当前位置:网站首页>Dgraph: large scale dynamic graph dataset
Dgraph: large scale dynamic graph dataset
2022-07-04 13:12:00 【Zhiyuan community】
In recent days, , Yang Yang's scientific research group of Zhejiang University (yangy.org) Hexin also jointly released a large-scale dynamic graph data set DGraph, Aimed at service graph neural network 、 Graph mining 、 Social networks 、 Researchers in the direction of anomaly detection , Provide large-scale data of real scenes .DGraph On the one hand, it can be used as the standard data to verify the performance of the correlation graph model , On the other hand, it can also be used to carry out user portrait 、 Network analysis and other research work .
Dataset home page :https://dgraph.xinye.com/
Github:
https://github.com/DGraphXinye/
Related papers :
DGraph: A Large-Scale Financial Dataset for Graph Anomaly Detection. Xuanwen Huang, Yang Yang*, Yang Wang, Chunping Wang, Zhisheng Zhang, Jiarong Xu, and Lei Chen. Preprint, 2022. (http://yangy.org/works/dgraph/dgraph_2022.pdf)
Data set description
DGraph The source data of is provided by Xinye Technology .DGraph It is a directed dynamic graph with no right , Contains more than 370 Ten thousand nodes and 430 Ten thousand dynamic edges . As shown in the figure below ,DGraph The node in represents the financial lending user of Xinye technology service , A directed edge indicates an urgent contact relationship , Each node contains the attribute characteristics after desensitization , And a label indicating whether it is a financial fraud user .
Data features
The scene is real
DGraph It comes from the real financial business scenario , Its construction logic is close to the industrial landing , It provides an opportunity for users of data sets to explore how to extend the graph model to the financial field . To be specific ,DGraph The proportion of abnormal and normal users in is about 1:100, Its “ The label is unbalanced ” The characteristics of the are in line with the real scene , Support exception detection 、 Research on classification of unbalanced nodes .
Structural dynamics
DGraph User relationships in are sampled from across 27 A business scenario for months , And the network structure will evolve over time , It provides data support for the current dynamic graph model and mining research .
Large scale
DGraph contain 370 Thousands of desensitized real financial lending users and 430 Ten thousand dynamic relationships , Its scale is about the largest dynamic graph data in the financial field Elliptic Of 17 times , Support the research and evaluation of large-scale graph models . Besides ,DGraph Contained in the 60% Of “ Background node ”, That is, it is not a classification or analysis object, but it actually exists 、 Nodes that have an indirect impact on business logic . These nodes play an important role in maintaining the connectivity of the network , Widely exists in industry . Reasonable processing of background nodes can effectively improve the storage space of data and the operation efficiency of the model in large-scale data scenarios .DGraph It contains more than 200 10000 background nodes , It can support researchers to explore the properties of background nodes .
Open source community maintenance
Ranking List
DGraph Users can submit at any time 、 Refreshed performance leaderboard (leaderboard), To track the research progress of the latest graph model . The list provides a unified evaluation process , All results are open and transparent .
Research results
DGraph It has rich characteristics , Support graph research in multiple directions .
Algorithm contest
Xinye technology revolves around DGraph The seventh Xinye Technology Cup algorithm competition was held , Task and DGraph The fraud user identification in is consistent . The competition is open to the whole society , Colleges and universities at home and abroad 、 Scientific research institutes 、 Internet enterprises can sign up for the competition , The bonus pool is abundant , total 31 Thousands of yuan .
Welcome interested colleagues to patronize DGraph Public data website , Work together to provide rich application data for the field of artificial intelligence , Work together to build an open digital ecosystem .
边栏推荐
- Agile development / agile testing experience
- WPF双滑块控件以及强制捕获鼠标事件焦点
- Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
- C#/VB. Net to add text / image watermarks to PDF documents
- 「小技巧」给Seurat对象瘦瘦身
- 干货整理!ERP在制造业的发展趋势如何,看这一篇就够了
- 室外LED屏幕防水吗?
- Comprehensive evaluation of modular note taking software: craft, notation, flowus
- Langue C: trouver le nombre de palindromes dont 100 - 999 est un multiple de 7
- Efficient! Build FTP working environment with virtual users
猜你喜欢
阿里云有奖体验:用PolarDB-X搭建一个高可用系统
Building intelligent gray-scale data system from 0 to 1: Taking vivo game center as an example
Golang sets the small details of goproxy proxy proxy, which is applicable to go module download timeout and Alibaba cloud image go module download timeout
Reptile exercises (I)
Practice: fabric user certificate revocation operation process
聊聊支付流程的设计与实现逻辑
runc hang 导致 Kubernetes 节点 NotReady
Jetson TX2配置Tensorflow、Pytorch等常用库
Is the outdoor LED screen waterproof?
比量子化学方法快六个数量级,一种基于绝热状态的绝热人工神经网络方法,可加速对偶氮苯衍生物及此类分子的模拟
随机推荐
Transformer principle and code elaboration (tensorflow)
Read the BGP agreement in 6 minutes.
Comparative study of the gods in the twilight Era
求解:在oracle中如何用一条语句用delete删除两个表中jack的信息
使用Scrcpy投屏
Detailed explanation of mt4api documentary and foreign exchange API documentary interfaces
Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
洞见科技解决方案总监薛婧:联邦学习助力数据要素安全流通
Efficient! Build FTP working environment with virtual users
高效!用虚拟用户搭建FTP工作环境
Can Console. Clear be used to only clear a line instead of whole console?
Jetson TX2 configures common libraries such as tensorflow and pytoch
「小技巧」给Seurat对象瘦瘦身
Reptile exercises (I)
[Android kotlin] lambda return statement and anonymous function
AI 绘画极简教程
阿里云有奖体验:用PolarDB-X搭建一个高可用系统
使用 NSProxy 实现消息转发
实战:fabric 用户证书吊销操作流程
DVWA range exercise 4