• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identifying multiple influential spreaders in complex networks based on spectral graph theory

    2023-10-11 07:56:46DongXuCui崔東旭JiaLinHe何嘉林ZiFeiXiao肖子飛andWeiPingRen任衛(wèi)平
    Chinese Physics B 2023年9期

    Dong-Xu Cui(崔東旭), Jia-Lin He(何嘉林), Zi-Fei Xiao(肖子飛), and Wei-Ping Ren(任衛(wèi)平)

    School of Computer Science and Engineering,China West Normal University,Nanchong 637009,China

    Keywords: spectral graph theory,Laplace matrix,influence maximization,multiple influential spreaders

    1.Introduction

    The influence maximization issue was first introduced by Domingos and Richardson in 2001.[1]One of the main problems of influence maximization is to findkcritical nodes in a complex network, so that the number of nodes being influenced in the network is maximized.The selection of critical nodes in the influence maximization problem is very significant for controlling the spread of epidemics,[2]controlling the spread of rumors,apprehending criminal gangs,[3]and tapping potential customers.[4]Many scholars have already made studies on related aspects.[5–10]

    Among the algorithms to select out multiple influential spreaders in complex networks,the most commonly used basic idea is the top-kstrategy, which selects the topknodes with the largest values as the initial spreaders.For example, degree centrality (DC)[11]measures the importance of a node by the number of nodes that are directly connected to it.The greater the DC,the greater impact on the propagation,so the topknodes with the largest degree values are selected as the initial spreaders in the propagation process.However,DC only considers the first-order neighbors and fails to consider the connections of other nodes(non-neighboring nodes)with it in the algorithm.In view of this, Chenet al.proposed the LocalRank[12]algorithm,which considers fourth-order neighbors and improves on the DC.Betweenness centrality(BC)[13]and closeness centrality (CC)[14,15]consider global network information.BC measures how important a node is based on how many shortest paths pass through it.CC evaluates the importance of a node by the sum of its distances to other nodes in the network,with the closer being more important.In addition,there is ClusterRank,[16]which considers both the degree of the node and the clustering coefficient, and PageRank[17]and LeaderRank,[18]proposed as algorithms to calculate the importance of Internet pages.Fanet al.[19]proposed the cycle ratio(CR)algorithm,which proposes and defines the cycle number matrix and cycle ratio by analyzing the information contained in cycles in a network structure; the cycle number matrix contains the cycle of nodes in the network information,and the cycle ratio measures the importance of nodes.Algorithms such as these all select the topknodes with the largest values as the initial spreaders in the propagation process,i.e.,using the top-kstrategy.

    Although the nodes selected by the top-kstrategy can improve the final affected scale, it causes local propagation if the selected nodes are clustered,because the top-ranked nodes selected by these algorithms might be clustered as a richclub.[20]Initially,some nodes that contribute to effective information propagation are selected.As more nodes are added to the rich-club,their contributions to effective information propagation become smaller.To avoid the occurrence of a richclub,some scholars have started to study the dispersion of selected nodes,such as excluding the selected nodes from being neighboring nodes, etc.Kempeet al.[21]proposed a “mountain climbing” greedy strategy to selectkcritical nodes, and the performance of this greedy strategy is close to 63%of the optimal performance.Chenet al.[22]proposed a“degree discount”heuristic algorithm to select critical nodes,which has a wider propagation range and lower time complexity.Zhaoet al.[23]applied the “coloring problem” in graph theory to find multiple influential spreaders in complex networks, by dividing nodes with the same color into same independent sets,and selecting a certain percentage of important nodes from each independent set; the larger the independent set is, the more nodes are selected, and this algorithm accelerates the propagation process.Guoet al.[24]proposed distance-based coloring algorithms, which significantly improve the final affected scale.Flaviano Moroneet al.[25]addressed the problem of quantifying nodes’ influence by finding the optimal (that is,minimal)set of structural influencers,and proposed collective influence (CI), a scalable algorithm to solve the optimization problem in large-scale real data sets.Zhanget al.[26]proposed the VoteRank algorithm, which selects multiple influential spreaders through each round of voting iterations and weakens the voting power of their neighbors; Sunet al.[27]proposed WVoteRank (WVR) based on the VoteRank algorithm, which can be used not only on unweighted networks but also on weighted networks.Fanet al.[28]proposed an algorithm to find critical nodes in complex networks by introducing a deep reinforcement learning framework.

    However, although the dispersion strategy improves the final affected scale by increasing the dispersion of the selected nodes,the disadvantage is that the local structure of many critical nodes is not conducive to disease propagation.Based on this,this paper proposes a compromise strategy to balance the top-kstrategy and the dispersion strategy.In the experimental study of seven real networks and four synthetic networks generated by the LFR[29]model that is a community generation model proposed by Lancichinettiet al., the algorithm in this paper has a clear advantage in the final affected scale, compared with BC,CC,DC,CI,WVR,CR and FINDER.

    The major contributions of this paper are shown as follows.

    (i) From analysis of two network topologies, it is found that the local tree structure is more conducive to the spread of disease than the local cluster structure.

    (ii)Using the eigenvectors of the Laplace matrix to classify structural importance of nodes,a balancing strategy is proposed in which nodes of the same class are not adjacent,while nodes of different classes are adjacent.

    2.Preliminaries

    2.1.Graph Laplacian quadratic form

    Given a graphG=(V,E),Vdenotes the set of nodes in the graph,which is assumed to be of lengthN.The graph signal is a mapping describingV →R, expressed in the form of a unit vector:x=[x1,x2,...,xN]T,wherexidenotes the signal strength on nodevi.When studying the properties of the graph signal, the topology of the graph should be considered in addition to the strength of the graph signal.The Laplace matrix is the core object used to study the structural properties of the graph and is defined as follows:

    whereAandDdenote the adjacency matrix and the diagonal matrix of the degree of the graph respectively,andDii=∑j Aijdenotes the degree of nodevi.Based on the Laplace matrix,we can define a very important quadratic form as follows:

    whereTV(x) is the total variance of the graph signal, which sums the differences of the signals on each edge and portrays the overall smoothness of the graph signal.

    Assuming that theNeigenvalues of the Laplace matrixLareγ1≥γ2≥···≥γNand the corresponding unit eigenvectors areu1,u2,...,uN,respectively,then equation(2)can be rewritten as

    where ~xidenotes the coordinates of signalxon the unit eigenvectoruicorresponding toγi,Λdenotes the diagonal matrix consisting of eigenvalues andUdenotes the orthogonal eigenmatrix consisting of eigenvectors.From Eq.(3),it can be seen that when the graph signalx=ui, thenTV(ui)=γi.Hence,forγ1≥γ2≥···≥γN, the inequalityTV(u1)≥TV(u2)≥···≥TV(uN)holds.

    2.2.SIR model

    The SIR model[30,31]and the SIS model are two relatively well-known infectious disease models,and in this experiment the SIR model is used as an evaluation metric for the performance of the algorithm.In the SIR model, each node in the network can only be in one of the following three states at each time step: susceptible(S),infected(I),and recovered(R).At time stept,infected nodeurandomly selects the neighboring nodev.If nodevbelongs to susceptible nodes,nodeuinfects it with probabilityα.Meanwhile,infected nodeubecomes a recovered node with probabilityβ.The disease propagation process ends when all infected nodes in the network have become recovered nodes.At this point,the final scale of affected nodesF(n)is used as a measure of the performances of different algorithms,defined as follows:

    whereN′andNRdenote the number of all nodes in the network and the number of nodes eventually recovered, respectively.In addition, in the SIR model, the basic reproduction numberλ=α/βreflects the disease propagation trend; for example,whenλ >1,the disease is able to spread throughout the population.

    2.3.The K-core algorithm

    TheK-core[32]algorithm is a subgraph mining algorithm to find the set of nodes in a graph that match a specified core degree,requiring each node to be connected to at leastKother nodes in that graph.In addition,K-core hierarchically divides the graph according toKvalues.For example,2-core removes nodes with degree less than 2 each time,3-core removes nodes with degree less than 3 each time,and each repeated removal of nodes as well as edges is specified byKvalues as shown in Fig.1.Thus,it shows that nodes with larger core degrees tend to have larger degrees, i.e., more neighboring nodes, which can play a greater role to a certain extent.

    Fig.1.Schematic of the 1-core,2-core,and 3-core subgraphs.

    3.Multiple influential spreaders identification algorithm

    3.1.Node local structure analysis

    From Subsection 2.3,it is clear that the outermost nodes of the network,i.e.,those withK=1,play a very limited role in the propagation process.Therefore, we only analyze the subgraph of the nodes withK ≥2 in the network.First, all nodes withK=1 are removed from the initial networkGto obtain the new networkG′.Next,the adjacency matrixA′of the new networkG′is normalized, which can be obtained as follows:

    Fig.2.Two classical topological structures.(a) Local tree structure;(b)local cluster structure.

    3.2.Trade-off strategy

    Currently, there are two strategies for identifying a set of critical nodes: the top-kstrategy and the dispersion strategy.The top-kstrategy selects the topknodes with the largest value, but the value selected is a single measure that does not fully represent the nodes’propagation ability,causing the selected nodes to cluster together and overlap, resulting in a rich-club phenomenon.The dispersion strategy focuses on the dispersion of the selected nodes, so many critical nodes not conducive to disease propagation are selected.In view of the limitations of the above two strategies, this paper proposes a compromise strategy that balances the importance of critical nodes and the dispersion of critical nodes.

    Given the eigenvectorsu1,u2,...,uNof the Laplacian matrix, the projectionsi jofon the eigenvectorujis defined as

    Therefore, we can use theNeigenvectors ofLas the benchmark category vectors to classify the importance of local structure ofNnodes in the network.Specifically,for each nodevi,the baseline category vector ordinal numberliwith the maximum similaritysijis calculated,i.e.,

    The setCjof nodes contained in each benchmark category vectorujis then found,i.e.,

    It is known from Subsection 3.1 that the largeris,the higher the probability of nodevispreading the disease outward.Hence, the importance of the local structure of nodes inC1,C2and other sets decreases successively.To select a set of critical nodes, we use the constraint that nodes in the same class are not adjacent, but nodes from different classes can be adjacent to balance the importance of structure and dispersion.Hence, we give priority to the nodes in the setC1when selecting a set of critical nodes.First, the nodes inC1are first sorted by similaritysi1from largest to smallest.Then,the first node inC1is selected as the critical node, and next the second critical node inC1is selected which is not adjacent to the first critical node and has the largestsi1,and so on,until there are no nodes to be selected inC1.If the number of selected critical nodes is not yet satisfied,we proceed to consider the second setC2.When selecting critical nodes fromC2,we only require that the selected nodes are not adjacent to the critical nodes already selected inC2.In other words, the critical nodes in each setCjare not adjacent to each other,but the critical nodes in two setsCiandCjcan be adjacent to each other.The above process is repeated until the given number of critical nodes is satisfied.

    The pseudo-code for our algorithm is given as follows.Algorithm 1 demonstrates node classification based on the eigenvectors of the Laplace matrix,where steps 4–9 represent that calculating similarity between ~a′iandujof every node,and classifying nodes by maximum similarity.After that, we can select a set of critical nodes by the constraint that nodes in the same class are not adjacent to each other while different classes of nodes can be adjacent to each other.

    Algorithm 1 NC(G)–Node classification Input: Graph G=(V,E)Output: Classified nodes sets C 1: Delete the nodes with K=1 in G using K-core algorithm,and get the new graph G′.2: L′←D′-A′and ~A′←D′-1A′.3: Cn ←/0 for n=0,1,2,...,[V′].4: for each row vector ~a′i of ~A′do 5: lmax ←i and smax ←0.6: for each eigenvectors uj of L′do 7: Calculate the similarity sij of ~a′i and eigenvectors uj.8: if sij >smax then 9: lmax ←j and smax ←sij 10: end if 11: end for 12: Clmax ←Clmax ∪{i}.13: end for 14: return C

    4.Experimental results

    To verify the effectiveness of the proposed algorithm(LA) in this paper, experiments are conducted on seven real networks and four synthetic networks generated by the LFR model[29]in this section, and their performance is evaluated in comparison with seven benchmark algorithms.To better demonstrate the comparative effects between these algorithms,we divided the experiments into two main groups: top-kstrategy and dispersion strategy.The experiments are carried out on the SIR model, and the infection probability is uniformly set asα=〈ω〉/(〈ω2〉-〈ω〉), where〈ω〉 is the average degree of the network.

    4.1.Benchmark algorithm

    Seven benchmark algorithms are selected for comparison with the LA algorithm,namely,BC,[13]CC,[14,15]DC,[11]CR,[19]CI,[25]WVR,[27]and FINDER.[28]The details of the seven algorithms are described as follows.

    4.1.1.Top-kstrategy

    Betweenness centrality(BC),which measures the importance of a node by whether the shortest paths all pass through it, and selects the topknodes that have been passed through more often as the initial spreaders.

    Closeness centrality (CC), which measures the importance of a node by the sum of its distances from other nodes in the network, and selects the topknodes with smaller sum of distances as the initial spreaders.

    Degree centrality (DC), which measures the importance of a node by the number of its neighbors, and selects the topknodes with larger degree values as the initial spreaders.

    Cycle ratio (CR), which defines a cycle number matrix in order to represent the cycle information of the network,by which a metric called cycle ratio can be calculated–quantifying the importance of a single node by measuring the extent to which a node participates in the shortest cycle associated with other nodes.

    4.1.2.Dispersion strategy

    Collective influence(CI),which selects the nodes through a scalable algorithm and believes low-degree nodes play a major broker role in the network,and despite being weakly connected,can be powerful influencers.

    WVoteRank (WVR), which selects the nodes with the highest number of votes and not the neighboring nodes of the already selected nodes as the initial propagators in each round of voting by iteration.

    FINDER (FINDER), which introduces a deep reinforcement learning framework that incorporates inductive graph representation learning to represent graph states and actions,and a deepQ′(quality of action score)network that combines reinforcement learning and deep neural networks to automatically learn the strategy that optimizes the objective to find critical nodes in a complex network.

    4.2.Real networks

    The seven real network datasets selected in this paper are C.elegans,[33]crime,[34]Email,[35]Yeast,[36]HI-II-14,[37]ca-HepPh,[38]and ca-AstroPh,[38]which are complex networks with nodes ranging from a few hundred to more than 10000.Among them, the C.elegans network is a neural network, in which nodes represent neurons in the nervous system of the worm,and edges represent connections between neurons.The crime network is a criminal network.The Email network is an email communication network at the University of Rovira,Spain,in which nodes represent users and edges indicate that users have sent emails to each other.The Yeast network and HI-II-14 network are protein–protein interaction networks.The Ca-HepPh network is a collaborative network, in which nodes are authors of published papers, and the edges represent that there are co-authored papers between two or more authors.The Ca-AstroPh network is a collaborative network,which covers scientific collaborations between authors of papers submitted to the astrophysics category.The basic topological properties of the seven real networks are shown in Table 1.

    Table 1.Four basic topological properties of the real networks,including the number of nodes(|V|),the number of edges(|E|),the average degree of the nodes(〈ω〉),and the network clustering coefficient(c).

    4.2.1.Top-kstrategy

    Fig.3.Final affected scale F(n) with different percentages of source influential spreaders p on seven real networks, where (a)–(f) show the effects of top-k strategy algorithms and (g) and (h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(a)–3(f),on the C.elegans network,the LA algorithm outperforms the other four algorithms overall.In particular,whenp ∈[0.03,0.10],the LA algorithm always performs better than the benchmark algorithms.On the Email network,Yeast network, ca-HepPh network, and ca-AstroPh network,the LA algorithm always brings a better influence range than DC,BC,CC,and CR whenp ∈[0.01,0.10].In particular,on the crime network,the LA algorithm obtains an improvement of spreading influence ranging from 5.53%to 17.30%over the second best algorithm CR.Similarly,the LA algorithm outperforms the second best algorithm CR with an improvement of spreading influence ranging from 15.77% to 29.10% on the ca-HepPh network.Moreover, on the ca-AstroPh network,the LA algorithm obtains improvements of 25.09%, 16.71%,52.29%and 54.49%compared with CR,BC,DC and CC,respectively.

    Fig.4.Final affected scale F(n) with different λ on six real networks,where (a)–(f) show the effects of top-k strategy algorithms and (g) and(h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where p=0.05, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In the experiment, the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(a)–4(f),it can be concluded that the LA algorithm performs better than the other four pure node centrality indicators algorithms on the C.elegans network, crime network, Yeast network, Email network, ca-HepPh network,and ca-AstroPh network.In particular,on the ca-AstroPh network, the LA algorithm obtains an improvement of spreading influence ranging from 23.61% to 28.56%over the second best algorithm CR.

    4.2.2.Dispersion strategy

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(g)–3(h),LA algorithm always outperforms the other three dispersion strategy algorithms.On the HI-II-14 network, LA algorithm outperforms algorithm WVR with an improvement of spreading influence ranging from 3.26%to 13.04%,outperforms algorithm FINDER with an improvement of spreading influence ranging from 10.43%to 20.02%,and outperforms algorithm CI with an improvement of spreading influence ranging from 4.43%to 16.73%.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In this experiment,the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(g)–4(h),the LA algorithm performs better than the dispersion strategy algorithms.In particular,on the HI-II-14 network, the LA algorithm obtains an improvement of spreading influence ranging from 6.18% to 14.51%over the second best algorithm WVR.

    4.3.Synthetic networks

    To verify the impact of community structure on our algorithm, we choose to compare it with the CR algorithm,since our algorithm tends to choose the local tree-like structure,while CR tends to choose the local cluster structure.The experiment is performed on four synthetic networks generated by the LFR model.[29]The LFR model accounts for the heterogeneity in the distributions of node degrees and of community sizes,which can be used to test the effect of community topology on algorithms.On the LFR model, both the degree and the community size distributions obey power laws,with exponentsε1andε2,respectively.In our experiments we generate the LFR networks we need by controlling a number of topologies,as follows: the four synthetic networks have the sameε1andε2,but different mixing parametersμ.The smaller theμ,the stronger the community structure.

    The four networks have the same number of nodes and approximate number of edges.The experimental results are shown in Fig.5.On the LFR1 network and LFR2 network with higher clustering coefficients, the LA algorithm outperforms the CR algorithm.In particular, on the LFR1 network,the LA algorithm obtains an improvement of spreading influence ranging from 4.87% to 7.86% over the CR algorithm.On the LFR2 network,the LA algorithm obtains an improvement of 6.35%on average.However,on the LFR3 and LFR4 networks with smaller clustering coefficients, there is no significant improvement or decrease in the final affected scale of the LA algorithm, but for the CR algorithm, there is an improvement compared to that on the LFR1 and LFR2 networks.Hence,when the local clustering structure increases,it has no obvious influence on our algorithm.

    Fig.5.Final affected scale F(n) with different percentages of source influential spreaders p on the synthetic network, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    We can explain the above phenomenon from the following two aspects.First, from the basic topological data of the four synthetic networks in Table 2, we can see that the modularity(Q)of the LFR1 network and LFR2 network is higher than that of the LFR3 network and LFR4 network.For a network, the greater the modularity is, the stronger the community structure is,and the higher the local clustering coefficient.For the CR algorithm considering the shortest cycle ratio,the selected nodes are basically located in the core of the community.When the community structure is strong, the CR algorithm tends to cause local propagation within the community,while when the community structure is weak, the connected edges between communities increase,which increases the possibility of outward propagation,so the CR algorithm performs better on the LFR3 network and LFR4 network than on the LFR1 network and LFR2 network.Secondly, the nodes selected by the LA algorithm act as“bridges”and do not necessarily have many neighbors,but the neighbors of the selected nodes tend to have a very large degree and can propagate far away.Hence,on networks with a strong community structure,the LA algorithm tends to select the middle node of the local tree-like structure, which connects several communities and can expand the affected scale; on networks with weak community structure, the possibility of forming a local tree-like structure between nodes and nodes or nodes and communities increases, so the LA algorithm also chooses “bridge” nodes to expand the affected scale.In short, the LA algorithm always selects the“bridge”nodes of the local tree-like structure regardless of the community structure, and the affected scale is not influenced.The CR algorithm tends to select the core nodes in the communities, which results in a strong community structure network and reduces the affected scale.

    Table 2.Eight basic topological properties of the synthetic network,including the number of nodes(|V|),number of edges(|E|),average degree(〈ω〉), node power-law exponent (ε1), community power-law exponent(ε2),mixing parameter(μ),modularity(Q),and network clustering coefficient(c).

    5.Conclusion

    In this paper, we propose a new algorithm for identifying multiple influential spreaders that balances the top-kstrategy and the dispersion strategy.To validate the performance of the LA algorithm, we evaluate it on seven real networks and four synthetic networks for comparison with seven benchmark algorithms.On the real networks, we observe the effect on the final affected scale by adjustingpandλ.From the above, we know that adjustingp ∈[0.01,0.10], the LA algorithm shows better performance on the C.elegans, crime,Email, Yeast, ca-HepPh and ca-AstroPh networks; when adjustingλ ∈[1.0,1.5],similarly,the LA algorithm outperforms the other seven benchmark algorithms.On the LFR networks,we observe the effect on the algorithm performance by generating networks with different community structures.This paper mainly shows the comparison between the LA algorithm and the CR algorithm.The experimental results show that the LA algorithm always selects the“bridge”nodes of the local tree-like structure,and outperforms other benchmark algorithms.

    The LA algorithm can improve the final affected scale to some extent.However, finding multiple influential spreaders is still an open research issue.In this paper,we focus on the effects of tree and cluster structures on the LA algorithm,while the way other network topologies,such as star and ring structures,affect the LA algorithm is still a far-reaching topic to be studied.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No.62176217), the Program from the Sichuan Provincial Science and Technology,China(Grant No.2018RZ0081), and the Fundamental Research Funds of China West Normal University(Grant No.17E063).

    尾随美女入室| 乱码一卡2卡4卡精品| 黑人高潮一二区| 久久精品91蜜桃| 国产精品野战在线观看| 女的被弄到高潮叫床怎么办| 中国国产av一级| 有码 亚洲区| 久久热精品热| 国产探花极品一区二区| 欧美潮喷喷水| 欧美成人精品欧美一级黄| 成年免费大片在线观看| 麻豆乱淫一区二区| 午夜激情欧美在线| a级毛色黄片| 深爱激情五月婷婷| 高清av免费在线| 99在线人妻在线中文字幕| 国产欧美另类精品又又久久亚洲欧美| 日本午夜av视频| 久久精品人妻少妇| 国产午夜福利久久久久久| 国产精品野战在线观看| 日本一本二区三区精品| 成人二区视频| 亚洲最大成人手机在线| 日韩强制内射视频| 亚洲国产欧洲综合997久久,| 日韩av不卡免费在线播放| 中文资源天堂在线| 亚洲人成网站高清观看| 男人狂女人下面高潮的视频| 插阴视频在线观看视频| 中文字幕熟女人妻在线| 久久精品影院6| 我的女老师完整版在线观看| 日韩一本色道免费dvd| 黄色日韩在线| 天天一区二区日本电影三级| 精品久久久久久久久久久久久| 91精品国产九色| 非洲黑人性xxxx精品又粗又长| 国产在视频线精品| 又粗又硬又长又爽又黄的视频| 国产精品av视频在线免费观看| 99久久九九国产精品国产免费| 成人亚洲精品av一区二区| 成人无遮挡网站| 97超视频在线观看视频| 少妇人妻一区二区三区视频| 久久久久久九九精品二区国产| 成人毛片60女人毛片免费| 白带黄色成豆腐渣| kizo精华| 亚洲丝袜综合中文字幕| 午夜精品国产一区二区电影 | 美女xxoo啪啪120秒动态图| 婷婷六月久久综合丁香| 亚洲精品亚洲一区二区| 最近中文字幕2019免费版| 91狼人影院| 尤物成人国产欧美一区二区三区| 水蜜桃什么品种好| 美女内射精品一级片tv| 综合色av麻豆| 高清av免费在线| 亚州av有码| 国产私拍福利视频在线观看| eeuss影院久久| 亚洲av成人精品一二三区| 国产精品av视频在线免费观看| 只有这里有精品99| 欧美日韩综合久久久久久| 中国美白少妇内射xxxbb| 老女人水多毛片| 久久精品久久久久久久性| 小蜜桃在线观看免费完整版高清| 嫩草影院入口| 日韩精品青青久久久久久| 亚洲av中文字字幕乱码综合| 在现免费观看毛片| 99久久精品国产国产毛片| 亚洲av电影在线观看一区二区三区 | 一级毛片我不卡| 中文天堂在线官网| 99久久成人亚洲精品观看| 国产精品蜜桃在线观看| 最后的刺客免费高清国语| 国产亚洲午夜精品一区二区久久 | 成人漫画全彩无遮挡| 国产精品无大码| 亚洲激情五月婷婷啪啪| 国产极品精品免费视频能看的| 国产精品国产高清国产av| 日日摸夜夜添夜夜添av毛片| 一级毛片aaaaaa免费看小| 中文在线观看免费www的网站| 精品无人区乱码1区二区| 国产精品熟女久久久久浪| 成人漫画全彩无遮挡| 国内揄拍国产精品人妻在线| 日本色播在线视频| 黄色配什么色好看| 亚洲av电影不卡..在线观看| 熟女人妻精品中文字幕| 亚洲成人久久爱视频| 春色校园在线视频观看| 岛国在线免费视频观看| 少妇裸体淫交视频免费看高清| 欧美精品国产亚洲| 成人三级黄色视频| 日本与韩国留学比较| 你懂的网址亚洲精品在线观看 | 菩萨蛮人人尽说江南好唐韦庄 | 国产成人免费观看mmmm| 久久精品国产自在天天线| 亚洲欧美日韩无卡精品| 午夜日本视频在线| 你懂的网址亚洲精品在线观看 | 18禁在线播放成人免费| 国产亚洲最大av| 精品久久国产蜜桃| 精品午夜福利在线看| 久久久久久久久久黄片| www日本黄色视频网| eeuss影院久久| 日韩三级伦理在线观看| 国产精品国产三级国产av玫瑰| 国产亚洲最大av| 丰满人妻一区二区三区视频av| 九九久久精品国产亚洲av麻豆| 色综合亚洲欧美另类图片| 热99在线观看视频| 国产一区二区在线观看日韩| 看非洲黑人一级黄片| 欧美精品一区二区大全| 日韩一本色道免费dvd| 精品人妻偷拍中文字幕| 亚洲第一区二区三区不卡| 精品酒店卫生间| 美女脱内裤让男人舔精品视频| 国产精品久久久久久久电影| 高清午夜精品一区二区三区| 国产精品99久久久久久久久| 天堂网av新在线| 老师上课跳d突然被开到最大视频| 亚洲在线观看片| 成人欧美大片| kizo精华| 夜夜看夜夜爽夜夜摸| 国产一级毛片七仙女欲春2| 国产精品久久久久久久电影| 欧美激情国产日韩精品一区| 麻豆成人av视频| 伦精品一区二区三区| 国产精品蜜桃在线观看| 久久人人爽人人片av| 亚洲国产色片| 韩国高清视频一区二区三区| 久久久久久久国产电影| 亚洲不卡免费看| 级片在线观看| 美女被艹到高潮喷水动态| 熟妇人妻久久中文字幕3abv| 99久久成人亚洲精品观看| 午夜激情欧美在线| 非洲黑人性xxxx精品又粗又长| 三级国产精品片| 欧美极品一区二区三区四区| 亚洲av电影不卡..在线观看| 国产 一区 欧美 日韩| 久久久a久久爽久久v久久| 亚洲三级黄色毛片| 久久久久久久久中文| 亚洲av中文字字幕乱码综合| 欧美潮喷喷水| 97超碰精品成人国产| 国产免费男女视频| 欧美不卡视频在线免费观看| 99久久九九国产精品国产免费| 久久精品国产亚洲av涩爱| 免费看光身美女| 老司机影院毛片| av.在线天堂| 日韩欧美 国产精品| 亚洲精品日韩在线中文字幕| 久久99精品国语久久久| 精品人妻视频免费看| 2022亚洲国产成人精品| av免费观看日本| 色综合亚洲欧美另类图片| 国产一区二区亚洲精品在线观看| 成年女人永久免费观看视频| 日本免费a在线| 丝袜美腿在线中文| 色播亚洲综合网| 麻豆成人午夜福利视频| 1024手机看黄色片| 麻豆乱淫一区二区| 18禁动态无遮挡网站| 乱码一卡2卡4卡精品| 久久精品熟女亚洲av麻豆精品 | 国国产精品蜜臀av免费| 国产高清有码在线观看视频| 丰满少妇做爰视频| av女优亚洲男人天堂| 国产精品久久久久久久久免| 天堂影院成人在线观看| 国产免费又黄又爽又色| 成人高潮视频无遮挡免费网站| 成人亚洲欧美一区二区av| 亚洲精品乱码久久久久久按摩| 亚洲成人精品中文字幕电影| 日韩欧美精品v在线| 草草在线视频免费看| 欧美一区二区国产精品久久精品| 女人十人毛片免费观看3o分钟| 国产精品熟女久久久久浪| a级毛色黄片| av黄色大香蕉| 成人一区二区视频在线观看| 国产伦理片在线播放av一区| 小说图片视频综合网站| 欧美精品一区二区大全| 亚洲成人中文字幕在线播放| 国产成人精品婷婷| 日本免费a在线| 国产精品一区www在线观看| 91精品国产九色| 看片在线看免费视频| 日韩人妻高清精品专区| 日本午夜av视频| 免费播放大片免费观看视频在线观看 | av.在线天堂| 国产一区二区三区av在线| 久久久久久久久久黄片| 免费看美女性在线毛片视频| 国产精华一区二区三区| 又爽又黄无遮挡网站| 啦啦啦观看免费观看视频高清| 伦精品一区二区三区| 天天躁夜夜躁狠狠久久av| 久久99热这里只有精品18| 97在线视频观看| 最后的刺客免费高清国语| 三级国产精品片| 国产亚洲av片在线观看秒播厂 | 禁无遮挡网站| 国产亚洲一区二区精品| 亚洲国产精品国产精品| 日韩一区二区视频免费看| 天天一区二区日本电影三级| 天堂中文最新版在线下载 | 九九热线精品视视频播放| 日韩高清综合在线| 免费黄色在线免费观看| 成人亚洲精品av一区二区| 夜夜爽夜夜爽视频| 成年版毛片免费区| 亚洲精品aⅴ在线观看| 五月伊人婷婷丁香| av卡一久久| 国产成人aa在线观看| 男女那种视频在线观看| 麻豆成人av视频| h日本视频在线播放| 少妇被粗大猛烈的视频| 黄色欧美视频在线观看| 国产伦理片在线播放av一区| 日韩精品青青久久久久久| 亚洲av电影在线观看一区二区三区 | 狠狠狠狠99中文字幕| 国产精华一区二区三区| 成人二区视频| 中文字幕av在线有码专区| av.在线天堂| 国内揄拍国产精品人妻在线| 久久韩国三级中文字幕| 日韩 亚洲 欧美在线| videos熟女内射| 国产黄片美女视频| 精品人妻偷拍中文字幕| 国产私拍福利视频在线观看| 国产一区二区亚洲精品在线观看| 中国国产av一级| 插阴视频在线观看视频| 特大巨黑吊av在线直播| 18+在线观看网站| 一个人看的www免费观看视频| 亚洲欧美日韩无卡精品| 国产男人的电影天堂91| 一区二区三区乱码不卡18| 国产乱人偷精品视频| 少妇熟女aⅴ在线视频| 亚洲av日韩在线播放| 免费av毛片视频| 日日干狠狠操夜夜爽| 亚洲一区高清亚洲精品| 国产精品人妻久久久久久| av播播在线观看一区| 久久久久久久午夜电影| 99在线视频只有这里精品首页| av黄色大香蕉| 国产亚洲精品av在线| 亚洲中文字幕日韩| 久久精品夜夜夜夜夜久久蜜豆| 69人妻影院| 婷婷色av中文字幕| 波多野结衣巨乳人妻| 亚洲精品aⅴ在线观看| 国产男人的电影天堂91| 亚洲av免费高清在线观看| 亚洲天堂国产精品一区在线| 国产黄片美女视频| www日本黄色视频网| 我要搜黄色片| 欧美成人精品欧美一级黄| 黄色配什么色好看| 少妇被粗大猛烈的视频| 最近中文字幕高清免费大全6| 建设人人有责人人尽责人人享有的 | 国产午夜精品久久久久久一区二区三区| 日本猛色少妇xxxxx猛交久久| 国产亚洲精品久久久com| 国产色爽女视频免费观看| 人体艺术视频欧美日本| 黄片wwwwww| 91在线精品国自产拍蜜月| 国产精品永久免费网站| 天堂中文最新版在线下载 | 日韩高清综合在线| 高清毛片免费看| 国产精品国产高清国产av| 亚洲成人精品中文字幕电影| 欧美一区二区国产精品久久精品| 99久国产av精品国产电影| 久久久a久久爽久久v久久| 精品熟女少妇av免费看| 99久久精品热视频| 国产亚洲精品久久久com| 久久精品熟女亚洲av麻豆精品 | 又爽又黄无遮挡网站| 国产又色又爽无遮挡免| 午夜福利高清视频| 天堂√8在线中文| 狂野欧美白嫩少妇大欣赏| 联通29元200g的流量卡| 日韩欧美 国产精品| 精品午夜福利在线看| 美女cb高潮喷水在线观看| 别揉我奶头 嗯啊视频| 老司机影院毛片| 亚洲真实伦在线观看| 91久久精品国产一区二区三区| 99在线视频只有这里精品首页| 日韩视频在线欧美| 亚洲av日韩在线播放| 国产国拍精品亚洲av在线观看| 午夜免费激情av| 老女人水多毛片| 亚洲av日韩在线播放| 99九九线精品视频在线观看视频| 免费黄色在线免费观看| 熟妇人妻久久中文字幕3abv| 少妇丰满av| 97热精品久久久久久| 联通29元200g的流量卡| 国产亚洲5aaaaa淫片| 乱人视频在线观看| 极品教师在线视频| 久久久久国产网址| 国产成人91sexporn| 狠狠狠狠99中文字幕| 久久精品国产鲁丝片午夜精品| 插逼视频在线观看| 九九热线精品视视频播放| 亚洲欧美精品综合久久99| .国产精品久久| 高清av免费在线| 亚洲一区高清亚洲精品| 一级黄色大片毛片| 一级毛片电影观看 | 蜜桃久久精品国产亚洲av| .国产精品久久| 日日撸夜夜添| 亚洲最大成人手机在线| av专区在线播放| 91精品伊人久久大香线蕉| 国产亚洲av片在线观看秒播厂 | 国产欧美日韩精品一区二区| 日本免费一区二区三区高清不卡| 超碰av人人做人人爽久久| 久久久久久久国产电影| 精品国产一区二区三区久久久樱花 | 成年av动漫网址| 国语自产精品视频在线第100页| 成人特级av手机在线观看| 久久久久久久久久久丰满| 中文字幕av成人在线电影| 成人无遮挡网站| 国产精品人妻久久久久久| 九九久久精品国产亚洲av麻豆| 蜜桃亚洲精品一区二区三区| 男人舔奶头视频| 69人妻影院| 99热精品在线国产| 久久精品夜夜夜夜夜久久蜜豆| 狂野欧美白嫩少妇大欣赏| 永久网站在线| 国产伦一二天堂av在线观看| 最近最新中文字幕免费大全7| 女的被弄到高潮叫床怎么办| 久久久午夜欧美精品| 精品欧美国产一区二区三| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品一区二区三区四区久久| 99久国产av精品| 亚洲欧美成人精品一区二区| 国产亚洲av片在线观看秒播厂 | 国产69精品久久久久777片| 小说图片视频综合网站| 国产精品国产三级国产av玫瑰| 麻豆精品久久久久久蜜桃| 天堂中文最新版在线下载 | 一区二区三区免费毛片| 一级爰片在线观看| 久久热精品热| 日本免费a在线| 国产乱人偷精品视频| 在线观看av片永久免费下载| 一区二区三区四区激情视频| 国产欧美日韩精品一区二区| 中文欧美无线码| 日韩欧美精品免费久久| 熟妇人妻久久中文字幕3abv| 亚洲av.av天堂| 狂野欧美白嫩少妇大欣赏| 黄色配什么色好看| 国产精品av视频在线免费观看| 一区二区三区四区激情视频| 亚洲三级黄色毛片| 国产精品av视频在线免费观看| 成年免费大片在线观看| 色网站视频免费| 国国产精品蜜臀av免费| 久久久久久久久久久丰满| 天天躁夜夜躁狠狠久久av| 一个人观看的视频www高清免费观看| 男女那种视频在线观看| 2022亚洲国产成人精品| 乱人视频在线观看| 国产av一区在线观看免费| 男女啪啪激烈高潮av片| 国产免费视频播放在线视频 | 免费在线观看成人毛片| 日韩国内少妇激情av| 亚洲自偷自拍三级| 超碰97精品在线观看| 精品国产露脸久久av麻豆 | 精品人妻偷拍中文字幕| 日日摸夜夜添夜夜爱| 久久久a久久爽久久v久久| 蜜臀久久99精品久久宅男| 天天躁日日操中文字幕| 91狼人影院| 亚洲一级一片aⅴ在线观看| 又粗又爽又猛毛片免费看| 亚洲精品aⅴ在线观看| 欧美zozozo另类| 欧美变态另类bdsm刘玥| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 真实男女啪啪啪动态图| 国产精品无大码| 丰满少妇做爰视频| 特级一级黄色大片| 国产亚洲91精品色在线| 亚洲精品一区蜜桃| 国产午夜精品久久久久久一区二区三区| 在现免费观看毛片| 亚洲成色77777| 视频中文字幕在线观看| 国产又色又爽无遮挡免| 免费电影在线观看免费观看| 极品教师在线视频| 亚洲真实伦在线观看| 禁无遮挡网站| 成年版毛片免费区| 深爱激情五月婷婷| 小蜜桃在线观看免费完整版高清| 日韩大片免费观看网站 | 亚洲精华国产精华液的使用体验| 亚洲国产欧洲综合997久久,| 久久久久久久亚洲中文字幕| 2021天堂中文幕一二区在线观| 两个人视频免费观看高清| 午夜免费男女啪啪视频观看| 精品久久国产蜜桃| videos熟女内射| 高清日韩中文字幕在线| 久热久热在线精品观看| 午夜福利在线在线| 成人av在线播放网站| 国语自产精品视频在线第100页| 国产成人午夜福利电影在线观看| 久久99热这里只有精品18| 久久99热6这里只有精品| 国内精品美女久久久久久| 国产精品久久视频播放| 亚洲性久久影院| 亚洲欧洲日产国产| 青春草视频在线免费观看| 国产精品一及| 国产精品久久电影中文字幕| 少妇人妻一区二区三区视频| 三级国产精品片| 波多野结衣高清无吗| 一本一本综合久久| 国产高清不卡午夜福利| 日韩成人av中文字幕在线观看| av在线亚洲专区| 国产精品日韩av在线免费观看| 中文字幕免费在线视频6| 日产精品乱码卡一卡2卡三| 能在线免费观看的黄片| 午夜福利网站1000一区二区三区| 简卡轻食公司| 日韩人妻高清精品专区| 好男人视频免费观看在线| 欧美一级a爱片免费观看看| 国产精品久久久久久精品电影| 啦啦啦啦在线视频资源| 色网站视频免费| 偷拍熟女少妇极品色| 可以在线观看毛片的网站| 免费电影在线观看免费观看| 免费看日本二区| 婷婷色麻豆天堂久久 | 亚洲欧美成人精品一区二区| 色哟哟·www| 成人一区二区视频在线观看| 中文精品一卡2卡3卡4更新| 十八禁国产超污无遮挡网站| 草草在线视频免费看| 午夜福利成人在线免费观看| 只有这里有精品99| 啦啦啦啦在线视频资源| 男人舔奶头视频| 亚洲久久久久久中文字幕| 老司机影院毛片| 岛国在线免费视频观看| 特级一级黄色大片| 国产精品爽爽va在线观看网站| 国产淫语在线视频| 亚洲18禁久久av| 亚洲在线自拍视频| 久久久久久伊人网av| 亚洲国产精品久久男人天堂| 欧美日韩精品成人综合77777| 久久久国产成人精品二区| 人人妻人人澡欧美一区二区| 三级毛片av免费| 午夜福利高清视频| 国产淫片久久久久久久久| 日本免费在线观看一区| 亚洲国产最新在线播放| 欧美最新免费一区二区三区| 男女视频在线观看网站免费| 少妇高潮的动态图| 女人十人毛片免费观看3o分钟| 国产精品99久久久久久久久| 99九九线精品视频在线观看视频| 人人妻人人看人人澡| 久久久精品94久久精品| 久久精品熟女亚洲av麻豆精品 | 欧美一级a爱片免费观看看| 99热网站在线观看| 亚洲不卡免费看| 免费av毛片视频| 亚洲国产精品国产精品| 久久婷婷人人爽人人干人人爱| 晚上一个人看的免费电影| 日本色播在线视频| 干丝袜人妻中文字幕| 中文欧美无线码| 成人鲁丝片一二三区免费| 日本色播在线视频| 特大巨黑吊av在线直播| 看非洲黑人一级黄片| 久久久久久久国产电影| 免费播放大片免费观看视频在线观看 | 日韩欧美精品免费久久| 三级男女做爰猛烈吃奶摸视频| 嫩草影院入口| 夫妻性生交免费视频一级片| 精品久久久久久久末码| 欧美最新免费一区二区三区| 亚洲婷婷狠狠爱综合网| 色网站视频免费| 日本一二三区视频观看| 亚洲av日韩在线播放| 水蜜桃什么品种好| 久久99精品国语久久久| 特大巨黑吊av在线直播| 亚洲精品乱久久久久久| 国产淫语在线视频| 舔av片在线| 国产午夜精品论理片| 一级毛片久久久久久久久女| 国产淫语在线视频| or卡值多少钱| 一个人看视频在线观看www免费| 男女视频在线观看网站免费| 国产极品精品免费视频能看的| 成人av在线播放网站|