{"id":"https://openalex.org/W3046201613","doi":"https://doi.org/10.1109/icc40277.2020.9149277","title":"MSTNN: A Graph Learning Based Method for the Origin-Destination Traffic Prediction","display_name":"MSTNN: A Graph Learning Based Method for the Origin-Destination Traffic Prediction","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046201613","doi":"https://doi.org/10.1109/icc40277.2020.9149277","mag":"3046201613"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9149277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027471859","display_name":"Chenming Yang","orcid":"https://orcid.org/0000-0003-3391-2316"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenming Yang","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100680516","display_name":"Zhiheng Zhou","orcid":"https://orcid.org/0000-0003-4269-5173"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiheng Zhou","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079575403","display_name":"Hui Wen","orcid":"https://orcid.org/0000-0003-0854-4152"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wen","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101543507","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-5957-2674"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027471859"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.3901,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.62681641,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7292174100875854},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.7095540165901184},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5737597942352295},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5228215456008911},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48254722356796265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3645378351211548},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35339224338531494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7292174100875854},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.7095540165901184},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5737597942352295},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5228215456008911},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48254722356796265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3645378351211548},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35339224338531494},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9149277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1485009520","https://openalex.org/W1662382123","https://openalex.org/W2016287239","https://openalex.org/W2058737544","https://openalex.org/W2110097654","https://openalex.org/W2110242546","https://openalex.org/W2145563843","https://openalex.org/W2184785877","https://openalex.org/W2558748708","https://openalex.org/W2579495707","https://openalex.org/W2963358464","https://openalex.org/W2963840672","https://openalex.org/W2964015378","https://openalex.org/W2964113829","https://openalex.org/W4297733535","https://openalex.org/W4385245566","https://openalex.org/W6628877408","https://openalex.org/W6637178625","https://openalex.org/W6685350579","https://openalex.org/W6686206596","https://openalex.org/W6696085341","https://openalex.org/W6726873649","https://openalex.org/W6739901393","https://openalex.org/W6745537798","https://openalex.org/W6746015598"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2354431794","https://openalex.org/W2166690231","https://openalex.org/W2950637221"],"abstract_inverted_index":{"Accurate":[0],"origin-destination":[1],"traffic":[2,42],"prediction":[3,197],"(ODTP)":[4],"is":[5,33],"a":[6,82,149],"persistent":[7],"problem":[8,32],"in":[9,160,195],"network":[10,93],"management.":[11],"Due":[12],"to":[13,52,103,119,154],"the":[14,19,30,36,47,53,59,111,115,121,132,156,169,174],"structural":[15],"nature":[16],"of":[17,56,125,146,152],"networks,":[18],"spatial":[20,97,106,112,123,170],"correlations":[21,63,124,159,177],"are":[22,101,178],"critical":[23],"for":[24],"effective":[25],"perdition.":[26],"In":[27,95,131],"this":[28,78],"paper,":[29],"ODTP":[31],"built":[34],"onto":[35],"graph":[37,84,91,116],"domain":[38],"by":[39],"mapping":[40],"OD":[41,57],"into":[43],"graph-structured":[44],"data":[45],"involving":[46],"topology":[48],"information.":[49],"Moreover,":[50],"due":[51],"flow":[54],"characteristics":[55],"traffic,":[58],"complex":[60],"spatial-temporal":[61,90],"(ST)":[62],"should":[64],"not":[65],"be":[66],"limited":[67],"at":[68],"one-hop":[69],"neighbors":[70],"or":[71],"consecutive":[72],"time":[73,165],"steps.":[74,166],"To":[75],"benefit":[76],"from":[77],"observation,":[79],"we":[80,135],"propose":[81],"novel":[83],"learning":[85],"based":[86],"method,":[87],"called":[88],"multi-scale":[89,105,157,175],"neural":[92],"(MSTNN).":[94],"MSTNN,":[96],"and":[98,107,127,163,171],"temporal":[99,108,133,158,172],"extractors":[100],"designed":[102],"capture":[104,120],"correlations.":[109],"Specifically,":[110],"extractor":[113],"employs":[114],"attention":[117],"mechanism":[118],"time-varying":[122],"nodes":[126],"their":[128],"multi-hop":[129],"neighbors.":[130],"extractor,":[134],"design":[136],"gated":[137],"dilated":[138],"convolution":[139],"layers":[140],"with":[141],"different":[142,150],"dilation":[143],"factors,":[144],"each":[145],"which":[147],"represents":[148],"granularity":[151],"time,":[153],"exploit":[155],"both":[161],"adjacent":[162],"non-adjacent":[164],"After":[167],"cascading":[168],"extractors,":[173],"ST":[176],"weighted":[179],"fused.":[180],"Simulations":[181],"on":[182],"two":[183],"real-world":[184],"datasets":[185],"show":[186],"that":[187,192],"MSTNN":[188],"outperforms":[189],"existing":[190],"approaches":[191],"work":[193],"well":[194],"various":[196],"tasks.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
