Next Article in Journal
Detection of Camellia oleifera Fruit in Complex Scenes by Using YOLOv7 and Data Augmentation
Next Article in Special Issue
Route Planning for Autonomous Driving Based on Traffic Information via Multi-Objective Optimization
Previous Article in Journal
Modified Uncertainty Error Aware Estimation Model for Tracking the Path of Unmanned Aerial Vehicles
Previous Article in Special Issue
Network Calculus Approach for Packet Delay Variation Analysis of Multi-Hop Wired Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

TBRm: A Time Representation Method for Industrial Knowledge Graph

School of Computer Science and Engineering, Shenyang Jianzhu University, Shenyang 110168, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(22), 11316; https://doi.org/10.3390/app122211316
Submission received: 19 September 2022 / Revised: 29 October 2022 / Accepted: 30 October 2022 / Published: 8 November 2022
(This article belongs to the Special Issue Real-Time Systems and Industrial Internet of Things)

Abstract

:
With the development of the artificial intelligence industry, Knowledge Graph (KG), as a concise and intuitive data presentation form, has received extensive attention and research from both academia and industry in recent years. At the same time, developments in the Internet of Things (IoT) have empowered modern industries to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). Using knowledge graphs (KG) to process data from the Industrial Internet of Things (IIoT) is a research field worthy of attention, but most of the researched knowledge graph technologies are mainly concentrated in the field of static knowledge graphs, which are composed of triples. In fact, many graphs also contain some dynamic information, such as time changes at points and time changes at edges; such knowledge graphs are called Temporal Knowledge Graphs (TKGs). We consider the temporal knowledge graph based on the projection and change of space. In order to combine the temporal information, we propose a new representation of the temporal knowledge graph, namely TBRm, which increases the temporal dimension of the translational distance model and utilizes relational predicates in time add representation in time dimension. We evaluate the proposed method on knowledge graph completion tasks using four benchmark datasets. Experiments demonstrate the effectiveness of TBRm representation in the temporal dimension. At the same time, it is also practiced on a network security data set of the Industrial Internet of Things. The practical results prove that the TBRm method can achieve good performance in terms of the degree of harm to IIoT network security.

1. Introduction

With the rapid development of Industrial Internet of Things (IIoT) and Knowledge Graph (KG) in recent years, IIoT applications in the industrial field are highly sensitive and critical, such as Industrial Control System (ICS), which integrates hardware and software to monitor and control the industrial environment operation of the system and its related components [1]. A Knowledge Graph (KG) stores facts about the real world as a collection represented by triples. Each triple in the KG is represented as <s, p, o>, where s and o represent the subject and object, and p represents the predicate connecting the subject s and the object. The problem with link prediction is to find the most suitable triples (s, p, ?) or (?, p, o) to complete knowledge graphs [2]. Our focus is on the temporal knowledge graph, which adds time information to the triples. As shown in Figure 1, the time series knowledge graph essentially wants to extend the traditional static knowledge graph in the time dimension. The form of the problem with link prediction becomes that it is most likely to be completed under the given time information. That is to say, facts in temporal KG can also have the form of (subject, predicate, object, timestamp) or (subject, predicate, object, time predicate, timestamp), which is used to increase the general triple (s, p, o). For example, facts such as (Donald Trump, born, US, 1946) or (Donald Trump, President, US, occurs Since 2017-01) express time information about the facts related to Donald Trump [3]. The former expresses the relation type of the predicate that occurs at a specific point in time, whereas the latter uses the time predicate “occurs Since” to express the disclosed time period (time range).
Recently, a lot of research work has been devoted to the representation learning of TKG. The method of link prediction is generally to embed the subject and predicate of the triple, and then use the scoring function to score. The temporal representation of knowledge graphs remains challenging due to the sparsity and irregularity of dynamic temporal information. The CYGNet model [4] utilizes the historical information of knowledge by designing a special replication module; meanwhile, a generation module is designed to predict the knowledge that appears for the first time. TA-DistMult [5] creates a temporal relationship by treating the characters in r and t as a sequence, and proposes a digit-level LSTM for learning the factual representations that contain temporal information in KGs and can be directly applied to current KGs In the existing scoring function method in the completion task. Through the study of these models, we improved the TransR model and proposed a new TKG representation learning method. The proposed TBRm (Time boundary relationship mapping) represents time information as a single dimension. We map the relationship formed by the TransR model to the time dimension, and by embedding the mapped time predicate into the standard scoring function of knowledge graph completion, Circular neural networks are used to learn the time-aware representation of relationship types. We conduct extensive experiments on four benchmark TKG datasets, and the results show that TBRm can effectively model TKG data through relationships with temporal attributes.
In the direction of IIoT, taking cyberattacks on industrial IOT devices as an example, according to statistics from Kaspersky researchers, the number of cyberattacks on IOT devices jumped from 639 million in 2020 to 1.5 billion in 2021 [6]. In addition to the attack itself, there are other factors that affect the damage of network attacks. In this paper, according to the Edge-IIoT dataset, we use the attacker (represented by IP address) as the subject, the sensor and brake (represented by IP address) as the object, and the attack type as the predicate relationship to establish a static knowledge map. Furthermore, based on the established TBRm method, we take the duration of network attacks as another indicator to judge the degree of harm, form a temporal knowledge graph based on the degree of harm of network attacks, increase the judgment variables to judge the degree of harm of network attacks, and make the judgment basis for the degree of harm more convincing.

2. Related Work

With the development of artificial intelligence technology, people are more and more interested in KG embedding tasks, among which the most successful method is the embedding-based technique proposed by Nayyeri et al. [7,8,9]. These techniques map entities and relationships into a continuous space and define a scoring function to infer missing information. For static knowledge graphs, i.e., knowledge graphs without temporal dynamic facts, a class of classic models is translational distance models, such as TransE [10] and its extensions [11,12], which represent two entities as vectors and the relation Modeled as a translation vector. The TransH [13] model is improved on the basis of TransE, and the relationship is represented by two vectors, among which, H in TransH represents Hyperplane; this article is also the first to propose the negative sampling method of unif and bern. The TransR [14] model takes the projection of TransH to the hyperplane one step further, that is, to the space. The essence is to convert the projection vector into a projection matrix. The entity is still represented by a vector, and the relationship is represented by a vector and a matrix. The improvement in effect is not large, but the amount of calculation increases significantly. The R in TransR stands for relation space. Another class of classic models are semantic matching models, which represent relations as matrices and combine head and tail entities using multiplication, using triangular norm to determine how plausible a fact is [15,16]. With the continuous iteration and updating of technology, other models based on neural network methods using feedforward or convolutional layers [17,18] have received extensive attention for better performance. However, these models do not incorporate the temporal dynamics of the facts.
In terms of temporal knowledge graph, Jiang et al. improved the TransE model and proposed the TTransE model [19], which embeds temporal information into the score function, captures the temporal order between relation types, and uses common sense to constrain it. to generate more accurate connection predictions. The HyTE [20] model maps each time to a hyperplane, which is equivalent to mapping different time points to different hyperplanes, and then models a relationship on each hyperplane, which is actually a triple relationship. modeling. Although the time series knowledge graph is a very large graph, it can be a subgraph from each time point. In the article of Temp [21], the time series knowledge graph is divided into multiple subgraphs, and then each subgraph is convolved through GNN, and then the direct time sequence of multiple graphs is modeled based on RNN, and GNN’s results are concatenated and such methods take into account not only the spatial dimension, but also representation learning in the temporal dimension.
Compared with the traditional static knowledge graph, the temporal knowledge graph has more time information. The knowledge in the knowledge graph is not static, but will change with time. We divide all algorithm models into three categories based on their differences in the way they process time information: temporal knowledge graph representation model with time constraints, time series coding temporal knowledge graph representation model and path reasoning temporal knowledge graph representation model, as shown in Table 1.

3. Research Methods

To address the fact that TransE and TransR do not mention time in fact, we propose TBRm, which represents a mapping of relational spaces to temporal dimensions bridged by time-specific matrices.

3.1. Problem Statement

Compared with traditional knowledge graphs, Temporal Knowledge Graphs have additional information. Each representation in the original knowledge graph is a triple, whereas each representation in the time-series knowledge graph is a quadruple, which not only includes Subject, object and relational predicate, as well as the time point or time range in which the relational predicate is established. Figure 2 shows an example of including time in a knowledge graph. In the example, the fact that Donald Trump is the President of the United States is only true in the time period 2017–2021, not in all time periods. When we ask a question, we need to know the specific time to find out exactly what we want. The tail entity of, so the facts in the time-series knowledge graph are time-dependent, and it is very important to consider the time of facts.
In terms of network security, the requirements knowledge graphs based on the IIoT network security system, as shown in Figure 3. Determining the degree of harm caused by network attacks, and deploying and focusing on prevention of potentially harmful network attacks in advance are conducive to ensuring the network security of IIoT. Clearly, different types of attacks have different degrees of harm, but it is worth thinking about which variables can be added in addition to the types of attacks to make the determination of the degree of harm more accurate.
In TKG, each fact has a relation (or predicate) p R with subject entity s E and object entity o E within time t T . where E and R represent the vocabulary sets corresponding to entity and relation predicates, respectively, and T is the set of time periods or timestamps (if they exist). Bold words s, p, o, t represents the embedding vectors of subject entity s, predicate p, object entity o, and time t in the factual events with temporal information. Let G t denote the snapshot of TKG in t time period, t = t b , t e , where t b denotes the time when a relationship starts, and t e denotes the time when a relationship ends. g = s , p , o , t represents the quadruple fact in G t . Both TransE and TransH assume embedding entities and relations in the same space k . In TransR, for each triple (s, p, o), the entity embedding is set to s, o   k , and the relation embedding is set to r   d . Here, the dimensions owned in entity embedding and relationship embedding may not be the same, that is, k ≠ d. However, none of these three classical models contain temporal information. To solve this problem, we propose a new method that projects triples in relational space onto an extended temporal space and translates them in temporal space, thus was named TBRm.

3.2. Model Structures

For each relation predicate p in the triple, TransR sets a projection matrix M p     k × d , which can project entities from entity space to relation space. Based on this idea, we extend the time dimension on the basis of relational space to form a time-space that is perpendicular to relational space. Define the Vertical projection matrix V t     d × d , V t can map the entity set and relation set to the time space, and reconstruct the triples under the limitation of the time dimension, so that the relation predicate contains It can be limited by duration. The overall structure of TBRm is shown in Figure 4.
The scoring function f is used for the embedding method of KG completion. The function works on the embedding of the subject e s , the object e o , and the predicate e p of the triple in the time dimension, in order to represent the duration (time span) of a relational predicate, let t = t e t b , it is worth noting that when the time represents the relational predicate in the form of timestamp, only t b is taken as the current time vector, that is, when t e = t b , t = t b . The value of a scoring function is proportional to the probability that a triple is true; a classic example of a scoring function is:
  • TrasnE [10]:
f t s , p , o = e s + e p e o 2
where   e s ,   e o d are the embeddings of subject and object entities, and   e p d are the embeddings of relational predicates. 2 represents the two-norm.
2.
TransR [14]:
f p s , o = s p + p o p 2 2
where s p = s M p ,     o p = o M p , and at the same time, the embedding and mapping matrices must be constrained, that is, s 2 1 , o 2 1 ,   p 2 1 ,     s p 2 1 ,     o p 2 1 . These scoring functions do not consider temporal information.
To introduce the temporal information of relational predicates, TBRm uses the projection matrix V t to define the projection of relational predicates as:
p t s = p V t t   ,   p t o = p V t t
where p t s represents the projection of the entity (subject) set at the beginning of the relation predicate on the time dimension, and   p t o represents the projection of the entity (object) set at the end of the relation predicate on the time dimension.
The scoring function is correspondingly defined as:
f t s , p , o = s p t + p t o p t s o p t 2 2
where s p t = s p V t   ,   o p t = o p V t . At the same time, the constraints of the projection matrix are satisfied, that is, s p t 2 1   ,   o p t 2 1 .

3.3. Training Target

Predict (object) entities given a query (s, p, ?, t). The learning goal is to minimize all the cross-entropy loss functions L of TKG snapshots that exist during training. By referring to the training method of the paper [29], we use the following margin-based scoring function as the training goal:
L = s , p , o S s , p , o S max 0 , f t s , p , o + α f t s , p , o
where max (x, y) aims to obtain the maximum value between x and y, α is the margin, S is the set of correct triples, and S’ is the set of incorrect triples.
Existing knowledge graphs only contain correct triples. It is reasonable to destroy correct triples (s, p, o) ∈ S by replacing entities, and construct incorrect triples s ,     p ,   o S . When breaking triples, we follow [30,31,32,33,34,35,36,37,38,39,40,41] and assign different probabilities to head/tail entity replacement.

4. Experiment and Discussion

In this section, we demonstrate the effectiveness of TBRm using four public IIoT datasets. First of all, we will explain the experimental settings in detail, including a detailed introduction to the baseline and dataset. Then, we analyzed and discussed the experimental results. We also conducted a comparative study to evaluate the advantages of the TBRm method over other baseline methods. Finally, we put the proposed representation method into practice on the Edge-IIoTset data set to prove the feasibility of TBRm on the Industrial Internet of Things. The specific code can be found at https://github.com/Dash69dash/temporalKG (accessed on 27 October 2022).

4.1. Dataset

We conducted experiments on the connection prediction of TBRm on four benchmark data sets related to the industrial Internet.At the same time, in order to see the performance of the proposed method on the Industrial Internet of Things, we used another Industrial Internet of Things data set to test the representation effect of TBRm. Table 2 summarizes the statistics of the dataset. The Bosch production line internal fault data set (BPLP) [42] describes the measurement results of parts as they move in the Bosch production line. Each part has a unique ID and contains a large number of anonymous features. Features are named according to the agreement that tells you the production line, the workstations on the production line, and the feature number. We separate the files according to the types of features contained in the files: numbers, categories, parts and workstations on the production line as subject entities and object entities, and fault types as relational predicates in the triplet. Finally, there is a file with a date feature, and the date function provides a timestamp of each measurement time. MOOC Platform User Behavior Data Set (MOOC-Ub) [43] includes the learning activities of all users on the school’s online platform from August 2015 to August 2017. User information is the information of users of the school online, including: gender, year of birth and education level. Course information includes the course start date, course end date, course category, and course type. Extract and filter the user ID as the subject entity, the course category and type as the object entity, and the user information and course information as the relational predicate. Combining the start and end times of the course, the model of the time series knowledge graph is used for experiments. Each json file contains user tracking logs for a specific period of time. The NFT Ethereum transaction data set (NFT) [44] contains the transaction activities of the Ethereum non-homogeneous currency (NFT) from 1 April 2021 to 25 September 2021. It is purely constructed from on-chain data and represents the activities of 9292 NFT smart contracts on the Ethereum blockchain during the period. The Information Exposure from Consumer IoT Devices (IE-IoTD) [45] dataset processed and analyzed the information leakage of 81 devices located in laboratories in the United States and the United Kingdom. We filtered out a total of 23,475 triplet relationships with timestamps.
The Edge-IIoTset [46] data set identifies and analyzes 14 types of network attack methods. These attacks can be summarized as five threats, namely, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. At the same time, the data set also indicates the start time and end time of an attack (or the time point of the attack). Edge-IIoTset’s IOT data is generated from various IOT devices (more than 10 types), such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). The Edge-IIoTset dataset also records the IP address of the attacker and the sensor being attacked.

4.2. Experimental Setup

Baseline Methods We compare our proposed method with the static KGE and TKGE models in the previous study. The static KGE methods used in this article are TransE [10], DistMult [16], Temporal methods include TTransE [20], HyTE [21], TA-DistMult [5].
Evaluation Protocol According to the previous work [29], we filtered out the triplet data that meets our experimental requirements from these four Industrial Internet of Things data sets, and divided them into training sets, verification sets, and test sets according to the characteristics of the data, which are 80%/10%/10%, respectively [47,48,49,50]. We report the average countdown ranking (MRR) and Hits@1/3/10 (the proportion of correct test cases in the top 1/3/10) to measure the performance of our model and the comparison model [51,52,53,54,55]. The calculation formula of MRR is as follows:
M R R = 1 S i = 1 S 1 r a n k i = 1 S 1 r a n k 1 + 1 r a n k 2 + + 1 r a n k S
where S is the set of triples, |S| is the number of triples, and 〖rank〗_i refers to the link prediction ranking of the i-th triplet.
HITS@n refers to the average proportion of triples ranked less than n in the link prediction [56,57]. The specific calculation method is as follows:
H I T S @ n = 1 S i = 1 S I r a n k i n
where the symbols involved in the above formula are the same as those involved in the MRR calculation formula, and I (∙) is the indicator function (if the condition is true, the function value is 1, otherwise it is 0). n usually takes the values of 1, 3, and 10.
Model configuration Exclude empty accounts that have not been used for a long time in the MOOC-Ub data set, and use the filtered triples and time for verification. The coefficient α is adjusted from 0.1 to 0.9, with a step size of 0.1. The batch size is set to 1024.The training epoch is limited to 50, which is sufficient to converge in most cases. The embedding dimension is set to 200 to be consistent with the setting of Jin et al. [30]. The baseline results are also from Jin et al. [30].
Selection of data in Edge-IIoTset dataset Since the Edge-IIoTset dataset not only contains the data described in Section 4.1, it also contains 61 flow features and two new attributes, which are stored together in a CSV file. We use python programs to extract the data information we need from it, including: The IP addresses of the network attacker and the attacked sensor, the attack methods of different attackers on the sensor, and the time when the network attack started and ended. We regard the attacker’s IP address as the subject entity set, the attacked sensor (IP address) as the object entity set, and the attack method as the predicate relationship set. The above data sets are used to form triples of knowledge graphs. Due to the different time units of network attacks (milliseconds, seconds, minutes, and hours), therefore, the time data is dimensionless. Use the Z-score normalization method:
t b * = t b μ b σ b , t e * = t e μ e σ e
where μ b and μ e are the mean values of t b and t e of the same time unit category, respectively. σ b and σ e are the standard deviations of t b and t e in the same time unit category, respectively.

4.3. Experimental Results

Table 3 and Table 4 report the link prediction results of the TBRm and baseline methods on the four IIoT data sets. On the data set in Table 3, the static KGE method lags far behind TA-DistMult or TTransE, because it cannot capture time dynamics. It can also be observed that the performance of all static KGE methods is usually better than that of HyTE. We believe that this is because HyTE slices the dynamic knowledge map with time into multiple static knowledge maps, which are represented independently on each static map, and lack coherence in time updates. Table 3 also shows that TBRm is significantly better than other baseline methods in BPLP and MOOC-Ub.
We also observed in Table 4 that TBRm’s performance on NFT and IE-IoTD is not always the best, especially on NFT. In fact, this is due to the excessive concentration of time information participating in the NFT data set. The excessive concentration of time information makes the time information data interval carried smaller, making it more difficult to distinguish triples. However, the Hyte method of slicing the time series knowledge map by time has a good performance on this data set. Although TBRm performs better on other data sets with a more balanced distribution of time information, how to solve this shortcoming of TBRm is a meaningful direction for further research.
Table 5 shows the percentage of TBRm’s four performance indicators on the Edge-IIoTset dataset. We can see that in addition to Hits@1, TBRm has achieved relatively high scores in the tests of the other three performance indicators. Analyzing the reasons, it was found that in the Edge-IIoTset data set, the number of subject entities of the network attacker is too large, however, there are only 14 kinds of attacks that act as predicates, and the gap between subject entity set and predicate relation set is too obvious. Therefore, in the process of link prediction, the probability of successful prediction for the first time will become very small, and the percentage value of Hits@1 will decrease accordingly.

5. Conclusions

Describing and inferring knowledge graphs with time constraints is a challenging problem. In this paper, we exploit the mapping mechanism to address this problem, assuming that future facts can be predicted from historical facts. The proposed TBRm selects future facts based on known facts that appeared in the past. The results show that TBRm has good performance in predicting future facts in TKGs. We propose a time-constrained relational mapping method to learn temporal knowledge graph fact representations that can be used in conjunction with current link prediction scoring function methods. Experiments on five temporal knowledge graph data demonstrate the effectiveness of the method and its feasibility on the Industrial Internet of Things.

Author Contributions

Conceptualization, K.C. and C.Z.; methodology, K.C. and C.Z.; software, C.Z.; validation, C.Z.; formal analysis, C.Z.; investigation, C.Z.; resources, K.C.; data curation, K.C.; writing—original draft preparation, C.Z.; writing—review and editing, K.C. and C.Z.; visualization, K.C.; supervision, K.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Intelligent IOT and Integrated security of industrial information physics systems, Key projects of the National Natural Science Foundation of China, 2022-01-01 to 2026-12-31, grant number 62133014. And The APC was funded by National Natural Science Foundation of China.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huong, T.T.; Bac, T.P.; Long, D.M.; Luong, T.D.; Dan, N.M.; Quang, L.A.; Cong, L.T.; Thang, B.D.; Tran, K.P. Detecting cyberattacks using anomaly detection in industrial control systems: A federated learning approach. Comput. Ind. 2021, 132, 103509. [Google Scholar] [CrossRef]
  2. Nickel, M.; Murphy, K.; Tresp, V.; Gabrilovich, E. A Review of Relational Machine Learning for Knowledge Graphs. Proc. IEEE 2016, 104, 33. [Google Scholar] [CrossRef]
  3. Ding, Z.; Zhao, R.; Zhang, J.; Gao, T.; Xiong, R.; Yu, Z.; Huang, T. Spatio-Temporal Recurrent Networks for Event-Based Optical Flow Estimation. In Proceedings of the AAAI Conference on Artificial Intelligence, Virtually, 22 February–1 March 2022; Volume 36, pp. 525–533. [Google Scholar]
  4. Zhu, C.; Chen, M.; Fan, C.; Cheng, G.; Zhang, Y. Learning from History: Modeling Temporal Knowledge Graphs with Sequential Copy-Generation Networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Virtually, 2–9 February 2021; Volume 35, pp. 4732–4740. [Google Scholar]
  5. García-Durán, A.; Dumančić, S.; Niepert, M. Learning Sequence Encoders for Temporal Knowledge Graph Completion. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, 31 October–4 November 2018; pp. 4816–4821. [Google Scholar]
  6. Manxin, T.; Lidan, S.; Ke, C.; Dawei, J.; Gang, C. A Knowledge Representation Method Based on Entity Time Sensitivity. Softw. Eng. 2020, 23, 1–6. [Google Scholar]
  7. Nayyeri, M.; Vahdati, S.; Aykul, C.; Lehmann, J. 5* Knowledge Graph Embeddings with Projective Transformations. In Proceedings of the AAAI Conference on Artificial Intelligence, Virtually, 2–9 February 2021; Volume 35, pp. 9064–9072. [Google Scholar]
  8. Zhou, X.; Niu, L.; Zhu, Q.; Zhu, X.; Liu, P.; Tan, J.; Guo, L. Knowledge Graph Embedding by Double Limit Scoring Loss. IEEE Trans. Knowl. Data Eng. 2022, 34, 5825–5839. [Google Scholar] [CrossRef]
  9. Rossi, A.; Barbosa, D.; Firmani, D.; Matinata, A.; Merialdo, P. Knowledge Graph Embedding for Link Prediction: A Comparative Analysis. ACM Trans. Knowl. Discov. Data 2021, 15, 1–49. [Google Scholar] [CrossRef]
  10. Bordes, A.; Usunier, N.; Garcia-Duran, A.; Weston, J.; Yakhnenko, O. Translating embeddings for modeling multi-relational data. Adv. Neural Inf. Process. Syst. 2013, 26, 2787–2795. [Google Scholar]
  11. Wang, Z.; Zhang, J.; Feng, J.; Chen, Z. Knowledge Graph Embedding by Translating on Hyperplanes. In Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, Québec City, QC, Canada, 27–31 July 2014; pp. 1112–1119. [Google Scholar]
  12. Xiong, S.; Huang, W.; Duan, P. Knowledge Graph Embedding via Relation Paths and Dynamic Mapping Matrix. In Advances in Conceptual Modeling. ER 2018. Lecture Notes in Computer Science; Woo, C., Lu, J., Li, Z., Ling, T., Li, G., Lee, M., Eds.; Springer: Cham, Switzerland, 2018; Volume 11158. [Google Scholar]
  13. Lin, Y.; Liu, Z.; Sun, M.; Liu, Y.; Zhu, X. Learning entity and relation embeddings for knowledge graph completion. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI’15), Austin, TX, USA, 25–30 January 2015; pp. 2181–2187. [Google Scholar]
  14. Trouillon, T.; Welbl, J.; Riedel, S.; Gaussier, É.; Bouchard, G. Complex Embeddings for Simple Link Prediction. In Proceedings of The 33rd International Conference on Machine Learning; PMLR: London, UK, 2016; Volume 48, pp. 2071–2080. [Google Scholar]
  15. Yang, B.; Yih, W.-T.; He, X.; Gao, J.; Deng, L. Embedding entities and relations for learning and inference in knowledge bases. arXiv 2015, arXiv:1412.6575. [Google Scholar]
  16. Dettmers, T.; Minervini, P.; Stenetorp, P.; Riedel, S. Convolutional 2D Knowledge Graph Embeddings. In Proceedings of the AAAI Conference on Artificial Intelligence, Orleans, LA, USA, 2–7 February 2018; pp. 1811–1818. [Google Scholar]
  17. Schlichtkrull, M.; Kipf, T.N.; Bloem, P.; van den Berg, R.; Titov, I.; Welling, M. Modeling Relational Data with Graph Convolutional Networks. In The Semantic Web. ESWC 2018. Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2018; Volume 10843. [Google Scholar]
  18. Vashishth, S.; Sanyal, S.; Nitin, V.; Talukdar, P. Composition-based Multi-Relational Graph Convolutional Networks. In Proceedings of the International Conference on Learning Representations, Towson, MD, USA, 26–30 April 2020. [Google Scholar]
  19. Jiang, T.; Liu, T.; Ge, T.; Sha, L.; Chang, B.; Li, S.; Sui, Z. Towards Time-Aware Knowledge Graph Completion. In Proceedings of the COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, Osaka, Japan, 11–16 December 2016; pp. 1715–1724. [Google Scholar]
  20. Dasgupta, S.S.; Ray, S.N.; Talukdar, P. HyTE: Hyperplane-based Temporally aware Knowledge Graph Embedding. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, 31 October–4 November 2018; pp. 2001–2011. [Google Scholar]
  21. Li, Z.; Feng, S.; Shi, J.; Zhou, Y.; Liao, Y.; Yang, Y.; Li, Y.; Yu, N.; Shao, X. Future event prediction based on temporal knowledge graph embedding. Comput. Syst. Sci. Eng. 2023, 44, 2411–2423. [Google Scholar] [CrossRef]
  22. Available online: https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/ (accessed on 19 October 2022).
  23. Xu, C.; Nayyeri, M.; Alkhoury, F.; Yazdi, H.S.; Lehmann, J. Temporal knowledge graph embedding model based on additive time series decomposition. arXiv 2019, arXiv:1911.07893. [Google Scholar]
  24. Leblay, J.; Chekol, M.W. Deriving Validity Time in Knowledge Graph. In Proceedings of the Web Conference 2018 (WWW ’18), International World Wide Web Conferences Steering Committee, Lyon, France, 23–27 April 2018; pp. 1771–1776. [Google Scholar]
  25. Trivedi, R.; Farajtabar, M.; Biswal, P.; Zha, H. Dyrep: Learning representations over dynamic graphs. arXiv 2018, arXiv:1803.04051. [Google Scholar]
  26. Bian, R.; Koh, Y.S.; Dobbie, G.; Divoli, A. Network embedding and change modeling in dynamic heterogeneous networks. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, Paris, France, 21–25 July 2019; pp. 861–864. [Google Scholar]
  27. Han, Z.; Chen, P.; Ma, Y.; Tresp, V. xERTE: Explainable reasoning on temporal knowledge graphs for forecasting future links. arXiv 2020, arXiv:2012.15537. [Google Scholar]
  28. Zuo, Y.; Fang, Q.; Qian, S.; Zhang, X.; Xu, C. Representation Learning of Knowledge Graphs with Entity Attributes and Multimedia Descriptions. In Proceedings of the 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM), Xi’an, China, 13–16 September 2018; pp. 1–5. [Google Scholar]
  29. Trivedi, R.; Dai, H.; Wang, Y.; Song, L. Know-evolve: Deep temporal reasoning for dynamic knowledge graphs. In Proceedings of the 34th International Conference on Machine Learning—Volume 70 (ICML’17), JMLR.org, Sydney, Australia, 6–11 August 2017; pp. 3462–3471. [Google Scholar]
  30. Jin, W.; Jiang, H.; Qu, M.; Chen, T.; Zhang, C.; Szekely, P.; Ren, X. Recurrent Event Network: Global Structure Inference Over Temporal Knowledge Graph. 2019. Available online: https://openreview.net/forum?id=SyeyF0VtDr (accessed on 18 September 2022).
  31. Glorot, X.; Bengio, Y. Understanding the difficulty of training deep feedforward neural networks. J. Mach. Learn. Res.-Proc. Track 2010, 9, 249–256. [Google Scholar]
  32. Van der Maaten, L.; Hinton, G. Visualizing data using t-SNE. J. Mach. Learn. Res. 2008, 9, 2579–2605. [Google Scholar]
  33. Sevick, M.A.; Zickmund, S.; Korytkowski, M.; Piraino, B.; Sereika, S.; Mihalko, S.; Snetselaar, L.; Stumbo, P.; Hausmann, L.; Ren, D.; et al. Design, feasibility, and acceptability of an intervention using personal digital assistant-based self-monitoring in managing type 2 diabetes. Contemp. Clin. Trials 2008, 29, 396–409. [Google Scholar] [CrossRef] [Green Version]
  34. Shao, P.; Zhang, D.; Yang, G.; Tao, J.; Che, F.; Liu, T. Tucker decomposition-based temporal knowledge graph completion. Knowl.-Based Syst. 2022, 238, 107841. [Google Scholar] [CrossRef]
  35. Cai, B.; Xiang, Y.; Gao, L.; Zhang, H.; Li, Y.; Li, J. Temporal Knowledge Graph Completion: A Survey. arXiv 2022, arXiv:2201.08236. [Google Scholar]
  36. Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutor. 2019, 21, 2671–2701. [Google Scholar] [CrossRef]
  37. Lei, Z.; Haq, A.U.; Zeb, A.; Suzauddola, M.; Zhang, D. Is the suggested food your desired? Multi-modal recipe recommendation with demand-based knowledge graph. Expert Syst. Appl. 2021, 186, 115708. [Google Scholar] [CrossRef]
  38. Tareq, I.; Elbagoury, B.M.; El-Regaily, S.; El-Horbaty, E.-S.M. Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT Datasets Using DL in Cybersecurity for IoT. Appl. Sci. 2022, 12, 9572. [Google Scholar] [CrossRef]
  39. Yang, Y.; Wu, Z.; Yang, Y.; Lian, S.; Guo, F.; Wang, Z. A Survey of Information Extraction Based on Deep Learning. Appl. Sci. 2022, 12, 9691. [Google Scholar] [CrossRef]
  40. Liu, S.; Xu, M.; Qin, Y.; Lukač, N. Knowledge Graph Alignment Network with Node-Level Strong Fusion. Appl. Sci. 2022, 12, 9434. [Google Scholar] [CrossRef]
  41. Alissa, K.A.; Elkamchouchi, D.H.; Tarmissi, K.; Yafoz, A.; Alsini, R.; Alghushairy, O.; Mohamed, A.; Al Duhayyim, M. Dwarf Mongoose Optimization with Machine-Learning-Driven Ransomware Detection in Internet of Things Environment. Appl. Sci. 2022, 12, 9513. [Google Scholar] [CrossRef]
  42. Droby, A.; Kurar Barakat, B.; Saabni, R.; Alaasam, R.; Madi, B.; El-Sana, J. Understanding Unsupervised Deep Learning for Text Line Segmentation. Appl. Sci. 2022, 12, 9528. [Google Scholar] [CrossRef]
  43. Gyrard, A.; Boudaoud, K. Interdisciplinary IoT and Emotion Knowledge Graph-Based Recommendation System to Boost Mental Health. Appl. Sci. 2022, 12, 9712. [Google Scholar] [CrossRef]
  44. Trappey, A.J.C.; Liang, C.-P.; Lin, H.-J. Using Machine Learning Language Models to Generate Innovation Knowledge Graphs for Patent Mining. Appl. Sci. 2022, 12, 9818. [Google Scholar] [CrossRef]
  45. Semmler, N. Data-Driven Transfer Optimizations for Big Data in the Industrial Internet of Things; Technical University of Berlin: Berlin, Germany, 2022. [Google Scholar]
  46. Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. TechRxiv 2022. preprint. [Google Scholar] [CrossRef]
  47. Umar, V.S.; Dixit, S.; Aggour, K.S.; Williams, J.W.; Cuddihy, P. On-demand Knowledge Graphs for Standards-Based Power Grid Data Provisioning. In Advances and Trends in Artificial Intelligence. From Theory to Practice. IEA/AIE 2021. Lecture Notes in Computer Science; Fujita, H., Selamat, A., Lin, J.C.W., Ali, M., Eds.; Springer: Cham, Switzerland, 2021; Volume 12799. [Google Scholar] [CrossRef]
  48. Channam, A.; Swarup, B.R.; Rao, S.G. Extraction of Recipes from Food Images by Using CNN Algorithm. In Proceedings of the 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 11–13 November 2021; pp. 1308–1315. [Google Scholar]
  49. Chen, K.; Ma, J.; Zhang, Q.; Bai, Y. Multi-modal Navigation Interaction Recommendation with a Driver Demand-Based Knowledge Graph. In Proceedings of the 10th International Joint Conference on Knowledge Graphs (IJCKG’21), Virtual Event Thailand, 6–8 December 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 195–199. [Google Scholar]
  50. Wang, M.; Wang, H.; Li, B.; Zhao, X.; Wang, X. Summary of Key Technologies of the New Generation of Knowledge Graph. Computer Research and Development: 1–18. Available online: http://kns.cnki.net/kcms/detail/11.1777.TP.20220301.1217.002.html (accessed on 20 October 2022).
  51. Fang, Z.; Long, Q.; Song, G.; Xie, K. Spatial-Temporal Graph ODE Networks for Traffic Flow Forecasting. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery Data Mining (KDD ′21), Virtual Event, Singapore, 14–18 August 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 364–373. [Google Scholar]
  52. Feng, L.; Shu, S.; Cao, Y.; Tao, L.; Wei, H.; Xiang, T.; An, B.; Niu, G. Multiple-Instance Learning from Similar and Dissimilar Bags. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD ′21), Virtual Event, Singapore, 14–18 August 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 374–382. [Google Scholar]
  53. Available online: https://blog.csdn.net/wzg199538/article/details/113847603?spm=1001.2014.3001.5506 (accessed on 13 October 2022).
  54. Mangal, A.; Kumar, N. Using big data to enhance the bosch production line performance: A Kaggle challenge. In Proceedings of the IEEE International Conference on Big Data (Big Data), Washington, DC, USA, 5–8 December 2016; pp. 2029–2035. [Google Scholar]
  55. Arp, D.; Spreitzenbarth, M.; Hubner, M.; Gascon, H.; Rieck, K.; Siemens, C.E.R.T. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Proceedings of the Symposium on Network and Distributed System Security (NDSS), San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
  56. Michael, S.; Florian, E.; Thomas, S.; Felix, C.F.; Hoffmann, J. Mobile-Sandbox: Looking Deeper into Android Applications. In Proceedings of the 28th International ACM Symposium on Applied Computing (SAC), Coimbra, Portugal, 18–22 March 2013. [Google Scholar]
  57. Feng, W.; Jie, T.; Tracy, X.L. Understanding Dropouts in MOOCs. In Proceedings of the AAAI Conference on Artificial Intelligence, Atlanta, Georgia, 8–12 October 2019; pp. 517–524. [Google Scholar]
Figure 1. An example of a time-series knowledge graph.
Figure 1. An example of a time-series knowledge graph.
Applsci 12 11316 g001
Figure 2. A clip of ICEWS showing records of the incumbents of the U.S. President over different time periods. Not all U.S. presidents in office are listed in the figure, and unlisted presidents and future presidents are represented by dotted lines.
Figure 2. A clip of ICEWS showing records of the incumbents of the U.S. President over different time periods. Not all U.S. presidents in office are listed in the figure, and unlisted presidents and future presidents are represented by dotted lines.
Applsci 12 11316 g002
Figure 3. Knowledge Graphs of requirements based on IIoT network security.
Figure 3. Knowledge Graphs of requirements based on IIoT network security.
Applsci 12 11316 g003
Figure 4. The overall structure of the TBRm model.
Figure 4. The overall structure of the TBRm model.
Applsci 12 11316 g004
Table 1. Classification of known temporal knowledge construction methods.
Table 1. Classification of known temporal knowledge construction methods.
Temporal Knowledge Graph Represents CategoriesModel AbbreviationFeatures
Temporal knowledge graph representation model with time constraintsETA-TransE [22]On the basis of the TransE model, a time transfer matrix is constructed based on the difference in the time granularity of the application scenario, which can distinguish the impact of the same time on different types of entities.
ATiSE [23]The influence of mining time on the evolution of entities.
TTransE [24]On the basis of the TransE model, time information is used to embed and represent time points in the triplet by relationship-time merging.
Time series coding temporal knowledge graph representation modelKnow-Evolve [25]By constructing an RNN network to update the embedded representation of the entity after it is affected by time changes.
RE-NET [26]Convert the time information into a sequence of events (triples) with time information, and finally use the RGCN network to aggregate the information of entities at the same time.
Path reasoning temporal knowledge graph representation modelChang2vec [27]Split the time series knowledge graph into multiple static knowledge graphs according to time nodes
Spectrum, recalculate the changed node entity representation and update its embedded representation.
xERTE [28]The model can visualize the interpretability of reasoning and show the reasoning path.
Table 2. Summarizes the statistics of the dataset.
Table 2. Summarizes the statistics of the dataset.
#DatasetBPLPMOOC-UbNFTIE-IoTDEdge-IIoTset
#Entities302424,100542212,564108,576
#Relation14527418624514
#Training721319,151727418,78024,301
#Validation532772634263407219,281
#Test33482854100023494820
Table 3. Results (percentages) on the BPLP and MOOC-Ub datasets.
Table 3. Results (percentages) on the BPLP and MOOC-Ub datasets.
MethodBPLPMOOC-Ub
MRRHits@1Hits@3Hits@10MRRHits@1Hits@3Hits@10
TransE16.474.6225.8434.7817.545.6233.0445.69
DistMult23.545.669.6439.1618.9514.2325.4337.42
TTransE10.6313.1424.9325.649.635.469.6517.56
HyTE19.3521.0428.4340.6221.3416.3825.6336.66
TA-DistMult9.617.258.9615.3412.578.9415.8223.13
TBRm8.7222.6329.9745.498.3520.3240.9846.49
The best results are shown in bold.
Table 4. Results (percentages) on the NFT and IE-IoTD datasets.
Table 4. Results (percentages) on the NFT and IE-IoTD datasets.
MethodNFTIE-IoTD
MRRHits@1 Hits@3Hits@10MRRHits@1Hits@3Hits@10
TransE33.6717.2648.8766.3128.4220.5259.6745.87
DistMult32.5317.6449.6364.4125.6819.4361.3642.94
TTransE49.5732.9835.6570.6930.2625.2048.4750.64
HyTE45.3926.3549.6375.6422.6324.1242.1352.12
TA-DistMult50.2640.2845.6137.3828.9221.1060.7448.67
TBRm30.0435.9946.9774.3225.3924.5964.7955.19
The best results are shown in bold.
Table 5. The performance of TBRm tested on the Industrial Internet of Things.
Table 5. The performance of TBRm tested on the Industrial Internet of Things.
MethodEdge-IIoTset
MRRHits@1Hits@3Hits@10
TBRm34.6819.6250.7360.34
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cao, K.; Zheng, C. TBRm: A Time Representation Method for Industrial Knowledge Graph. Appl. Sci. 2022, 12, 11316. https://doi.org/10.3390/app122211316

AMA Style

Cao K, Zheng C. TBRm: A Time Representation Method for Industrial Knowledge Graph. Applied Sciences. 2022; 12(22):11316. https://doi.org/10.3390/app122211316

Chicago/Turabian Style

Cao, Keyan, and Chuang Zheng. 2022. "TBRm: A Time Representation Method for Industrial Knowledge Graph" Applied Sciences 12, no. 22: 11316. https://doi.org/10.3390/app122211316

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop