• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Exact Graph Pattern Matching: Applications, Progress and Prospects

    2023-05-18 14:37:34SUNGuohao孫國豪YUShuiFANGXiuLUJinhu陸金虎
    關(guān)鍵詞:陸金

    SUN Guohao(孫國豪), YU Shui(余 水), FANG Xiu(方 秀), LU Jinhu(陸金虎)

    School of Computer Science and Technology, Donghua University, Shanghai 201620, China

    Abstract:Graph pattern matching (GPM) can be used to mine the key information in graphs. Exact GPM is one of the most commonly used methods among all the GPM-related methods, which aims to exactly find all subgraphs for a given query graph in a data graph. The exact GPM has been widely used in biological data analyses, social network analyses and other fields. In this paper, the applications of the exact GPM were first introduced, and the research progress of the exact GPM was summarized. Then, the related algorithms were introduced in detail, and the experiments on the state-of-the-art exact GPM algorithms were conducted to compare their performance. Based on the experimental results, the applicable scenarios of the algorithms were pointed out. New research opportunities in this area were proposed.

    Key words:graph pattern matching (GPM); exact matching; subgraph isomorphism; graph embedding; subgraph matching

    Introduction

    In recent years, information and Internet technology have been developed rapidly, which leads to the era of big data. In this era, some common networks such as social networks[1-2], biological information networks[3-4]and communication networks[5-6]have produced massive amounts of heterogeneous data from multiple sources. With the increasing scale of data, the relationship among different data becomes more and more complex. The graph structure is very suitable to describe the internal correlation among multi-source heterogeneous data, which has been widely used in the fields of computer vision and pattern recognition[7-9].

    Most networks can be modeled as graphs. How to analyze and mine the key information in a graph has become a research hotspot. Graph pattern matching (GPM) is a key technique for mining information in graphs, which aims to find out all isomorphic subgraphs of a given query graph in a data graph. GPM is also called subgraph isomorphism, which has been widely used in protein interaction network analyses[10-11], social network analyses[12-13], chemical compound searches[14], network intrusion detection[15-16], resource description framework (RDF) query processing[17-18], recommendation systems[19-20]and so on.

    The GPM problem belongs to non-deterministic polynomial hard (NP-hard) problems[21-22], which makes it computationally expensive to find matching results, especially in large-scale graphs. In order to solve this problem, many efficient methods have been proposed both in static and dynamic graphs. Because of the difficulty of GPM in dynamic graphs, the research on dynamic graphs is still in its infancy[23]. The static GPM is focused on in this paper.

    Based on the accuracy of the query results, the static GPM can be grouped into two categories: exact GPM and approximate GPM. The exact GPM requires that not only in labels and semantics but also in the structure, the vertices in a query graph and a data graph should be strictly matched. The approximate GPM relaxes the constraints of labels and semantics, which allows a label to match its subset labels and allows some errors in the matching results. In most practical applications, the matching results are often required to be accurate, which makes the exact GPM more widely used than the approximate GPM. Therefore, the exact GPM is focused on in this paper.

    At present, many methods have been proposed in the field of the exact GPM. The most classic algorithm is Ullmann algorithm[24]. The Ullmann algorithm is a backtracking algorithm, which finds matching results by adding partial results. Based on the backtracking framework of the Ullmann algorithm, many efficient algorithms have been proposed to accelerate the exact GPM. The representative algorithms are VF2[25], GraphQL[26], GADDI[27], SPath[28], Turboiso[29], core-forest-leaf (CFL)[30], DPiso[31], compact embedding cluster index (CECI)[32]and RI[33].

    In this paper, the applications and the research progress of the exact GPM are first summarized, and the related algorithms are introduced in detail. Then, the experiments on the latest exact GPM algorithms are conducted to compare their performance. Finally, the future research opportunities in this field are discussed.

    1 Preliminaries

    This paper focuses on the undirected vertex-labeled graphg=(V,E,W,L), whereV,EandWrepresent the vertex set, the edge set and the label set ofg, respectively;Lis a label function that maps a vertexuto a label. The notations frequently used in this paper are shown in Table 1.

    Table 1 Notations frequently used in this paper

    Definition1Subgraph isomorphism: given a query graphQ=(VQ,EQ) and a data graphG=(VG,EG), a subgraph isomorphism is an injective functionffromVQtoVGsuch that ?u∈VQ,L(u)=L(f(u)); ?e(u,u′)∈EQ,e(f(u),f(u′))∈EG.

    Definition2Label and degree filtering (LDF) constraint: given the query vertexu∈VQ, it can be matched to the data vertexv∈VGif the following conditions are satisfied:L(u)=L(v);d(u)≤d(v).

    GivenQandG, the exact GPM aims to find in the data graph all the subgraphs that are the isomorphism of the query graph.

    2 Exact GPM

    2.1 Common framework

    Leeetal.[34]proposed a common framework for some representative exact GPM algorithms. Sunetal.[35]supplemented this framework to make it suitable for more algorithms. The common framework is shown in Fig.1, which takesQandGas input and outputs all matching results fromQtoG.

    Fig.1 Algorithm of common framework

    2.2 Representative algorithms

    The exact GPM algorithms can generally be divided into three steps. The exact GPM algorithms will use some pruning strategies or filtering methods to filter the candidate vertices in step 1. Step 1 is also called the filtering method of the exact GPM algorithms. The exact GPM algorithms will use some methods to generate a matching order in step 2. Step 2 is also called the ordering method of the exact GPM algorithms. The exact GPM algorithms will enumerate the matching results based on the filtered vertices and the generated matching order in step 3. Step 3 is also called the enumeration method of the exact GPM algorithms. This paper will introduce the representative exact GPM algorithms in detail according to the three steps.

    2.2.1CFLalgorithm

    Fig.2 Example of data and query graphs: (a) data graph G; (b) query graph Q

    Fig.3 Example of filtering method of CFL: (a) BFS tree of query graph Q; (b) CPI structure of query graph Q

    Step2The ordering method of the CFL algorithm uses a path-based strategy for generating the matching order. Specifically, this method first selects three vertices from the core structure with a higher degree and a lower frequency of labels in the data graph label set and chooses the vertex with the smallest candidate vertices as the first vertex in the matching order. Then, this method constructs a weight array to count the embeddings of all paths from the root to leaves in the BFS tree of the query graph in the CPI structure. LetC(p) represent the embeddings of the pathp, andNTE(p) represent the number of edges connected with the vertices in the pathpin the query graph. This method selects the pathp*with the minimum value ofC(p)/|NTE(p)|, and adds the vertices in the pathp*to the matching order. It removes the pathp*. Setu+as the last vertex of the common prefix of the pathpand the matching order sequence.pu+is the suffix ofpstarting fromu+. This method selects the pathp*with the minimum value ofC(pu+)/|C(u+)|, and adds the vertices that in the pathp*but not in the current matching order into the matching order. Then, this method removes the pathp*until all paths are processed and a matching order is generated.

    Step3The enumeration method of the CFL algorithm matches each query vertex to its candidates with the matching order based on the backtracking method, which is the same as the Ullmann algorithm.

    The efficiency of the CFL algorithm is much higher than that of the previous algorithms such as Turboiso, GraphQL and SPath.

    2.2.2DPisoalgorithm

    The CPI structure of the CFL algorithm is generated according to the BFS tree of the query graph. However, the BFS tree cannot contain all the edges in the query graph, and the non-tree edges (e.g., the edges not in the BFS tree) have a strong pruning ability.

    Step1The filtering method of the DPisoalgorithm reconstructs the query graph into a directed acyclic graph (DAG) and designs a auxiliary data structure called the candidate space (CS) structure. The CS structure can replace the data graph for the matching query process. Figure 4(a) shows the DAG of the query graphQin Fig.2(b), and Fig.4(b) shows its CS structure.

    Fig.4 Example of filtering method of DPiso: (a) DAG of query graph Q; (b) CS structure of query graph Q

    The filtering method of the DPisoalgorithm applies the same method as the CFL algorithm to generate candidate vertex sets according to the CS structure. This method also needs to satisfy LDF and NLF constraints. For anyv∈C(u), letpt(u) represent the prefix tree ofu, which consists of the path starting fromuto all leaf vertices. If the prefix treept(u) can be homomorphic mapped to the prefix treept(v) (i.e., all the vertices inpt(u) can be matched to the vertices inpt(v) and allow duplicate matching of vertices), thenvcan be kept inC(u).

    Step2The ordering method of the DPisoalgorithm separates all the vertices of which degree is one in the query graphQ, and the remaining vertices are recorded asQ′. The ordering method of the DPisoalgorithm matches the vertices inQ′. This method selects the vertex with the smallest number ofω(u), andω(u) is an estimate of the path embeddings. Foru∈V(Q′), this method constructs the tree-like path ofu. A tree-like path starting fromuindicates that the vertices have only one parent vertex apart from the first vertex. Let the embeddings of the tree-like path ofuin the CS structure be denoted asω(u), and for eachu∈V(Q′), this method constructs the weight array according toω(u), where the vertex with the least weight is selected as the next matching vertex. Moreover, an optimization method called failing set pruning strategy is also proposed by the DPisoalgorithm, which applies the relevant information to exclude some useless vertices in the search tree of the partial matching.

    An example of the failing set pruning strategy is shown in Fig.5. Figure 5(c) shows the process of the failing set pruning strategy ofQinG. The vertices in the tree represent a partial matching resultM.(ui,vj) means thatuican be matched tovj, and !(ui,vj) means thatuicannot be matched tovj. When matchingu3tou10after matchingu4tov11, it will fail in the end. The reason is that there is no isomorphic subgraph in the data graph that can be matched to the query graph. Therefore, the failing set pruning strategy removes all the sibling vertices (M3,2,M3,3, …,M3,10) of the search vertexM3,1. In other words, there is no need to matchu4to other vertices.

    Fig.5 Example of failing set pruning strategy: (a) query graph Q; (b) data graph G; (c) search tree of Q in G

    Step3The enumeration method of the DPisoalgorithm enumerates the matching result with the matching order, which is the same as the Ullmann algorithm.

    The DPisoalgorithm is much more efficient than the CFL algorithm.

    2.2.3CECIalgorithm

    Step2The ordering method of the CECI algorithm first selects a vertex with a larger degree and a smaller number of initial candidates as the first vertex in the matching order. Then, it conducts the breadth-first search from this vertex, and the order of the width-first search is taken as the matching order.

    Step3The enumeration method of the CECI algorithm enumerates the matching result with the matching order, which is the same as the Ullmann algorithm.

    The CECI algorithm is more efficient in the parallel processing field.

    2.2.4RIalgorithm

    The core idea of the RI algorithm is to find an efficient matching order as a good matching order is very important to speed up the matching process.

    Step1The filtering method of the RI algorithm filters the candidate vertices based on two pruning rules of the Ullmann algorithm.

    (1) One to one mapping relationship. For example, the subgraph matching procedure ofQinGwith matching orderφ={u1,u2,u3} is shown in Fig.6. In Fig.6(c),u1is adjacent tou2, andv1is not adjacent tov5. Ifu1is matched tov1, then there is no need to matchu2tov5.

    Fig.6 Example of subgraph matching procedure: (a) query graph Q; (b) data graph G; (c) search tree of Q in G

    (2) The consistency of adjacent relations of vertices. For example, a query vertex can only match one data vertex.

    Step2The ordering method of the RI algorithm applies a score function to calculate the score of a vertex according to the topological structure information of the query graph. Specifically, this method first selects a vertex with the largest degree in the query graph as the first vertex in the matching order. LetV1represent the set of neighbors ofu∈V(Q) that are in the current matching orderφ,V1={u′∈φ|e(u,u′)∈E(Q)}. LetV2that is not inφrepresent the set of common neighbors betweenuand the vertices inφ,V2={u′'∈φ|?u″∈V(Q)-φ,e(u′,u″)∈E(Q)∧e(u,u″)∈E(Q)}. LetV3represent the set of neighbors ofuthat are not inφand not adjacent to any vertices inφ,V3={u′∈N(u)-φ|?u″∈φ,e(u′,u″)?E(Q)}.

    This method iteratively selects the vertex with the largest |V1| as the next vertex. If |V1| is the same, the vertex with the largest |V2| is selected. If |V1| and |V2| are the same, the vertex with the largest |V3| is selected. If all three are the same, the vertex is selected at random.

    Step3The enumeration method of the RI algorithm enumerates the matching result to the matching order, which is the same as the Ullmann algorithm.

    Compared with the latest algorithms, the matching order of the RI algorithm is very efficient. The RI algorithm is only suitable for small queries because it does not use any data graph information.

    3 Experiments

    In this section, the latest exact GPM algorithms for experiments are compared, which are CFL, DPiso, CECI and RI algorithms.

    3.1 Experiment environment

    The experiments are conducted on a Linux machine with the Ubuntu 20.04.1 64 bit distribution operating system. The processor model is AMD ryzen 5 4600H 3.00 GHz and the memory is 8 G. All the algorithms are programmed in C++.

    3.2 Datasets and query graph

    Yeast, Human Protein Reference Database (HPRD), WordNet and Youtube datasets are selected in this experiments, which are commonly used in the previous work. The details of these datasets are shown in Table 2, wheredmaxrepresents the maximum degree of vertices,Wmaxrepresents the maximum frequency of labels, andddenotes the average degree of vertices. |V|, |E| and |W| represent the number of the vertices, the number of the edges and the number of the labels, respectively. The query graphs are generated for each datasetGby randomly extracting subgraphs fromG, and each query graph can be guaranteed to have at least one matching result in this way. For each dataset, five query sets are generated according to the number of vertices. The number of vertices are used to measure the scale of the query graph.

    Table 2 Properties of datasets

    3.3 Experimental results and analysis

    The size of the query graph is measured by the number of vertices. For example, a query graph size of four means that it contains four vertices. For Yeast and HPRD datasets, the query graphs are varied with sizes of 4, 8, 16, 24 and 32. For WordNet dataset, the query graphs are varied with sizes of 4, 8, 12 and 16, because WordNet dataset contains a large number of the same labels, which makes it very challenging.

    3.3.1Efficiency

    Figure 7 shows the average elapsed time of the exact GPM algorithms by varying the query graph size.

    Fig.7 Average elapsed time of algorithms by varying query graph size: (a) Yeast dataset; (b) HPRD dataset; (c) WordNet dataset; (d) Youtube dataset

    On Yeast dataset, the overall performance of the CECI algorithm is the best. The overall efficiency of the DPisoalgorithm is very close to that of the CECI algorithm. The RI algorithm has the worst efficiency. On HPRD dataset, the overall performance of the CFL algorithm is the best. On WordNet dataset, when the query graph size is 16, the overall performance of the RI algorithm is the best, and the CFL algorithm is the worst among all the algorithms. On Youtube dataset, the performance of the CFL algorithm is the worst and the RI algorithm is the best when the query graph size is 16.

    On Yeast dataset, when the query graph is dense, the DPisoalgorithm and the CECI algorithm conduct one more refinement on the candidate vertex set than the CFL algorithm, and the DPisoalgorithm and the CECI algorithm are better than the CFL algorithm. Moreover, the DPisoalgorithm and the CECI algorithm both apply the set intersection-based method for further filters, which speeds up the matching process. The RI algorithm is faster than the CFL algorithm, the DPisoalgorithm and the CECI algorithm when the query graph size is four, because the purpose of the RI algorithm is to find the best matching order to speed up the matching process and there are no efficient pruning rules or reasonable auxiliary data structures. The performance of the RI algorithm is relatively good when the dataset is sparse. Experiments on HPRD dataset show that all queries can be completed in 10 ms on average, so it is relatively easy to query on HPRD dataset. The DPisoalgorithm conducts one more refinement on the candidate vertex set than the CFL algorithm, so it is slower than the CFL algorithm in this dataset. The extra refinement process does not achieve good efficiency because it is easy to query on this dataset, which increases the time cost. In addition, the failing set pruning strategy of the DPisoalgorithm is effective on large queries. On WordNet and Youtube datasets, the overall performance of the DPisoalgorithm and that of the CECI algorithm are similar, and both of them are superior to the CFL algorithm. It is because the WordNet dataset contains a large number of duplicate labels and the average degree is only 3.1, which makes the dataset sparse. The overall performance of the RI algorithm is better than that of other three algorithms in the sparse graphs. In summary, the performance of the DPisoalgorithm and the CECI algorithm is better than that of the CFL algorithm and the RI algorithm. The matching performance of the CECI algorithm and that of the DPisoalgorithm is close.

    In addition, the experimental results also demonstrate that the characteristics of both pattern graphs and data graphs will influence the efficiency of the algorithms. On WordNet dataset, the RI algorithm is better than other three algorithms in the sparse graphs. For the dense pattern graph, the DPisoalgorithm and the CECI algorithm can achieve better efficiency because they conduct one more refinement on the candidate vertex set. Therefore, based on the results, when facing a new pattern graph and a new data graph, we can first analyze the characteristics of both the pattern graph and the data graph, and then select the suitable algorithm in order to achieve the best efficiency when performing the exact GPM progress.

    3.3.2Memorycost

    Figure 8 shows the average memory cost of the exact matching algorithms by varying the query graph size. The memory cost of the RI algorithm is the largest among all algorithms on Yeast, HPRD and Youtube datasets.

    The RI algorithm does not build any auxiliary structures to help filter vertices, and its filtering method is inefficient compared to other algorithms. Therefore, it consumes too much memory.

    In summary, the RI algorithm consumes more memory than other algorithms on Yeast, HPRD and Youtube datasets, and the overall memory cost of CFL, DPisoand CECI algorithms is similar. On WordNet dataset, the average memory cost of the CECI algorithm is significantly less than that of the CFL algorithm and the DPisoalgorithm.

    Fig.8 Average memory cost of algorithms by varying query graph size: (a) Yeast dataset; (b) HPRD dataset; (c) WordNet dataset; (d) Youtube dataset

    4 Conclusions

    In this paper, the applications of the GPM technique were introduced. Then, the typical GPM algorithms were presented in detail and the performance of these algorithms was compared. The efficiency in the different data graphs and query graphs of algorithms was shown, which could help us to select appropriate algorithms in different scenarios to achieve high query efficiency.

    In the future, we can conduct the exact GPM in a distributed environment to improve the performance,i.e., divide the large-scale data graph into multiple parts, process each part in parallel in different computer memories, and finally summarize the processing results of all machines into a complete result. It is also a good future research direction for the development of distributed GPM algorithms because they can handle highly dynamic data graphs. In order to reduce the size of the data graph, it is also an interesting future work to develop a general graph compression technique that maintains the matching properties of subgraphs in a distributed environment. Since most of the current exact GPMs are for the static graphs, the data graph is constantly updated in actual scenarios. Therefore, it is important to design efficient dynamic graph matching algorithms. Moreover, some of the latest documents have begun to optimize GPM from the computer hardware level to speed up the matching speed, such as using field programmable gate array to accelerate the subgraph matching process on a single computer, and using single instruction multiple data instructions to enhance pruning capabilities. Therefore, optimizing GPM from the hardware level will be an interesting job.

    猜你喜歡
    陸金
    黃陵祭
    軒轅頌
    12.16億美元陸金所下半年啟動IPO
    CHIP新電腦(2016年3期)2016-03-10 13:19:09
    陸金龍理事長一行拜訪比德文控股集團(tuán)董事長李國欣
    新能源科技(2015年5期)2015-04-23 06:25:39
    給每家銀行做個“陸金所”
    午夜影院日韩av| 女生性感内裤真人,穿戴方法视频| 成人亚洲精品一区在线观看| 亚洲五月天丁香| 99久久国产精品久久久| 怎么达到女性高潮| 欧美日韩黄片免| 男女下面进入的视频免费午夜 | 国产真人三级小视频在线观看| 中文字幕人妻丝袜一区二区| 麻豆av在线久日| 欧美一级毛片孕妇| 99国产精品一区二区三区| 999精品在线视频| 欧美老熟妇乱子伦牲交| av超薄肉色丝袜交足视频| 中文字幕色久视频| 亚洲va日本ⅴa欧美va伊人久久| 自线自在国产av| 美女高潮喷水抽搐中文字幕| www.www免费av| 精品久久久久久成人av| 97人妻天天添夜夜摸| 人人妻,人人澡人人爽秒播| 亚洲久久久国产精品| 男人的好看免费观看在线视频 | 国内精品久久久久久久电影| 色播在线永久视频| 色在线成人网| 免费看美女性在线毛片视频| 中出人妻视频一区二区| 老司机在亚洲福利影院| 欧美午夜高清在线| 久久午夜亚洲精品久久| 脱女人内裤的视频| 成人国产一区最新在线观看| or卡值多少钱| 十分钟在线观看高清视频www| 一区二区三区国产精品乱码| 色老头精品视频在线观看| 色老头精品视频在线观看| 嫩草影视91久久| 国产av在哪里看| av在线播放免费不卡| 日韩三级视频一区二区三区| 最近最新免费中文字幕在线| 欧美日韩一级在线毛片| svipshipincom国产片| 99精品在免费线老司机午夜| 久热爱精品视频在线9| 亚洲国产精品999在线| 国产av一区二区精品久久| 亚洲av日韩精品久久久久久密| 一个人观看的视频www高清免费观看 | 久久久久久久久中文| 精品卡一卡二卡四卡免费| 精品福利观看| 无遮挡黄片免费观看| 亚洲精品美女久久av网站| 国产欧美日韩精品亚洲av| 51午夜福利影视在线观看| 国产极品粉嫩免费观看在线| 九色国产91popny在线| 精品国内亚洲2022精品成人| 真人做人爱边吃奶动态| 脱女人内裤的视频| 久久欧美精品欧美久久欧美| 午夜亚洲福利在线播放| 大码成人一级视频| 老熟妇乱子伦视频在线观看| 久久精品国产清高在天天线| 亚洲五月婷婷丁香| 久久青草综合色| 女人被躁到高潮嗷嗷叫费观| 成人亚洲精品一区在线观看| 中出人妻视频一区二区| 久热爱精品视频在线9| 丰满的人妻完整版| 久久久久九九精品影院| 国产精品电影一区二区三区| 男女午夜视频在线观看| 欧美日韩乱码在线| 精品久久久久久成人av| 欧美成人午夜精品| 久久精品影院6| 黄色视频,在线免费观看| 99在线视频只有这里精品首页| 国产97色在线日韩免费| 99久久99久久久精品蜜桃| 久久久久亚洲av毛片大全| 精品久久久久久久毛片微露脸| aaaaa片日本免费| netflix在线观看网站| 人人妻,人人澡人人爽秒播| 欧美激情高清一区二区三区| 亚洲国产中文字幕在线视频| 亚洲国产高清在线一区二区三 | 久久久水蜜桃国产精品网| 亚洲一卡2卡3卡4卡5卡精品中文| 国产亚洲精品av在线| 午夜福利18| 制服丝袜大香蕉在线| 狂野欧美激情性xxxx| 一级毛片精品| 一二三四在线观看免费中文在| 在线视频色国产色| 婷婷六月久久综合丁香| 99精品欧美一区二区三区四区| 国产精品精品国产色婷婷| 午夜亚洲福利在线播放| 久久午夜亚洲精品久久| 精品午夜福利视频在线观看一区| 亚洲情色 制服丝袜| 无限看片的www在线观看| 俄罗斯特黄特色一大片| 大香蕉久久成人网| 国产单亲对白刺激| 免费一级毛片在线播放高清视频 | 亚洲一码二码三码区别大吗| 可以在线观看的亚洲视频| 国产日韩一区二区三区精品不卡| 老司机在亚洲福利影院| 久久久国产欧美日韩av| 男女做爰动态图高潮gif福利片 | 精品一品国产午夜福利视频| 88av欧美| 久久久久久久久久久久大奶| 女人精品久久久久毛片| svipshipincom国产片| 色综合婷婷激情| 国产精品98久久久久久宅男小说| ponron亚洲| 男人舔女人下体高潮全视频| 免费高清在线观看日韩| 国产熟女午夜一区二区三区| 午夜成年电影在线免费观看| 久久青草综合色| 一级黄色大片毛片| 亚洲国产精品sss在线观看| 亚洲男人天堂网一区| 日本免费a在线| 日韩有码中文字幕| √禁漫天堂资源中文www| 91九色精品人成在线观看| 免费在线观看影片大全网站| 午夜免费观看网址| 91av网站免费观看| 99精品久久久久人妻精品| 亚洲天堂国产精品一区在线| 国产精品乱码一区二三区的特点 | 男人操女人黄网站| av天堂久久9| 黄色成人免费大全| 国产高清激情床上av| 日韩视频一区二区在线观看| 久久性视频一级片| 色尼玛亚洲综合影院| 亚洲精品av麻豆狂野| 日韩免费av在线播放| 亚洲av电影不卡..在线观看| 99久久精品国产亚洲精品| 久久国产精品人妻蜜桃| 97人妻天天添夜夜摸| 久热这里只有精品99| 淫秽高清视频在线观看| 十八禁人妻一区二区| 精品一区二区三区四区五区乱码| 可以免费在线观看a视频的电影网站| 一级毛片高清免费大全| 97人妻天天添夜夜摸| 中文字幕人成人乱码亚洲影| 黄频高清免费视频| 两人在一起打扑克的视频| 国产97色在线日韩免费| 国产成人啪精品午夜网站| 久久人妻av系列| 成人欧美大片| 免费无遮挡裸体视频| 亚洲 国产 在线| 久久精品国产清高在天天线| 亚洲精品久久国产高清桃花| 制服人妻中文乱码| 脱女人内裤的视频| 亚洲精品在线美女| 男女下面进入的视频免费午夜 | 999久久久国产精品视频| 国产精品久久久av美女十八| 久久中文字幕人妻熟女| 日韩欧美在线二视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲伊人色综图| 成熟少妇高潮喷水视频| 大香蕉久久成人网| www国产在线视频色| 亚洲一区中文字幕在线| 久久久国产欧美日韩av| 天堂√8在线中文| 电影成人av| 婷婷丁香在线五月| 麻豆av在线久日| 亚洲专区字幕在线| 一区二区三区激情视频| 97人妻精品一区二区三区麻豆 | 午夜两性在线视频| 久久精品aⅴ一区二区三区四区| 中文字幕精品免费在线观看视频| 老汉色∧v一级毛片| 999久久久国产精品视频| av有码第一页| 最近最新免费中文字幕在线| 少妇的丰满在线观看| 亚洲精品av麻豆狂野| 欧美一区二区精品小视频在线| 老汉色av国产亚洲站长工具| 精品欧美国产一区二区三| 日韩欧美国产在线观看| 一二三四在线观看免费中文在| 一区二区日韩欧美中文字幕| 69av精品久久久久久| 精品日产1卡2卡| 成人永久免费在线观看视频| 午夜免费成人在线视频| 国产av精品麻豆| 久久草成人影院| 日韩国内少妇激情av| 亚洲精品一区av在线观看| 久久精品影院6| 亚洲欧美精品综合久久99| 亚洲成人免费电影在线观看| 国产精品自产拍在线观看55亚洲| 九色国产91popny在线| 欧美日本亚洲视频在线播放| 免费在线观看黄色视频的| 岛国在线观看网站| 天堂√8在线中文| 国产亚洲欧美精品永久| 乱人伦中国视频| 亚洲黑人精品在线| 热re99久久国产66热| 国产一卡二卡三卡精品| 欧美日韩亚洲国产一区二区在线观看| 欧美日本亚洲视频在线播放| 国产精品美女特级片免费视频播放器 | av欧美777| 亚洲色图 男人天堂 中文字幕| 亚洲国产日韩欧美精品在线观看 | 男女下面插进去视频免费观看| 国产成人av激情在线播放| 美女午夜性视频免费| 一级作爱视频免费观看| 国产视频一区二区在线看| 中文字幕另类日韩欧美亚洲嫩草| 免费观看精品视频网站| 国产真人三级小视频在线观看| 精品熟女少妇八av免费久了| 在线观看免费视频日本深夜| 露出奶头的视频| 欧美国产日韩亚洲一区| 亚洲国产毛片av蜜桃av| 99久久精品国产亚洲精品| 久久久久久免费高清国产稀缺| av视频在线观看入口| 久久青草综合色| 两个人免费观看高清视频| 久久久国产成人免费| 我的亚洲天堂| 久久精品aⅴ一区二区三区四区| 日本撒尿小便嘘嘘汇集6| 一边摸一边做爽爽视频免费| videosex国产| 老司机午夜十八禁免费视频| 欧美 亚洲 国产 日韩一| 男女午夜视频在线观看| 黄频高清免费视频| 在线观看舔阴道视频| 在线免费观看的www视频| 亚洲成国产人片在线观看| 99久久久亚洲精品蜜臀av| 18美女黄网站色大片免费观看| 国产伦一二天堂av在线观看| 亚洲精品国产精品久久久不卡| 欧美中文综合在线视频| 国产不卡一卡二| 两性夫妻黄色片| 午夜激情av网站| 国产一区二区三区综合在线观看| 久久这里只有精品19| 搡老妇女老女人老熟妇| 午夜两性在线视频| 久久久国产欧美日韩av| 日本a在线网址| 国产欧美日韩一区二区精品| 亚洲情色 制服丝袜| 老熟妇仑乱视频hdxx| 叶爱在线成人免费视频播放| 欧美日韩亚洲国产一区二区在线观看| 欧美精品啪啪一区二区三区| 国产xxxxx性猛交| 日韩欧美免费精品| 日本vs欧美在线观看视频| av免费在线观看网站| 亚洲自拍偷在线| 成人免费观看视频高清| 亚洲人成电影免费在线| 久久久久久久久中文| 好男人电影高清在线观看| 亚洲精品久久成人aⅴ小说| 色播亚洲综合网| 欧美中文综合在线视频| 亚洲三区欧美一区| 变态另类丝袜制服| 在线观看免费日韩欧美大片| 国产精品电影一区二区三区| 国产野战对白在线观看| 亚洲国产欧美一区二区综合| 九色国产91popny在线| 97碰自拍视频| 99国产精品一区二区蜜桃av| 9色porny在线观看| 亚洲av成人不卡在线观看播放网| 欧美日韩乱码在线| 国产片内射在线| 自线自在国产av| 亚洲国产精品成人综合色| 色综合欧美亚洲国产小说| 国产精品一区二区精品视频观看| 亚洲精品美女久久久久99蜜臀| 欧美人与性动交α欧美精品济南到| 桃红色精品国产亚洲av| a在线观看视频网站| 99久久99久久久精品蜜桃| 欧美黄色片欧美黄色片| 亚洲五月婷婷丁香| 免费在线观看日本一区| 国产乱人伦免费视频| 国产精品久久久人人做人人爽| 后天国语完整版免费观看| 中文字幕高清在线视频| 成人欧美大片| 老司机深夜福利视频在线观看| 亚洲熟妇中文字幕五十中出| 久久久国产成人精品二区| 午夜两性在线视频| 88av欧美| 国产精品秋霞免费鲁丝片| 韩国av一区二区三区四区| 在线观看一区二区三区| 69精品国产乱码久久久| 色婷婷久久久亚洲欧美| 一二三四社区在线视频社区8| 操美女的视频在线观看| 一边摸一边做爽爽视频免费| 亚洲av电影在线进入| 丰满人妻熟妇乱又伦精品不卡| 伊人久久大香线蕉亚洲五| 欧美成人性av电影在线观看| 一级毛片女人18水好多| 1024香蕉在线观看| 欧美日韩一级在线毛片| 老熟妇乱子伦视频在线观看| 在线天堂中文资源库| 大码成人一级视频| 成人av一区二区三区在线看| 高清黄色对白视频在线免费看| 国产激情久久老熟女| 午夜两性在线视频| 少妇裸体淫交视频免费看高清 | 午夜福利影视在线免费观看| 午夜福利一区二区在线看| 欧美人与性动交α欧美精品济南到| 国产亚洲精品综合一区在线观看 | 亚洲人成伊人成综合网2020| 国产亚洲精品一区二区www| 国产精品,欧美在线| 日本撒尿小便嘘嘘汇集6| 在线观看免费视频日本深夜| 黑丝袜美女国产一区| 成人18禁在线播放| 无遮挡黄片免费观看| 欧美色视频一区免费| 亚洲精品一卡2卡三卡4卡5卡| videosex国产| 国产精品 欧美亚洲| 自线自在国产av| 国产精品久久视频播放| 在线国产一区二区在线| 久久中文看片网| 首页视频小说图片口味搜索| 日韩中文字幕欧美一区二区| 日韩欧美免费精品| 日日夜夜操网爽| 在线视频色国产色| 在线观看免费日韩欧美大片| 咕卡用的链子| 久久精品国产亚洲av香蕉五月| 免费在线观看黄色视频的| 一级黄色大片毛片| 日本免费a在线| 亚洲精品av麻豆狂野| 丰满的人妻完整版| 狂野欧美激情性xxxx| 精品电影一区二区在线| 一边摸一边抽搐一进一小说| 久久精品亚洲精品国产色婷小说| 十八禁网站免费在线| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品一区av在线观看| 精品欧美国产一区二区三| 老司机在亚洲福利影院| 国产精品精品国产色婷婷| 久久久久精品国产欧美久久久| 亚洲国产精品999在线| 一级片免费观看大全| 中文字幕久久专区| 久久人人精品亚洲av| 国产熟女午夜一区二区三区| 亚洲av五月六月丁香网| 国产午夜精品久久久久久| 丰满人妻熟妇乱又伦精品不卡| 人人妻人人澡欧美一区二区 | 黄网站色视频无遮挡免费观看| 亚洲欧美一区二区三区黑人| 波多野结衣巨乳人妻| 亚洲久久久国产精品| 国产精品永久免费网站| 亚洲美女黄片视频| 热99re8久久精品国产| 国产亚洲精品久久久久久毛片| 午夜亚洲福利在线播放| 丁香六月欧美| 午夜免费观看网址| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲午夜精品一区,二区,三区| 国产高清有码在线观看视频 | 午夜老司机福利片| 午夜免费成人在线视频| 色av中文字幕| 中文字幕人成人乱码亚洲影| 欧美大码av| 天堂√8在线中文| 精品卡一卡二卡四卡免费| 搡老妇女老女人老熟妇| 国产精品亚洲一级av第二区| 欧美日韩福利视频一区二区| 国产野战对白在线观看| 日本三级黄在线观看| 午夜免费观看网址| 真人做人爱边吃奶动态| 亚洲精品中文字幕一二三四区| 九色亚洲精品在线播放| 99在线视频只有这里精品首页| 久久欧美精品欧美久久欧美| 成熟少妇高潮喷水视频| 在线免费观看的www视频| 亚洲精品av麻豆狂野| 亚洲九九香蕉| 老司机在亚洲福利影院| 国产欧美日韩一区二区精品| 午夜影院日韩av| 欧洲精品卡2卡3卡4卡5卡区| 长腿黑丝高跟| 在线观看舔阴道视频| cao死你这个sao货| 身体一侧抽搐| 亚洲一区高清亚洲精品| 国产真人三级小视频在线观看| 日韩欧美国产在线观看| 色综合站精品国产| 无限看片的www在线观看| 最近最新免费中文字幕在线| 国产高清视频在线播放一区| 欧美色欧美亚洲另类二区 | 两个人看的免费小视频| 国产精品爽爽va在线观看网站 | 国产高清videossex| 宅男免费午夜| 欧美日韩福利视频一区二区| 国产精品98久久久久久宅男小说| 国产成人精品久久二区二区91| 成人精品一区二区免费| 宅男免费午夜| 制服人妻中文乱码| 欧美老熟妇乱子伦牲交| www.熟女人妻精品国产| 免费av毛片视频| 午夜福利成人在线免费观看| 精品电影一区二区在线| 日韩有码中文字幕| 一区二区三区激情视频| 满18在线观看网站| 亚洲va日本ⅴa欧美va伊人久久| 淫秽高清视频在线观看| 淫妇啪啪啪对白视频| 黄色女人牲交| 丰满人妻熟妇乱又伦精品不卡| 免费少妇av软件| 国产单亲对白刺激| 国产精品综合久久久久久久免费 | 欧美成人免费av一区二区三区| 男女午夜视频在线观看| 久久久精品国产亚洲av高清涩受| 黄色 视频免费看| 成人手机av| 久久久久久免费高清国产稀缺| 十八禁人妻一区二区| 又紧又爽又黄一区二区| 日本 欧美在线| 757午夜福利合集在线观看| 日本a在线网址| 欧美精品啪啪一区二区三区| 久久精品国产亚洲av高清一级| 国产成+人综合+亚洲专区| 成在线人永久免费视频| 真人做人爱边吃奶动态| 亚洲av日韩精品久久久久久密| cao死你这个sao货| 岛国在线观看网站| 亚洲黑人精品在线| 亚洲精品一卡2卡三卡4卡5卡| 色精品久久人妻99蜜桃| 在线观看免费视频日本深夜| 亚洲色图 男人天堂 中文字幕| 麻豆久久精品国产亚洲av| 国产av又大| 99国产极品粉嫩在线观看| 熟女少妇亚洲综合色aaa.| 久久久水蜜桃国产精品网| 色婷婷久久久亚洲欧美| 69精品国产乱码久久久| 国产又色又爽无遮挡免费看| 久久青草综合色| 欧美成人性av电影在线观看| 老司机靠b影院| 色综合欧美亚洲国产小说| 国产欧美日韩精品亚洲av| 久久精品亚洲熟妇少妇任你| 一区在线观看完整版| 巨乳人妻的诱惑在线观看| 国产精品一区二区免费欧美| 久久人妻熟女aⅴ| 日本黄色视频三级网站网址| 国产精品秋霞免费鲁丝片| 午夜影院日韩av| 99久久综合精品五月天人人| 亚洲国产精品sss在线观看| 老司机午夜十八禁免费视频| 久久久久亚洲av毛片大全| 欧美中文日本在线观看视频| 亚洲成人精品中文字幕电影| www.精华液| 男女床上黄色一级片免费看| 精品久久久久久久人妻蜜臀av | 国产亚洲欧美98| 午夜影院日韩av| 色av中文字幕| 精品一品国产午夜福利视频| svipshipincom国产片| 1024香蕉在线观看| 夜夜躁狠狠躁天天躁| 国产一区二区激情短视频| 成人精品一区二区免费| 黄色视频,在线免费观看| 又黄又粗又硬又大视频| 久久久久久久久久久久大奶| 亚洲中文字幕日韩| 精品熟女少妇八av免费久了| 婷婷精品国产亚洲av在线| 亚洲成国产人片在线观看| 国产精品1区2区在线观看.| 一二三四社区在线视频社区8| 国产1区2区3区精品| 99国产综合亚洲精品| 色老头精品视频在线观看| 黄片大片在线免费观看| 18禁观看日本| 日韩一卡2卡3卡4卡2021年| 日韩 欧美 亚洲 中文字幕| 国产高清videossex| 亚洲熟妇中文字幕五十中出| 国产精品电影一区二区三区| 欧美日韩乱码在线| 一级黄色大片毛片| 国产精品美女特级片免费视频播放器 | 亚洲国产精品合色在线| 啪啪无遮挡十八禁网站| 亚洲精品中文字幕在线视频| 精品一区二区三区四区五区乱码| 国产真人三级小视频在线观看| 最近最新中文字幕大全电影3 | 搡老岳熟女国产| 亚洲精品国产色婷婷电影| 色综合站精品国产| 曰老女人黄片| 嫁个100分男人电影在线观看| 大型黄色视频在线免费观看| 热99re8久久精品国产| av欧美777| 日日夜夜操网爽| 免费女性裸体啪啪无遮挡网站| 亚洲最大成人中文| 18禁裸乳无遮挡免费网站照片 | 亚洲av成人一区二区三| 极品教师在线免费播放| 亚洲一区二区三区不卡视频| 国产成人精品无人区| 不卡一级毛片| 欧美色视频一区免费| 久久国产乱子伦精品免费另类| 日本三级黄在线观看| 黄色视频不卡| 99国产精品一区二区三区| 在线观看免费日韩欧美大片| 波多野结衣高清无吗| 亚洲第一欧美日韩一区二区三区| 精品一品国产午夜福利视频|