免费视频播放在线视频 | 综合色丁香网| 国产免费视频播放在线视频 | 一区二区三区四区激情视频| 好男人视频免费观看在线| 国产精华一区二区三区| 国内精品宾馆在线| 99热6这里只有精品| 超碰97精品在线观看| 午夜福利成人在线免费观看| 亚洲精品一区蜜桃| 中文字幕久久专区| 国产又色又爽无遮挡免| 日韩成人伦理影院| 国产精品国产高清国产av| 夜夜看夜夜爽夜夜摸| 国产女主播在线喷水免费视频网站 | 超碰av人人做人人爽久久| 青春草亚洲视频在线观看| av在线播放精品| 亚洲精品影视一区二区三区av| 日本一二三区视频观看| 亚洲国产色片| 国产视频内射| 特大巨黑吊av在线直播| 亚洲在线自拍视频| 97超碰精品成人国产| 少妇熟女aⅴ在线视频| 成年女人看的毛片在线观看| 熟女电影av网| 国产又色又爽无遮挡免| 啦啦啦观看免费观看视频高清| 国产91av在线免费观看| 午夜久久久久精精品| 亚洲av成人精品一区久久| 日韩在线高清观看一区二区三区| 熟妇人妻久久中文字幕3abv| 免费av不卡在线播放| 91午夜精品亚洲一区二区三区| 亚洲综合色惰| 久久精品影院6| 一个人免费在线观看电影| 亚洲国产最新在线播放| 99在线视频只有这里精品首页| 超碰97精品在线观看| 欧美潮喷喷水| 寂寞人妻少妇视频99o| 精品一区二区免费观看| 综合色av麻豆| 久久久久网色| 成人美女网站在线观看视频| 国产亚洲av片在线观看秒播厂 | 18禁裸乳无遮挡免费网站照片| 国产v大片淫在线免费观看| 一级毛片aaaaaa免费看小| 国产毛片a区久久久久| 国产三级中文精品| 免费av毛片视频| av在线天堂中文字幕| 男插女下体视频免费在线播放| 一级av片app| 波多野结衣巨乳人妻| 日韩一本色道免费dvd| 久久久久久久久久黄片| 偷拍熟女少妇极品色| 日本一二三区视频观看| 99久久人妻综合| av在线亚洲专区| 永久免费av网站大全| 久久久久精品久久久久真实原创| 精品免费久久久久久久清纯| 成人av在线播放网站| 国产精品永久免费网站| 天天一区二区日本电影三级| 亚洲av中文av极速乱| 99热网站在线观看| 六月丁香七月| 亚洲av不卡在线观看| 国产成人午夜福利电影在线观看| 亚洲国产高清在线一区二区三| 亚洲av.av天堂| 色播亚洲综合网| 九九爱精品视频在线观看| 人人妻人人澡人人爽人人夜夜 | 国产日韩欧美在线精品| 欧美最新免费一区二区三区| 久久99蜜桃精品久久| 男女国产视频网站| 中文字幕精品亚洲无线码一区| 日韩视频在线欧美| 精品不卡国产一区二区三区| 久久亚洲精品不卡| 最近中文字幕高清免费大全6| 麻豆乱淫一区二区| 成人午夜精彩视频在线观看| 日韩人妻高清精品专区| 亚洲综合色惰| 少妇裸体淫交视频免费看高清| 亚洲欧美日韩高清专用| 乱码一卡2卡4卡精品| 最近中文字幕2019免费版| 日本午夜av视频| 成人特级av手机在线观看| 人妻少妇偷人精品九色| 欧美一级a爱片免费观看看| 麻豆久久精品国产亚洲av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 好男人在线观看高清免费视频| 欧美高清性xxxxhd video| 国产精品不卡视频一区二区| 插逼视频在线观看| 国产 一区精品| 亚洲av成人av| 午夜福利在线观看吧| 成人鲁丝片一二三区免费| 可以在线观看毛片的网站| 国产熟女欧美一区二区| 高清日韩中文字幕在线| 天天躁日日操中文字幕| 老师上课跳d突然被开到最大视频| 国产精品99久久久久久久久| av免费观看日本| 69人妻影院| 18禁动态无遮挡网站| 国产伦在线观看视频一区| 自拍偷自拍亚洲精品老妇| 午夜亚洲福利在线播放| 久久精品久久久久久久性| 日本一本二区三区精品| 国产精品.久久久| 中文欧美无线码| 国产黄a三级三级三级人| 欧美xxxx黑人xx丫x性爽| 日本黄色片子视频| 最近中文字幕2019免费版| 亚州av有码| 99久久无色码亚洲精品果冻| 成年av动漫网址| 99视频精品全部免费 在线| 亚洲欧美成人综合另类久久久 | 人人妻人人看人人澡| 亚洲自拍偷在线| 日本免费a在线| 久99久视频精品免费| 色尼玛亚洲综合影院| 国产探花极品一区二区| 午夜福利网站1000一区二区三区| 久久久久久久久久黄片| 国语对白做爰xxxⅹ性视频网站| 成年av动漫网址| 亚洲欧美日韩东京热| 日产精品乱码卡一卡2卡三| 天堂√8在线中文| 国语对白做爰xxxⅹ性视频网站| 九九爱精品视频在线观看| 日韩成人伦理影院| 在线观看av片永久免费下载| 亚洲精品乱久久久久久| videossex国产| 内地一区二区视频在线| 久久久久国产网址| 99久久中文字幕三级久久日本| 日韩欧美精品免费久久| 真实男女啪啪啪动态图| 国产免费福利视频在线观看| 日本猛色少妇xxxxx猛交久久| 三级毛片av免费| 亚洲国产日韩欧美精品在线观看| av在线观看视频网站免费| 美女xxoo啪啪120秒动态图| 美女高潮的动态| 男人的好看免费观看在线视频| 亚洲久久久久久中文字幕| 亚洲成人av在线免费| www.色视频.com| 大香蕉97超碰在线| 免费人成在线观看视频色| 两个人的视频大全免费| АⅤ资源中文在线天堂| 最近2019中文字幕mv第一页| 联通29元200g的流量卡| 国产av在哪里看| 最近中文字幕高清免费大全6| 亚洲av不卡在线观看| 国产黄片美女视频| 国产精品一区二区三区四区久久| 久久午夜福利片| 最近最新中文字幕大全电影3| 我的老师免费观看完整版| 国产一区二区亚洲精品在线观看| 麻豆乱淫一区二区| 亚洲国产精品合色在线| 在线免费观看的www视频| 国产黄色视频一区二区在线观看 | 人人妻人人澡欧美一区二区| 午夜亚洲福利在线播放| 18禁动态无遮挡网站| 精品酒店卫生间| 久久这里只有精品中国| 丰满少妇做爰视频| 99热这里只有是精品50| 麻豆久久精品国产亚洲av| 亚洲av成人av| 国产成人aa在线观看| 久久久欧美国产精品| 国产精品福利在线免费观看| 观看美女的网站| 亚洲av不卡在线观看| 国内少妇人妻偷人精品xxx网站| 久久精品久久精品一区二区三区| 成人欧美大片| 黄片无遮挡物在线观看| 综合色丁香网| 欧美另类亚洲清纯唯美| av福利片在线观看| 日韩三级伦理在线观看| 久久久久网色| 免费av观看视频| 日韩精品有码人妻一区| 禁无遮挡网站| 亚洲欧美成人精品一区二区| av免费观看日本| 国产精品久久视频播放| 久久久欧美国产精品| 亚洲伊人久久精品综合 | 中文字幕免费在线视频6| 高清午夜精品一区二区三区| 精品久久久久久久久av| 国产精品一二三区在线看| 在线观看66精品国产| 床上黄色一级片| 欧美3d第一页| 波野结衣二区三区在线| 长腿黑丝高跟| 国产精品国产三级国产专区5o | 国产黄片视频在线免费观看| 国产久久久一区二区三区| av在线蜜桃| 日本爱情动作片www.在线观看| 别揉我奶头 嗯啊视频| 寂寞人妻少妇视频99o| 狠狠狠狠99中文字幕| 高清在线视频一区二区三区 | 欧美日本亚洲视频在线播放| 卡戴珊不雅视频在线播放| 中文在线观看免费www的网站| 麻豆久久精品国产亚洲av| 成人漫画全彩无遮挡| videos熟女内射| 国产高潮美女av| 国产精品精品国产色婷婷| 极品教师在线视频| 在线a可以看的网站| 麻豆国产97在线/欧美| a级毛色黄片| 伦理电影大哥的女人| 色吧在线观看| 亚洲欧美一区二区三区国产| 亚洲欧美日韩东京热| 久久久久久伊人网av| 国产成人aa在线观看| 久久久久久久久久成人| 国内揄拍国产精品人妻在线| 1024手机看黄色片| 伦精品一区二区三区| 国产 一区精品| videossex国产| 国产淫语在线视频| 久久久午夜欧美精品| 久久精品久久精品一区二区三区| 欧美成人午夜免费资源| 久久久亚洲精品成人影院| 成人午夜高清在线视频| 国产色爽女视频免费观看| 少妇高潮的动态图| 伊人久久精品亚洲午夜| 在线观看一区二区三区| 久久久久久国产a免费观看| 2021少妇久久久久久久久久久| 久久精品熟女亚洲av麻豆精品 | 久久草成人影院| 夫妻性生交免费视频一级片| 中文精品一卡2卡3卡4更新| 韩国高清视频一区二区三区| 白带黄色成豆腐渣| 久久人人爽人人爽人人片va| 国产亚洲一区二区精品| 三级男女做爰猛烈吃奶摸视频| 中文精品一卡2卡3卡4更新| 久久草成人影院| 日本黄大片高清| 日韩成人av中文字幕在线观看| av在线老鸭窝| 午夜福利在线在线| 美女内射精品一级片tv| 18+在线观看网站| 少妇人妻一区二区三区视频| 亚洲av免费高清在线观看| 日韩成人伦理影院| 亚洲伊人久久精品综合 | 中文字幕av在线有码专区| 亚洲美女视频黄频| 亚洲国产色片| 成年女人看的毛片在线观看| 国产高清有码在线观看视频| 麻豆一二三区av精品| 国产精品一及| 国产一级毛片在线| 国产爱豆传媒在线观看| 国产精品久久视频播放| av在线亚洲专区| 国产一区二区在线av高清观看| 色尼玛亚洲综合影院| 自拍偷自拍亚洲精品老妇| 成人无遮挡网站| 91狼人影院| 亚洲熟妇中文字幕五十中出| 久久草成人影院| 边亲边吃奶的免费视频| 国产免费视频播放在线视频 | 亚洲国产精品久久男人天堂| 国产三级中文精品| 大香蕉97超碰在线| 不卡视频在线观看欧美| 亚洲欧洲日产国产| 成人综合一区亚洲| 亚洲av.av天堂| 国产91av在线免费观看| 汤姆久久久久久久影院中文字幕 | www.色视频.com| 久久久国产成人精品二区| 亚洲av中文av极速乱| 亚洲国产精品成人久久小说| 美女脱内裤让男人舔精品视频| 国产精品爽爽va在线观看网站| 可以在线观看毛片的网站| 精品午夜福利在线看| 如何舔出高潮| 婷婷色麻豆天堂久久 | 日本熟妇午夜| 男女国产视频网站| 久久精品熟女亚洲av麻豆精品 | 国产熟女欧美一区二区| 精品免费久久久久久久清纯| 小蜜桃在线观看免费完整版高清| 国产精品,欧美在线| 18禁在线播放成人免费| 国产探花在线观看一区二区| 国产成人免费观看mmmm| 99热这里只有精品一区| 国产精品福利在线免费观看| 国产成人aa在线观看| 国产午夜福利久久久久久| 两个人视频免费观看高清| 日韩成人伦理影院| 国产成人福利小说| 久久久精品大字幕| 亚洲一级一片aⅴ在线观看| 中文字幕制服av| 日本色播在线视频| 久久久久性生活片| 亚洲精品自拍成人| 在现免费观看毛片| 日韩,欧美,国产一区二区三区 | 日本一本二区三区精品| 亚洲av男天堂| 国产久久久一区二区三区| 日韩中字成人| 久久草成人影院| 村上凉子中文字幕在线| 国产人妻一区二区三区在| 身体一侧抽搐| 2021少妇久久久久久久久久久| 亚洲经典国产精华液单| 两个人视频免费观看高清| 欧美日韩国产亚洲二区| 在线观看美女被高潮喷水网站| 久久久久免费精品人妻一区二区| 男女国产视频网站| 赤兔流量卡办理| 淫秽高清视频在线观看| 亚洲丝袜综合中文字幕| 国产高清视频在线观看网站| 真实男女啪啪啪动态图| 国产精品,欧美在线| 级片在线观看| www.色视频.com| 国产在线一区二区三区精 | av在线天堂中文字幕| 亚洲性久久影院| 观看美女的网站| 麻豆成人av视频| 淫秽高清视频在线观看| 欧美变态另类bdsm刘玥| 丰满乱子伦码专区| 可以在线观看毛片的网站| 久久精品影院6| 大又大粗又爽又黄少妇毛片口| 爱豆传媒免费全集在线观看| 高清在线视频一区二区三区 | av在线天堂中文字幕| 中文资源天堂在线| 国产视频首页在线观看| 麻豆一二三区av精品| 日本猛色少妇xxxxx猛交久久| 啦啦啦观看免费观看视频高清| 97超视频在线观看视频| 老女人水多毛片| 我的女老师完整版在线观看| 欧美成人午夜免费资源| 男女下面进入的视频免费午夜| 18禁动态无遮挡网站| 精品久久久久久久久亚洲| 亚洲久久久久久中文字幕| 亚洲怡红院男人天堂| 十八禁国产超污无遮挡网站| 一边亲一边摸免费视频| 赤兔流量卡办理| 超碰av人人做人人爽久久| 国产免费男女视频| 69人妻影院| 一个人看的www免费观看视频| 亚洲va在线va天堂va国产| 精品熟女少妇av免费看| 男人和女人高潮做爰伦理| 日本黄大片高清| 久99久视频精品免费| 汤姆久久久久久久影院中文字幕 | 日本与韩国留学比较| 男人狂女人下面高潮的视频| 2022亚洲国产成人精品| 国产真实乱freesex| 22中文网久久字幕| 建设人人有责人人尽责人人享有的 | 午夜激情欧美在线|