• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A novel method for identifying influential nodes in complex networks based on gravity model

    2022-05-16 07:12:34YuanJiang蔣沅SongQingYang楊松青YuWeiYan嚴玉為TianChiTong童天馳andJiYangDai代冀陽
    Chinese Physics B 2022年5期

    Yuan Jiang(蔣沅) Song-Qing Yang(楊松青) Yu-Wei Yan(嚴玉為)Tian-Chi Tong(童天馳) and Ji-Yang Dai(代冀陽)

    1School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China

    2School of Automation,Nanjing University of Technology,Nanjing 210094,China

    Keywords: influential nodes,gravity model,structural hole,K-shell

    1. Introduction

    With the rapid development of network information technology, studies on complex networks has attracted attention in many fields.[1–4]As one of the core elements of a complex network, influential nodes have a significant impact on the structure and function of the network and are widely studied and applied, such as inhibiting disease spreading,[5]rumor controlling,[6]information dissemination,[7]and traffic network analysis.[8]

    In different research backgrounds, scientists have proposed many measures to identify the influence of nodes. At present, degree centrality[9]is the commonly used measure,which is simple but not accurate. Betweenness centrality[10]and closeness centrality[11]are based on the number of shortest paths between nodes and the average shortest distance respectively, however, the information flow does not always transmit through the shortest path and its time complexity is high. Brockmanet al.[12]proposed a probabilistically motivated effective distance to replace the shortest distance,which can effectively mine the dynamic interaction information between nodes. Kitsaket al.[13]proposed the K-shell decomposition method to determine the locations of nodes in the network, which has low time complexity, however its discrimination is too coarse. To improve the discrimination, Zenget al.[14]proposed a mixed degree decomposition method,which decomposes K-shell based on the mixing degree of the remaining neighbors and the deleted neighbors in the network.Bae and Kimet al.[15]introduced the concept of neighborhood coreness in their improvement of the K-shell method,using the sum of K-shell values of nodes and their neighbors to identify the influence of nodes in the network. Wanget al.[16]proposed a vector centrality method based on the number of multi-order neighbor shells,using the form of vectors to represent the relative influence of nodes in a network. Burtet al.[17]proposed the theory of structural holes and designed the network constraint index to quantify the constraints that nodes are subjected to when they form structural holes,which can identify the bridging nodes in a network. Suet al.[18]proposed a method based on the structural holes of nodes and their neighbors,which considers both the degree centrality and topology of nodes and their neighbors and can effectively identify influential nodes in a network. Yanget al.[19]quantified the complexity of the network based on Tsallis entropy and combined the structural holes and global location information of nodes to identify influential nodes in the network.

    Gravity model is derived from Newton’s law of gravitation, which can represent the interaction between nodes in a complex network. If a node has more interaction with others, the node should be more influential. Based on gravity model, Liet al.[20]considered both neighborhood information and path information to identify influential nodes. Maet al.[21]proposed a gravity model that regards the K-shell value of each node as its mass. Yanet al.[22]proposed a method to identify influential spreaders based on entropy weight method and gravity law.

    Based on the above research works, we propose a novel method for identifying influential nodes in complex networks based on gravity model, called EGMS. The EGMS method considers both the local topology and the global location of nodes in a network. In the EGMS method, the K-shell centrality is used to reflect the global location of nodes and the structure hole characteristics are used to represent the local topology of nodes. At the same time, to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network, the shortest distance is replaced by a probabilistically motivated effective distance.Then this method fully considers the influence of nodes and their neighbors from the aspect of gravity. By using the monotonicity index, susceptible-infected-recovered (SIR) model,and Kendall’s tau coefficient as evaluation criteria, we compare the proposed method with seven existing identification methods on eight real-world networks. The experimental results show the excellent performance of the proposed method and the relationship between different methods.

    The structure of this paper is as follows. In Section 2,we briefly introduce several existing identification methods and the concept of effective distance. In Section 3,a novel method for identifying influential nodes in complex networks based on gravity model is then proposed and presented.In Section 4,the details and results of experiments are then presented. Finally,conclusions will be given in Section 5.

    2. Preliminaries

    Given a complex networkG=(V,E),whereVandErepresent the set of nodes and edges inGrespectively.nandmare the number of nodes and edges. The adjacency matrix of networkGis denoted asAn×n=(ai j)n×n, whereai j=1 if there is a connective relationship between nodeviand nodevj,andai j=0 otherwise.

    2.1. Degree centrality

    Degree centrality[9](DC)is a simple measure for identifying influential nodes. The more DC a node possesses, the more influential it is. It is defined as follows:

    wherekiis the degree of nodevi. Hence nodevi’s degree of next-nearest neighbors isQ(i)=∑ω∈Γ(i)kω,whereΓ(i)is the set ofvi’s nearest neighbors.

    2.2. Betweenness centrality

    Betweenness centrality[10](BC)focuses on the degree of clustering of the shortest path through a node. It is defined as follows:

    2.3. Closeness centrality

    Closeness centrality[11](CC)is defined as the reciprocal of the sum of the shortest distances between a node and all other nodes in the network. It is expressed as follows:

    wheredijdenotes the shortest distance between nodesviandvj.

    2.4. Mixed degree decomposition method

    whereλis an adjustable parameter in range[0, 1], the MDD is consistent with the K-shell decomposition method ifλ=0,and it is equivalent to degree centrality ifλ=1. In this paper,we set the parameterλ=0.7 consistent with Ref.[11].

    2.5. Structural holes theory

    Structural hole theory was put forward by Burt in 1992 when he studied the competitive relationship in social networks.[17]In social networks,structural holes refer to nonredundant relationships between individuals,and there is a gap in complementary information. In order to quantify the control of the structural hole nodes on these relationships, Burt uses the network constraint index (NC) to measure the constraints formed by the nodes in the structural hole. The node is more likely to form structural holes if the index is smaller,and the influence of the node is greater. The network constraint index of nodeviis defined as follows:

    When calculating the network constraint index of nodevi,considering the degree of the node and its neighbors,as well as the topological structure of the node, the weight ratioLijcan be defined as follows:

    2.6. Gravity model

    Gravity model[20](GM) is inspired by Newton’s law of gravity,and it identifies influential nodes by considering both degree centrality and the shortest distance,which is defined as follows:

    2.7. Effective distance

    Effective distance[12](Edis)was proposed by Brockmann and Helbing in 2013 when studying the impact of complex networkdriven on the spreading process of epidemic diseases.Unlike conventional geographic distance and the shortest path distance,effective distance is a probabilistically motivated abstract distance. In the network where information flow is the interaction,it can effectively measure the mutual influence between nodes. The effective lengthdj|ifrom nodevito a directly connected nodevjis defined as follows:

    wherePj|idenotes the ratio of information flow from nodevito nodevj,which can be calculated as follows:

    wherekidenotes the degree of nodeviin the undirected network and the out-degree of nodeviin the directed network,ai jis the element in the adjacency matrixAn×n. For indirectly connected nodeviand nodevj,the effective length between them will be transmitted along the shortest path,e.g.,dj|i=dk|i+dj|klike form.

    The effective distance is defined by the shortest one of all effective lengths from nodevito nodevj, which is expressed as follows:

    whereλ(Γ) andΓdenote the set of all effective lengths and the sum of all the probably paths from nodevito nodevjrespectively. Usually,in the real-world networks,thedj|i/=di|jandDj|i/=Di|j.

    3. Proposed method

    3.1. The EGMS method

    Based on the gravity model, a novel method is proposed for identifying influential nodes in terms of the local topology and the global location,called EGMS.The EGMS method comprehensively examines the structural hole characteristics and K-shell centrality of nodes,replaces the shortest distance with a probabilistically motivated effective distance,and fully considers the influence of nodes and their neighbors from the aspect of gravity. A flowchart of the proposed method is shown in Fig.1,and the further details are as follows:

    Step 1 Calculating the joint K-shell centrality of node pairs

    K-shell centrality is a global measure describing the location of a node in a network,it can reflect both the relationship between each node and the whole network as well as the interaction between distinct nodes. In this paper, the K-shell centrality of each node is obtained by the MDD method mentioned in Subsection 2.4, and the joint K-shell centrality of node pairs can be obtained as follows:

    Step 2 Calculating the joint network constraint index of node pairs

    The network constraint index in structural hole theory is an identification metric based on local topological information of the network,it can be calculate by Eqs.(5)–(7),and the joint network constraint index between nodeviand nodevjcan be calculated as follows:

    Step 3 Calculating the effective distance between all node pairs

    In our proposed EGMS method, the shortest distance is replaced by the probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. The effective distance from one node to another node can be obtained using Eqs.(9)–(11).

    Step 4 Calculating the combined forces of nodes

    By comprehensively considering the K-shell centrality,network constraints and effective distances, the interaction forces between node pairs can be obtained. Thus, the combined force of nodeviis defined as follows:

    Step 5 Getting the final influence of nodes

    Bae and Kim[15]introduced the concept of neighborhood coreness (Cnc+) in improving the K-shell method, which measures the influence of nodes in a network by summing the K-shell values of their neighbors. In this paper, we borrow this concept and fully consider the influence of nodes’neighbors from the aspect of gravity. Based on the above,the final influence of nodevican be calculated as follows:

    Fig.1. The flow chart of our proposed EGMS method.

    3.2. A simpe example

    To better illustrate how the EGMS method works and to initially assess its validity and accuracy,a simple example network with 10 nodes and 14 edges is given in Fig.2,and some properties of each node in the example network are shown in Table 1.

    Fig.2. A simple example network with 10 nodes and 14 edges. Nodes with larger degrees have darker colors.

    Firstly, we calculate the joint K-shell centrality of node pairs by Eq. (12) and the joint network constraint index of node pairs by Eq. (13) respectively. The joint K-shell centrality and the joint network constraint index between nodev4and nodev9can be obtained as follows:

    Secondly, by using Eqs. (9)–(11), the effective distance between nodev4and nodev9can be obtained as follows:

    The above results clearly show thatD4|9andD9|4are not equal, as mentioned in Subsection 2.7. The results of the effective distance from nodev4to the others are shown in Table 2.

    Table 1. Properties of each node in the example network,including DC,MDD,and NC.

    Table 2. Effective distance from node v4 to the others in the example network.

    Table 3. The combined forces of nodes in the example network.

    Table 4. The final influence of nodes in the example network.

    Then,the combined force of nodev4can be obtained by Eq.(14)as follows:

    The final influence of nodes are shown in Table 4.

    According to Table 1 and Table 4, the ranking lists of nodes in the example network measured by different methods are shown in Table 5. As shown in Table 5, the ranking lists of nodes measured by the EGMS method is is similar to other methods, indicating that the EGMS method can effectively identify the influence of nodes. Compared with DC and MDD,the influence of nodev7and nodev8is further discriminated in the EGMS method. And compared with NC,nodev2and nodev6are re-ranked in the EGMS method by considering the influence of their neighbors. Based on the above, the validity and accuracy of EGMS method is initially verified.

    Table 5. The ranking lists of nodes in the example network measured by different methods.

    4. Experimental analysis

    4.1. Dataset

    In this section, eight real-world networks from different fields are chosen for experiments, including the Dolphins,[23]Polbooks,[24]Jazz,[25]USAir,[26]NetScience,[27]C.Elegans,[28]Email,[29]PowerGrid.[30]The statistical characteristics of eight real-world networks are shown in Table 6. The table includes information on the number of nodesn, the number of edgesm, the average degree〈k〉,the clustering coefficientc,the average shortest path length〈d〉, the epidemic thresholdβthin SIR model, and the fixed infection probabilityβ.

    Table 6. Statistical characteristics of eight real-world networks.

    4.2. Comparison methods

    To verify the validity and accuracy of our proposed EGMS method, seven methods are used as comparisons,including degree centrality (DC),[9]betweenness centrality(BC),[10]closeness centrality (CC),[11]mixed degree decomposition method (MDD),[14]network constraint index(NC),[18]neighborhood coreness (Cnc+),[15]and gravity model(GM).[20]

    4.3. Evaluation criteria

    To evaluate the performance of difference methods, several evaluation criteria are presented in this section,including monotonicity index,[15]susceptible–infected–recovered(SIR)model,[31]and Kendall’s tau coefficient.[32]

    The monotonicity indexM(R)is used to quantify the resolution of different identification methods,which is defined as follows:

    whereRis the influence ranking vector of each node obtained by the influence identification method,nis the total number of nodes,andnris the number of nodes with the same influence.The value ofM(R)in range[0,1],which will be higher if the identification method can better distinguish the influence of all nodes in the network.

    The SIR model[31]is used to examine the spreading ability of nodes. In this model, each node in the network can be in one of the following three states: susceptible, infected, or recovered. In the initial stage of spreading,only one infected node in the network, and all other nodes are susceptible. In each timestamp, each one infected node to infect its susceptible neighbors with the infection probabilityβ. At the same time,the infected node recovers with probabilityμ. This process is repeated until there are no susceptible nodes in the network. At the end of SIR spreading process, the number of recovered nodes is regarded as the spreading ability of nodes.For simplicity, the value of the recovery probability is set toμ=1. The spreading process cannot be carried out normally if the infection probabilityβis too small or too large, do the spreading ability of each node cannot be measured accurately.Therefore, we set the epidemic threshold isβth≈〈k〉/〈k2〉,where〈k〉and〈k2〉denote the average degree and average second-order degree of the nodes respectively. The value ofβis set nearβth. As show in Table 6,theβthandβfor different networks are given.

    In order to evaluate the accuracy of the identification method, Kendall’s tau coefficient[32]is used to measure the correlation between the ranking list of nodes’ influence obtained by each identification method and the ranking list of nodes’ spreading ability obtained from the SIR model. Suppose there are two sequencesXandYcontainingnnodes,whereX=(x1,x2,...,xn)andY=(y1,y2,...,yn),and the elements in sequenceXand sequenceYare constructed into a new sequenceXY=((x1,y1),...,(xi,yi),...,(xn,yn)). For any pair of elementsXYi=(xi,yi)andXYj=(xj,yj)in the sequenceXY,if(xi >xjandxi >yj)or(xi <xjandxi <yj),the pair is considered to be concordant.On the contrary,if(xi >xjandxi <yj)or(xi <xjandxi >yj),this pair is considered to be discordant. If (xi=xjandxi=yj), it is considered that the pair is neither concordant nor discordant. Kendall’s tau coefficientτis defined as wherencandndare the numbers of concordant pairs and discordant pairs respectively.The value ofτin range[-1,1].The two sequences are completely positively correlated ifτ=1,that is to say, the closer the value ofτis to 1, the higher the accuracy. On the contrary, the two sequences are completely negatively correlated.

    4.4. Experiments

    4.4.1. Examining the resolution of different identification methods

    In this experiment, the monotonicity index[13]Mis used to examine the resolution of the seven identification methods and our proposed EGMS method,i.e.,the ability to distinguish the influence of nodes. Table 7 records the resolution of the different methods in eight real-world networks, and figure 3 shows the difference more intuitively. As shown in Fig.3,the EGMS method performs very well in the eight networks. In addition, the resolution of CC and GM is also good. Compared with others, the EGMS method gives a higherMvalue in most cases, and the value ofM(EGMS) is very close to or even equal to 1 in all cases. Therefore,the EGMS method performs excellent in distinguish the influence of nodes.

    Fig. 3. The monotonicity index M of eight identification methods in eight real-world networks.

    Table 7. The monotonicity index M of different identification methods.

    4.4.2. The comparisons of different identification methods and SIR model

    In this experiment, the SIR model is used to obtain the spreading ability of nodes and Kendall’s tau coefficient is used to quantify the correlation between the spreading ability and influence of nodes in the networks. The stronger the correlation,the more accurate the identification method is.Due to the randomness of the spreading process of the SIR model,this experiment repeats the spreading process for each node and then takes the average value. For networks|V|<100, the independent experiment is executed 104times; for|V|<103, the independent experiment is executed 103times. Table 8 shows Kendall’s tau coefficient between different identification methods and the SIR model with the fixed infection probability in eight real-world networks, whereσdenotes the ranking lists of the spreading ability of nodes in the networks. The values of the fixed infection probability are shown in Table 6.

    In order to further verify the accuracy and reliability of the proposed method,a series of Kendall’s tau coefficients between different identification methods and SIR model can be obtained by changing the infection probabilityβ. The results are shown in Fig. 4, where the black dashed line denotes the epidemic thresholdβth. From which we can see, the EGMS method outperforms all the methods when the infection probabilityβtakes values near the epidemic thresholdβth. This indicates that the influence of nodes identified by the EGMS method has a significant correlation with the spreading ability of nodes. When the infection probability is far greater than or far less than the epidemic threshold,DC,MDD and GM show better correlation than EGMS in six networks except USAir and PowerGrid. In addition, Cnc+ performed slightly worse than EGMS in most networks and BC performed worst in all cases.According to the above analysis,the EGMS method can identify the influence of nodes more accurately and reliably.

    Table 8. Kendall’s tau coefficient between different identification methods and SIR model with the fixed infection probability.

    4.4.3. Kendall’s τ coefficient for different identification methods to varying scales of topranking nodes

    In this experiment, the scale of nodes examined by Kendall’s tau coefficient is adjusted, which is changed from whole nodes to partial nodes. The correlation results between the top nodes in different scales obtained by different identification methods and the ranking list of the spreading ability of nodes are further studied. The scale of topranking nodes is denotes asL,which is set to 0.05–1.Figure 5 shows the values of Kendall’s tau coefficient for different identification methods to varying scales of topranking nodes nodes. As shown in Fig.5,the EGMS method performs well at various scales of topranking nodes and performs better than all other methods at higher values ofL.

    4.4.4. The relationship between EGMS and other identification methods

    In the final experiment, the relationship between the EGMS method and other identification methods is analyzed.The results are shown in Fig. 6, where each point denotes one node in the network, the color of each point denotes the spreading ability derived by the SIR model,and the horizontal and vertical axes are denote the values of nodes’influence in the network obtained by the EGMS method and other methods respectively. The EGMS method has a strong correlation with one method if the nodes in the figure are linearly distributed.As shown in the distribution of the nodes in Fig. 6, strong correlations are found between EGMS and DC, CC, MMD,and NC, respectively. This indicates that the EGMS method not only takes into account the degree centrality, location information and the closeness between nodes sufficiently, but also has the ability to identify bridging nodes in the network.Moreover,the apparent linear relationship between EGMS and Cnc+and GM indicates that the node rankings are overall similar, and it also demonstrates that EGMS can identify the influence of nodes effectively. From Fig.6,it can also find that some nodes have large values of BC,but their spreading ability is not very strong, so it is not accurate enough to identify the influence of nodes by BC alone.Therefore,the EGMS method is more advantageous than other methods in identifying the influence of nodes in the network.

    Fig.5. Kendall’s τ coefficient for different identification methods to varying scales of top-ranking nodes: (a)Dolphins;(b)Polbooks;(c)Jazz;(d)USAir;(e)NetScience;(f)C.Elegans;(g)Email;(h)PowerGrid.

    Fig. 6. The relationship between EGMS and other identification methods: (a1)–(a7) Dolphins, β =0.15; (b1)–(b7) Polbooks, β =0.1; (c1)–(c7)Jazz,β =0.04;(d1)–(d7)USAir,β =0.03.

    5. Conclusions and discussion

    In this paper,we proposed a novel method for identifying influential nodes in complex networks based on gravity model,called EGMS. For the shortcoming that the existing methods concentrate only on only one aspect,the EGMS method considers both the local topology and the global location information,comprehensively examines the structural hole characteristics and K-shell centrality of nodes At the same time,the shortest distance is replaced by a probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. Then the EGMS method fully considers the influence of nodes and their neighbors from the aspect of gravity to optimize the utilization of available resources. In addition,the EGMS method also has the ability to identify bridging nodes in the network. From the experimental results, the EGMS method can better distinguish differences in the influence of nodes than other identification methods. Further, the EGMS method performs excellent in identifying influential nodes at various scales of topranking nodes. Finding a more effective method combining network topology and propagation dynamics to identify influential nodes in the network is still an open issue. How to improve our proposed EGMS method to reduce its time complexity is our future work.

    Acknowledgment

    Project supported by the National Natural Science Foundation of China(Grant Nos.61663030 and 61663032).

    每晚都被弄得嗷嗷叫到高潮| 小说图片视频综合网站| 精品一区二区三区av网在线观看| 欧美国产日韩亚洲一区| 老司机午夜福利在线观看视频| 国产视频内射| 欧美色欧美亚洲另类二区| e午夜精品久久久久久久| 中文字幕精品亚洲无线码一区| 亚洲人成伊人成综合网2020| 午夜老司机福利剧场| 高清毛片免费观看视频网站| 母亲3免费完整高清在线观看| 欧美性猛交╳xxx乱大交人| 久久精品综合一区二区三区| 长腿黑丝高跟| 亚洲精品美女久久久久99蜜臀| 欧美黑人欧美精品刺激| 香蕉av资源在线| 久久婷婷人人爽人人干人人爱| 五月伊人婷婷丁香| 三级国产精品欧美在线观看| 麻豆久久精品国产亚洲av| 三级男女做爰猛烈吃奶摸视频| h日本视频在线播放| 免费av不卡在线播放| 色哟哟哟哟哟哟| 欧美最新免费一区二区三区 | 好男人在线观看高清免费视频| 男女之事视频高清在线观看| a级毛片a级免费在线| 九九热线精品视视频播放| 欧美一区二区亚洲| 亚洲av不卡在线观看| 99在线视频只有这里精品首页| 18禁裸乳无遮挡免费网站照片| 男插女下体视频免费在线播放| 麻豆成人午夜福利视频| e午夜精品久久久久久久| 精品日产1卡2卡| 桃色一区二区三区在线观看| 老司机福利观看| 国产精品久久电影中文字幕| 校园春色视频在线观看| 国产又黄又爽又无遮挡在线| 欧美另类亚洲清纯唯美| svipshipincom国产片| 国产久久久一区二区三区| 久久久久精品国产欧美久久久| 欧美国产日韩亚洲一区| 欧美一级a爱片免费观看看| 窝窝影院91人妻| 国产午夜精品论理片| 日韩国内少妇激情av| 国产视频一区二区在线看| 免费在线观看影片大全网站| 日本免费一区二区三区高清不卡| 好男人电影高清在线观看| 亚洲精品在线观看二区| 国产精品香港三级国产av潘金莲| 久久久久久久久大av| 中文亚洲av片在线观看爽| 午夜福利在线观看免费完整高清在 | 欧美日本视频| 一级毛片女人18水好多| 欧美最黄视频在线播放免费| av专区在线播放| 人人妻人人看人人澡| 日本熟妇午夜| 亚洲人成网站在线播放欧美日韩| 国产一级毛片七仙女欲春2| 又粗又爽又猛毛片免费看| 日韩欧美精品v在线| 精华霜和精华液先用哪个| 黄片小视频在线播放| 综合色av麻豆| 观看美女的网站| 免费看十八禁软件| 日韩亚洲欧美综合| 禁无遮挡网站| 久久九九热精品免费| 少妇人妻精品综合一区二区 | 国产极品精品免费视频能看的| 国产乱人视频| 一区福利在线观看| 天堂动漫精品| 欧美日韩乱码在线| 精品免费久久久久久久清纯| 最近最新免费中文字幕在线| 一级作爱视频免费观看| 夜夜爽天天搞| 一进一出抽搐动态| www国产在线视频色| 亚洲国产精品久久男人天堂| 天堂av国产一区二区熟女人妻| 国产免费男女视频| 成人特级黄色片久久久久久久| 亚洲精品在线观看二区| 久久精品国产自在天天线| 97超视频在线观看视频| 在线观看美女被高潮喷水网站 | 最新中文字幕久久久久| 午夜福利欧美成人| 中文字幕人妻丝袜一区二区| 露出奶头的视频| 一区二区三区免费毛片| 久久久久九九精品影院| 午夜激情福利司机影院| 欧美成人免费av一区二区三区| 人妻丰满熟妇av一区二区三区| 国产亚洲精品一区二区www| 国产精品99久久99久久久不卡| 不卡一级毛片| 精品人妻1区二区| 欧美午夜高清在线| 欧美性猛交黑人性爽| 91久久精品国产一区二区成人 | 麻豆一二三区av精品| 免费av不卡在线播放| 精品久久久久久,| 日本精品一区二区三区蜜桃| 两个人视频免费观看高清| 亚洲成av人片免费观看| 久久草成人影院| 级片在线观看| a级一级毛片免费在线观看| 伊人久久精品亚洲午夜| 久久婷婷人人爽人人干人人爱| 波多野结衣高清作品| 性色av乱码一区二区三区2| 精品一区二区三区视频在线 | 免费看a级黄色片| 99热只有精品国产| 狠狠狠狠99中文字幕| av女优亚洲男人天堂| www.熟女人妻精品国产| 麻豆一二三区av精品| 三级男女做爰猛烈吃奶摸视频| 无遮挡黄片免费观看| 亚洲av美国av| 欧美性猛交╳xxx乱大交人| 18禁裸乳无遮挡免费网站照片| 亚洲人成伊人成综合网2020| 亚洲天堂国产精品一区在线| 国产伦在线观看视频一区| 麻豆成人av在线观看| 国产精品影院久久| 男女做爰动态图高潮gif福利片| 免费高清视频大片| 69av精品久久久久久| 操出白浆在线播放| 亚洲久久久久久中文字幕| 亚洲av中文字字幕乱码综合| 成人高潮视频无遮挡免费网站| 久久香蕉精品热| av天堂在线播放| 岛国视频午夜一区免费看| 国产伦人伦偷精品视频| 免费看十八禁软件| 很黄的视频免费| 窝窝影院91人妻| 日本成人三级电影网站| 亚洲美女黄片视频| 亚洲激情在线av| 18禁美女被吸乳视频| 亚洲国产色片| 法律面前人人平等表现在哪些方面| 高清在线国产一区| 国产精品99久久久久久久久| 日本黄色视频三级网站网址| 精品久久久久久,| 天堂√8在线中文| 中亚洲国语对白在线视频| 三级毛片av免费| 日韩欧美国产在线观看| 国产精品乱码一区二三区的特点| 国产精品久久久久久久电影 | 国产精品精品国产色婷婷| 99在线人妻在线中文字幕| 久久6这里有精品| 少妇人妻精品综合一区二区 | 亚洲国产精品sss在线观看| 91av网一区二区| 久久精品国产亚洲av香蕉五月| 我要搜黄色片| av女优亚洲男人天堂| 国产高清videossex| 亚洲欧美日韩东京热| 国产精品影院久久| 久久99热这里只有精品18| 日本免费a在线| 久久性视频一级片| 亚洲不卡免费看| 又黄又粗又硬又大视频| 九九在线视频观看精品| 久久国产乱子伦精品免费另类| 国产成年人精品一区二区| 免费人成视频x8x8入口观看| 国产精品久久久久久久久免 | 久99久视频精品免费| 欧美大码av| 国产精品98久久久久久宅男小说| 国产男靠女视频免费网站| 亚洲18禁久久av| 亚洲欧美日韩卡通动漫| 三级毛片av免费| 国产精品野战在线观看| 色哟哟哟哟哟哟| 宅男免费午夜| 啪啪无遮挡十八禁网站| 欧美3d第一页| 中文字幕高清在线视频| 色哟哟哟哟哟哟| 国产精品一及| 亚洲精华国产精华精| 91麻豆av在线| 无限看片的www在线观看| 此物有八面人人有两片| 少妇的逼好多水| 亚洲最大成人手机在线| 欧美国产日韩亚洲一区| 日韩精品中文字幕看吧| 亚洲欧美日韩无卡精品| 亚洲无线在线观看| 可以在线观看的亚洲视频| 欧美一级a爱片免费观看看| 波野结衣二区三区在线 | 国产一区二区激情短视频| 久久性视频一级片| 国产高清videossex| 网址你懂的国产日韩在线| 久久亚洲精品不卡| 69人妻影院| 亚洲欧美激情综合另类| 丁香六月欧美| 91久久精品电影网| 国产私拍福利视频在线观看| www.www免费av| 高潮久久久久久久久久久不卡| 999久久久精品免费观看国产| 变态另类丝袜制服| 国产成人影院久久av| 亚洲欧美精品综合久久99| 特级一级黄色大片| 国产男靠女视频免费网站| 波多野结衣高清作品| 精品久久久久久久末码| 日本三级黄在线观看| 欧美精品啪啪一区二区三区| 一级a爱片免费观看的视频| 嫩草影院精品99| 一级黄片播放器| 欧美最黄视频在线播放免费| 国产99白浆流出| 岛国视频午夜一区免费看| 男人的好看免费观看在线视频| 亚洲不卡免费看| 国产黄片美女视频| 色噜噜av男人的天堂激情| 嫩草影院入口| 色尼玛亚洲综合影院| 欧美精品啪啪一区二区三区| 国内揄拍国产精品人妻在线| 51午夜福利影视在线观看| 免费看日本二区| 一本综合久久免费| 午夜影院日韩av| 一个人免费在线观看电影| 精品日产1卡2卡| 国内精品一区二区在线观看| 亚洲真实伦在线观看| 九色成人免费人妻av| 1024手机看黄色片| 高潮久久久久久久久久久不卡| 夜夜看夜夜爽夜夜摸| 岛国视频午夜一区免费看| 一本久久中文字幕| 亚洲天堂国产精品一区在线| 手机成人av网站| 国产高清激情床上av| 免费看十八禁软件| 久久人妻av系列| 国产免费一级a男人的天堂| 床上黄色一级片| 亚洲人成电影免费在线| 国产亚洲精品综合一区在线观看| 波多野结衣高清无吗| 成年女人永久免费观看视频| 国产成人aa在线观看| 一区二区三区国产精品乱码| 国产午夜福利久久久久久| 99精品欧美一区二区三区四区| 亚洲五月婷婷丁香| 国产在线精品亚洲第一网站| 不卡一级毛片| 变态另类丝袜制服| 久99久视频精品免费| 亚洲人成网站高清观看| 成人特级黄色片久久久久久久| 99热只有精品国产| 毛片女人毛片| 人妻丰满熟妇av一区二区三区| 精品电影一区二区在线| 久久久久久大精品| 三级毛片av免费| 国产亚洲精品av在线| 亚洲成人中文字幕在线播放| 国产精品 国内视频| 在线播放国产精品三级| 精品一区二区三区视频在线观看免费| 岛国视频午夜一区免费看| 别揉我奶头~嗯~啊~动态视频| 欧美一级a爱片免费观看看| 嫩草影视91久久| 99国产综合亚洲精品| www国产在线视频色| 欧美日韩精品网址| 国产欧美日韩一区二区三| 禁无遮挡网站| 看片在线看免费视频| 日本与韩国留学比较| 天天添夜夜摸| 在线免费观看不下载黄p国产 | 亚洲激情在线av| 男人和女人高潮做爰伦理| 亚洲中文日韩欧美视频| 国产av在哪里看| 69av精品久久久久久| 中文在线观看免费www的网站| 不卡一级毛片| 丰满乱子伦码专区| 又爽又黄无遮挡网站| 国产毛片a区久久久久| 久久久久久久久大av| 欧美日韩一级在线毛片| 在线观看舔阴道视频| 一级a爱片免费观看的视频| 男女视频在线观看网站免费| 国内精品久久久久精免费| 日韩免费av在线播放| 日本免费a在线| 国产色爽女视频免费观看| 欧美区成人在线视频| 国产成人福利小说| 国内精品久久久久久久电影| 成人永久免费在线观看视频| 精品国产美女av久久久久小说| 精品一区二区三区视频在线 | 国产一区在线观看成人免费| 亚洲精品影视一区二区三区av| 国产 一区 欧美 日韩| 老汉色∧v一级毛片| 听说在线观看完整版免费高清| 蜜桃亚洲精品一区二区三区| 精品国产超薄肉色丝袜足j| 亚洲av日韩精品久久久久久密| 特大巨黑吊av在线直播| 日本黄色视频三级网站网址| 国产黄a三级三级三级人| 亚洲人成伊人成综合网2020| 亚洲国产精品合色在线| 国产91精品成人一区二区三区| av女优亚洲男人天堂| 国产欧美日韩精品一区二区| 日韩成人在线观看一区二区三区| 色精品久久人妻99蜜桃| 亚洲av中文字字幕乱码综合| 久久久精品大字幕| 老司机在亚洲福利影院| www.999成人在线观看| 欧美3d第一页| 日本成人三级电影网站| 少妇的逼好多水| 免费看日本二区| 免费在线观看影片大全网站| 男女之事视频高清在线观看| 中文在线观看免费www的网站| 大型黄色视频在线免费观看| 在线观看美女被高潮喷水网站 | 1024手机看黄色片| 亚洲午夜理论影院| 黄色女人牲交| 亚洲欧美激情综合另类| 日韩中文字幕欧美一区二区| 听说在线观看完整版免费高清| 高清在线国产一区| 亚洲 国产 在线| 久久亚洲真实| 真人做人爱边吃奶动态| 久久精品国产自在天天线| 亚洲欧美日韩高清专用| 国产精品乱码一区二三区的特点| 99热只有精品国产| 狂野欧美激情性xxxx| 久久久久久人人人人人| 99久久无色码亚洲精品果冻| 国产精品野战在线观看| 久久精品国产亚洲av香蕉五月| 熟女人妻精品中文字幕| 亚洲av五月六月丁香网| 亚洲狠狠婷婷综合久久图片| 日韩欧美国产在线观看| 日本与韩国留学比较| 国产精品嫩草影院av在线观看 | 在线免费观看的www视频| 亚洲成人久久爱视频| 亚洲最大成人中文| 国产av不卡久久| 成熟少妇高潮喷水视频| 日韩人妻高清精品专区| 久久精品91无色码中文字幕| 91在线观看av| 97超视频在线观看视频| 中出人妻视频一区二区| 大型黄色视频在线免费观看| 午夜福利在线观看吧| 久久精品国产综合久久久| 久久久久久久久大av| 桃色一区二区三区在线观看| 欧美三级亚洲精品| 亚洲欧美日韩卡通动漫| 免费人成在线观看视频色| www.色视频.com| 97超级碰碰碰精品色视频在线观看| 动漫黄色视频在线观看| 日本a在线网址| 少妇的逼水好多| 国产精品一及| 少妇的丰满在线观看| 午夜福利在线观看免费完整高清在 | 男女那种视频在线观看| 在线视频色国产色| 一本久久中文字幕| 成人高潮视频无遮挡免费网站| 亚洲精品国产精品久久久不卡| 国产久久久一区二区三区| 欧美日本亚洲视频在线播放| 最后的刺客免费高清国语| 亚洲在线观看片| 成人三级黄色视频| 国产成人影院久久av| 免费人成在线观看视频色| 欧美av亚洲av综合av国产av| 99在线视频只有这里精品首页| 精品不卡国产一区二区三区| 久久久精品欧美日韩精品| 国产成人av激情在线播放| 欧美bdsm另类| 老司机午夜十八禁免费视频| 国产一级毛片七仙女欲春2| 精品免费久久久久久久清纯| 免费av观看视频| 日韩高清综合在线| 18美女黄网站色大片免费观看| a在线观看视频网站| 欧美xxxx黑人xx丫x性爽| 午夜福利在线观看吧| 日本撒尿小便嘘嘘汇集6| 老司机在亚洲福利影院| 香蕉丝袜av| 精品久久久久久久人妻蜜臀av| 高清日韩中文字幕在线| 欧美成人免费av一区二区三区| 波多野结衣高清无吗| 男插女下体视频免费在线播放| 老司机在亚洲福利影院| 观看美女的网站| 久久精品国产综合久久久| 国产三级黄色录像| 亚洲在线观看片| 18禁国产床啪视频网站| 成熟少妇高潮喷水视频| 日韩人妻高清精品专区| 俺也久久电影网| av天堂中文字幕网| 搡老妇女老女人老熟妇| 91在线观看av| 综合色av麻豆| 成人欧美大片| 国产成年人精品一区二区| 日韩欧美国产在线观看| 亚洲片人在线观看| 99久国产av精品| 欧美av亚洲av综合av国产av| 很黄的视频免费| 午夜福利高清视频| 好男人在线观看高清免费视频| 久久香蕉精品热| 一区二区三区免费毛片| 网址你懂的国产日韩在线| 一夜夜www| 亚洲国产欧美网| 亚洲精品国产精品久久久不卡| 久久久精品大字幕| 国产91精品成人一区二区三区| 蜜桃久久精品国产亚洲av| 美女免费视频网站| ponron亚洲| 天美传媒精品一区二区| 中文字幕高清在线视频| 亚洲精品粉嫩美女一区| 啦啦啦观看免费观看视频高清| 亚洲av美国av| 国产又黄又爽又无遮挡在线| 国产精品久久久久久精品电影| 中出人妻视频一区二区| 久久国产乱子伦精品免费另类| 欧美色欧美亚洲另类二区| 成人国产一区最新在线观看| 别揉我奶头~嗯~啊~动态视频| 国产一级毛片七仙女欲春2| 男人的好看免费观看在线视频| 变态另类成人亚洲欧美熟女| 99久久无色码亚洲精品果冻| 日韩精品中文字幕看吧| 99国产精品一区二区蜜桃av| 岛国在线观看网站| 一夜夜www| 又黄又粗又硬又大视频| 国内毛片毛片毛片毛片毛片| a级一级毛片免费在线观看| 亚洲精品国产精品久久久不卡| 淫妇啪啪啪对白视频| 欧美黑人欧美精品刺激| 制服人妻中文乱码| 在线免费观看的www视频| 两个人看的免费小视频| 国产精品免费一区二区三区在线| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 人妻丰满熟妇av一区二区三区| 国产精品,欧美在线| xxx96com| 亚洲国产欧洲综合997久久,| 精品一区二区三区av网在线观看| 美女高潮喷水抽搐中文字幕| 夜夜躁狠狠躁天天躁| 十八禁网站免费在线| 免费在线观看日本一区| 长腿黑丝高跟| 国产欧美日韩精品一区二区| 久久精品综合一区二区三区| 日日摸夜夜添夜夜添小说| 天堂√8在线中文| 成人一区二区视频在线观看| 麻豆国产97在线/欧美| 国产激情偷乱视频一区二区| 久久香蕉国产精品| 国产精品野战在线观看| 亚洲av日韩精品久久久久久密| 91在线观看av| 午夜亚洲福利在线播放| 在线十欧美十亚洲十日本专区| 在线观看美女被高潮喷水网站 | 国产精品久久电影中文字幕| eeuss影院久久| 亚洲av不卡在线观看| 国产精品av视频在线免费观看| 尤物成人国产欧美一区二区三区| 91麻豆精品激情在线观看国产| 国产综合懂色| 国产欧美日韩精品亚洲av| 欧美一级a爱片免费观看看| 亚洲精品粉嫩美女一区| 看黄色毛片网站| 亚洲性夜色夜夜综合| 两性午夜刺激爽爽歪歪视频在线观看| 日本a在线网址| 国产精品98久久久久久宅男小说| 99久久无色码亚洲精品果冻| 亚洲av二区三区四区| 国模一区二区三区四区视频| 99视频精品全部免费 在线| 禁无遮挡网站| 91久久精品电影网| 非洲黑人性xxxx精品又粗又长| 久久国产乱子伦精品免费另类| 欧美成人免费av一区二区三区| 最新中文字幕久久久久| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国产视频一区二区在线看| 久久午夜亚洲精品久久| 日韩人妻高清精品专区| 国产日本99.免费观看| 搡老岳熟女国产| 亚洲人成网站在线播| 久久久成人免费电影| 高潮久久久久久久久久久不卡| 成年女人永久免费观看视频| 久久精品国产综合久久久| 51午夜福利影视在线观看| 老司机在亚洲福利影院| a在线观看视频网站| 日韩欧美 国产精品| 日本撒尿小便嘘嘘汇集6| 国产一区二区在线观看日韩 | 国产视频一区二区在线看| 99在线视频只有这里精品首页| 国产三级中文精品| 国产亚洲欧美98| 一a级毛片在线观看| 最新美女视频免费是黄的| 久久香蕉国产精品| 又黄又粗又硬又大视频| 99国产精品一区二区蜜桃av| 国产老妇女一区| 1024手机看黄色片| 日本五十路高清| 99热这里只有精品一区| 久久精品国产清高在天天线| 啦啦啦韩国在线观看视频| 噜噜噜噜噜久久久久久91| 亚洲最大成人中文| 日韩欧美精品免费久久 | 婷婷精品国产亚洲av| 久久久久九九精品影院|