• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identifying multiple influential spreaders in complex networks based on spectral graph theory

    2023-10-11 07:56:46DongXuCui崔東旭JiaLinHe何嘉林ZiFeiXiao肖子飛andWeiPingRen任衛(wèi)平
    Chinese Physics B 2023年9期

    Dong-Xu Cui(崔東旭), Jia-Lin He(何嘉林), Zi-Fei Xiao(肖子飛), and Wei-Ping Ren(任衛(wèi)平)

    School of Computer Science and Engineering,China West Normal University,Nanchong 637009,China

    Keywords: spectral graph theory,Laplace matrix,influence maximization,multiple influential spreaders

    1.Introduction

    The influence maximization issue was first introduced by Domingos and Richardson in 2001.[1]One of the main problems of influence maximization is to findkcritical nodes in a complex network, so that the number of nodes being influenced in the network is maximized.The selection of critical nodes in the influence maximization problem is very significant for controlling the spread of epidemics,[2]controlling the spread of rumors,apprehending criminal gangs,[3]and tapping potential customers.[4]Many scholars have already made studies on related aspects.[5–10]

    Among the algorithms to select out multiple influential spreaders in complex networks,the most commonly used basic idea is the top-kstrategy, which selects the topknodes with the largest values as the initial spreaders.For example, degree centrality (DC)[11]measures the importance of a node by the number of nodes that are directly connected to it.The greater the DC,the greater impact on the propagation,so the topknodes with the largest degree values are selected as the initial spreaders in the propagation process.However,DC only considers the first-order neighbors and fails to consider the connections of other nodes(non-neighboring nodes)with it in the algorithm.In view of this, Chenet al.proposed the LocalRank[12]algorithm,which considers fourth-order neighbors and improves on the DC.Betweenness centrality(BC)[13]and closeness centrality (CC)[14,15]consider global network information.BC measures how important a node is based on how many shortest paths pass through it.CC evaluates the importance of a node by the sum of its distances to other nodes in the network,with the closer being more important.In addition,there is ClusterRank,[16]which considers both the degree of the node and the clustering coefficient, and PageRank[17]and LeaderRank,[18]proposed as algorithms to calculate the importance of Internet pages.Fanet al.[19]proposed the cycle ratio(CR)algorithm,which proposes and defines the cycle number matrix and cycle ratio by analyzing the information contained in cycles in a network structure; the cycle number matrix contains the cycle of nodes in the network information,and the cycle ratio measures the importance of nodes.Algorithms such as these all select the topknodes with the largest values as the initial spreaders in the propagation process,i.e.,using the top-kstrategy.

    Although the nodes selected by the top-kstrategy can improve the final affected scale, it causes local propagation if the selected nodes are clustered,because the top-ranked nodes selected by these algorithms might be clustered as a richclub.[20]Initially,some nodes that contribute to effective information propagation are selected.As more nodes are added to the rich-club,their contributions to effective information propagation become smaller.To avoid the occurrence of a richclub,some scholars have started to study the dispersion of selected nodes,such as excluding the selected nodes from being neighboring nodes, etc.Kempeet al.[21]proposed a “mountain climbing” greedy strategy to selectkcritical nodes, and the performance of this greedy strategy is close to 63%of the optimal performance.Chenet al.[22]proposed a“degree discount”heuristic algorithm to select critical nodes,which has a wider propagation range and lower time complexity.Zhaoet al.[23]applied the “coloring problem” in graph theory to find multiple influential spreaders in complex networks, by dividing nodes with the same color into same independent sets,and selecting a certain percentage of important nodes from each independent set; the larger the independent set is, the more nodes are selected, and this algorithm accelerates the propagation process.Guoet al.[24]proposed distance-based coloring algorithms, which significantly improve the final affected scale.Flaviano Moroneet al.[25]addressed the problem of quantifying nodes’ influence by finding the optimal (that is,minimal)set of structural influencers,and proposed collective influence (CI), a scalable algorithm to solve the optimization problem in large-scale real data sets.Zhanget al.[26]proposed the VoteRank algorithm, which selects multiple influential spreaders through each round of voting iterations and weakens the voting power of their neighbors; Sunet al.[27]proposed WVoteRank (WVR) based on the VoteRank algorithm, which can be used not only on unweighted networks but also on weighted networks.Fanet al.[28]proposed an algorithm to find critical nodes in complex networks by introducing a deep reinforcement learning framework.

    However, although the dispersion strategy improves the final affected scale by increasing the dispersion of the selected nodes,the disadvantage is that the local structure of many critical nodes is not conducive to disease propagation.Based on this,this paper proposes a compromise strategy to balance the top-kstrategy and the dispersion strategy.In the experimental study of seven real networks and four synthetic networks generated by the LFR[29]model that is a community generation model proposed by Lancichinettiet al., the algorithm in this paper has a clear advantage in the final affected scale, compared with BC,CC,DC,CI,WVR,CR and FINDER.

    The major contributions of this paper are shown as follows.

    (i) From analysis of two network topologies, it is found that the local tree structure is more conducive to the spread of disease than the local cluster structure.

    (ii)Using the eigenvectors of the Laplace matrix to classify structural importance of nodes,a balancing strategy is proposed in which nodes of the same class are not adjacent,while nodes of different classes are adjacent.

    2.Preliminaries

    2.1.Graph Laplacian quadratic form

    Given a graphG=(V,E),Vdenotes the set of nodes in the graph,which is assumed to be of lengthN.The graph signal is a mapping describingV →R, expressed in the form of a unit vector:x=[x1,x2,...,xN]T,wherexidenotes the signal strength on nodevi.When studying the properties of the graph signal, the topology of the graph should be considered in addition to the strength of the graph signal.The Laplace matrix is the core object used to study the structural properties of the graph and is defined as follows:

    whereAandDdenote the adjacency matrix and the diagonal matrix of the degree of the graph respectively,andDii=∑j Aijdenotes the degree of nodevi.Based on the Laplace matrix,we can define a very important quadratic form as follows:

    whereTV(x) is the total variance of the graph signal, which sums the differences of the signals on each edge and portrays the overall smoothness of the graph signal.

    Assuming that theNeigenvalues of the Laplace matrixLareγ1≥γ2≥···≥γNand the corresponding unit eigenvectors areu1,u2,...,uN,respectively,then equation(2)can be rewritten as

    where ~xidenotes the coordinates of signalxon the unit eigenvectoruicorresponding toγi,Λdenotes the diagonal matrix consisting of eigenvalues andUdenotes the orthogonal eigenmatrix consisting of eigenvectors.From Eq.(3),it can be seen that when the graph signalx=ui, thenTV(ui)=γi.Hence,forγ1≥γ2≥···≥γN, the inequalityTV(u1)≥TV(u2)≥···≥TV(uN)holds.

    2.2.SIR model

    The SIR model[30,31]and the SIS model are two relatively well-known infectious disease models,and in this experiment the SIR model is used as an evaluation metric for the performance of the algorithm.In the SIR model, each node in the network can only be in one of the following three states at each time step: susceptible(S),infected(I),and recovered(R).At time stept,infected nodeurandomly selects the neighboring nodev.If nodevbelongs to susceptible nodes,nodeuinfects it with probabilityα.Meanwhile,infected nodeubecomes a recovered node with probabilityβ.The disease propagation process ends when all infected nodes in the network have become recovered nodes.At this point,the final scale of affected nodesF(n)is used as a measure of the performances of different algorithms,defined as follows:

    whereN′andNRdenote the number of all nodes in the network and the number of nodes eventually recovered, respectively.In addition, in the SIR model, the basic reproduction numberλ=α/βreflects the disease propagation trend; for example,whenλ >1,the disease is able to spread throughout the population.

    2.3.The K-core algorithm

    TheK-core[32]algorithm is a subgraph mining algorithm to find the set of nodes in a graph that match a specified core degree,requiring each node to be connected to at leastKother nodes in that graph.In addition,K-core hierarchically divides the graph according toKvalues.For example,2-core removes nodes with degree less than 2 each time,3-core removes nodes with degree less than 3 each time,and each repeated removal of nodes as well as edges is specified byKvalues as shown in Fig.1.Thus,it shows that nodes with larger core degrees tend to have larger degrees, i.e., more neighboring nodes, which can play a greater role to a certain extent.

    Fig.1.Schematic of the 1-core,2-core,and 3-core subgraphs.

    3.Multiple influential spreaders identification algorithm

    3.1.Node local structure analysis

    From Subsection 2.3,it is clear that the outermost nodes of the network,i.e.,those withK=1,play a very limited role in the propagation process.Therefore, we only analyze the subgraph of the nodes withK ≥2 in the network.First, all nodes withK=1 are removed from the initial networkGto obtain the new networkG′.Next,the adjacency matrixA′of the new networkG′is normalized, which can be obtained as follows:

    Fig.2.Two classical topological structures.(a) Local tree structure;(b)local cluster structure.

    3.2.Trade-off strategy

    Currently, there are two strategies for identifying a set of critical nodes: the top-kstrategy and the dispersion strategy.The top-kstrategy selects the topknodes with the largest value, but the value selected is a single measure that does not fully represent the nodes’propagation ability,causing the selected nodes to cluster together and overlap, resulting in a rich-club phenomenon.The dispersion strategy focuses on the dispersion of the selected nodes, so many critical nodes not conducive to disease propagation are selected.In view of the limitations of the above two strategies, this paper proposes a compromise strategy that balances the importance of critical nodes and the dispersion of critical nodes.

    Given the eigenvectorsu1,u2,...,uNof the Laplacian matrix, the projectionsi jofon the eigenvectorujis defined as

    Therefore, we can use theNeigenvectors ofLas the benchmark category vectors to classify the importance of local structure ofNnodes in the network.Specifically,for each nodevi,the baseline category vector ordinal numberliwith the maximum similaritysijis calculated,i.e.,

    The setCjof nodes contained in each benchmark category vectorujis then found,i.e.,

    It is known from Subsection 3.1 that the largeris,the higher the probability of nodevispreading the disease outward.Hence, the importance of the local structure of nodes inC1,C2and other sets decreases successively.To select a set of critical nodes, we use the constraint that nodes in the same class are not adjacent, but nodes from different classes can be adjacent to balance the importance of structure and dispersion.Hence, we give priority to the nodes in the setC1when selecting a set of critical nodes.First, the nodes inC1are first sorted by similaritysi1from largest to smallest.Then,the first node inC1is selected as the critical node, and next the second critical node inC1is selected which is not adjacent to the first critical node and has the largestsi1,and so on,until there are no nodes to be selected inC1.If the number of selected critical nodes is not yet satisfied,we proceed to consider the second setC2.When selecting critical nodes fromC2,we only require that the selected nodes are not adjacent to the critical nodes already selected inC2.In other words, the critical nodes in each setCjare not adjacent to each other,but the critical nodes in two setsCiandCjcan be adjacent to each other.The above process is repeated until the given number of critical nodes is satisfied.

    The pseudo-code for our algorithm is given as follows.Algorithm 1 demonstrates node classification based on the eigenvectors of the Laplace matrix,where steps 4–9 represent that calculating similarity between ~a′iandujof every node,and classifying nodes by maximum similarity.After that, we can select a set of critical nodes by the constraint that nodes in the same class are not adjacent to each other while different classes of nodes can be adjacent to each other.

    Algorithm 1 NC(G)–Node classification Input: Graph G=(V,E)Output: Classified nodes sets C 1: Delete the nodes with K=1 in G using K-core algorithm,and get the new graph G′.2: L′←D′-A′and ~A′←D′-1A′.3: Cn ←/0 for n=0,1,2,...,[V′].4: for each row vector ~a′i of ~A′do 5: lmax ←i and smax ←0.6: for each eigenvectors uj of L′do 7: Calculate the similarity sij of ~a′i and eigenvectors uj.8: if sij >smax then 9: lmax ←j and smax ←sij 10: end if 11: end for 12: Clmax ←Clmax ∪{i}.13: end for 14: return C

    4.Experimental results

    To verify the effectiveness of the proposed algorithm(LA) in this paper, experiments are conducted on seven real networks and four synthetic networks generated by the LFR model[29]in this section, and their performance is evaluated in comparison with seven benchmark algorithms.To better demonstrate the comparative effects between these algorithms,we divided the experiments into two main groups: top-kstrategy and dispersion strategy.The experiments are carried out on the SIR model, and the infection probability is uniformly set asα=〈ω〉/(〈ω2〉-〈ω〉), where〈ω〉 is the average degree of the network.

    4.1.Benchmark algorithm

    Seven benchmark algorithms are selected for comparison with the LA algorithm,namely,BC,[13]CC,[14,15]DC,[11]CR,[19]CI,[25]WVR,[27]and FINDER.[28]The details of the seven algorithms are described as follows.

    4.1.1.Top-kstrategy

    Betweenness centrality(BC),which measures the importance of a node by whether the shortest paths all pass through it, and selects the topknodes that have been passed through more often as the initial spreaders.

    Closeness centrality (CC), which measures the importance of a node by the sum of its distances from other nodes in the network, and selects the topknodes with smaller sum of distances as the initial spreaders.

    Degree centrality (DC), which measures the importance of a node by the number of its neighbors, and selects the topknodes with larger degree values as the initial spreaders.

    Cycle ratio (CR), which defines a cycle number matrix in order to represent the cycle information of the network,by which a metric called cycle ratio can be calculated–quantifying the importance of a single node by measuring the extent to which a node participates in the shortest cycle associated with other nodes.

    4.1.2.Dispersion strategy

    Collective influence(CI),which selects the nodes through a scalable algorithm and believes low-degree nodes play a major broker role in the network,and despite being weakly connected,can be powerful influencers.

    WVoteRank (WVR), which selects the nodes with the highest number of votes and not the neighboring nodes of the already selected nodes as the initial propagators in each round of voting by iteration.

    FINDER (FINDER), which introduces a deep reinforcement learning framework that incorporates inductive graph representation learning to represent graph states and actions,and a deepQ′(quality of action score)network that combines reinforcement learning and deep neural networks to automatically learn the strategy that optimizes the objective to find critical nodes in a complex network.

    4.2.Real networks

    The seven real network datasets selected in this paper are C.elegans,[33]crime,[34]Email,[35]Yeast,[36]HI-II-14,[37]ca-HepPh,[38]and ca-AstroPh,[38]which are complex networks with nodes ranging from a few hundred to more than 10000.Among them, the C.elegans network is a neural network, in which nodes represent neurons in the nervous system of the worm,and edges represent connections between neurons.The crime network is a criminal network.The Email network is an email communication network at the University of Rovira,Spain,in which nodes represent users and edges indicate that users have sent emails to each other.The Yeast network and HI-II-14 network are protein–protein interaction networks.The Ca-HepPh network is a collaborative network, in which nodes are authors of published papers, and the edges represent that there are co-authored papers between two or more authors.The Ca-AstroPh network is a collaborative network,which covers scientific collaborations between authors of papers submitted to the astrophysics category.The basic topological properties of the seven real networks are shown in Table 1.

    Table 1.Four basic topological properties of the real networks,including the number of nodes(|V|),the number of edges(|E|),the average degree of the nodes(〈ω〉),and the network clustering coefficient(c).

    4.2.1.Top-kstrategy

    Fig.3.Final affected scale F(n) with different percentages of source influential spreaders p on seven real networks, where (a)–(f) show the effects of top-k strategy algorithms and (g) and (h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(a)–3(f),on the C.elegans network,the LA algorithm outperforms the other four algorithms overall.In particular,whenp ∈[0.03,0.10],the LA algorithm always performs better than the benchmark algorithms.On the Email network,Yeast network, ca-HepPh network, and ca-AstroPh network,the LA algorithm always brings a better influence range than DC,BC,CC,and CR whenp ∈[0.01,0.10].In particular,on the crime network,the LA algorithm obtains an improvement of spreading influence ranging from 5.53%to 17.30%over the second best algorithm CR.Similarly,the LA algorithm outperforms the second best algorithm CR with an improvement of spreading influence ranging from 15.77% to 29.10% on the ca-HepPh network.Moreover, on the ca-AstroPh network,the LA algorithm obtains improvements of 25.09%, 16.71%,52.29%and 54.49%compared with CR,BC,DC and CC,respectively.

    Fig.4.Final affected scale F(n) with different λ on six real networks,where (a)–(f) show the effects of top-k strategy algorithms and (g) and(h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where p=0.05, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In the experiment, the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(a)–4(f),it can be concluded that the LA algorithm performs better than the other four pure node centrality indicators algorithms on the C.elegans network, crime network, Yeast network, Email network, ca-HepPh network,and ca-AstroPh network.In particular,on the ca-AstroPh network, the LA algorithm obtains an improvement of spreading influence ranging from 23.61% to 28.56%over the second best algorithm CR.

    4.2.2.Dispersion strategy

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(g)–3(h),LA algorithm always outperforms the other three dispersion strategy algorithms.On the HI-II-14 network, LA algorithm outperforms algorithm WVR with an improvement of spreading influence ranging from 3.26%to 13.04%,outperforms algorithm FINDER with an improvement of spreading influence ranging from 10.43%to 20.02%,and outperforms algorithm CI with an improvement of spreading influence ranging from 4.43%to 16.73%.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In this experiment,the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(g)–4(h),the LA algorithm performs better than the dispersion strategy algorithms.In particular,on the HI-II-14 network, the LA algorithm obtains an improvement of spreading influence ranging from 6.18% to 14.51%over the second best algorithm WVR.

    4.3.Synthetic networks

    To verify the impact of community structure on our algorithm, we choose to compare it with the CR algorithm,since our algorithm tends to choose the local tree-like structure,while CR tends to choose the local cluster structure.The experiment is performed on four synthetic networks generated by the LFR model.[29]The LFR model accounts for the heterogeneity in the distributions of node degrees and of community sizes,which can be used to test the effect of community topology on algorithms.On the LFR model, both the degree and the community size distributions obey power laws,with exponentsε1andε2,respectively.In our experiments we generate the LFR networks we need by controlling a number of topologies,as follows: the four synthetic networks have the sameε1andε2,but different mixing parametersμ.The smaller theμ,the stronger the community structure.

    The four networks have the same number of nodes and approximate number of edges.The experimental results are shown in Fig.5.On the LFR1 network and LFR2 network with higher clustering coefficients, the LA algorithm outperforms the CR algorithm.In particular, on the LFR1 network,the LA algorithm obtains an improvement of spreading influence ranging from 4.87% to 7.86% over the CR algorithm.On the LFR2 network,the LA algorithm obtains an improvement of 6.35%on average.However,on the LFR3 and LFR4 networks with smaller clustering coefficients, there is no significant improvement or decrease in the final affected scale of the LA algorithm, but for the CR algorithm, there is an improvement compared to that on the LFR1 and LFR2 networks.Hence,when the local clustering structure increases,it has no obvious influence on our algorithm.

    Fig.5.Final affected scale F(n) with different percentages of source influential spreaders p on the synthetic network, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    We can explain the above phenomenon from the following two aspects.First, from the basic topological data of the four synthetic networks in Table 2, we can see that the modularity(Q)of the LFR1 network and LFR2 network is higher than that of the LFR3 network and LFR4 network.For a network, the greater the modularity is, the stronger the community structure is,and the higher the local clustering coefficient.For the CR algorithm considering the shortest cycle ratio,the selected nodes are basically located in the core of the community.When the community structure is strong, the CR algorithm tends to cause local propagation within the community,while when the community structure is weak, the connected edges between communities increase,which increases the possibility of outward propagation,so the CR algorithm performs better on the LFR3 network and LFR4 network than on the LFR1 network and LFR2 network.Secondly, the nodes selected by the LA algorithm act as“bridges”and do not necessarily have many neighbors,but the neighbors of the selected nodes tend to have a very large degree and can propagate far away.Hence,on networks with a strong community structure,the LA algorithm tends to select the middle node of the local tree-like structure, which connects several communities and can expand the affected scale; on networks with weak community structure, the possibility of forming a local tree-like structure between nodes and nodes or nodes and communities increases, so the LA algorithm also chooses “bridge” nodes to expand the affected scale.In short, the LA algorithm always selects the“bridge”nodes of the local tree-like structure regardless of the community structure, and the affected scale is not influenced.The CR algorithm tends to select the core nodes in the communities, which results in a strong community structure network and reduces the affected scale.

    Table 2.Eight basic topological properties of the synthetic network,including the number of nodes(|V|),number of edges(|E|),average degree(〈ω〉), node power-law exponent (ε1), community power-law exponent(ε2),mixing parameter(μ),modularity(Q),and network clustering coefficient(c).

    5.Conclusion

    In this paper, we propose a new algorithm for identifying multiple influential spreaders that balances the top-kstrategy and the dispersion strategy.To validate the performance of the LA algorithm, we evaluate it on seven real networks and four synthetic networks for comparison with seven benchmark algorithms.On the real networks, we observe the effect on the final affected scale by adjustingpandλ.From the above, we know that adjustingp ∈[0.01,0.10], the LA algorithm shows better performance on the C.elegans, crime,Email, Yeast, ca-HepPh and ca-AstroPh networks; when adjustingλ ∈[1.0,1.5],similarly,the LA algorithm outperforms the other seven benchmark algorithms.On the LFR networks,we observe the effect on the algorithm performance by generating networks with different community structures.This paper mainly shows the comparison between the LA algorithm and the CR algorithm.The experimental results show that the LA algorithm always selects the“bridge”nodes of the local tree-like structure,and outperforms other benchmark algorithms.

    The LA algorithm can improve the final affected scale to some extent.However, finding multiple influential spreaders is still an open research issue.In this paper,we focus on the effects of tree and cluster structures on the LA algorithm,while the way other network topologies,such as star and ring structures,affect the LA algorithm is still a far-reaching topic to be studied.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No.62176217), the Program from the Sichuan Provincial Science and Technology,China(Grant No.2018RZ0081), and the Fundamental Research Funds of China West Normal University(Grant No.17E063).

    久久久久久伊人网av| 久久99一区二区三区| 国产69精品久久久久777片| 在线观看免费日韩欧美大片 | 欧美少妇被猛烈插入视频| 国产高清三级在线| 亚洲精品乱久久久久久| 午夜免费鲁丝| 美女主播在线视频| 国产精品久久久久久久电影| 蜜桃国产av成人99| 精品少妇久久久久久888优播| 日本与韩国留学比较| 男女无遮挡免费网站观看| 亚洲精品,欧美精品| 尾随美女入室| 日韩强制内射视频| 亚洲av二区三区四区| 欧美性感艳星| 久久人妻熟女aⅴ| 黄色视频在线播放观看不卡| 啦啦啦在线观看免费高清www| 国产探花极品一区二区| 精品久久久精品久久久| 欧美人与性动交α欧美精品济南到 | 日日摸夜夜添夜夜爱| 精品酒店卫生间| 欧美bdsm另类| 欧美日韩亚洲高清精品| 日本vs欧美在线观看视频| 黄色毛片三级朝国网站| 亚洲欧洲国产日韩| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 十八禁高潮呻吟视频| 精品卡一卡二卡四卡免费| 亚洲av男天堂| 久久99一区二区三区| 亚洲不卡免费看| 午夜激情久久久久久久| 最新的欧美精品一区二区| 高清视频免费观看一区二区| 免费观看性生交大片5| 肉色欧美久久久久久久蜜桃| 久久99一区二区三区| 美女主播在线视频| 久久人妻熟女aⅴ| 精品少妇黑人巨大在线播放| 天天影视国产精品| 精品99又大又爽又粗少妇毛片| 久久精品久久久久久久性| 精品国产国语对白av| 久久综合国产亚洲精品| 爱豆传媒免费全集在线观看| 街头女战士在线观看网站| 五月开心婷婷网| 国产成人精品一,二区| 亚洲人与动物交配视频| 18禁在线无遮挡免费观看视频| 少妇人妻久久综合中文| 精品熟女少妇av免费看| 亚洲在久久综合| 老女人水多毛片| 国产精品熟女久久久久浪| 国产精品女同一区二区软件| 最近最新中文字幕免费大全7| 国产精品成人在线| 尾随美女入室| 精品国产国语对白av| 国产精品欧美亚洲77777| 欧美精品人与动牲交sv欧美| 成人亚洲欧美一区二区av| 91成人精品电影| 久久精品国产a三级三级三级| videossex国产| 菩萨蛮人人尽说江南好唐韦庄| 国产精品.久久久| 自线自在国产av| 亚洲欧美中文字幕日韩二区| 亚洲美女视频黄频| 日韩精品免费视频一区二区三区 | 婷婷色av中文字幕| 卡戴珊不雅视频在线播放| 精品午夜福利在线看| 日本av免费视频播放| 满18在线观看网站| 午夜免费观看性视频| 女的被弄到高潮叫床怎么办| 国产在视频线精品| 丰满迷人的少妇在线观看| 精品熟女少妇av免费看| 日韩一区二区三区影片| 黄色怎么调成土黄色| 欧美精品一区二区免费开放| 黄色一级大片看看| 久久久久久久久久久丰满| 国产成人av激情在线播放 | 99视频精品全部免费 在线| 看免费成人av毛片| 国产黄色视频一区二区在线观看| 免费观看性生交大片5| 多毛熟女@视频| 26uuu在线亚洲综合色| 国产一区二区在线观看av| 国产成人freesex在线| 亚洲人成网站在线观看播放| 亚洲精品日本国产第一区| 国产精品无大码| 婷婷色av中文字幕| 国产视频首页在线观看| 国产成人精品婷婷| 在线天堂最新版资源| 91成人精品电影| 美女主播在线视频| 亚洲av二区三区四区| 在线观看免费视频网站a站| 久久午夜综合久久蜜桃| 99re6热这里在线精品视频| 天美传媒精品一区二区| 女性生殖器流出的白浆| 久久久久久久久久久丰满| 欧美日韩视频精品一区| 人人妻人人爽人人添夜夜欢视频| 极品少妇高潮喷水抽搐| 制服人妻中文乱码| 色5月婷婷丁香| 18禁动态无遮挡网站| 人妻人人澡人人爽人人| 高清av免费在线| 国产极品粉嫩免费观看在线 | 亚洲成人一二三区av| av免费在线看不卡| 少妇被粗大的猛进出69影院 | 国产精品久久久久久精品古装| 菩萨蛮人人尽说江南好唐韦庄| 欧美精品一区二区大全| 久久青草综合色| 国产精品 国内视频| 久久久久久久久久成人| 嫩草影院入口| 插逼视频在线观看| 18禁观看日本| 久久 成人 亚洲| 色婷婷av一区二区三区视频| 男女免费视频国产| 欧美日韩国产mv在线观看视频| 亚洲精品中文字幕在线视频| 亚洲欧洲精品一区二区精品久久久 | 国产精品久久久久久久久免| 国产女主播在线喷水免费视频网站| 欧美bdsm另类| 欧美老熟妇乱子伦牲交| 亚洲av.av天堂| 国产免费又黄又爽又色| 国产亚洲欧美精品永久| 中文字幕制服av| 国产精品秋霞免费鲁丝片| 又黄又爽又刺激的免费视频.| 午夜激情久久久久久久| 国产精品无大码| 国产成人精品无人区| 一区二区三区四区激情视频| 国产免费一级a男人的天堂| 亚洲怡红院男人天堂| 99国产综合亚洲精品| 久久久久久久久久久丰满| 少妇熟女欧美另类| av国产久精品久网站免费入址| 日本猛色少妇xxxxx猛交久久| 亚洲丝袜综合中文字幕| 日韩三级伦理在线观看| 最近的中文字幕免费完整| 精品久久蜜臀av无| 亚洲精品亚洲一区二区| 夜夜看夜夜爽夜夜摸| 寂寞人妻少妇视频99o| 22中文网久久字幕| 国产免费福利视频在线观看| 人人妻人人爽人人添夜夜欢视频| 欧美丝袜亚洲另类| 一区二区三区免费毛片| 日韩中字成人| 只有这里有精品99| 视频在线观看一区二区三区| 免费高清在线观看日韩| 久久av网站| 黄色欧美视频在线观看| 天堂俺去俺来也www色官网| 国产精品久久久久久精品电影小说| 精品午夜福利在线看| 日韩制服骚丝袜av| 国产有黄有色有爽视频| 伦精品一区二区三区| 亚洲精品久久成人aⅴ小说 | 麻豆精品久久久久久蜜桃| 色婷婷久久久亚洲欧美| 日本av手机在线免费观看| 精品久久久久久电影网| 婷婷色综合大香蕉| 欧美日韩一区二区视频在线观看视频在线| 黄色欧美视频在线观看| 亚洲国产色片| 国产黄色视频一区二区在线观看| 高清欧美精品videossex| a级毛片免费高清观看在线播放| 国产极品粉嫩免费观看在线 | 91在线精品国自产拍蜜月| 亚洲怡红院男人天堂| 男人添女人高潮全过程视频| 亚洲精品国产av成人精品| 国产精品免费大片| 日本wwww免费看| 亚洲精品aⅴ在线观看| 欧美亚洲 丝袜 人妻 在线| 亚洲一级一片aⅴ在线观看| 久久精品久久久久久噜噜老黄| 菩萨蛮人人尽说江南好唐韦庄| 免费播放大片免费观看视频在线观看| 久久久久视频综合| 黑人高潮一二区| 菩萨蛮人人尽说江南好唐韦庄| 性高湖久久久久久久久免费观看| 一级毛片aaaaaa免费看小| 乱码一卡2卡4卡精品| 精品人妻一区二区三区麻豆| 午夜影院在线不卡| 国产成人精品一,二区| 18禁动态无遮挡网站| 美女cb高潮喷水在线观看| videossex国产| 国产精品人妻久久久影院| 一本色道久久久久久精品综合| 婷婷色综合大香蕉| 婷婷色综合大香蕉| 少妇人妻 视频| 久久久久视频综合| 精品久久久久久久久av| 日本与韩国留学比较| 国产精品国产三级专区第一集| 欧美人与性动交α欧美精品济南到 | 日本免费在线观看一区| 99精国产麻豆久久婷婷| 日韩精品免费视频一区二区三区 | 久热久热在线精品观看| 亚洲成人一二三区av| a 毛片基地| 日本av手机在线免费观看| 亚洲国产av新网站| 在线观看三级黄色| 男女高潮啪啪啪动态图| 精品久久国产蜜桃| 久久久久久久久久人人人人人人| 18+在线观看网站| 国产在线视频一区二区| 免费观看av网站的网址| 欧美最新免费一区二区三区| 日韩精品免费视频一区二区三区 | 五月玫瑰六月丁香| 午夜日本视频在线| 国产免费一级a男人的天堂| 成人手机av| 成年美女黄网站色视频大全免费 | 纯流量卡能插随身wifi吗| 国产爽快片一区二区三区| 国产亚洲精品久久久com| 日本欧美国产在线视频| 国产精品99久久99久久久不卡 | 日韩不卡一区二区三区视频在线| 亚洲美女视频黄频| 边亲边吃奶的免费视频| 五月玫瑰六月丁香| 最黄视频免费看| 最新中文字幕久久久久| 极品人妻少妇av视频| 97超视频在线观看视频| 七月丁香在线播放| 欧美日韩精品成人综合77777| 久久久久久伊人网av| 亚洲精品aⅴ在线观看| 一级,二级,三级黄色视频| 国产黄色免费在线视频| 69精品国产乱码久久久| 满18在线观看网站| 亚洲美女黄色视频免费看| 色94色欧美一区二区| 国产在线免费精品| 大陆偷拍与自拍| 91国产中文字幕| 日本午夜av视频| 国产精品一国产av| 亚洲av国产av综合av卡| 一区在线观看完整版| 久久精品国产自在天天线| 亚洲熟女精品中文字幕| 日韩一本色道免费dvd| 最新的欧美精品一区二区| 精品久久久久久久久亚洲| 免费观看在线日韩| 人成视频在线观看免费观看| 亚洲精品日韩av片在线观看| 777米奇影视久久| 大片免费播放器 马上看| 国产成人91sexporn| 一区在线观看完整版| 国产av精品麻豆| 亚洲精华国产精华液的使用体验| 国产视频内射| av国产精品久久久久影院| 七月丁香在线播放| 精品午夜福利在线看| 久久久久人妻精品一区果冻| 一区二区三区四区激情视频| 搡老乐熟女国产| 亚洲欧洲国产日韩| 在线观看三级黄色| √禁漫天堂资源中文www| 日本wwww免费看| 久久精品国产自在天天线| 如日韩欧美国产精品一区二区三区 | 国产av一区二区精品久久| 亚洲精品久久成人aⅴ小说 | 亚洲国产精品一区二区三区在线| 大香蕉久久网| 亚洲丝袜综合中文字幕| 国产精品麻豆人妻色哟哟久久| 欧美xxxx性猛交bbbb| 亚洲av国产av综合av卡| 亚洲av欧美aⅴ国产| 视频区图区小说| 制服人妻中文乱码| 色视频在线一区二区三区| 国产欧美另类精品又又久久亚洲欧美| 久久青草综合色| 亚洲欧美日韩另类电影网站| 国产免费又黄又爽又色| 成人免费观看视频高清| 久久久久久久久久久久大奶| 欧美日韩视频精品一区| 男女高潮啪啪啪动态图| 最近手机中文字幕大全| 免费黄色在线免费观看| 欧美成人午夜免费资源| 亚洲国产日韩一区二区| 制服诱惑二区| av在线播放精品| 九色亚洲精品在线播放| 亚洲精品一区蜜桃| 国产69精品久久久久777片| 国产成人午夜福利电影在线观看| 插逼视频在线观看| 91aial.com中文字幕在线观看| 亚洲内射少妇av| 黄片播放在线免费| 一区二区三区乱码不卡18| 2021少妇久久久久久久久久久| 999精品在线视频| 久久精品国产鲁丝片午夜精品| 老司机影院毛片| 欧美精品一区二区免费开放| 制服人妻中文乱码| av女优亚洲男人天堂| 极品少妇高潮喷水抽搐| av视频免费观看在线观看| 久久鲁丝午夜福利片| 日产精品乱码卡一卡2卡三| 91国产中文字幕| 777米奇影视久久| 插阴视频在线观看视频| 三级国产精品片| 国产精品不卡视频一区二区| 成人亚洲欧美一区二区av| 制服诱惑二区| 亚洲天堂av无毛| 日韩伦理黄色片| 9色porny在线观看| 亚洲国产色片| 亚洲美女搞黄在线观看| 91精品三级在线观看| 熟女电影av网| 最黄视频免费看| 成人漫画全彩无遮挡| 丰满饥渴人妻一区二区三| 亚洲欧美日韩另类电影网站| 日韩视频在线欧美| 99精国产麻豆久久婷婷| 亚洲美女视频黄频| 人人澡人人妻人| 久久99热这里只频精品6学生| 秋霞在线观看毛片| 欧美日韩亚洲高清精品| 另类亚洲欧美激情| 精品亚洲乱码少妇综合久久| 高清毛片免费看| 成人亚洲欧美一区二区av| 我的女老师完整版在线观看| av国产精品久久久久影院| 一边摸一边做爽爽视频免费| 国产av一区二区精品久久| 黄色配什么色好看| 18在线观看网站| 亚洲怡红院男人天堂| 激情五月婷婷亚洲| 我要看黄色一级片免费的| 精品人妻一区二区三区麻豆| 久久久久久久久久成人| 观看av在线不卡| 亚洲国产最新在线播放| 中文字幕免费在线视频6| 99精国产麻豆久久婷婷| 一边亲一边摸免费视频| 欧美日韩av久久| 成人午夜精彩视频在线观看| 男人操女人黄网站| 最后的刺客免费高清国语| 男人添女人高潮全过程视频| 日本与韩国留学比较| 观看美女的网站| 国产精品久久久久久精品古装| 亚洲精品一二三| 日本与韩国留学比较| 97在线视频观看| 曰老女人黄片| 日日啪夜夜爽| 国产在线视频一区二区| 日韩av不卡免费在线播放| 久久久久视频综合| 嫩草影院入口| 老女人水多毛片| 插逼视频在线观看| 欧美日韩精品成人综合77777| 黄片播放在线免费| 麻豆精品久久久久久蜜桃| 一个人免费看片子| 交换朋友夫妻互换小说| 精品久久蜜臀av无| 亚洲婷婷狠狠爱综合网| 亚洲国产欧美日韩在线播放| 久久婷婷青草| 91久久精品电影网| 日韩av免费高清视频| 老司机亚洲免费影院| 亚洲三级黄色毛片| 日本黄大片高清| 麻豆成人av视频| 搡女人真爽免费视频火全软件| 人人澡人人妻人| 国产69精品久久久久777片| 人妻制服诱惑在线中文字幕| 婷婷色综合大香蕉| 成人无遮挡网站| 亚洲少妇的诱惑av| 99视频精品全部免费 在线| 国产精品人妻久久久影院| 国产精品一区www在线观看| 成人综合一区亚洲| 国产黄色免费在线视频| 久久青草综合色| 老熟女久久久| 两个人的视频大全免费| 久久人人爽人人爽人人片va| 五月天丁香电影| 欧美一级a爱片免费观看看| 18在线观看网站| 国产精品欧美亚洲77777| 婷婷成人精品国产| 尾随美女入室| 男女啪啪激烈高潮av片| 97在线视频观看| 久久99热6这里只有精品| 中国美白少妇内射xxxbb| 天天操日日干夜夜撸| 国产精品欧美亚洲77777| 久久久久国产精品人妻一区二区| 国产欧美亚洲国产| 亚洲一区二区三区欧美精品| 久久av网站| 欧美激情极品国产一区二区三区 | 在现免费观看毛片| 免费少妇av软件| 99精国产麻豆久久婷婷| 哪个播放器可以免费观看大片| 99久久综合免费| 国产精品麻豆人妻色哟哟久久| 最新的欧美精品一区二区| 免费大片18禁| 亚洲国产精品国产精品| 国产熟女欧美一区二区| 夫妻午夜视频| 最近2019中文字幕mv第一页| 国产伦理片在线播放av一区| 国产极品粉嫩免费观看在线 | 狂野欧美激情性xxxx在线观看| 水蜜桃什么品种好| a级片在线免费高清观看视频| 色婷婷av一区二区三区视频| 建设人人有责人人尽责人人享有的| 免费大片黄手机在线观看| 一级a做视频免费观看| 九九爱精品视频在线观看| 成人毛片60女人毛片免费| 国模一区二区三区四区视频| 亚洲国产精品999| 有码 亚洲区| 久久精品国产亚洲av天美| 在线观看免费日韩欧美大片 | 欧美+日韩+精品| 一级片'在线观看视频| 亚洲不卡免费看| 国产黄色免费在线视频| 成人无遮挡网站| 欧美人与善性xxx| 国产日韩一区二区三区精品不卡 | www.av在线官网国产| 99久久中文字幕三级久久日本| 久久久精品区二区三区| 你懂的网址亚洲精品在线观看| 久久99热这里只频精品6学生| 国产成人精品一,二区| 成人黄色视频免费在线看| 99热全是精品| 母亲3免费完整高清在线观看 | 久久久久国产精品人妻一区二区| 免费观看av网站的网址| 亚洲欧美日韩卡通动漫| a级片在线免费高清观看视频| 欧美另类一区| 午夜免费观看性视频| 九色成人免费人妻av| 亚洲欧美色中文字幕在线| 99热国产这里只有精品6| 韩国高清视频一区二区三区| 欧美精品人与动牲交sv欧美| 中文字幕精品免费在线观看视频 | 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 最近手机中文字幕大全| 日本免费在线观看一区| 久久久久网色| 一级,二级,三级黄色视频| 亚洲五月婷婷丁香| 啦啦啦视频在线资源免费观看| 午夜福利免费观看在线| 在线观看舔阴道视频| 黄频高清免费视频| 国产精品98久久久久久宅男小说| 日韩人妻精品一区2区三区| 曰老女人黄片| 精品国产乱码久久久久久男人| 日日夜夜操网爽| 国产91精品成人一区二区三区 | 午夜精品国产一区二区电影| 青草久久国产| 亚洲欧美激情在线| 亚洲精品中文字幕一二三四区 | h视频一区二区三区| 久久精品国产99精品国产亚洲性色 | 成人亚洲精品一区在线观看| 欧美中文综合在线视频| 日韩视频在线欧美| 狂野欧美激情性xxxx| 国产又爽黄色视频| 久久久久国产一级毛片高清牌| 亚洲第一av免费看| 亚洲精品乱久久久久久| 天天影视国产精品| 99久久精品国产亚洲精品| 亚洲伊人色综图| 女人精品久久久久毛片| 成人国产av品久久久| av在线播放免费不卡| 一级片'在线观看视频| 亚洲欧美色中文字幕在线| 久久久久久亚洲精品国产蜜桃av| 国产精品影院久久| 国产精品成人在线| 又紧又爽又黄一区二区| 1024视频免费在线观看| 无限看片的www在线观看| 99国产综合亚洲精品| netflix在线观看网站| 国产免费现黄频在线看| 真人做人爱边吃奶动态| 啦啦啦 在线观看视频| 丰满迷人的少妇在线观看| 国产在线观看jvid| 一本—道久久a久久精品蜜桃钙片| 丝瓜视频免费看黄片| 国产av又大| 女人被躁到高潮嗷嗷叫费观| 夜夜爽天天搞| 97人妻天天添夜夜摸| 18禁美女被吸乳视频| 国产精品久久久久成人av| 亚洲av日韩在线播放| 欧美 亚洲 国产 日韩一| 69av精品久久久久久 | 午夜福利免费观看在线| 精品久久久精品久久久| 狠狠婷婷综合久久久久久88av| 高清欧美精品videossex| 国产有黄有色有爽视频| 99精品在免费线老司机午夜| 90打野战视频偷拍视频| 一区二区三区乱码不卡18| 51午夜福利影视在线观看| 色老头精品视频在线观看| 久久久久久久久久久久大奶| 亚洲专区国产一区二区| 国产成人影院久久av| 国产一区二区三区视频了| 欧美人与性动交α欧美精品济南到| 悠悠久久av| 黄色片一级片一级黄色片| 99国产极品粉嫩在线观看| 首页视频小说图片口味搜索| 99re在线观看精品视频| 伦理电影免费视频|