• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Maximizing Influence in Temporal Social Networks:A Node Feature-Aware Voting Algorithm

    2024-01-12 03:46:10WenlongZhuYuMiaoShuangshuangYangZuozhengLianandLianheCui
    Computers Materials&Continua 2023年12期

    Wenlong Zhu ,Yu Miao ,Shuangshuang Yang ,Zuozheng Lian,2 and Lianhe Cui

    1College of Computer and Control Engineering,Qiqihar University,Qiqihar,161006,China

    2Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis,Qiqihar University,Qiqihar,161006,China

    3College of Teacher Education,Qiqihar University,Qiqihar,161006,China

    ABSTRACT Influence Maximization (IM) aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most existing studies on the IM problem focus on static social network features,while neglecting the features of temporal social networks.To bridge this gap,we focus on node features reflected by their historical interaction behavior in temporal social networks,i.e.,interaction attributes and self-similarity,and incorporate them into the influence maximization algorithm and information propagation model.Firstly,we propose a node feature-aware voting algorithm,called ISVoteRank,for seed nodes selection.Specifically,before voting,the algorithm sets the initial voting ability of nodes in a personalized manner by combining their features.During the voting process,voting weights are set based on the interaction strength between nodes,allowing nodes to vote at different extents and subsequently weakening their voting ability accordingly.The process concludes by selecting the top k nodes with the highest voting scores as seeds,avoiding the inefficiency of iterative seed selection in traditional voting-based algorithms.Secondly,we extend the Independent Cascade (IC) model and propose the Dynamic Independent Cascade (DIC) model,which aims to capture the dynamic features in the information propagation process by combining node features.Finally,experiments demonstrate that the ISVoteRank algorithm has been improved in both effectiveness and efficiency compared to baseline methods,and the influence spread through the DIC model is improved compared to the IC model.

    KEYWORDS Temporal social networks;influence maximization;voting strategy;interactive properties;self-similarity

    1 Introduction

    With the advent of the digital era,the study of social networks has attracted widespread interest[1].Especially the IM problem,which mainly involves selecting seed nodes through the influence maximization algorithm,and then simulating the propagation through the information propagation model[2,3].This is particularly important for viral marketing,as such research can effectively promote products or services by identifying influential users.Hence,the study of IM holds profound theoretical significance and broad application prospects.However,current research has mainly focused on the static properties of social networks,while ignoring the dynamic historical interaction behaviors in social networks.For instance,in many real-world scenarios,a node,despite having numerous neighbors,maybe like a dormant node if it does not interact with its neighbors.In contrast,another node,having the same neighbors,can be very active if it frequently interacts with its neighbors.Actually,the latter node evidently holds a heightened capacity for information propagation,but the traditional IM algorithms treat these two nodes equally.

    Taking Fig.1 as an example,the edge values symbolize the interaction timestamps between users.Node A and node B have the same number of neighbors,but A only communicates with its neighbors for one time,in contrast,B often communicates with its neighbors.It is easy to see that B has more potential to propagate information than A.Therefore,considering only the static structure of the network is not sufficient to find the nodes with the highest potential influence,and it is also necessary to consider the dynamic historical interaction behavior of the nodes.

    Figure 1:An example of two nodes communicating with their neighbors

    However,the interaction behavior between nodes is not random,but is influenced by the node features reflected by their historical interaction behavior [4,5].For instance,if two nodes have had frequent interactions in the past,they are likely to interact more frequently in the future.Furthermore,the historical interaction behavior between nodes also displays self-similarity,which mirrors the tendency of nodes to repeat their behaviors [6–8].This behavior is reflected in the consistency of individual behavioral patterns across a time series.For example,if user A regularly contacts user B in the morning,they are likely to continue this pattern on subsequent mornings.Overall,the node features reflected in the historical interaction behaviors of nodes greatly influence information propagation.For example,in the real-time evolution of Twitter networks,researchers have found that the largest cascades tend to be generated by users with many followers and a large number of historical interaction behaviors[9].

    Evidently,the node features embodied by these dynamic historical interaction behaviors are important in actual social networks,but are not adequately represented in traditional algorithms and propagation models of IM.The IM problem of temporal social networks faces the following challenges:

    (1)Seed selection algorithms:traditional influence maximization algorithms have limited consideration of node characteristics in temporal social networks and cannot select high-quality seed nodes;

    (2)Information propagation models:traditional information propagation models do not take into account the dynamic historical interaction behavior of nodes,and thus cannot be applied to temporal social networks.

    Therefore,the motivation of this study is to more appropriately address the above issues in temporal social networks by considering the node features reflected by their historical interaction behaviors.Based on this,we first propose a voting-based IM algorithm called ISVoteRank.This algorithm initially determines the voting ability of each node based on its node features.During the voting process,voting weights are set based on the interaction strength between nodes,allowing nodes to vote for their in-neighbors at different extents,and subsequently weakening their voting ability accordingly.After the voting is completed,the topknodes with the highest voting scores are selected as seed nodes.Subsequently,we designed an information propagation model called DIC,which utilizes the node features of interaction attributes and self-similarity to capture the dynamic features of temporal social networks,including dynamic changes in the activation time,activation probability,and activation frequency of nodes.In summary,our main contributions are as follows:

    (1)We quantify the historical interaction behaviors of nodes into two node features,i.e.,interaction attributes and self-similarity.To distinguish the order of interactions,we classify the interaction attributes into active interaction attributes and passive interaction attributes.

    (2) We propose the node feature-aware voting algorithm ISVoteRank,which incorporates node features into the voting process,sets the node’s personalized initial voting ability,and dynamically adjusts the node’s voting ability in the voting process,allowing more efficient selection of seed nodes.

    (3)We extend the traditional IC model to the DIC model,which combines the node features to set the activation time,activation probability,and activation frequency changes,so as to capture the dynamic features of the information propagation process.

    (4) Experiments on four real-world temporal social network datasets demonstrate the superior performance of the ISVoteRank algorithm in terms of effectiveness and efficiency compared to existing baseline methods.

    The remainder of this paper is organized as follows:Section 2 discusses related work.Preliminary definitions are introduced in Section 3.Section 4 describes the ISVoteRank algorithm for selecting seed nodes,and the DIC model for information propagation of seed nodes.Experimental results from real-world datasets are provided in Section 5,and Section 6 concludes the paper.

    2 Related Works

    In this section,a brief overview of related work on solutions to the influence maximization problem is provided,focusing on influence maximization algorithms and information propagation models.

    2.1 Influence Maximization Algorithms

    One of the main challenges of the IM problem lies in its complexity,which often makes direct calculation of the global optimum solution impractical.To address this issue,researchers have proposed many different algorithms.This section will focus on discussing three main categories:greedy algorithms,approximation algorithms,and heuristic algorithms.

    Greedy algorithms offer a direct approach to the IM problem,choosing the best seed nodes by Monte Carlo simulations.Kempe et al.first proposed a greedy algorithm [10],which iteratively selects nodes that can maximize marginal influence to join the seed set.Greedy algorithms can guarantee that the obtained solution is over 63%of the global optimum,due to the submodular and monotonic properties of the IM problem.However,a major challenge of greedy algorithms lies in their computational complexity,particularly when a large number of simulations are required.Although greedy algorithms can provide (1-1/e) approximate solutions,their high computational complexity limits their application in large-scale networks.

    Due to the computational complexity of greedy algorithms,many researchers have sought to design more efficient approximation algorithms.While approximation algorithms cannot guarantee finding the global optimum,they can find a relatively good solution within polynomial time.Leskovec et al.[11] proposed a Cost Effective Lazy Forward (CELF) algorithm,considering the cost and benefit of information spread in the network,achieving the effect of maximizing influence under a given budget.Chen et al.[12]proposed two improved greedy algorithms,called NewGreedy and MixedGreedy,which further optimize greedy algorithms by building subgraphs of the network.However,the complexity of these approximation algorithms remains high and can not be applied in large-scale social networks.

    Heuristic algorithms are another approach to the IM problem.They rely on some strategy or heuristic information,aiming to find a relatively good solution without complex calculations [13–15].These algorithms are particularly effective when dealing with large-scale networks.For example,Chen et al.[16] proposed a heuristic algorithm called DegreeDiscount,which considers a node’s degree and the influence of its neighboring nodes when selecting seed nodes.Zhang et al.[17]introduced the VoteRank algorithm,which identifies propagators in the network based on a voting mechanism.Subsequently,Sun et al.[18] extended VoteRank to weighted networks,proposing the WVoteRank algorithm.Kumar et al.[19] designed the NCVoteRank algorithm,considering the Neighborhood Coreness(NC)values of neighbors during voting.Later,Kumar et al.[20]took into account the weights of two-level neighbors,further improving the WVoteRank algorithm.Liu et al.[21]improved the VoteRank algorithm by combining the diversity of node voting capabilities,proposing the VoteRank++algorithm.However,the above voting-based methods all select seeds by iteration,which can be time-consuming when the network size is large.In addition,the above methods only consider the node features in static social networks,resulting in only being applicable to static social networks and performing poorly in temporal social networks.

    Recent studies have begun to focus on the IM problem in temporal social networks,and feature selection has become increasingly important [22–25].For example,Wang et al.[26] introduced a pairwise factor graph (PFG) for simulating social influence,and a dynamic factor graph (DFG) to integrate temporal information.In addition,Zhang et al.[27] proposed an influence maximization framework,leveraging machine learning for prediction and replacement.Using past network snapshots,the framework predicts upcoming ones and identifies seed nodes suitable for dynamic networks based on these predictions.Chandran et al.[28]studied time influence maximization in dynamic social networks and proposed a seed selection method based on sliding windows.

    From the above analysis,we note that for the IM problem in temporal social networks,most of the existing work addresses the problem through dynamic networks,such as sliding windows.This approach describes the evolution of the network through dynamic changes in the network,leading to a high time complexity.In conclusion,IM problems are complex and challenging,requiring a deep understanding of the network structure and node features.

    2.2 Information Propagation Models

    Information propagation models are the foundation of influence maximization research,used to simulate the process of information propagation in social networks.The two most common information propagation models are the IC model and the Linear Threshold(LT)model.

    The IC model[10]is a probabilistic model that describes the process of information propagation in networks in a simple way.In this model,each activated node has one opportunity to activate its neighboring nodes.For any edge from an activated node to its neighbors,there is a fixed probability,indicating the possibility of the neighbor node being activated.However,the IC model mainly considers the global characteristics of the network and neglects the impact of individual node behavior,which may lead to errors when simulating the complex information propagation process in the real world.The LT model[10]is another commonly used information propagation model.In this model,each node is assigned a threshold.A node will be activated only when the number of activated nodes among its neighbors exceeds the threshold.Compared to the IC model,the LT model pays more attention to mutual influence between nodes,rather than just one-way influence.However,like the IC model,the LT model does not fully consider nodes’individual behavior and dynamic characteristics.So these two models may have certain limitations when simulating the complex real-world information propagation process,especially in temporal social networks.

    In addition to the IC and LT models,there are many other information propagation models being proposed,such as the Independent Cascade model on Temporal graph (ICT) [29],which modifies the IC model based on static graphs to enable information propagation on temporal graphs.Chen et al.[30]proposed the Improved Weighted Cascade Model(IWCM)in response to the problem that the Weighted Cascade Model(WCM)for static social networks does not apply to temporal social networks.Although these models take into account the temporal nature of information propagation,there are limitations such as ignoring the possibility of complex interactions between nodes and oversimplifying the complexity of information propagation.

    Although current information propagation models have played an important role in understanding and simulating the propagation of information in social networks,their consideration factors are limited,especially the neglect of dynamic behavior and personalized characteristics of nodes,which may lead to certain limitations in complex real-world information propagation processes,especially for temporal social networks.Therefore,how to more comprehensively consider the diversity of networks in information propagation models,such as the dynamic behavior of nodes and complex interactions,is still an important direction of current studies,and is the problem this paper attempts to solve.

    3 Preliminaries

    This section introduces the relevant definitions of temporal social networks,and describes the node features reflected by their historical interaction behavior in this network.

    3.1 Temporal Social Network

    Definition 1:Temporal Social Network(TSN).We define aTSNasGT(V,E,TE),whereVis the set of nodes,Eis the set of edges,andTEis the time set corresponding to inter-node interactions.In this network,|V|=nand|E|=m.Interaction times between any two nodesuandvare represented byT(u,v),which is a subset ofTE.

    Distinct from conventional social networks,TSNincorporates the temporal sequence of interactions of nodes.As shown in Fig.2,the edge values symbolize the interaction timestamps between users.For instance,givenT(A,C)={1,2},if user A successfully activates user C at time 2,then C is active at and after time 2 and inactive before time 2.Subsequently,C may activate its neighbors D and E because C has interaction times with them at and after time 2.However,if B activates C at time 4,then C can only activate E since the interaction times between C and D are both before time 4.It is thus clear that the relationships between nodes in aTSNare not static,but dynamic over time.

    Figure 2:Temporal social network

    Based on this analysis,a key feature ofTSNis the interaction behavior between nodes,which reflects not only changes in network structure but also changes in node behavior.Therefore,it is important for the node characteristics reflected by the historical interaction behaviors of nodes.

    3.2 Node Features

    Based on the above analysis,this paper quantifies the node features reflected by their historical interaction behaviors as interaction attributes and self-similarity.Interaction attributes reflect the strength of node behavior in the past,while self-similarity reveals the time dependence of node behavior in the future.

    3.2.1 Interaction Attributes

    Definition 2:Interaction Attributes (IA).In a temporal social network,interaction attributes represent the interaction strength between a node and its neighbors.

    Specifically,due to the importance of the temporal order of interactions inTSN,this paper categorizesIAinto two types:active interacting attributes and passive interacting attributes.

    Definition 3:Active Interaction Attribute(AIA).This attribute captures the proactive behavior of a node with its neighbors when initiating an interaction and reflects the node’s tendency to interact with its neighbors.Eq.(1)provides a method for calculating theAIAvalue of nodev:

    Definition 4:Passive Interaction Attribute (PIA): This attribute captures the receptive behavior of a node in response to an interaction initiated by its neighboring node and reflects the tendency of the node to be activated by its neighbors.Eq.(2)provides a method for calculating thePIAvalue of nodev:

    where|T(u,v)|represents the number of interactions from nodeuto nodev,andin(v)denotes the set of in-neighbors of nodev.

    As shown in Fig.2,node C has anAIAvalue of 6,while thePIAvalue is 5.By breaking down theAIAandPIAvalues of nodes,a better understanding and measurement of node interaction behavior patterns in temporal social networks can be achieved.

    3.2.2 Self-Similarity

    Definition 5:Self-similarity.Self-similarity reflects the fact that a node’s current behavior is influenced by the time series of its historical interaction behavior,describing the influence of past behavior on future behavior.

    Crovella et al.[31] have highlighted the significance of self-similarity in the temporal sequences of node interactions.A common indicator to quantify the value of self-similarity in a time series is the Hurst index,which measures the autocorrelation of the time series[32,33].The Hurst index values range from 0 to 1,indicating different trends[34].When the Hurst index value ranges from 0 to 0.5,it indicates that the time series has anti-persistent properties.In this type of time series,high and low values alternate over the long term,showing a tendency to revert to the mean.When the Hurst index value equals 0.5,it indicates that the time series is random and uncorrelated.In this case,the correlation between current values and future values is negligible,making it difficult to identify clear trends.When the Hurst index value ranges from 0.5 to 1,it indicates that the time series has persistent properties.This means that a high value may trigger a series of high values that may persist for a long period in the future.

    To evaluate the Hurst index,this study employs the rescaled range(R/S)analysis technique[34].This statistical method is typically used to classify time series data and measure its variability over a specific time.For example,consider a scenario in a social network where user A has consistently posted daily status updates at 8 am over the past week.This behavior exhibits a phenomenon of selfsimilarity,suggesting a pattern or regularity in the timing of these updates.By applying the (R/S)method to quantify this behavior and calculating the value of the Hurst index,we can gain a deeper understanding of the persistence or long-term dependency of this activity.If the value of the Hurst index is close to 1,it means that the behavior of user A shows persistence.In other words,the presence of one high value(posting a daily status update at 8 am)tends to trigger a series of subsequent high values.This finding further emphasizes the potential self-similarity and predictability of user A’s past patterns over future patterns.

    In summary,the interaction attributes and self-similarity reflect the historical interaction behavior of nodes,and enable a more precise understanding and analysis of node behavior.Interaction attributes reflect the strength of node behaviors in the past,and self-similarity reveals the temporal dependence of node behaviors in the future.These two features provide a mechanism to better identify influential nodes and predict their future behavior in complex and dynamic temporal social networks.

    4 Proposed Methods

    Based on the preliminary analysis,this paper proposes the ISVoteRank algorithm for selecting seed nodes,as well as the DIC information propagation model for estimating the influence spread of seed nodes.Fig.3 shows the framework of our work.

    As shown in Fig.3,we proposed the ISVoteRank algorithm based on node features in temporal social networks.More specifically,the state of each nodevis denoted as(vsv,vav),wherevsvdenotes the obtained voting score,andvavdenotes the voting ability.For each directed edge(u,v),firstly,the voting weightwv,ufrom neighborvto nodeuis computed,and secondly,the voting score of nodeuis updated and the voting ability of neighborvis weakened.Finally,the topknodes with the highest voting scores are selected as seed nodes.Subsequently,the selected seed nodes are simulated to propagate in the DIC information propagation model to estimate the influence spread of the seed nodes.

    Figure 3:Working framework

    4.1 ISVoteRank Algorithm

    In this section,we present the ISVoteRank algorithm,which is an extension of the VoteRank algorithm [17] that incorporates multidimensional optimization and improvements to better fit the specific characteristics of temporal social networks.

    4.1.1 Initializing Voting Ability

    In the original VoteRank algorithm[17],the initial voting ability of each node is set to 1.However,in temporal social networks,each node exhibits distinct characteristics,necessitating a personalized initialization of the voting ability.

    According to the analysis in Section 3,the active interaction attribute reflects the node’s tendency to actively interact with its neighbors,and the self-similarity reflects the influence of the node’s past behavior on its future behavior.Therefore,here we combine these two features to set the initial voting capacity of the node,which is calculated as follows:

    wherehurst(v) is the self-similarity of nodev,AIAvis the value of the active interaction attribute of nodev,andAIAmaxis the value of the largest active interaction attribute in the whole network.

    4.1.2 Computing Voting Score

    In static social networks,the voting weights of nodes are shown in Fig.4a,and the VoteRank strategy [17] assumes that each node has the same voting weight for all its neighbors.However,in temporal social networks,as shown in Fig.4b,different interaction strengths among nodes should lead to different voting weights among nodes.

    Figure 4:Comparison of voting weights

    Therefore to address this problem,this paper overcomes this limitation by introducing personalized voting weights based on node features.As shown in Fig.4b,the voting weight from node D to node F depends on a ratio,i.e.,the number of node F’s passive interactions with node D to the number of node F’s passive interactions with all its neighbors.Therefore,the voting weight of nodevfor its neighboruis given by Eq.(4):

    where |T(u,v)|represents the number of interactions from nodeuto nodev,andPIAvdenotes the Passive Interaction Attribute of nodev.

    Based on Eq.(4),the voting score of nodeuis further defined as follows:

    wherewv,udenotes the weight that nodevgives to nodeuto vote,vavdenotes the voting ability of nodev,andoutudenotes the set of out neighbors of nodeu.

    4.1.3 Weakening Voting Ability

    In VoteRank [17],seed nodes are selected through iterative voting.Once a seed is selected,its voting ability is set to 0,and the voting ability of its neighboring nodes is weakened.These settings are implemented to prevent an excessive concentration of identified influential nodes in the network.However,this iterative approach may be less efficient when applied to large-scale social networks.To address this limitation,the ISVoteRank algorithm introduces a new mechanism.Once a node completes voting for its neighbors,its voting capacity is reduced based on specific rules.When a node’s voting capacity reaches 0,it no longer participates in the following voting process.This design aims to overcome the drawbacks of iterative voting and also prevents excessive concentration of seed nodes.Specifically,after nodevvotes for nodeu,the voting capacity of nodevis weakened according to Eq.(6):

    whereAIAavgis the average active interaction attribute value of the nodes in the network.

    4.1.4 Selecting Seed Nodes

    Based on the above analysis,to reduce the aggregation of the selected seed nodes,the voting ability is dynamically adjusted by combining the node features during the voting process.Therefore,in the seed selection phase,the topknodes with the highest voting scores can be sequentially selected as seed nodes after one voting process.As shown in Eq.(8):

    whereSrepresents the set of seed nodes,uiis a node inGT,vsuidenotes the voting score ofui,andvs′is thek+1th highervsvalue of nodes inGT.

    4.1.5 Algorithm Process

    The voting process of ISVoteRank is outlined in Algorithm 1.Initially,the algorithm initializes the voting ability and score for each node in the network(lines 3–4).It then proceeds to iterate through each edge(u,v)(line 6).During this iteration,if the voting ability of nodevis greater than 0,indicating it has the ability to vote,the algorithm calculates the weight of nodevto vote for nodeu(line 8).Subsequently,it updates the voting score of nodeuand adjusts the voting ability of nodev(lines 9–10).Finally,the algorithm selects the topknodes with the highest scores and adds them to the seed node setS(line 13).Following this process,ISVoteRank ensures that each node’s voting ability and score are appropriately initialized,and dynamically adjusted based on their participation in the voting process.

    The complexity analysis of ISVoteRank can be divided into three steps.In the initialization phase(lines 2–5),the algorithm traverses all nodes,resulting in a time complexity ofO(n),wherenis the number of nodes.During the voting phase(lines 6–12),the algorithm traverses all edges,resulting in a time complexity ofO(m),wheremis the number of edges.The seed selection phase(line 13)involves sorting all nodes based on their scores.This step has a time complexity ofO(nlogn),wherenis the number of nodes.Overall,the total time complexity of the ISVoteRank algorithm can be approximated asO(n+m+nlogn)or more concisely expressed asO(m+nlogn).

    It can be seen that the ISVoteRank algorithm effectively combines voting weights with the voting process,avoiding the drawbacks of iterative voting in traditional voting algorithms,and has relatively low time complexity,making it computationally efficient when dealing with large-scale temporal social networks.

    4.2 Dynamic Independent Cascade Model

    The traditional IC model has been widely utilized in analyzing information propagation within static social networks.However,when applied to temporal social networks,the limitations of the IC model become apparent as it fails to effectively capture the dynamic features of such networks.This is primarily because the IC model assumes static network connectivity patterns,where an active node has only one chance to activate each of its inactive neighbor nodes,and the activation process does not take into account the temporal sequence of node interactions.In contrast,real social networks exhibit dynamic changes in connectivity.

    To address this problem,this paper proposes a dynamic independent cascade model,called the DIC model.This model incorporates node features reflected by their historical interaction behavior into the DIC model for capturing the dynamic features of the temporal social network.These dynamic features include changes in node activation times,activation probabilities,and activation frequencies.Specifically,activation time is related to the evolution of historical interaction time,activation probability is related to interaction attributes and varies with activation frequency,and activation frequency is influenced by the self-similarity observed in the historical interaction behavior of nodes.By integrating these factors,this model can capture changes in node behaviors based on node features,thus capturing the dynamic characteristics of the temporal social network.

    4.2.1 Activation Time

    Definition 6:Activation Time.The moment when nodevis successfully activated by its active parent nodeuis its activation time,denoted asActv={t|t∈T(u,v)and t≥Actu}.

    The IM algorithm for static social networks does not need to consider the activation time of the node,while the time when the node is successfully activated in a temporal social network needs to be considered,and the activation time of the node will change as the node interaction behaviors occur.As shown in Fig.5,node B is selected as the seed node with the initial activation time set to 0,and the rest of the nodes have their initial activation time set to-1.When node B successfully activates node C at moment 4,the activation time of node C will be updated to 4.

    Figure 5:Variation in activation time during information propagation

    4.2.2 Activation Probability and Activation Frequency

    In static social networks,as in Fig.6a,active node A activates its inactive neighbor nodes B and C with the same probability and only one activation opportunity.However,in temporal social networks,as in Fig.6b,the difference in interaction strength between nodes results in different probabilities for active node D to activate its inactive neighbor nodes E and F.

    Figure 6:Comparison of activation probability and activation frequency in different social networks

    Therefore,to capture the dynamics of the information propagation process,we first set the activation probability in combination with the interaction attributes of the nodes.Then,when the first activation fails but there is still interaction behavior,we judge the activation frequency based on the self-similarity of the inactivated nodes,i.e.,the Hurst index of an inactivated node is greater than 0.5,which represents the possibility of interaction behavior of the node,and thus activation is performed again.Detailed definitions of activation frequency and activation probability are shown below:

    Definition 7:Activation Frequency.Activation frequency is a measure of the number of times a node is activated during the propagation of information.

    Definition 8:Activation Probability.Activation probability is the probability that an inactive nodevis successfully influenced by its active parent nodeuthrough the directed edge(u,v),denoted as∈[0,1].In static social networks,degree estimation is usually used to calculate the activation probability between nodes.However,in temporal social networks,there are different interaction behaviors among nodes,which implies the dynamics of activation probabilities among nodes.Therefore,in this paper,the activation probability is defined by Eq.(9):

    wherePu,vdenotes the probability of nodeuactivating nodevfor the first time,PIAvdenotes the passive interaction attribute of nodev,anddenotes the number of interactions from nodeuto nodev.θdenotes activation frequency.The activation probability increases with the increase of activation frequency.

    4.2.3 Information Propagation Process

    In the DIC model,initially,all nodesvin the network except the seed node are set to be inactive,i.e.,their initial activation timeActv=-1.When a seed nodeuis selected to start influence propagation,the following process is set:

    (1)Let the initial activation time of the seed node beActu=0,i.e.,the seed nodeuis active at the time moment 0.At this time,uactivates its inactive neighbor nodevwith a certain probability,anduhas at least one chance to try to activatev.

    (2)Whenutries to activatev,the interaction times between nodes are traversed sequentially,if the conditionActu={t|t∈T(u,v)and Actu≤t}is satisfied,uactivatesvwith probability

    (3)Ifufails to activatevfor the first time,the self-similarity ofvis calculated and ifhurst(v)>0.5,activation ofvwill be attempted again until all interaction times have been traversed.

    (4)Ifvis successfully activated byuat the time momentt={t|t∈T(u,v)},its activation timeActvis recorded,whereActv=t.

    (5) The influence propagation process stops when all active nodes have tried to activate their neighbors and no new nodes have been activated.

    Algorithm 2 illustrates the propagation process of the DIC model mentioned above.We can see that the DIC model offers an effective approach to capturing the dynamic features of the temporal social networks by considering node features revealed by the historical interaction behaviors during information propagation.

    5 Experiments

    5.1 Experimental Settings

    5.1.1 Data

    We utilized four real-world datasets from SNAP,available at http://snap.stanford.edu/data/.Each row in these datasets contains three components represented as(u,v,t),which signifies an interaction betweenuandvat timet.The comprehensive details of these datasets can be found in Table 1.

    Table 1:Parameters of experimental datasets

    Dataset 1[35]is based on email data from a European research institution.Dataset 2[36]captures private messages from a University of California online network.Dataset 3 [35] and Dataset 4 [35]represent user interactions on Math Overflow and Ask Ubuntu,respectively.

    5.1.2 Baseline Methods

    Seven methods are used as baselines,which are related to voting mechanisms and other heuristics.They are described as follows:

    VoteRank[17]:As a basic voting algorithm,VoteRank sets the initial voting ability of the node to 1,and then selects the node with the highest score as the seed node through iterative voting.

    WVoteRank[18]:WVoteRank is an extension of VoteRank,which incorporates the edge weights related to the node’s nearest neighbors(one-hop neighbors)into the calculation of voting scores,and iteratively votes to select the node with the highest score as the seed node.

    NCVoteRank[19]:NCVoteRank incorporates the Neighborhood Coreness(NC)value of a node into the calculation of its voting score,and then selects the node with the highest score as the seed node through iterative voting.

    VoteRank++[21]:Based on the basic principles of VoteRank,VoteRank++improves the initial voting ability of nodes and the calculation of voting scores.Although the seed selection strategy is improved,it still cannot guarantee good time performance.

    K_shell[37]:K_shell is a method for determining the centrality of a network node by calculating the K_shell value(orKsvalue)of each node to determine the importance of the node.

    DegreeDiscount [16]:DegreeDiscount is a seed node selection method based on the degree of a node.The core idea is that when a nodev’s neighboring nodes are selected as seed nodes,the degree of nodevis discounted to reduce its influence in subsequent seed selection.

    Max_activity:This algorithm selects the topknodes with the highest value ofAIAas seed nodes in this paper.

    5.1.3 Parameter Settings and Preprocessing

    Parameter settings: To compare the impact of these different methods on the same dataset,all algorithms run 1000 Monte Carlo simulations in the DIC model,and take the average influence spread value as the final result,so the observed differences are statistically significant.The activation probability is set as shown in Section 4.1.3.The range of the seed number is set between 10 and 100.

    Preprocessing: For the ISVoteRank algorithm,the Hurst index value,representing nodes’selfsimilarity,is computed offline based on the nodes’interaction time series.This preprocessing step is necessary for efficiently calculating the Hurst index values.

    5.2 Experimental Results

    Our experiments are divided into three parts:

    (1) Influence spread: comparing the effectiveness of algorithms by propagating the seed nodes’influence selected by algorithms through the DIC model,and comparing the differences between the DIC and IC models by propagating the seed nodes’influence selected by the ISVoteRank algorithm;

    (2) Time performance: comparing the efficiency of algorithms by comparing the running time variation of algorithms in selecting 10 to 100 seed nodes;

    (3)Average shortest path length:by comparing the average shortest distance length between the seed nodes selected by algorithms,thus verifying that the algorithm proposed in this paper does not perform iterative seed selection but still reduces the aggregation of seed nodes.

    5.2.1 Influence Spread

    Firstly,to observe the effectiveness of the algorithms,we calculate the influence spread of different algorithms by varying the number of seeds from 10 to 100.The experimental results are shown in Fig.7.

    From the figure,it is worth noting that the ISVoteRank algorithm achieves a relatively higher influence spread on all of the datasets.E.g.,in Fig.7a,when thek=50,ISVoteRank reaches an influence of about 1462.78,while the closest VoteRank is about 1430.12 and the worst VoteRank++is about 1262.56,which means ISVoteRank improves by approximately 2.28% compared to the closest algorithm and approximately 15.88% compared to the worst algorithm.More precisely,in Fig.7a,when the number of seeds is 40 to 80,ISVoteRank outperforms the next best VoteRank by about 1.2%,and as the number of seeds increases,ISVoteRank and VoteRank gradually get closer,but ISVoteRank still ranks first.It is closely followed by WVoteRank and the Max_activity,while K_shell,NCVoteRank,DegreeDiscount and VoteRank++underperform.In Fig.7b,ISVoteRank outperforms the rest algorithms in terms of effectiveness as the number of seeds increases.In Fig.7c,ISVoteRank is relatively better,followed by VoteRank,WVoteRank,and Max_activity.The rest of the algorithms perform worse.In Fig.7d,ISVoteRank performs comparable to the VoteRank,WVoteRank,and Max_activity,followed by DegreeDiscount,and the rest of the algorithms are relatively poor.In addition,it is seen that VoteRank++performs worse compared to the other voting algorithms in all datasets.The reason is that VoteRank++considers more features of static social networks to improve voting ability,making it less suitable for temporal social networks.

    The above phenomenon can be explained as follows.First,ISVoterank,VoteRank,WVoteRank,NCVoteRank and VoteRank++are all voting strategy-based algorithms.However,VoteRank,WVoteRank,NCVoteRank and VoteRank++only consider the static features of the network and ignore the node features reflected by their historical interaction behavior,which leads to poor results.Secondly,ISVoteRank uses the interaction strength between nodes to set personalized voting weights,which is very helpful in improving the effectiveness.Finally,when weakening the voting ability of nodes,ISVoteRank also weakens the voting ability differently according to the interaction strength between nodes,which is more in line with the interaction behavior of nodes.Overall,ISVoteRank performs well,reflecting its effectiveness in the face of complex temporal social networks.

    Figure 7:The influence spread of different algorithms varies with the number of seeds

    Subsequently,we compare the influence spread of ISVoteRank in DIC and IC information propagation models.Since the ISVoteRank algorithm shows robust performance in the above experiments.Therefore,we first run the ISVoteRank algorithm to generate a seed set ofk=50,and then use the seed set as an input to the DIC and IC propagation models,respectively.The results are shown in Fig.8.IC_ISVoteRank means the ISVoteRank algorithm runs in the IC model and the DIC_ISVoteRank means the ISVoteRank algorithm runs in the DIC model.

    From the figure,we observe that when the data set is small,as in Fig.8a,the influence spread of seeds in the DIC model is about twice as much as that in the IC model;when the data set is large,as shown in Fig.8b,the DIC model still performs better than the IC model.From these results,the DIC model shows a stronger information propagation ability due to its combination of node features in temporal social networks.

    Figure 8:Comparison of influence spread of the VoteRank algorithm in different models

    5.2.2 Time Performance

    In this section,we compare the efficiency of different algorithms.First,whenk=50,we count the running time of each algorithm on different datasets,and the results are shown in Table 2.Secondly,we vary the seeds fromk=10 tok=100,and count the running time of different algorithms varies with the number of seeds.Fig.9 shows the results in the form of a box plot.The abscissa represents different algorithms,and the ordinate records the running time of the corresponding algorithm.

    Table 2:Running time of the algorithms

    From Table 2,we get the following observations: First,ISVoteRank is more efficient compared to voting-based algorithms.Among them,ISVoteRank is about 0.18,0.15,3.79 and 13.95 s faster than VoteRank in four data sets.This means that as the network size increases,the running time of ISVoteRank increases less.This is because the ISVoteRank algorithm does not need to iteratively vote to select seeds,and only votes once to select seed nodes.Secondly,compared with other nonvoting algorithms,although ISVoteRank is not as good as DegreeDiscount and Max_activity,in Section 5.2.1,ISVoteRank’s influence spread is better than these two algorithms.

    From Fig.9,it can be seen that ISVoteRank proposed in this paper has a significantly shorter running time compared with other voting-based algorithms,and the running time fluctuations for different numbers of seeds are small,reflecting its efficiency and stability.In addition,the running time of Max_activity,K_shell,and DegreeDiscount are also shorter and comparable to ISVoteRank,and the runtime fluctuations are relatively small,showing excellent stability.

    Figure 9:The running time of different algorithms varies with the number of seeds

    The above phenomena can be explained as follows.First,ISVoteRank avoids the drawback of iterative seed selection in traditional voting algorithms and can select seeds quickly.While the rest of the voting-based algorithms belong to the traditional voting algorithms,the iterative selection of seed nodes takes more time.In particular,VoteRank++takes more factors into account leading to a long running time,especially in larger datasets,such as Fig.9d,the average running time of the VoteRank++reaches about 140 s.Second,the Max_activity,K_shell,and DegreeDiscount only consider a certain feature of the nodes.Although their running time is shorter,they cannot guarantee the performance of the influence spread as can be seen from Fig.7.In summary,Fig.9 vividly reveals the advantages of ISVoteRank in terms of running efficiency and stability.

    5.2.3 Average Shortest Path Length

    As highlighted in [17],the distance between seeds plays a crucial role in maximizing influence.When the identified seeds are widely distributed in the network,they tend to exert influence over a larger range of nodes.Therefore,the average shortest path length between seeds,denoted asLs,is used as an indicator to evaluate the spread of seeds’influence.A larger value ofLsindicates that the selected seeds are more dispersed and have a broader range of influence.The formula ofLsis provided in Eq.(11):

    whereSis a set of identified seeds andluvdenotes the length of the shortest path from nodeuto nodev.

    As shown in Fig.10,ISVoteRank outperforms VoteRank,WVoteRank,and DegreeDiscount in terms ofLsvalues in each dataset.This indicates that the influential nodes selected by ISVoteRank are more dispersed in the network,further reflecting the reasonableness of the voting strategy designed in this paper.Although VoteRank++and NCVoteRank perform reasonably well in each dataset,it is worth noting that they do not perform well in terms of influence spread because the average distance between the seed nodes selected by these algorithms is too large.While the K_shell algorithm performs better only in Fig.10a,Max_activity performs better only in Fig.10b.In contrast,ISVoteRank proposed in this paper is more stable.

    The above phenomenon can be explained as follows.On the one hand,ISVoteRank sets the voting weights according to the interaction strength between nodes during the voting process,which can make the neighbors obtain different degrees of voting scores.On the other hand,once a node votes,it weakens the node’s voting ability according to the voting weight,and this strategy further distinguishes the voting scores obtained by neighbors.Combining the above strategies,the voting algorithm proposed in this paper reduces the aggregation of seed nodes.

    5.2.4 Results Analysis

    From the above experiments,it can be seen that ISVoteRank proposed in this paper obtains good performance in terms of effectiveness and efficiency,and these results are further analyzed next.

    First,in terms of influence spread,i.e.,effectiveness,ISVoteRank performs well,although VoteRank and WVoteRank also perform well in Figs.7c and 7d,their failure to consider the node features of the temporal social network leads to poor results in other datasets.Second,in terms of time performance,i.e.,efficiency,ISVoteRank avoids the drawback of iterative seed node selection,leading to a much better time performance than other voting-based algorithms,on par with Max_activity,K_shell,and DegreeDiscount.Third,the experimental results of the average shortest path length of seed nodes further reflect that although ISVoteRank only selects seed nodes at once,the design of the algorithm in the voting process still reduces the aggregation of seed nodes,no less than VoteRank.Overall,ISVoteRank performs well for considering node features reflected by their historical interaction behavior and the optimization of the voting process.These results reflect the superiority of ISVoteRank,which provides an effective and efficient solution to the IM problem in temporal social networks.

    Figure 10:The average shortest path length of seeds selected by different algorithms varies with the number of seeds

    6 Conclusion

    In conclusion,this study presents an innovative approach to the IM problem within temporal social networks by incorporating node features,specifically interaction attributes and self-similarity derived from nodes’historical interaction behavior.This incorporation has led to the proposition of the node-feature-aware voting algorithm ISVoteRank and the DIC model.The ISVoteRank algorithm optimizes the voting mechanism by using node features,avoiding the inefficient iterative strategy of traditional voting-based algorithms,and allowing the algorithm to efficiently select high-quality seed nodes.The DIC model captures the dynamic changes of node activation time,activation probability and activation frequency during information propagation.Experiments on four real-world temporal social network datasets demonstrate that ISVoteRank has superior performance in terms of efficiency and effectiveness compared to existing baseline methods.Overall,this research offers a practical and innovative solution to the IM problem in temporal social networks.However,it is worth noting that this work has some limitations,such as limited consideration of the community structure of social networks.Since the community structure reflects more intensive interaction patterns among users,users in the same community often have similar interests and opinions,which will inevitably affect the speed and scope of information propagation.In view of this consideration,in future research work,we will further explore temporal social networks more deeply in combination with community structure to enhance the robustness and applicability of the proposed models and algorithms.

    Acknowledgement:Not applicable.

    Funding Statement:This work is supported by the Fundamental Research Funds for the Universities of Heilongjiang(Nos.145109217,135509234),the Youth Science and Technology Innovation Personnel Training Project of Heilongjiang(No.UNPYSCT-2020072),and the Innovative Research Projects for Postgraduates of Qiqihar University(No.YJSCX2022048).

    Author Contributions:Study conception and design: W.Zhu,Y.Miao;data collection: Y.Miao,S.Yang;analysis and interpretation of results:Y.Miao,Z.Lian,L.Cui;draft manuscript preparation:W.Zhu,Y.Miao.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:All of the datasets used are available at http://snap.stanford.edu/data/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产真实乱freesex| 日韩欧美国产在线观看| 天堂av国产一区二区熟女人妻| 亚洲最大成人中文| 亚洲av成人不卡在线观看播放网| 亚洲国产欧美人成| 精品一区二区三区视频在线| 精品人妻一区二区三区麻豆 | 亚洲精品粉嫩美女一区| 男人的好看免费观看在线视频| 色综合欧美亚洲国产小说| 久久久久久久久中文| 久久精品91蜜桃| av欧美777| 欧美性感艳星| 亚洲人与动物交配视频| 99精品在免费线老司机午夜| 精品一区二区三区视频在线观看免费| 久久久成人免费电影| 国产黄色小视频在线观看| 欧美xxxx性猛交bbbb| 色尼玛亚洲综合影院| 久久久久久久久久成人| 亚洲欧美日韩无卡精品| 性色av乱码一区二区三区2| 国产成人av教育| 最近最新中文字幕大全电影3| 国产精品国产高清国产av| 自拍偷自拍亚洲精品老妇| 变态另类丝袜制服| 亚洲欧美日韩高清专用| 国产欧美日韩精品一区二区| 久久精品国产亚洲av涩爱 | 国产三级中文精品| 3wmmmm亚洲av在线观看| 精品乱码久久久久久99久播| АⅤ资源中文在线天堂| 日韩欧美免费精品| 久久午夜福利片| 18美女黄网站色大片免费观看| 毛片一级片免费看久久久久 | 九色成人免费人妻av| 波多野结衣高清作品| 亚洲精品色激情综合| 深夜精品福利| 久久久精品欧美日韩精品| 淫秽高清视频在线观看| 亚洲国产精品成人综合色| 欧美在线一区亚洲| 国产欧美日韩一区二区精品| 国产亚洲欧美98| 麻豆av噜噜一区二区三区| 国产69精品久久久久777片| 国产精品亚洲av一区麻豆| 久久久久久久亚洲中文字幕 | 日韩有码中文字幕| 日本黄色片子视频| 一本综合久久免费| 欧美在线黄色| 中亚洲国语对白在线视频| 精品日产1卡2卡| 欧美+日韩+精品| 久久欧美精品欧美久久欧美| 深爱激情五月婷婷| 国产亚洲欧美98| 国产熟女xx| 欧美又色又爽又黄视频| 免费大片18禁| 亚洲欧美精品综合久久99| 91狼人影院| av天堂在线播放| 精品午夜福利在线看| a级毛片a级免费在线| 在线免费观看的www视频| 非洲黑人性xxxx精品又粗又长| 桃色一区二区三区在线观看| 久久伊人香网站| 看黄色毛片网站| 不卡一级毛片| 欧美午夜高清在线| av视频在线观看入口| 在现免费观看毛片| 亚洲精品456在线播放app | 亚洲第一电影网av| 日韩大尺度精品在线看网址| 少妇的逼水好多| 免费看光身美女| 国产视频一区二区在线看| 日本成人三级电影网站| 国产爱豆传媒在线观看| 亚洲国产精品sss在线观看| 丰满的人妻完整版| 丰满乱子伦码专区| 亚洲av电影在线进入| 亚洲精品影视一区二区三区av| 非洲黑人性xxxx精品又粗又长| 亚洲人成网站在线播| 成人美女网站在线观看视频| 日日夜夜操网爽| 色5月婷婷丁香| 亚洲av五月六月丁香网| 精品一区二区三区人妻视频| 无遮挡黄片免费观看| 国产精品一及| 淫秽高清视频在线观看| 中国美女看黄片| 亚洲欧美激情综合另类| 精品久久久久久久久久久久久| 亚洲国产日韩欧美精品在线观看| 99久久九九国产精品国产免费| 一进一出抽搐gif免费好疼| avwww免费| 欧美性猛交黑人性爽| 亚洲精品影视一区二区三区av| 国产av一区在线观看免费| 婷婷精品国产亚洲av| 草草在线视频免费看| 99久久无色码亚洲精品果冻| 又黄又爽又刺激的免费视频.| 亚洲电影在线观看av| 亚州av有码| 好男人在线观看高清免费视频| 午夜精品一区二区三区免费看| 久久精品91蜜桃| 亚洲精品色激情综合| 精品一区二区三区视频在线| 久久久久久久久久成人| 亚洲片人在线观看| 久久久色成人| 国产熟女xx| 欧美在线黄色| 男人和女人高潮做爰伦理| 看免费av毛片| 午夜福利在线在线| 啪啪无遮挡十八禁网站| 久久久久性生活片| 亚洲精品乱码久久久v下载方式| 精品久久久久久久人妻蜜臀av| 国产亚洲精品av在线| 亚洲成人久久性| 村上凉子中文字幕在线| www.999成人在线观看| 国产精品久久久久久精品电影| 国内精品久久久久久久电影| 桃色一区二区三区在线观看| 18+在线观看网站| 国产乱人视频| 亚洲,欧美精品.| 18禁裸乳无遮挡免费网站照片| 精品久久久久久成人av| 好看av亚洲va欧美ⅴa在| 欧美日韩综合久久久久久 | 国产免费男女视频| 国产三级在线视频| 宅男免费午夜| 亚洲aⅴ乱码一区二区在线播放| 亚洲成a人片在线一区二区| 免费观看精品视频网站| av福利片在线观看| 精品人妻视频免费看| 琪琪午夜伦伦电影理论片6080| 中国美女看黄片| 99精品久久久久人妻精品| 天堂影院成人在线观看| 小蜜桃在线观看免费完整版高清| 小说图片视频综合网站| 无遮挡黄片免费观看| 女生性感内裤真人,穿戴方法视频| 亚洲五月天丁香| 婷婷丁香在线五月| 在线播放无遮挡| 91午夜精品亚洲一区二区三区 | 亚洲精品色激情综合| 日本 欧美在线| 中出人妻视频一区二区| 人人妻人人看人人澡| 国产午夜福利久久久久久| 国产高清激情床上av| 少妇裸体淫交视频免费看高清| x7x7x7水蜜桃| 国产精品亚洲美女久久久| 久久精品夜夜夜夜夜久久蜜豆| 最后的刺客免费高清国语| 日韩成人在线观看一区二区三区| 露出奶头的视频| 久久久久九九精品影院| 级片在线观看| 欧美日韩综合久久久久久 | 韩国av一区二区三区四区| 国产老妇女一区| 无遮挡黄片免费观看| 九色成人免费人妻av| 久久天躁狠狠躁夜夜2o2o| 亚洲成a人片在线一区二区| 中文字幕久久专区| 国产精品一区二区性色av| 久久亚洲精品不卡| 老鸭窝网址在线观看| 久久久国产成人精品二区| 精品久久久久久久人妻蜜臀av| 国产极品精品免费视频能看的| 在线观看一区二区三区| 69av精品久久久久久| 老女人水多毛片| 久久欧美精品欧美久久欧美| 欧美乱妇无乱码| netflix在线观看网站| 精品国产三级普通话版| 久久99热6这里只有精品| 波野结衣二区三区在线| 波多野结衣高清作品| 给我免费播放毛片高清在线观看| 免费看美女性在线毛片视频| 免费大片18禁| 最后的刺客免费高清国语| 特大巨黑吊av在线直播| 久久久久久久久中文| 亚洲国产高清在线一区二区三| 亚洲,欧美,日韩| 男女那种视频在线观看| 在线国产一区二区在线| 亚洲精品在线观看二区| 国产精品爽爽va在线观看网站| 久久久国产成人免费| 乱码一卡2卡4卡精品| 日本成人三级电影网站| 精品乱码久久久久久99久播| 在线观看美女被高潮喷水网站 | 99riav亚洲国产免费| av在线老鸭窝| 亚洲人成网站在线播放欧美日韩| 丰满的人妻完整版| 嫁个100分男人电影在线观看| 久久人妻av系列| h日本视频在线播放| 丁香欧美五月| 99国产综合亚洲精品| 成人av在线播放网站| 91在线观看av| 国产一区二区在线观看日韩| 亚洲欧美日韩卡通动漫| 老司机午夜福利在线观看视频| 韩国av一区二区三区四区| 久久精品人妻少妇| 女生性感内裤真人,穿戴方法视频| 久久性视频一级片| 欧美另类亚洲清纯唯美| 日本熟妇午夜| 搡老岳熟女国产| 欧美日韩中文字幕国产精品一区二区三区| 欧美一区二区亚洲| 久久久久久国产a免费观看| 69av精品久久久久久| 免费看日本二区| 99国产精品一区二区三区| 欧美日韩国产亚洲二区| 色哟哟哟哟哟哟| 亚洲成人精品中文字幕电影| 成年女人永久免费观看视频| 1024手机看黄色片| 中文字幕久久专区| 亚洲专区中文字幕在线| a级毛片免费高清观看在线播放| 热99re8久久精品国产| 国产色婷婷99| 老熟妇仑乱视频hdxx| 久久久久久久久久黄片| 国产一区二区激情短视频| 啪啪无遮挡十八禁网站| 国产成人欧美在线观看| 色综合婷婷激情| av中文乱码字幕在线| 我要搜黄色片| 很黄的视频免费| 丁香六月欧美| 日本黄大片高清| 午夜福利免费观看在线| 老司机福利观看| 国产毛片a区久久久久| 高清日韩中文字幕在线| 国产亚洲av嫩草精品影院| 美女被艹到高潮喷水动态| 日韩欧美精品v在线| 亚洲七黄色美女视频| 亚洲欧美精品综合久久99| 一个人看的www免费观看视频| 婷婷六月久久综合丁香| 99在线人妻在线中文字幕| 我的女老师完整版在线观看| 成年人黄色毛片网站| 此物有八面人人有两片| 国产三级黄色录像| 日本黄色片子视频| 天天一区二区日本电影三级| 一级a爱片免费观看的视频| 久久午夜福利片| 欧美中文日本在线观看视频| 又黄又爽又免费观看的视频| 男女下面进入的视频免费午夜| 久久6这里有精品| 亚洲第一电影网av| 色哟哟哟哟哟哟| 久久久久久大精品| 97超级碰碰碰精品色视频在线观看| 麻豆一二三区av精品| 一区二区三区高清视频在线| a级毛片免费高清观看在线播放| 国产美女午夜福利| 18+在线观看网站| 亚洲成人久久性| 国产一区二区三区在线臀色熟女| 亚洲人成电影免费在线| 中文资源天堂在线| 午夜a级毛片| 精品欧美国产一区二区三| 看黄色毛片网站| 精品久久久久久久久亚洲 | 色在线成人网| 免费电影在线观看免费观看| 亚洲欧美清纯卡通| 国内精品久久久久久久电影| 国产在线男女| 我的老师免费观看完整版| 国产免费av片在线观看野外av| 中国美女看黄片| 国产色婷婷99| 在线观看av片永久免费下载| 美女黄网站色视频| 亚洲av免费高清在线观看| 亚洲在线观看片| 成人毛片a级毛片在线播放| 长腿黑丝高跟| 午夜激情福利司机影院| 丁香六月欧美| 欧美又色又爽又黄视频| av在线天堂中文字幕| 久久精品国产99精品国产亚洲性色| 波多野结衣巨乳人妻| 久久久久国产精品人妻aⅴ院| 999久久久精品免费观看国产| 美女大奶头视频| www日本黄色视频网| 日韩欧美一区二区三区在线观看| 国产一区二区在线av高清观看| 一级毛片久久久久久久久女| 给我免费播放毛片高清在线观看| 又爽又黄无遮挡网站| 日韩欧美在线二视频| 国产亚洲精品综合一区在线观看| 国产亚洲精品久久久久久毛片| ponron亚洲| 亚洲片人在线观看| 51午夜福利影视在线观看| www.www免费av| 男人狂女人下面高潮的视频| 成人一区二区视频在线观看| 亚洲专区国产一区二区| 少妇人妻一区二区三区视频| 欧美黑人巨大hd| 国产精品电影一区二区三区| 国产伦精品一区二区三区视频9| 别揉我奶头~嗯~啊~动态视频| 国产精品一区二区三区四区免费观看 | 国产精品影院久久| 99久久无色码亚洲精品果冻| 精品一区二区三区av网在线观看| 自拍偷自拍亚洲精品老妇| 欧美在线一区亚洲| 尤物成人国产欧美一区二区三区| 又粗又爽又猛毛片免费看| 亚洲精品影视一区二区三区av| 麻豆一二三区av精品| 色综合亚洲欧美另类图片| 在线免费观看不下载黄p国产 | 波野结衣二区三区在线| 成年女人永久免费观看视频| 欧美日韩亚洲国产一区二区在线观看| 欧美区成人在线视频| 深爱激情五月婷婷| av在线老鸭窝| 亚洲精品亚洲一区二区| 色综合站精品国产| 国内精品久久久久久久电影| 真人做人爱边吃奶动态| 精品人妻视频免费看| 亚洲欧美日韩高清专用| 免费一级毛片在线播放高清视频| 欧美又色又爽又黄视频| 最近视频中文字幕2019在线8| 国产中年淑女户外野战色| 在线播放无遮挡| 99热只有精品国产| 人妻久久中文字幕网| 又粗又爽又猛毛片免费看| 性插视频无遮挡在线免费观看| 精品久久久久久久人妻蜜臀av| 精品国产三级普通话版| 午夜激情欧美在线| 国产乱人伦免费视频| 国产黄色小视频在线观看| 国产色爽女视频免费观看| 精品一区二区三区人妻视频| 搡女人真爽免费视频火全软件 | 久久久久免费精品人妻一区二区| 久久婷婷人人爽人人干人人爱| 99热6这里只有精品| 中文亚洲av片在线观看爽| 亚洲七黄色美女视频| 国产亚洲精品综合一区在线观看| 99国产极品粉嫩在线观看| 桃红色精品国产亚洲av| 欧美日本视频| 国产精品久久久久久精品电影| 国产美女午夜福利| 亚洲精品一卡2卡三卡4卡5卡| 国产精品日韩av在线免费观看| 午夜福利成人在线免费观看| 欧美在线一区亚洲| 成年女人毛片免费观看观看9| 欧美精品啪啪一区二区三区| 亚洲精品日韩av片在线观看| 99在线视频只有这里精品首页| 免费av不卡在线播放| 亚洲狠狠婷婷综合久久图片| 黄色丝袜av网址大全| av天堂在线播放| 男人和女人高潮做爰伦理| 成人美女网站在线观看视频| 一区二区三区高清视频在线| 丰满乱子伦码专区| 夜夜夜夜夜久久久久| 国产精品乱码一区二三区的特点| 国内揄拍国产精品人妻在线| 午夜精品在线福利| 国产精品不卡视频一区二区 | 国产精品自产拍在线观看55亚洲| 无人区码免费观看不卡| 真人做人爱边吃奶动态| 亚洲专区中文字幕在线| 露出奶头的视频| 可以在线观看的亚洲视频| 免费av观看视频| 久久精品久久久久久噜噜老黄 | 亚洲av二区三区四区| 男人舔女人下体高潮全视频| 91久久精品国产一区二区成人| 99久久精品国产亚洲精品| a级一级毛片免费在线观看| 91午夜精品亚洲一区二区三区 | 在现免费观看毛片| a级毛片免费高清观看在线播放| 国产高清激情床上av| 午夜老司机福利剧场| 日韩国内少妇激情av| 麻豆成人av在线观看| 性色av乱码一区二区三区2| 国产精品不卡视频一区二区 | 久久久久久久久久成人| 亚洲国产欧洲综合997久久,| 淫妇啪啪啪对白视频| 久久久久久久久久黄片| 在线播放国产精品三级| 亚洲av.av天堂| 久久国产精品人妻蜜桃| 美女免费视频网站| 一级av片app| 少妇人妻一区二区三区视频| 国产视频内射| 自拍偷自拍亚洲精品老妇| 国产成人av教育| 12—13女人毛片做爰片一| 国产亚洲av嫩草精品影院| av在线蜜桃| 麻豆成人午夜福利视频| 国产精品久久久久久亚洲av鲁大| 99热6这里只有精品| 亚洲精品一区av在线观看| 精品一区二区三区视频在线| 91久久精品电影网| 亚洲人成伊人成综合网2020| 少妇人妻一区二区三区视频| 久久伊人香网站| 色吧在线观看| 成人一区二区视频在线观看| 国产亚洲欧美在线一区二区| 国产午夜精品论理片| 国产高清有码在线观看视频| 免费av不卡在线播放| 日韩高清综合在线| 免费在线观看影片大全网站| 熟女人妻精品中文字幕| 村上凉子中文字幕在线| 欧美日韩亚洲国产一区二区在线观看| 亚洲综合色惰| 欧美最黄视频在线播放免费| 国产精品精品国产色婷婷| 熟妇人妻久久中文字幕3abv| 免费人成视频x8x8入口观看| 午夜两性在线视频| 成人性生交大片免费视频hd| 国产三级在线视频| 亚洲久久久久久中文字幕| 美女黄网站色视频| 久久久色成人| 日韩欧美国产在线观看| 老熟妇乱子伦视频在线观看| 人人妻人人澡欧美一区二区| 欧美性猛交╳xxx乱大交人| 老司机午夜福利在线观看视频| 久久久久国产精品人妻aⅴ院| 国产91精品成人一区二区三区| 别揉我奶头~嗯~啊~动态视频| 欧美高清成人免费视频www| 变态另类成人亚洲欧美熟女| 亚洲成人精品中文字幕电影| avwww免费| 成年女人永久免费观看视频| 狠狠狠狠99中文字幕| 国产精品美女特级片免费视频播放器| 亚洲第一电影网av| 国产精品久久久久久久电影| 免费高清视频大片| 欧美日韩福利视频一区二区| 丁香六月欧美| 日韩人妻高清精品专区| 欧洲精品卡2卡3卡4卡5卡区| 最近最新免费中文字幕在线| 日韩av在线大香蕉| 最后的刺客免费高清国语| 免费黄网站久久成人精品 | 中文字幕人成人乱码亚洲影| 熟女人妻精品中文字幕| 身体一侧抽搐| 欧美黑人巨大hd| 亚洲欧美精品综合久久99| 日韩免费av在线播放| 国产欧美日韩精品亚洲av| 天天躁日日操中文字幕| 午夜激情福利司机影院| 精品久久久久久成人av| 午夜日韩欧美国产| 又粗又爽又猛毛片免费看| 国产精品一区二区三区四区久久| 一级a爱片免费观看的视频| 国产精品,欧美在线| 色精品久久人妻99蜜桃| 欧美最黄视频在线播放免费| 我的老师免费观看完整版| 国产精品免费一区二区三区在线| av视频在线观看入口| 免费看日本二区| 看十八女毛片水多多多| 宅男免费午夜| 嫩草影院入口| aaaaa片日本免费| 精品国内亚洲2022精品成人| 成年版毛片免费区| 91在线观看av| 国产高清视频在线播放一区| or卡值多少钱| 美女高潮的动态| 欧美日韩瑟瑟在线播放| 日韩中字成人| 禁无遮挡网站| 91九色精品人成在线观看| 久久婷婷人人爽人人干人人爱| 国产欧美日韩一区二区精品| 亚洲,欧美,日韩| 3wmmmm亚洲av在线观看| 久99久视频精品免费| 看十八女毛片水多多多| 欧美日韩乱码在线| 成人欧美大片| 国产精品亚洲一级av第二区| 中文字幕熟女人妻在线| 男女那种视频在线观看| 波多野结衣高清无吗| 桃红色精品国产亚洲av| 搞女人的毛片| 国产一区二区亚洲精品在线观看| 日本在线视频免费播放| av中文乱码字幕在线| 日韩亚洲欧美综合| 亚洲经典国产精华液单 | xxxwww97欧美| 亚洲中文字幕一区二区三区有码在线看| 岛国在线免费视频观看| 国产伦在线观看视频一区| 最近中文字幕高清免费大全6 | 亚洲美女黄片视频| 91在线精品国自产拍蜜月| 亚洲av日韩精品久久久久久密| 午夜福利视频1000在线观看| 国产色爽女视频免费观看| 身体一侧抽搐| 国产一区二区亚洲精品在线观看| 国产精品美女特级片免费视频播放器| 亚洲精品在线观看二区| av中文乱码字幕在线| 亚洲黑人精品在线| 精品久久久久久久久久久久久| 亚洲美女黄片视频| 久久久久九九精品影院| 亚洲av中文字字幕乱码综合| 在线观看舔阴道视频| 全区人妻精品视频| 久久午夜福利片| 熟妇人妻久久中文字幕3abv| 欧美性感艳星| 国产探花在线观看一区二区| 久久中文看片网| 久久伊人香网站| 一a级毛片在线观看| 一级av片app| 男人舔奶头视频|