Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionPages 304–315https://doi.org/10.1145/3643916.3646556Given a known buggy code snippet, searching for similar patterns in a target project to detect unknown bugs is a reasonable approach. In practice, a search unit, such as a function, may appear quite different from the buggy snippet but actually contains ...
- research-articleJune 2023
GuP: Fast Subgraph Matching by Guard-based Pruning
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 2Article No.: 167, Pages 1–26https://doi.org/10.1145/3589312Subgraph matching, which finds subgraphs isomorphic to a query, is crucial for information retrieval from data represented as a graph. To avoid redundant explorations in the data, existing methods restrict the search space by extracting candidate ...
- research-articleMarch 2023
An Efficient Alternative to Subgraph Isomorphism and Its Advantages
ACAI '22: Proceedings of the 2022 5th International Conference on Algorithms, Computing and Artificial IntelligenceArticle No.: 108, Pages 1–6https://doi.org/10.1145/3579654.3579768Subgraph Isomorphism is a fundamental problem in graph theory. It has many applications in social network analysis, molecular investigations, knowledge graphs, etc. Given a Query Graph and a Data Graph, the target of Subgraph Isomorphism, i.e., ...
- research-articleApril 2022
HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs
WWW '22: Proceedings of the ACM Web Conference 2022Pages 755–766https://doi.org/10.1145/3485447.3512235A code property graph (CPG) is a joint representation of syntax, control flows, and data flows of a target application. Recent studies have demonstrated the promising efficacy of leveraging CPGs for the identification of vulnerabilities. It recasts the ...
- research-articleFebruary 2021
A Survey on Distributed Graph Pattern Matching in Massive Graphs
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 36, Pages 1–35https://doi.org/10.1145/3439724Besides its NP-completeness, the strict constraints of subgraph isomorphism are making it impractical for graph pattern matching (GPM) in the context of big data. As a result, relaxed GPM models have emerged as they yield interesting results in a ...
-
- research-articleJanuary 2021
Scalable Pattern Matching in Metadata Graphs via Constraint Checking
ACM Transactions on Parallel Computing (TOPC), Volume 8, Issue 1Article No.: 2, Pages 1–45https://doi.org/10.1145/3434391Pattern matching is a fundamental tool for answering complex graph queries. Unfortunately, existing solutions have limited capabilities: They do not scale to process large graphs and/or support only a restricted set of search templates or usage ...
- research-articleJanuary 2021
Graph Pattern Detection: Hardness for all Induced Patterns and Faster Noninduced Cycles
SIAM Journal on Computing (SICOMP), Volume 50, Issue 5Pages 1627–1662https://doi.org/10.1137/20M1335054We consider the pattern detection problem in graphs: given a constant size pattern graph $H$ and a host graph $G$, determine whether $G$ contains a subgraph isomorphic to $H$. We present the following new improved upper and lower bounds: We prove that if a ...
- research-articleAugust 2020
Neural Subgraph Isomorphism Counting
KDD '20: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningPages 1959–1969https://doi.org/10.1145/3394486.3403247In this paper, we study a new graph learning problem: learning to count subgraph isomorphisms. Different from other traditional graph learning problems such as node classification and link prediction, subgraph isomorphism counting is NP-complete and ...
- research-articleJuly 2020Honorable Mention
Parallel Planar Subgraph Isomorphism and Vertex Connectivity
SPAA '20: Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and ArchitecturesPages 269–280https://doi.org/10.1145/3350755.3400259We present the first parallel fixed-parameter algorithm for subgraph isomorphism in planar graphs, bounded-genus graphs, and, more generally, all minor-closed graphs of locally bounded treewidth. Our randomized low depth algorithm has a near-linear work ...
- invited-talkJune 2020
Graph Neural Networks for Graph Search
GRADES-NDA'20: Proceedings of the 3rd Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA)Article No.: 1, Page 1https://doi.org/10.1145/3398682.3399159Graph neural networks (GNNs) have received more and more attention in past several years, due to the wide applications of graphs and networks, and the superiority of their performance compared to traditional heuristics-driven approaches. However, most ...
- short-paperDecember 2019
Analysing system behaviour by automatic benchmarking of system-level provenance
Middleware '19: Proceedings of the 20th International Middleware Conference Doctoral SymposiumPages 1–5https://doi.org/10.1145/3366624.3368155System-level provenance is of widespread interest for applications such as security enforcement and information protection. However, testing the correctness or completeness of provenance systems is challenging. In some cases, there is not even a clear ...
- research-articleDecember 2019
ProvMark: A Provenance Expressiveness Benchmarking System
- Sheung Chi Chan,
- James Cheney,
- Pramod Bhatotia,
- Thomas Pasquier,
- Ashish Gehani,
- Hassaan Irshad,
- Lucian Carata,
- Margo Seltzer
Middleware '19: Proceedings of the 20th International Middleware ConferencePages 268–279https://doi.org/10.1145/3361525.3361552System level provenance is of widespread interest for applications such as security enforcement and information protection. However, testing the correctness or completeness of provenance capture tools is challenging and currently done manually. In some ...
- research-articleJune 2019
Efficient Subgraph Matching: Harmonizing Dynamic Programming, Adaptive Matching Order, and Failing Set Together
SIGMOD '19: Proceedings of the 2019 International Conference on Management of DataPages 1429–1446https://doi.org/10.1145/3299869.3319880Subgraph matching (or subgraph isomorphism) is one of the fundamental problems in graph analysis. Extensive research has been done to develop practical solutions for subgraph matching. The state-of-the-art algorithms such as \textsfCFL-Match and \...
- research-articleJune 2019
CECI: Compact Embedding Cluster Index for Scalable Subgraph Matching
SIGMOD '19: Proceedings of the 2019 International Conference on Management of DataPages 1447–1462https://doi.org/10.1145/3299869.3300086Subgraph matching finds all distinct isomorphic embeddings of a query graph on a data graph. For large graphs, current solutions face the scalability challenge due to expensive joins, excessive false candidates, and workload imbalance. In this paper, we ...
- research-articleApril 2019
A method for fuzzy quantified querying over fuzzy Resource Description Framework graph
International Journal of Intelligent Systems (IJIS), Volume 34, Issue 6Pages 1086–1107https://doi.org/10.1002/int.22087AbstractVagueness (or imprecision) naturally arises in real‐world Resource Description Framework (RDF) data. The way we query RDF data is a crucial subject because of the vagueness and the wide connectivity of such data. Fuzzy quantified queries have ...
- research-articleJuly 2018
Transfer Learning via Feature Isomorphism Discovery
KDD '18: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningPages 1301–1309https://doi.org/10.1145/3219819.3220029Transfer learning has gained increasing attention due to the inferior performance of machine learning algorithms with insufficient training data. Most of the previous homogeneous or heterogeneous transfer learning works aim to learn a mapping function ...
- research-articleJuly 2018
Automated test mapping and coverage for network topologies
ISSTA 2018: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 73–83https://doi.org/10.1145/3213846.3213859Communication devices such as routers and switches play a critical role in the reliable functioning of embedded system networks. Dozens of such devices may be part of an embedded system network, and they need to be tested in conjunction with various ...
- research-articleJune 2017
Tight Lower Bounds on Graph Embedding Problems
- Marek Cygan,
- Fedor V. Fomin,
- Alexander Golovnev,
- Alexander S. Kulikov,
- Ivan Mihajlin,
- Jakub Pachocki,
- Arkadiusz Socała
Journal of the ACM (JACM), Volume 64, Issue 3Article No.: 18, Pages 1–22https://doi.org/10.1145/3051094We prove that unless the Exponential Time Hypothesis (ETH) fails, deciding if there is a homomorphism from graph G to graph H cannot be done in time |V(H)|o(|V(G)|). We also show an exponential-time reduction from Graph Homomorphism to Subgraph ...
- articleMarch 2017
An Optimization of Closed Frequent Subgraph Mining Algorithm
Cybernetics and Information Technologies (CYBAIT), Volume 17, Issue 1Pages 3–15https://doi.org/10.1515/cait-2017-0001AbstractGraph mining isamajor area of interest within the field of data mining in recent years. Akey aspect of graph mining is frequent subgraph mining. Central to the entire discipline of frequent subgraph mining is the concept of subgraph ...
- research-articleJanuary 2017
The Secret Life of Keys: On the Calculation of Mechanical Lock Systems
Keys and locks are an omnipresent fixture in our daily life, limiting physical access to privileged resources or spaces. While most of us may have marveled at the intricate shape of a key, the usually hidden mechanical complexity within a cylinder lock is ...