• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identifying multiple influential spreaders in complex networks based on spectral graph theory

    2023-10-11 07:56:46DongXuCui崔東旭JiaLinHe何嘉林ZiFeiXiao肖子飛andWeiPingRen任衛(wèi)平
    Chinese Physics B 2023年9期

    Dong-Xu Cui(崔東旭), Jia-Lin He(何嘉林), Zi-Fei Xiao(肖子飛), and Wei-Ping Ren(任衛(wèi)平)

    School of Computer Science and Engineering,China West Normal University,Nanchong 637009,China

    Keywords: spectral graph theory,Laplace matrix,influence maximization,multiple influential spreaders

    1.Introduction

    The influence maximization issue was first introduced by Domingos and Richardson in 2001.[1]One of the main problems of influence maximization is to findkcritical nodes in a complex network, so that the number of nodes being influenced in the network is maximized.The selection of critical nodes in the influence maximization problem is very significant for controlling the spread of epidemics,[2]controlling the spread of rumors,apprehending criminal gangs,[3]and tapping potential customers.[4]Many scholars have already made studies on related aspects.[5–10]

    Among the algorithms to select out multiple influential spreaders in complex networks,the most commonly used basic idea is the top-kstrategy, which selects the topknodes with the largest values as the initial spreaders.For example, degree centrality (DC)[11]measures the importance of a node by the number of nodes that are directly connected to it.The greater the DC,the greater impact on the propagation,so the topknodes with the largest degree values are selected as the initial spreaders in the propagation process.However,DC only considers the first-order neighbors and fails to consider the connections of other nodes(non-neighboring nodes)with it in the algorithm.In view of this, Chenet al.proposed the LocalRank[12]algorithm,which considers fourth-order neighbors and improves on the DC.Betweenness centrality(BC)[13]and closeness centrality (CC)[14,15]consider global network information.BC measures how important a node is based on how many shortest paths pass through it.CC evaluates the importance of a node by the sum of its distances to other nodes in the network,with the closer being more important.In addition,there is ClusterRank,[16]which considers both the degree of the node and the clustering coefficient, and PageRank[17]and LeaderRank,[18]proposed as algorithms to calculate the importance of Internet pages.Fanet al.[19]proposed the cycle ratio(CR)algorithm,which proposes and defines the cycle number matrix and cycle ratio by analyzing the information contained in cycles in a network structure; the cycle number matrix contains the cycle of nodes in the network information,and the cycle ratio measures the importance of nodes.Algorithms such as these all select the topknodes with the largest values as the initial spreaders in the propagation process,i.e.,using the top-kstrategy.

    Although the nodes selected by the top-kstrategy can improve the final affected scale, it causes local propagation if the selected nodes are clustered,because the top-ranked nodes selected by these algorithms might be clustered as a richclub.[20]Initially,some nodes that contribute to effective information propagation are selected.As more nodes are added to the rich-club,their contributions to effective information propagation become smaller.To avoid the occurrence of a richclub,some scholars have started to study the dispersion of selected nodes,such as excluding the selected nodes from being neighboring nodes, etc.Kempeet al.[21]proposed a “mountain climbing” greedy strategy to selectkcritical nodes, and the performance of this greedy strategy is close to 63%of the optimal performance.Chenet al.[22]proposed a“degree discount”heuristic algorithm to select critical nodes,which has a wider propagation range and lower time complexity.Zhaoet al.[23]applied the “coloring problem” in graph theory to find multiple influential spreaders in complex networks, by dividing nodes with the same color into same independent sets,and selecting a certain percentage of important nodes from each independent set; the larger the independent set is, the more nodes are selected, and this algorithm accelerates the propagation process.Guoet al.[24]proposed distance-based coloring algorithms, which significantly improve the final affected scale.Flaviano Moroneet al.[25]addressed the problem of quantifying nodes’ influence by finding the optimal (that is,minimal)set of structural influencers,and proposed collective influence (CI), a scalable algorithm to solve the optimization problem in large-scale real data sets.Zhanget al.[26]proposed the VoteRank algorithm, which selects multiple influential spreaders through each round of voting iterations and weakens the voting power of their neighbors; Sunet al.[27]proposed WVoteRank (WVR) based on the VoteRank algorithm, which can be used not only on unweighted networks but also on weighted networks.Fanet al.[28]proposed an algorithm to find critical nodes in complex networks by introducing a deep reinforcement learning framework.

    However, although the dispersion strategy improves the final affected scale by increasing the dispersion of the selected nodes,the disadvantage is that the local structure of many critical nodes is not conducive to disease propagation.Based on this,this paper proposes a compromise strategy to balance the top-kstrategy and the dispersion strategy.In the experimental study of seven real networks and four synthetic networks generated by the LFR[29]model that is a community generation model proposed by Lancichinettiet al., the algorithm in this paper has a clear advantage in the final affected scale, compared with BC,CC,DC,CI,WVR,CR and FINDER.

    The major contributions of this paper are shown as follows.

    (i) From analysis of two network topologies, it is found that the local tree structure is more conducive to the spread of disease than the local cluster structure.

    (ii)Using the eigenvectors of the Laplace matrix to classify structural importance of nodes,a balancing strategy is proposed in which nodes of the same class are not adjacent,while nodes of different classes are adjacent.

    2.Preliminaries

    2.1.Graph Laplacian quadratic form

    Given a graphG=(V,E),Vdenotes the set of nodes in the graph,which is assumed to be of lengthN.The graph signal is a mapping describingV →R, expressed in the form of a unit vector:x=[x1,x2,...,xN]T,wherexidenotes the signal strength on nodevi.When studying the properties of the graph signal, the topology of the graph should be considered in addition to the strength of the graph signal.The Laplace matrix is the core object used to study the structural properties of the graph and is defined as follows:

    whereAandDdenote the adjacency matrix and the diagonal matrix of the degree of the graph respectively,andDii=∑j Aijdenotes the degree of nodevi.Based on the Laplace matrix,we can define a very important quadratic form as follows:

    whereTV(x) is the total variance of the graph signal, which sums the differences of the signals on each edge and portrays the overall smoothness of the graph signal.

    Assuming that theNeigenvalues of the Laplace matrixLareγ1≥γ2≥···≥γNand the corresponding unit eigenvectors areu1,u2,...,uN,respectively,then equation(2)can be rewritten as

    where ~xidenotes the coordinates of signalxon the unit eigenvectoruicorresponding toγi,Λdenotes the diagonal matrix consisting of eigenvalues andUdenotes the orthogonal eigenmatrix consisting of eigenvectors.From Eq.(3),it can be seen that when the graph signalx=ui, thenTV(ui)=γi.Hence,forγ1≥γ2≥···≥γN, the inequalityTV(u1)≥TV(u2)≥···≥TV(uN)holds.

    2.2.SIR model

    The SIR model[30,31]and the SIS model are two relatively well-known infectious disease models,and in this experiment the SIR model is used as an evaluation metric for the performance of the algorithm.In the SIR model, each node in the network can only be in one of the following three states at each time step: susceptible(S),infected(I),and recovered(R).At time stept,infected nodeurandomly selects the neighboring nodev.If nodevbelongs to susceptible nodes,nodeuinfects it with probabilityα.Meanwhile,infected nodeubecomes a recovered node with probabilityβ.The disease propagation process ends when all infected nodes in the network have become recovered nodes.At this point,the final scale of affected nodesF(n)is used as a measure of the performances of different algorithms,defined as follows:

    whereN′andNRdenote the number of all nodes in the network and the number of nodes eventually recovered, respectively.In addition, in the SIR model, the basic reproduction numberλ=α/βreflects the disease propagation trend; for example,whenλ >1,the disease is able to spread throughout the population.

    2.3.The K-core algorithm

    TheK-core[32]algorithm is a subgraph mining algorithm to find the set of nodes in a graph that match a specified core degree,requiring each node to be connected to at leastKother nodes in that graph.In addition,K-core hierarchically divides the graph according toKvalues.For example,2-core removes nodes with degree less than 2 each time,3-core removes nodes with degree less than 3 each time,and each repeated removal of nodes as well as edges is specified byKvalues as shown in Fig.1.Thus,it shows that nodes with larger core degrees tend to have larger degrees, i.e., more neighboring nodes, which can play a greater role to a certain extent.

    Fig.1.Schematic of the 1-core,2-core,and 3-core subgraphs.

    3.Multiple influential spreaders identification algorithm

    3.1.Node local structure analysis

    From Subsection 2.3,it is clear that the outermost nodes of the network,i.e.,those withK=1,play a very limited role in the propagation process.Therefore, we only analyze the subgraph of the nodes withK ≥2 in the network.First, all nodes withK=1 are removed from the initial networkGto obtain the new networkG′.Next,the adjacency matrixA′of the new networkG′is normalized, which can be obtained as follows:

    Fig.2.Two classical topological structures.(a) Local tree structure;(b)local cluster structure.

    3.2.Trade-off strategy

    Currently, there are two strategies for identifying a set of critical nodes: the top-kstrategy and the dispersion strategy.The top-kstrategy selects the topknodes with the largest value, but the value selected is a single measure that does not fully represent the nodes’propagation ability,causing the selected nodes to cluster together and overlap, resulting in a rich-club phenomenon.The dispersion strategy focuses on the dispersion of the selected nodes, so many critical nodes not conducive to disease propagation are selected.In view of the limitations of the above two strategies, this paper proposes a compromise strategy that balances the importance of critical nodes and the dispersion of critical nodes.

    Given the eigenvectorsu1,u2,...,uNof the Laplacian matrix, the projectionsi jofon the eigenvectorujis defined as

    Therefore, we can use theNeigenvectors ofLas the benchmark category vectors to classify the importance of local structure ofNnodes in the network.Specifically,for each nodevi,the baseline category vector ordinal numberliwith the maximum similaritysijis calculated,i.e.,

    The setCjof nodes contained in each benchmark category vectorujis then found,i.e.,

    It is known from Subsection 3.1 that the largeris,the higher the probability of nodevispreading the disease outward.Hence, the importance of the local structure of nodes inC1,C2and other sets decreases successively.To select a set of critical nodes, we use the constraint that nodes in the same class are not adjacent, but nodes from different classes can be adjacent to balance the importance of structure and dispersion.Hence, we give priority to the nodes in the setC1when selecting a set of critical nodes.First, the nodes inC1are first sorted by similaritysi1from largest to smallest.Then,the first node inC1is selected as the critical node, and next the second critical node inC1is selected which is not adjacent to the first critical node and has the largestsi1,and so on,until there are no nodes to be selected inC1.If the number of selected critical nodes is not yet satisfied,we proceed to consider the second setC2.When selecting critical nodes fromC2,we only require that the selected nodes are not adjacent to the critical nodes already selected inC2.In other words, the critical nodes in each setCjare not adjacent to each other,but the critical nodes in two setsCiandCjcan be adjacent to each other.The above process is repeated until the given number of critical nodes is satisfied.

    The pseudo-code for our algorithm is given as follows.Algorithm 1 demonstrates node classification based on the eigenvectors of the Laplace matrix,where steps 4–9 represent that calculating similarity between ~a′iandujof every node,and classifying nodes by maximum similarity.After that, we can select a set of critical nodes by the constraint that nodes in the same class are not adjacent to each other while different classes of nodes can be adjacent to each other.

    Algorithm 1 NC(G)–Node classification Input: Graph G=(V,E)Output: Classified nodes sets C 1: Delete the nodes with K=1 in G using K-core algorithm,and get the new graph G′.2: L′←D′-A′and ~A′←D′-1A′.3: Cn ←/0 for n=0,1,2,...,[V′].4: for each row vector ~a′i of ~A′do 5: lmax ←i and smax ←0.6: for each eigenvectors uj of L′do 7: Calculate the similarity sij of ~a′i and eigenvectors uj.8: if sij >smax then 9: lmax ←j and smax ←sij 10: end if 11: end for 12: Clmax ←Clmax ∪{i}.13: end for 14: return C

    4.Experimental results

    To verify the effectiveness of the proposed algorithm(LA) in this paper, experiments are conducted on seven real networks and four synthetic networks generated by the LFR model[29]in this section, and their performance is evaluated in comparison with seven benchmark algorithms.To better demonstrate the comparative effects between these algorithms,we divided the experiments into two main groups: top-kstrategy and dispersion strategy.The experiments are carried out on the SIR model, and the infection probability is uniformly set asα=〈ω〉/(〈ω2〉-〈ω〉), where〈ω〉 is the average degree of the network.

    4.1.Benchmark algorithm

    Seven benchmark algorithms are selected for comparison with the LA algorithm,namely,BC,[13]CC,[14,15]DC,[11]CR,[19]CI,[25]WVR,[27]and FINDER.[28]The details of the seven algorithms are described as follows.

    4.1.1.Top-kstrategy

    Betweenness centrality(BC),which measures the importance of a node by whether the shortest paths all pass through it, and selects the topknodes that have been passed through more often as the initial spreaders.

    Closeness centrality (CC), which measures the importance of a node by the sum of its distances from other nodes in the network, and selects the topknodes with smaller sum of distances as the initial spreaders.

    Degree centrality (DC), which measures the importance of a node by the number of its neighbors, and selects the topknodes with larger degree values as the initial spreaders.

    Cycle ratio (CR), which defines a cycle number matrix in order to represent the cycle information of the network,by which a metric called cycle ratio can be calculated–quantifying the importance of a single node by measuring the extent to which a node participates in the shortest cycle associated with other nodes.

    4.1.2.Dispersion strategy

    Collective influence(CI),which selects the nodes through a scalable algorithm and believes low-degree nodes play a major broker role in the network,and despite being weakly connected,can be powerful influencers.

    WVoteRank (WVR), which selects the nodes with the highest number of votes and not the neighboring nodes of the already selected nodes as the initial propagators in each round of voting by iteration.

    FINDER (FINDER), which introduces a deep reinforcement learning framework that incorporates inductive graph representation learning to represent graph states and actions,and a deepQ′(quality of action score)network that combines reinforcement learning and deep neural networks to automatically learn the strategy that optimizes the objective to find critical nodes in a complex network.

    4.2.Real networks

    The seven real network datasets selected in this paper are C.elegans,[33]crime,[34]Email,[35]Yeast,[36]HI-II-14,[37]ca-HepPh,[38]and ca-AstroPh,[38]which are complex networks with nodes ranging from a few hundred to more than 10000.Among them, the C.elegans network is a neural network, in which nodes represent neurons in the nervous system of the worm,and edges represent connections between neurons.The crime network is a criminal network.The Email network is an email communication network at the University of Rovira,Spain,in which nodes represent users and edges indicate that users have sent emails to each other.The Yeast network and HI-II-14 network are protein–protein interaction networks.The Ca-HepPh network is a collaborative network, in which nodes are authors of published papers, and the edges represent that there are co-authored papers between two or more authors.The Ca-AstroPh network is a collaborative network,which covers scientific collaborations between authors of papers submitted to the astrophysics category.The basic topological properties of the seven real networks are shown in Table 1.

    Table 1.Four basic topological properties of the real networks,including the number of nodes(|V|),the number of edges(|E|),the average degree of the nodes(〈ω〉),and the network clustering coefficient(c).

    4.2.1.Top-kstrategy

    Fig.3.Final affected scale F(n) with different percentages of source influential spreaders p on seven real networks, where (a)–(f) show the effects of top-k strategy algorithms and (g) and (h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(a)–3(f),on the C.elegans network,the LA algorithm outperforms the other four algorithms overall.In particular,whenp ∈[0.03,0.10],the LA algorithm always performs better than the benchmark algorithms.On the Email network,Yeast network, ca-HepPh network, and ca-AstroPh network,the LA algorithm always brings a better influence range than DC,BC,CC,and CR whenp ∈[0.01,0.10].In particular,on the crime network,the LA algorithm obtains an improvement of spreading influence ranging from 5.53%to 17.30%over the second best algorithm CR.Similarly,the LA algorithm outperforms the second best algorithm CR with an improvement of spreading influence ranging from 15.77% to 29.10% on the ca-HepPh network.Moreover, on the ca-AstroPh network,the LA algorithm obtains improvements of 25.09%, 16.71%,52.29%and 54.49%compared with CR,BC,DC and CC,respectively.

    Fig.4.Final affected scale F(n) with different λ on six real networks,where (a)–(f) show the effects of top-k strategy algorithms and (g) and(h) show the effects of dispersion strategy algorithms.Experiments are carried out on the SIR model, where p=0.05, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In the experiment, the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(a)–4(f),it can be concluded that the LA algorithm performs better than the other four pure node centrality indicators algorithms on the C.elegans network, crime network, Yeast network, Email network, ca-HepPh network,and ca-AstroPh network.In particular,on the ca-AstroPh network, the LA algorithm obtains an improvement of spreading influence ranging from 23.61% to 28.56%over the second best algorithm CR.

    4.2.2.Dispersion strategy

    Firstly,we investigate the effect of changing the percentage of source influential spreaderspon the final affected scaleF(n).Another variable parameterλis set to 1.2.As can be seen in Figs.3(g)–3(h),LA algorithm always outperforms the other three dispersion strategy algorithms.On the HI-II-14 network, LA algorithm outperforms algorithm WVR with an improvement of spreading influence ranging from 3.26%to 13.04%,outperforms algorithm FINDER with an improvement of spreading influence ranging from 10.43%to 20.02%,and outperforms algorithm CI with an improvement of spreading influence ranging from 4.43%to 16.73%.

    Secondly, we investigate the effect of changingλon the final affected scaleF(n).In this experiment,the percentage of source influential spreaders is set to a fixed value ofp=0.05.As can be seen in Figs.4(g)–4(h),the LA algorithm performs better than the dispersion strategy algorithms.In particular,on the HI-II-14 network, the LA algorithm obtains an improvement of spreading influence ranging from 6.18% to 14.51%over the second best algorithm WVR.

    4.3.Synthetic networks

    To verify the impact of community structure on our algorithm, we choose to compare it with the CR algorithm,since our algorithm tends to choose the local tree-like structure,while CR tends to choose the local cluster structure.The experiment is performed on four synthetic networks generated by the LFR model.[29]The LFR model accounts for the heterogeneity in the distributions of node degrees and of community sizes,which can be used to test the effect of community topology on algorithms.On the LFR model, both the degree and the community size distributions obey power laws,with exponentsε1andε2,respectively.In our experiments we generate the LFR networks we need by controlling a number of topologies,as follows: the four synthetic networks have the sameε1andε2,but different mixing parametersμ.The smaller theμ,the stronger the community structure.

    The four networks have the same number of nodes and approximate number of edges.The experimental results are shown in Fig.5.On the LFR1 network and LFR2 network with higher clustering coefficients, the LA algorithm outperforms the CR algorithm.In particular, on the LFR1 network,the LA algorithm obtains an improvement of spreading influence ranging from 4.87% to 7.86% over the CR algorithm.On the LFR2 network,the LA algorithm obtains an improvement of 6.35%on average.However,on the LFR3 and LFR4 networks with smaller clustering coefficients, there is no significant improvement or decrease in the final affected scale of the LA algorithm, but for the CR algorithm, there is an improvement compared to that on the LFR1 and LFR2 networks.Hence,when the local clustering structure increases,it has no obvious influence on our algorithm.

    Fig.5.Final affected scale F(n) with different percentages of source influential spreaders p on the synthetic network, where λ =1.2, α =〈ω〉/(〈ω2〉-〈ω〉).Each data point is the average of 100 independent runs.

    We can explain the above phenomenon from the following two aspects.First, from the basic topological data of the four synthetic networks in Table 2, we can see that the modularity(Q)of the LFR1 network and LFR2 network is higher than that of the LFR3 network and LFR4 network.For a network, the greater the modularity is, the stronger the community structure is,and the higher the local clustering coefficient.For the CR algorithm considering the shortest cycle ratio,the selected nodes are basically located in the core of the community.When the community structure is strong, the CR algorithm tends to cause local propagation within the community,while when the community structure is weak, the connected edges between communities increase,which increases the possibility of outward propagation,so the CR algorithm performs better on the LFR3 network and LFR4 network than on the LFR1 network and LFR2 network.Secondly, the nodes selected by the LA algorithm act as“bridges”and do not necessarily have many neighbors,but the neighbors of the selected nodes tend to have a very large degree and can propagate far away.Hence,on networks with a strong community structure,the LA algorithm tends to select the middle node of the local tree-like structure, which connects several communities and can expand the affected scale; on networks with weak community structure, the possibility of forming a local tree-like structure between nodes and nodes or nodes and communities increases, so the LA algorithm also chooses “bridge” nodes to expand the affected scale.In short, the LA algorithm always selects the“bridge”nodes of the local tree-like structure regardless of the community structure, and the affected scale is not influenced.The CR algorithm tends to select the core nodes in the communities, which results in a strong community structure network and reduces the affected scale.

    Table 2.Eight basic topological properties of the synthetic network,including the number of nodes(|V|),number of edges(|E|),average degree(〈ω〉), node power-law exponent (ε1), community power-law exponent(ε2),mixing parameter(μ),modularity(Q),and network clustering coefficient(c).

    5.Conclusion

    In this paper, we propose a new algorithm for identifying multiple influential spreaders that balances the top-kstrategy and the dispersion strategy.To validate the performance of the LA algorithm, we evaluate it on seven real networks and four synthetic networks for comparison with seven benchmark algorithms.On the real networks, we observe the effect on the final affected scale by adjustingpandλ.From the above, we know that adjustingp ∈[0.01,0.10], the LA algorithm shows better performance on the C.elegans, crime,Email, Yeast, ca-HepPh and ca-AstroPh networks; when adjustingλ ∈[1.0,1.5],similarly,the LA algorithm outperforms the other seven benchmark algorithms.On the LFR networks,we observe the effect on the algorithm performance by generating networks with different community structures.This paper mainly shows the comparison between the LA algorithm and the CR algorithm.The experimental results show that the LA algorithm always selects the“bridge”nodes of the local tree-like structure,and outperforms other benchmark algorithms.

    The LA algorithm can improve the final affected scale to some extent.However, finding multiple influential spreaders is still an open research issue.In this paper,we focus on the effects of tree and cluster structures on the LA algorithm,while the way other network topologies,such as star and ring structures,affect the LA algorithm is still a far-reaching topic to be studied.

    Acknowledgments

    Project supported by the National Natural Science Foundation of China (Grant No.62176217), the Program from the Sichuan Provincial Science and Technology,China(Grant No.2018RZ0081), and the Fundamental Research Funds of China West Normal University(Grant No.17E063).

    性色avwww在线观看| 久久精品夜夜夜夜夜久久蜜豆| 国产精品一区二区性色av| 亚洲成人久久性| 国产精品综合久久久久久久免费| 亚洲真实伦在线观看| 国产精品,欧美在线| 天堂√8在线中文| 免费人成视频x8x8入口观看| 男人和女人高潮做爰伦理| 一级黄片播放器| 99久国产av精品| 日韩欧美在线二视频| 哪里可以看免费的av片| 国内揄拍国产精品人妻在线| 午夜影院日韩av| 久久久成人免费电影| 九色成人免费人妻av| 国内毛片毛片毛片毛片毛片| 亚洲欧美日韩高清专用| 国产成人欧美在线观看| 夜夜躁狠狠躁天天躁| 国产激情偷乱视频一区二区| h日本视频在线播放| 久久久久亚洲av毛片大全| 九九久久精品国产亚洲av麻豆| 久久久精品欧美日韩精品| 中亚洲国语对白在线视频| 成人av在线播放网站| 午夜福利视频1000在线观看| 日韩 亚洲 欧美在线| 欧美区成人在线视频| 精品久久久久久久久亚洲 | 欧美在线一区亚洲| 国产成人啪精品午夜网站| 欧美+日韩+精品| 人人妻,人人澡人人爽秒播| 丰满乱子伦码专区| 99精品久久久久人妻精品| 精品久久久久久久久久免费视频| 亚洲成人久久性| 亚洲av成人av| bbb黄色大片| 成人一区二区视频在线观看| 午夜福利在线在线| 日本a在线网址| 精品午夜福利视频在线观看一区| 少妇高潮的动态图| 久久精品国产清高在天天线| 午夜精品在线福利| 成人精品一区二区免费| 自拍偷自拍亚洲精品老妇| 国产精品精品国产色婷婷| 久久久久性生活片| 日本熟妇午夜| 婷婷色综合大香蕉| 在线观看午夜福利视频| 国产 一区 欧美 日韩| 国产老妇女一区| 丰满人妻一区二区三区视频av| 97热精品久久久久久| 久久伊人香网站| 老熟妇乱子伦视频在线观看| 亚洲美女视频黄频| 亚洲av免费高清在线观看| 天堂网av新在线| 永久网站在线| 午夜福利免费观看在线| 首页视频小说图片口味搜索| 国产黄片美女视频| www.999成人在线观看| 久久九九热精品免费| 午夜精品一区二区三区免费看| 国产白丝娇喘喷水9色精品| 97碰自拍视频| 亚洲av.av天堂| 亚洲黑人精品在线| 国产视频内射| 国产色婷婷99| 成人永久免费在线观看视频| 亚洲精品一卡2卡三卡4卡5卡| 久久久久久九九精品二区国产| 精品久久久久久久久亚洲 | 久久午夜福利片| 别揉我奶头 嗯啊视频| 亚洲av二区三区四区| 国产主播在线观看一区二区| 男插女下体视频免费在线播放| 淫妇啪啪啪对白视频| 永久网站在线| 我要搜黄色片| 久久草成人影院| 国产毛片a区久久久久| 欧美bdsm另类| 18禁裸乳无遮挡免费网站照片| 观看免费一级毛片| 老司机深夜福利视频在线观看| 日本与韩国留学比较| 我要搜黄色片| 高清在线国产一区| 亚洲午夜理论影院| 99久久久亚洲精品蜜臀av| 国产不卡一卡二| 久久久精品欧美日韩精品| 亚洲av免费高清在线观看| 亚洲人成伊人成综合网2020| 国产综合懂色| 特级一级黄色大片| 三级男女做爰猛烈吃奶摸视频| 欧美日本亚洲视频在线播放| www.999成人在线观看| 欧美黑人巨大hd| 国产69精品久久久久777片| 十八禁国产超污无遮挡网站| 身体一侧抽搐| av在线天堂中文字幕| 在线看三级毛片| 熟妇人妻久久中文字幕3abv| 久久中文看片网| 日韩亚洲欧美综合| 一本综合久久免费| 黄色女人牲交| 中文字幕精品亚洲无线码一区| 亚洲无线观看免费| 国产私拍福利视频在线观看| 99热6这里只有精品| 亚洲一区二区三区不卡视频| 91麻豆精品激情在线观看国产| 国产亚洲av嫩草精品影院| 日日夜夜操网爽| 免费看a级黄色片| 欧美zozozo另类| 精品人妻一区二区三区麻豆 | 国产精品一区二区免费欧美| 成人毛片a级毛片在线播放| 国产精品爽爽va在线观看网站| 国产精品伦人一区二区| 夜夜看夜夜爽夜夜摸| 哪里可以看免费的av片| 中文字幕免费在线视频6| 在线a可以看的网站| 日本精品一区二区三区蜜桃| 在线免费观看不下载黄p国产 | av国产免费在线观看| 日本 欧美在线| 怎么达到女性高潮| 全区人妻精品视频| 亚洲成人精品中文字幕电影| 国产精品一区二区三区四区久久| 欧美一区二区亚洲| 成人性生交大片免费视频hd| 国产精品永久免费网站| 国产毛片a区久久久久| 精品人妻视频免费看| 十八禁网站免费在线| 一进一出抽搐动态| 亚洲精品一卡2卡三卡4卡5卡| АⅤ资源中文在线天堂| 色av中文字幕| 精品人妻偷拍中文字幕| 在线观看美女被高潮喷水网站 | 国产三级在线视频| 给我免费播放毛片高清在线观看| 久久久久久久久久成人| 波多野结衣高清作品| 国产日本99.免费观看| 少妇熟女aⅴ在线视频| 久久精品国产清高在天天线| 欧美3d第一页| 日韩中文字幕欧美一区二区| 国产精品女同一区二区软件 | .国产精品久久| 少妇的逼好多水| 蜜桃亚洲精品一区二区三区| 国内精品美女久久久久久| 国产精品自产拍在线观看55亚洲| 国产又黄又爽又无遮挡在线| 无遮挡黄片免费观看| 一边摸一边抽搐一进一小说| 少妇的逼水好多| 亚洲精品成人久久久久久| 日韩欧美精品免费久久 | 欧美成人性av电影在线观看| 日本一本二区三区精品| 一a级毛片在线观看| 亚洲av免费高清在线观看| 欧美日本视频| 亚洲av免费在线观看| 夜夜夜夜夜久久久久| 亚洲精品一卡2卡三卡4卡5卡| 有码 亚洲区| 久久精品国产99精品国产亚洲性色| av福利片在线观看| 一级毛片久久久久久久久女| 日韩大尺度精品在线看网址| 一区福利在线观看| 国产真实乱freesex| 少妇熟女aⅴ在线视频| 天堂动漫精品| 久久精品国产亚洲av天美| 成人毛片a级毛片在线播放| 国产高清有码在线观看视频| 看片在线看免费视频| eeuss影院久久| 在现免费观看毛片| 精品福利观看| 制服丝袜大香蕉在线| 国产 一区 欧美 日韩| 自拍偷自拍亚洲精品老妇| 十八禁人妻一区二区| 国产精品不卡视频一区二区 | 国产精品野战在线观看| 我的女老师完整版在线观看| 国产精品久久久久久久久免 | 欧美成人a在线观看| 中文字幕久久专区| 久久99热这里只有精品18| 51国产日韩欧美| 一个人看的www免费观看视频| 国产精品日韩av在线免费观看| 亚洲人成网站在线播| 91字幕亚洲| 久久亚洲真实| 特级一级黄色大片| 综合色av麻豆| 看免费av毛片| 精品乱码久久久久久99久播| 国产成人啪精品午夜网站| 欧美+亚洲+日韩+国产| 嫩草影院入口| 亚洲,欧美,日韩| 91麻豆精品激情在线观看国产| 夜夜夜夜夜久久久久| 久久精品91蜜桃| 国内毛片毛片毛片毛片毛片| 成人精品一区二区免费| 免费高清视频大片| 精品久久久久久久久久久久久| 欧美激情在线99| 亚洲在线自拍视频| 一区福利在线观看| 蜜桃亚洲精品一区二区三区| 精品人妻1区二区| 久久性视频一级片| .国产精品久久| 乱人视频在线观看| 午夜视频国产福利| 亚洲av成人av| 高清在线国产一区| 久久精品久久久久久噜噜老黄 | 午夜日韩欧美国产| 美女高潮喷水抽搐中文字幕| 在线播放国产精品三级| 欧美bdsm另类| 欧美中文日本在线观看视频| 神马国产精品三级电影在线观看| 1024手机看黄色片| 国产老妇女一区| 国产伦人伦偷精品视频| 午夜免费男女啪啪视频观看 | 欧美在线黄色| 99热这里只有是精品在线观看 | 男人和女人高潮做爰伦理| 日韩精品中文字幕看吧| 亚洲内射少妇av| 精品久久久久久久久久久久久| 久久国产乱子伦精品免费另类| 国产欧美日韩一区二区精品| 国产亚洲精品久久久久久毛片| 免费观看人在逋| 99久久精品一区二区三区| 免费电影在线观看免费观看| 高清在线国产一区| 国产精品av视频在线免费观看| 夜夜夜夜夜久久久久| 成人毛片a级毛片在线播放| 国模一区二区三区四区视频| 欧美+日韩+精品| 精品久久国产蜜桃| 精品一区二区三区av网在线观看| 丰满的人妻完整版| 直男gayav资源| 午夜影院日韩av| 可以在线观看的亚洲视频| 欧美区成人在线视频| 狠狠狠狠99中文字幕| 亚洲中文日韩欧美视频| 琪琪午夜伦伦电影理论片6080| 真实男女啪啪啪动态图| eeuss影院久久| xxxwww97欧美| 欧美一区二区精品小视频在线| 十八禁人妻一区二区| 99久久九九国产精品国产免费| 露出奶头的视频| 天堂网av新在线| 日韩欧美一区二区三区在线观看| 色av中文字幕| 欧美bdsm另类| 亚洲av电影不卡..在线观看| 精华霜和精华液先用哪个| 中文字幕精品亚洲无线码一区| 国产一级毛片七仙女欲春2| 午夜福利在线观看吧| 欧美激情久久久久久爽电影| 观看美女的网站| 99久久99久久久精品蜜桃| 国产av不卡久久| 日韩欧美国产在线观看| 91麻豆精品激情在线观看国产| 欧美另类亚洲清纯唯美| 精华霜和精华液先用哪个| 欧美色欧美亚洲另类二区| 国产爱豆传媒在线观看| 精品人妻熟女av久视频| 日韩免费av在线播放| 国产精华一区二区三区| 成年女人看的毛片在线观看| 午夜免费激情av| 国产黄片美女视频| av视频在线观看入口| 午夜视频国产福利| 90打野战视频偷拍视频| 9191精品国产免费久久| 麻豆国产97在线/欧美| 真实男女啪啪啪动态图| 亚洲精品色激情综合| 高清在线国产一区| 高清日韩中文字幕在线| 国产色爽女视频免费观看| 婷婷六月久久综合丁香| 高清在线国产一区| 91麻豆精品激情在线观看国产| 亚洲国产精品久久男人天堂| 日本 av在线| 亚洲av电影不卡..在线观看| 久久精品夜夜夜夜夜久久蜜豆| 国产v大片淫在线免费观看| 亚洲乱码一区二区免费版| 99热6这里只有精品| 中文字幕av成人在线电影| 亚洲av免费高清在线观看| 亚洲成人免费电影在线观看| 国产亚洲精品久久久com| av福利片在线观看| 高清毛片免费观看视频网站| 亚洲第一区二区三区不卡| 俺也久久电影网| 女同久久另类99精品国产91| 桃红色精品国产亚洲av| 午夜福利在线观看免费完整高清在 | 极品教师在线视频| 国产不卡一卡二| 精品日产1卡2卡| 亚洲国产精品999在线| 欧美色欧美亚洲另类二区| 久久久久亚洲av毛片大全| 99热6这里只有精品| 日韩精品青青久久久久久| 亚洲人成电影免费在线| 日韩欧美国产一区二区入口| 桃色一区二区三区在线观看| 国产真实伦视频高清在线观看 | 久久久久久久久久成人| 亚洲av熟女| 少妇熟女aⅴ在线视频| 狠狠狠狠99中文字幕| 亚洲av中文字字幕乱码综合| 国产主播在线观看一区二区| 中文字幕精品亚洲无线码一区| 在线观看免费视频日本深夜| 床上黄色一级片| 精品午夜福利视频在线观看一区| 悠悠久久av| 一个人观看的视频www高清免费观看| 真人做人爱边吃奶动态| 亚洲av.av天堂| 久久精品国产99精品国产亚洲性色| 色哟哟哟哟哟哟| 91久久精品国产一区二区成人| 国产av麻豆久久久久久久| 亚洲综合色惰| 国产麻豆成人av免费视频| 久久国产精品影院| 极品教师在线免费播放| 国产综合懂色| 久久国产乱子免费精品| 亚洲人成电影免费在线| av天堂中文字幕网| 超碰av人人做人人爽久久| 免费在线观看日本一区| 国产精品久久久久久精品电影| 亚洲精品乱码久久久v下载方式| 国产不卡一卡二| 亚洲精品乱码久久久v下载方式| 国产精品av视频在线免费观看| 国内久久婷婷六月综合欲色啪| 香蕉av资源在线| 国产高清三级在线| 国产一区二区激情短视频| 国产伦精品一区二区三区四那| 丰满乱子伦码专区| 亚洲一区二区三区不卡视频| 99国产精品一区二区蜜桃av| 在线观看免费视频日本深夜| 毛片一级片免费看久久久久 | 久久精品人妻少妇| www.999成人在线观看| av天堂中文字幕网| 一级毛片久久久久久久久女| 中文字幕人妻熟人妻熟丝袜美| 亚洲美女黄片视频| 成人av在线播放网站| 亚洲经典国产精华液单 | 欧美绝顶高潮抽搐喷水| 亚洲av日韩精品久久久久久密| 亚洲在线观看片| 男女做爰动态图高潮gif福利片| 国产精华一区二区三区| 国产伦在线观看视频一区| 色哟哟·www| 99热这里只有精品一区| 精品人妻视频免费看| 国内精品久久久久久久电影| 国产午夜福利久久久久久| 欧美激情在线99| 国产亚洲精品综合一区在线观看| 五月玫瑰六月丁香| 国内久久婷婷六月综合欲色啪| 国产野战对白在线观看| 麻豆成人午夜福利视频| 在线观看66精品国产| 欧美zozozo另类| 好看av亚洲va欧美ⅴa在| 亚洲av成人av| 麻豆一二三区av精品| 极品教师在线免费播放| 成年版毛片免费区| 在现免费观看毛片| 午夜福利在线在线| 成人亚洲精品av一区二区| 亚洲av.av天堂| 午夜精品一区二区三区免费看| 丰满乱子伦码专区| 欧美精品啪啪一区二区三区| 嫁个100分男人电影在线观看| 我的老师免费观看完整版| 51国产日韩欧美| 成人三级黄色视频| 丰满人妻熟妇乱又伦精品不卡| 五月玫瑰六月丁香| 欧美日本视频| 嫩草影院入口| 国产高潮美女av| 国产亚洲欧美98| 精品国产三级普通话版| 亚洲在线观看片| or卡值多少钱| 欧美不卡视频在线免费观看| 男人的好看免费观看在线视频| 12—13女人毛片做爰片一| 亚洲成a人片在线一区二区| 男人舔女人下体高潮全视频| 成人美女网站在线观看视频| 亚洲最大成人av| 亚洲最大成人中文| 久久性视频一级片| 久久久久亚洲av毛片大全| 精品日产1卡2卡| 美女黄网站色视频| 亚洲午夜理论影院| 亚洲精华国产精华精| 国产免费一级a男人的天堂| 免费在线观看亚洲国产| 国内揄拍国产精品人妻在线| 高潮久久久久久久久久久不卡| 90打野战视频偷拍视频| 看十八女毛片水多多多| 亚洲国产色片| 亚洲欧美日韩无卡精品| 女同久久另类99精品国产91| 日本精品一区二区三区蜜桃| 日韩欧美国产在线观看| 草草在线视频免费看| 国产成人啪精品午夜网站| 久久亚洲精品不卡| 精品99又大又爽又粗少妇毛片 | 久久这里只有精品中国| 久久草成人影院| 美女大奶头视频| 欧美3d第一页| 美女大奶头视频| 欧美成人免费av一区二区三区| 亚洲精品成人久久久久久| 免费看日本二区| 无遮挡黄片免费观看| 欧美黄色淫秽网站| 成人永久免费在线观看视频| 日本与韩国留学比较| 亚洲一区高清亚洲精品| 日韩中字成人| 91麻豆av在线| 久久这里只有精品中国| 尤物成人国产欧美一区二区三区| 草草在线视频免费看| 日韩欧美国产在线观看| 在线免费观看的www视频| 十八禁国产超污无遮挡网站| www.999成人在线观看| 又黄又爽又刺激的免费视频.| 亚洲av美国av| 高潮久久久久久久久久久不卡| 日韩欧美三级三区| 国产 一区 欧美 日韩| 国产免费av片在线观看野外av| 精品99又大又爽又粗少妇毛片 | 2021天堂中文幕一二区在线观| 久久久久性生活片| 人人妻人人澡欧美一区二区| 夜夜夜夜夜久久久久| 日本与韩国留学比较| 国产精品亚洲av一区麻豆| 少妇人妻一区二区三区视频| 蜜桃亚洲精品一区二区三区| 中文字幕人成人乱码亚洲影| 如何舔出高潮| 日本 av在线| 99久久成人亚洲精品观看| 91麻豆精品激情在线观看国产| 国产色爽女视频免费观看| 国产精品一区二区三区四区久久| 国产探花在线观看一区二区| 久久精品综合一区二区三区| 中文字幕av在线有码专区| 露出奶头的视频| 国产伦在线观看视频一区| 一区二区三区四区激情视频 | 国产精品av视频在线免费观看| 麻豆国产av国片精品| 亚洲人成网站高清观看| 麻豆国产97在线/欧美| 国产伦一二天堂av在线观看| 91在线精品国自产拍蜜月| 小蜜桃在线观看免费完整版高清| 露出奶头的视频| 亚洲,欧美,日韩| 亚洲国产精品成人综合色| 国产黄片美女视频| 久久久久国内视频| 亚洲成人久久性| 久久99热6这里只有精品| 日韩中字成人| 久久精品国产亚洲av天美| 天堂动漫精品| 日韩欧美在线乱码| 噜噜噜噜噜久久久久久91| a级一级毛片免费在线观看| 亚洲性夜色夜夜综合| 天堂av国产一区二区熟女人妻| 极品教师在线免费播放| 午夜视频国产福利| 九九热线精品视视频播放| 午夜日韩欧美国产| 天美传媒精品一区二区| 国产伦一二天堂av在线观看| 亚洲美女视频黄频| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 婷婷精品国产亚洲av| 亚洲欧美日韩卡通动漫| 99国产精品一区二区三区| 国内毛片毛片毛片毛片毛片| 欧美乱色亚洲激情| 久久天躁狠狠躁夜夜2o2o| 夜夜看夜夜爽夜夜摸| 桃红色精品国产亚洲av| 国产亚洲精品久久久久久毛片| 乱人视频在线观看| 免费人成在线观看视频色| 亚洲无线在线观看| 在线国产一区二区在线| 亚洲欧美日韩卡通动漫| 午夜两性在线视频| 国产欧美日韩一区二区精品| 好男人电影高清在线观看| 免费在线观看亚洲国产| av在线观看视频网站免费| 韩国av一区二区三区四区| a级毛片免费高清观看在线播放| 亚洲无线观看免费| 久久久久久久精品吃奶| 女同久久另类99精品国产91| 男插女下体视频免费在线播放| 色哟哟哟哟哟哟| xxxwww97欧美| 欧美又色又爽又黄视频| 成人性生交大片免费视频hd| 亚洲精品一区av在线观看| 色av中文字幕| 精品乱码久久久久久99久播| 亚洲人成网站高清观看| 亚洲熟妇中文字幕五十中出| 高潮久久久久久久久久久不卡| 亚洲av日韩精品久久久久久密| 色综合婷婷激情| 日本免费a在线| 日本熟妇午夜| a在线观看视频网站| 亚洲中文字幕一区二区三区有码在线看| 一进一出抽搐动态| 亚洲精品日韩av片在线观看| 观看免费一级毛片| av在线天堂中文字幕| 免费无遮挡裸体视频| 午夜精品久久久久久毛片777| 精华霜和精华液先用哪个|