• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A novel method for identifying influential nodes in complex networks based on gravity model

    2022-05-16 07:12:34YuanJiang蔣沅SongQingYang楊松青YuWeiYan嚴玉為TianChiTong童天馳andJiYangDai代冀陽
    Chinese Physics B 2022年5期

    Yuan Jiang(蔣沅) Song-Qing Yang(楊松青) Yu-Wei Yan(嚴玉為)Tian-Chi Tong(童天馳) and Ji-Yang Dai(代冀陽)

    1School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China

    2School of Automation,Nanjing University of Technology,Nanjing 210094,China

    Keywords: influential nodes,gravity model,structural hole,K-shell

    1. Introduction

    With the rapid development of network information technology, studies on complex networks has attracted attention in many fields.[1–4]As one of the core elements of a complex network, influential nodes have a significant impact on the structure and function of the network and are widely studied and applied, such as inhibiting disease spreading,[5]rumor controlling,[6]information dissemination,[7]and traffic network analysis.[8]

    In different research backgrounds, scientists have proposed many measures to identify the influence of nodes. At present, degree centrality[9]is the commonly used measure,which is simple but not accurate. Betweenness centrality[10]and closeness centrality[11]are based on the number of shortest paths between nodes and the average shortest distance respectively, however, the information flow does not always transmit through the shortest path and its time complexity is high. Brockmanet al.[12]proposed a probabilistically motivated effective distance to replace the shortest distance,which can effectively mine the dynamic interaction information between nodes. Kitsaket al.[13]proposed the K-shell decomposition method to determine the locations of nodes in the network, which has low time complexity, however its discrimination is too coarse. To improve the discrimination, Zenget al.[14]proposed a mixed degree decomposition method,which decomposes K-shell based on the mixing degree of the remaining neighbors and the deleted neighbors in the network.Bae and Kimet al.[15]introduced the concept of neighborhood coreness in their improvement of the K-shell method,using the sum of K-shell values of nodes and their neighbors to identify the influence of nodes in the network. Wanget al.[16]proposed a vector centrality method based on the number of multi-order neighbor shells,using the form of vectors to represent the relative influence of nodes in a network. Burtet al.[17]proposed the theory of structural holes and designed the network constraint index to quantify the constraints that nodes are subjected to when they form structural holes,which can identify the bridging nodes in a network. Suet al.[18]proposed a method based on the structural holes of nodes and their neighbors,which considers both the degree centrality and topology of nodes and their neighbors and can effectively identify influential nodes in a network. Yanget al.[19]quantified the complexity of the network based on Tsallis entropy and combined the structural holes and global location information of nodes to identify influential nodes in the network.

    Gravity model is derived from Newton’s law of gravitation, which can represent the interaction between nodes in a complex network. If a node has more interaction with others, the node should be more influential. Based on gravity model, Liet al.[20]considered both neighborhood information and path information to identify influential nodes. Maet al.[21]proposed a gravity model that regards the K-shell value of each node as its mass. Yanet al.[22]proposed a method to identify influential spreaders based on entropy weight method and gravity law.

    Based on the above research works, we propose a novel method for identifying influential nodes in complex networks based on gravity model, called EGMS. The EGMS method considers both the local topology and the global location of nodes in a network. In the EGMS method, the K-shell centrality is used to reflect the global location of nodes and the structure hole characteristics are used to represent the local topology of nodes. At the same time, to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network, the shortest distance is replaced by a probabilistically motivated effective distance.Then this method fully considers the influence of nodes and their neighbors from the aspect of gravity. By using the monotonicity index, susceptible-infected-recovered (SIR) model,and Kendall’s tau coefficient as evaluation criteria, we compare the proposed method with seven existing identification methods on eight real-world networks. The experimental results show the excellent performance of the proposed method and the relationship between different methods.

    The structure of this paper is as follows. In Section 2,we briefly introduce several existing identification methods and the concept of effective distance. In Section 3,a novel method for identifying influential nodes in complex networks based on gravity model is then proposed and presented.In Section 4,the details and results of experiments are then presented. Finally,conclusions will be given in Section 5.

    2. Preliminaries

    Given a complex networkG=(V,E),whereVandErepresent the set of nodes and edges inGrespectively.nandmare the number of nodes and edges. The adjacency matrix of networkGis denoted asAn×n=(ai j)n×n, whereai j=1 if there is a connective relationship between nodeviand nodevj,andai j=0 otherwise.

    2.1. Degree centrality

    Degree centrality[9](DC)is a simple measure for identifying influential nodes. The more DC a node possesses, the more influential it is. It is defined as follows:

    wherekiis the degree of nodevi. Hence nodevi’s degree of next-nearest neighbors isQ(i)=∑ω∈Γ(i)kω,whereΓ(i)is the set ofvi’s nearest neighbors.

    2.2. Betweenness centrality

    Betweenness centrality[10](BC)focuses on the degree of clustering of the shortest path through a node. It is defined as follows:

    2.3. Closeness centrality

    Closeness centrality[11](CC)is defined as the reciprocal of the sum of the shortest distances between a node and all other nodes in the network. It is expressed as follows:

    wheredijdenotes the shortest distance between nodesviandvj.

    2.4. Mixed degree decomposition method

    whereλis an adjustable parameter in range[0, 1], the MDD is consistent with the K-shell decomposition method ifλ=0,and it is equivalent to degree centrality ifλ=1. In this paper,we set the parameterλ=0.7 consistent with Ref.[11].

    2.5. Structural holes theory

    Structural hole theory was put forward by Burt in 1992 when he studied the competitive relationship in social networks.[17]In social networks,structural holes refer to nonredundant relationships between individuals,and there is a gap in complementary information. In order to quantify the control of the structural hole nodes on these relationships, Burt uses the network constraint index (NC) to measure the constraints formed by the nodes in the structural hole. The node is more likely to form structural holes if the index is smaller,and the influence of the node is greater. The network constraint index of nodeviis defined as follows:

    When calculating the network constraint index of nodevi,considering the degree of the node and its neighbors,as well as the topological structure of the node, the weight ratioLijcan be defined as follows:

    2.6. Gravity model

    Gravity model[20](GM) is inspired by Newton’s law of gravity,and it identifies influential nodes by considering both degree centrality and the shortest distance,which is defined as follows:

    2.7. Effective distance

    Effective distance[12](Edis)was proposed by Brockmann and Helbing in 2013 when studying the impact of complex networkdriven on the spreading process of epidemic diseases.Unlike conventional geographic distance and the shortest path distance,effective distance is a probabilistically motivated abstract distance. In the network where information flow is the interaction,it can effectively measure the mutual influence between nodes. The effective lengthdj|ifrom nodevito a directly connected nodevjis defined as follows:

    wherePj|idenotes the ratio of information flow from nodevito nodevj,which can be calculated as follows:

    wherekidenotes the degree of nodeviin the undirected network and the out-degree of nodeviin the directed network,ai jis the element in the adjacency matrixAn×n. For indirectly connected nodeviand nodevj,the effective length between them will be transmitted along the shortest path,e.g.,dj|i=dk|i+dj|klike form.

    The effective distance is defined by the shortest one of all effective lengths from nodevito nodevj, which is expressed as follows:

    whereλ(Γ) andΓdenote the set of all effective lengths and the sum of all the probably paths from nodevito nodevjrespectively. Usually,in the real-world networks,thedj|i/=di|jandDj|i/=Di|j.

    3. Proposed method

    3.1. The EGMS method

    Based on the gravity model, a novel method is proposed for identifying influential nodes in terms of the local topology and the global location,called EGMS.The EGMS method comprehensively examines the structural hole characteristics and K-shell centrality of nodes,replaces the shortest distance with a probabilistically motivated effective distance,and fully considers the influence of nodes and their neighbors from the aspect of gravity. A flowchart of the proposed method is shown in Fig.1,and the further details are as follows:

    Step 1 Calculating the joint K-shell centrality of node pairs

    K-shell centrality is a global measure describing the location of a node in a network,it can reflect both the relationship between each node and the whole network as well as the interaction between distinct nodes. In this paper, the K-shell centrality of each node is obtained by the MDD method mentioned in Subsection 2.4, and the joint K-shell centrality of node pairs can be obtained as follows:

    Step 2 Calculating the joint network constraint index of node pairs

    The network constraint index in structural hole theory is an identification metric based on local topological information of the network,it can be calculate by Eqs.(5)–(7),and the joint network constraint index between nodeviand nodevjcan be calculated as follows:

    Step 3 Calculating the effective distance between all node pairs

    In our proposed EGMS method, the shortest distance is replaced by the probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. The effective distance from one node to another node can be obtained using Eqs.(9)–(11).

    Step 4 Calculating the combined forces of nodes

    By comprehensively considering the K-shell centrality,network constraints and effective distances, the interaction forces between node pairs can be obtained. Thus, the combined force of nodeviis defined as follows:

    Step 5 Getting the final influence of nodes

    Bae and Kim[15]introduced the concept of neighborhood coreness (Cnc+) in improving the K-shell method, which measures the influence of nodes in a network by summing the K-shell values of their neighbors. In this paper, we borrow this concept and fully consider the influence of nodes’neighbors from the aspect of gravity. Based on the above,the final influence of nodevican be calculated as follows:

    Fig.1. The flow chart of our proposed EGMS method.

    3.2. A simpe example

    To better illustrate how the EGMS method works and to initially assess its validity and accuracy,a simple example network with 10 nodes and 14 edges is given in Fig.2,and some properties of each node in the example network are shown in Table 1.

    Fig.2. A simple example network with 10 nodes and 14 edges. Nodes with larger degrees have darker colors.

    Firstly, we calculate the joint K-shell centrality of node pairs by Eq. (12) and the joint network constraint index of node pairs by Eq. (13) respectively. The joint K-shell centrality and the joint network constraint index between nodev4and nodev9can be obtained as follows:

    Secondly, by using Eqs. (9)–(11), the effective distance between nodev4and nodev9can be obtained as follows:

    The above results clearly show thatD4|9andD9|4are not equal, as mentioned in Subsection 2.7. The results of the effective distance from nodev4to the others are shown in Table 2.

    Table 1. Properties of each node in the example network,including DC,MDD,and NC.

    Table 2. Effective distance from node v4 to the others in the example network.

    Table 3. The combined forces of nodes in the example network.

    Table 4. The final influence of nodes in the example network.

    Then,the combined force of nodev4can be obtained by Eq.(14)as follows:

    The final influence of nodes are shown in Table 4.

    According to Table 1 and Table 4, the ranking lists of nodes in the example network measured by different methods are shown in Table 5. As shown in Table 5, the ranking lists of nodes measured by the EGMS method is is similar to other methods, indicating that the EGMS method can effectively identify the influence of nodes. Compared with DC and MDD,the influence of nodev7and nodev8is further discriminated in the EGMS method. And compared with NC,nodev2and nodev6are re-ranked in the EGMS method by considering the influence of their neighbors. Based on the above, the validity and accuracy of EGMS method is initially verified.

    Table 5. The ranking lists of nodes in the example network measured by different methods.

    4. Experimental analysis

    4.1. Dataset

    In this section, eight real-world networks from different fields are chosen for experiments, including the Dolphins,[23]Polbooks,[24]Jazz,[25]USAir,[26]NetScience,[27]C.Elegans,[28]Email,[29]PowerGrid.[30]The statistical characteristics of eight real-world networks are shown in Table 6. The table includes information on the number of nodesn, the number of edgesm, the average degree〈k〉,the clustering coefficientc,the average shortest path length〈d〉, the epidemic thresholdβthin SIR model, and the fixed infection probabilityβ.

    Table 6. Statistical characteristics of eight real-world networks.

    4.2. Comparison methods

    To verify the validity and accuracy of our proposed EGMS method, seven methods are used as comparisons,including degree centrality (DC),[9]betweenness centrality(BC),[10]closeness centrality (CC),[11]mixed degree decomposition method (MDD),[14]network constraint index(NC),[18]neighborhood coreness (Cnc+),[15]and gravity model(GM).[20]

    4.3. Evaluation criteria

    To evaluate the performance of difference methods, several evaluation criteria are presented in this section,including monotonicity index,[15]susceptible–infected–recovered(SIR)model,[31]and Kendall’s tau coefficient.[32]

    The monotonicity indexM(R)is used to quantify the resolution of different identification methods,which is defined as follows:

    whereRis the influence ranking vector of each node obtained by the influence identification method,nis the total number of nodes,andnris the number of nodes with the same influence.The value ofM(R)in range[0,1],which will be higher if the identification method can better distinguish the influence of all nodes in the network.

    The SIR model[31]is used to examine the spreading ability of nodes. In this model, each node in the network can be in one of the following three states: susceptible, infected, or recovered. In the initial stage of spreading,only one infected node in the network, and all other nodes are susceptible. In each timestamp, each one infected node to infect its susceptible neighbors with the infection probabilityβ. At the same time,the infected node recovers with probabilityμ. This process is repeated until there are no susceptible nodes in the network. At the end of SIR spreading process, the number of recovered nodes is regarded as the spreading ability of nodes.For simplicity, the value of the recovery probability is set toμ=1. The spreading process cannot be carried out normally if the infection probabilityβis too small or too large, do the spreading ability of each node cannot be measured accurately.Therefore, we set the epidemic threshold isβth≈〈k〉/〈k2〉,where〈k〉and〈k2〉denote the average degree and average second-order degree of the nodes respectively. The value ofβis set nearβth. As show in Table 6,theβthandβfor different networks are given.

    In order to evaluate the accuracy of the identification method, Kendall’s tau coefficient[32]is used to measure the correlation between the ranking list of nodes’ influence obtained by each identification method and the ranking list of nodes’ spreading ability obtained from the SIR model. Suppose there are two sequencesXandYcontainingnnodes,whereX=(x1,x2,...,xn)andY=(y1,y2,...,yn),and the elements in sequenceXand sequenceYare constructed into a new sequenceXY=((x1,y1),...,(xi,yi),...,(xn,yn)). For any pair of elementsXYi=(xi,yi)andXYj=(xj,yj)in the sequenceXY,if(xi >xjandxi >yj)or(xi <xjandxi <yj),the pair is considered to be concordant.On the contrary,if(xi >xjandxi <yj)or(xi <xjandxi >yj),this pair is considered to be discordant. If (xi=xjandxi=yj), it is considered that the pair is neither concordant nor discordant. Kendall’s tau coefficientτis defined as wherencandndare the numbers of concordant pairs and discordant pairs respectively.The value ofτin range[-1,1].The two sequences are completely positively correlated ifτ=1,that is to say, the closer the value ofτis to 1, the higher the accuracy. On the contrary, the two sequences are completely negatively correlated.

    4.4. Experiments

    4.4.1. Examining the resolution of different identification methods

    In this experiment, the monotonicity index[13]Mis used to examine the resolution of the seven identification methods and our proposed EGMS method,i.e.,the ability to distinguish the influence of nodes. Table 7 records the resolution of the different methods in eight real-world networks, and figure 3 shows the difference more intuitively. As shown in Fig.3,the EGMS method performs very well in the eight networks. In addition, the resolution of CC and GM is also good. Compared with others, the EGMS method gives a higherMvalue in most cases, and the value ofM(EGMS) is very close to or even equal to 1 in all cases. Therefore,the EGMS method performs excellent in distinguish the influence of nodes.

    Fig. 3. The monotonicity index M of eight identification methods in eight real-world networks.

    Table 7. The monotonicity index M of different identification methods.

    4.4.2. The comparisons of different identification methods and SIR model

    In this experiment, the SIR model is used to obtain the spreading ability of nodes and Kendall’s tau coefficient is used to quantify the correlation between the spreading ability and influence of nodes in the networks. The stronger the correlation,the more accurate the identification method is.Due to the randomness of the spreading process of the SIR model,this experiment repeats the spreading process for each node and then takes the average value. For networks|V|<100, the independent experiment is executed 104times; for|V|<103, the independent experiment is executed 103times. Table 8 shows Kendall’s tau coefficient between different identification methods and the SIR model with the fixed infection probability in eight real-world networks, whereσdenotes the ranking lists of the spreading ability of nodes in the networks. The values of the fixed infection probability are shown in Table 6.

    In order to further verify the accuracy and reliability of the proposed method,a series of Kendall’s tau coefficients between different identification methods and SIR model can be obtained by changing the infection probabilityβ. The results are shown in Fig. 4, where the black dashed line denotes the epidemic thresholdβth. From which we can see, the EGMS method outperforms all the methods when the infection probabilityβtakes values near the epidemic thresholdβth. This indicates that the influence of nodes identified by the EGMS method has a significant correlation with the spreading ability of nodes. When the infection probability is far greater than or far less than the epidemic threshold,DC,MDD and GM show better correlation than EGMS in six networks except USAir and PowerGrid. In addition, Cnc+ performed slightly worse than EGMS in most networks and BC performed worst in all cases.According to the above analysis,the EGMS method can identify the influence of nodes more accurately and reliably.

    Table 8. Kendall’s tau coefficient between different identification methods and SIR model with the fixed infection probability.

    4.4.3. Kendall’s τ coefficient for different identification methods to varying scales of topranking nodes

    In this experiment, the scale of nodes examined by Kendall’s tau coefficient is adjusted, which is changed from whole nodes to partial nodes. The correlation results between the top nodes in different scales obtained by different identification methods and the ranking list of the spreading ability of nodes are further studied. The scale of topranking nodes is denotes asL,which is set to 0.05–1.Figure 5 shows the values of Kendall’s tau coefficient for different identification methods to varying scales of topranking nodes nodes. As shown in Fig.5,the EGMS method performs well at various scales of topranking nodes and performs better than all other methods at higher values ofL.

    4.4.4. The relationship between EGMS and other identification methods

    In the final experiment, the relationship between the EGMS method and other identification methods is analyzed.The results are shown in Fig. 6, where each point denotes one node in the network, the color of each point denotes the spreading ability derived by the SIR model,and the horizontal and vertical axes are denote the values of nodes’influence in the network obtained by the EGMS method and other methods respectively. The EGMS method has a strong correlation with one method if the nodes in the figure are linearly distributed.As shown in the distribution of the nodes in Fig. 6, strong correlations are found between EGMS and DC, CC, MMD,and NC, respectively. This indicates that the EGMS method not only takes into account the degree centrality, location information and the closeness between nodes sufficiently, but also has the ability to identify bridging nodes in the network.Moreover,the apparent linear relationship between EGMS and Cnc+and GM indicates that the node rankings are overall similar, and it also demonstrates that EGMS can identify the influence of nodes effectively. From Fig.6,it can also find that some nodes have large values of BC,but their spreading ability is not very strong, so it is not accurate enough to identify the influence of nodes by BC alone.Therefore,the EGMS method is more advantageous than other methods in identifying the influence of nodes in the network.

    Fig.5. Kendall’s τ coefficient for different identification methods to varying scales of top-ranking nodes: (a)Dolphins;(b)Polbooks;(c)Jazz;(d)USAir;(e)NetScience;(f)C.Elegans;(g)Email;(h)PowerGrid.

    Fig. 6. The relationship between EGMS and other identification methods: (a1)–(a7) Dolphins, β =0.15; (b1)–(b7) Polbooks, β =0.1; (c1)–(c7)Jazz,β =0.04;(d1)–(d7)USAir,β =0.03.

    5. Conclusions and discussion

    In this paper,we proposed a novel method for identifying influential nodes in complex networks based on gravity model,called EGMS. For the shortcoming that the existing methods concentrate only on only one aspect,the EGMS method considers both the local topology and the global location information,comprehensively examines the structural hole characteristics and K-shell centrality of nodes At the same time,the shortest distance is replaced by a probabilistically motivated effective distance to simplify the spatiotemporal complexity of a network and mine the implicit dynamic information in a network. Then the EGMS method fully considers the influence of nodes and their neighbors from the aspect of gravity to optimize the utilization of available resources. In addition,the EGMS method also has the ability to identify bridging nodes in the network. From the experimental results, the EGMS method can better distinguish differences in the influence of nodes than other identification methods. Further, the EGMS method performs excellent in identifying influential nodes at various scales of topranking nodes. Finding a more effective method combining network topology and propagation dynamics to identify influential nodes in the network is still an open issue. How to improve our proposed EGMS method to reduce its time complexity is our future work.

    Acknowledgment

    Project supported by the National Natural Science Foundation of China(Grant Nos.61663030 and 61663032).

    香蕉国产在线看| 国产精品久久久久久人妻精品电影| 免费av毛片视频| 巨乳人妻的诱惑在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 神马国产精品三级电影在线观看 | 床上黄色一级片| 九九热线精品视视频播放| 国产一区二区激情短视频| 欧美一区二区国产精品久久精品 | e午夜精品久久久久久久| 日本撒尿小便嘘嘘汇集6| 久久精品国产99精品国产亚洲性色| 91麻豆av在线| 欧美极品一区二区三区四区| 亚洲av成人精品一区久久| 夜夜躁狠狠躁天天躁| 亚洲午夜理论影院| 欧美不卡视频在线免费观看 | 欧美乱妇无乱码| 91国产中文字幕| 亚洲欧美激情综合另类| 亚洲天堂国产精品一区在线| 99精品在免费线老司机午夜| 一级毛片女人18水好多| 中文字幕高清在线视频| 亚洲国产日韩欧美精品在线观看 | 国产av又大| 国产成人av教育| 欧美一级毛片孕妇| 日韩欧美国产在线观看| 亚洲人成网站高清观看| 99久久99久久久精品蜜桃| 在线十欧美十亚洲十日本专区| 777久久人妻少妇嫩草av网站| 国产精品国产高清国产av| 久久精品91蜜桃| 人人妻人人澡欧美一区二区| 色噜噜av男人的天堂激情| 欧美午夜高清在线| 一进一出好大好爽视频| 88av欧美| 我要搜黄色片| 亚洲成人国产一区在线观看| av欧美777| 黄色视频不卡| 免费观看人在逋| 18美女黄网站色大片免费观看| 在线观看日韩欧美| 成人亚洲精品av一区二区| 观看免费一级毛片| 国产成人精品久久二区二区免费| 色老头精品视频在线观看| 999精品在线视频| 日韩成人在线观看一区二区三区| 久久这里只有精品中国| 亚洲精品美女久久av网站| 免费观看人在逋| 一本一本综合久久| 国产v大片淫在线免费观看| 窝窝影院91人妻| 曰老女人黄片| 999久久久国产精品视频| 五月伊人婷婷丁香| 亚洲av成人av| 香蕉丝袜av| 99riav亚洲国产免费| 久久午夜亚洲精品久久| 精品午夜福利视频在线观看一区| 日本一本二区三区精品| 好看av亚洲va欧美ⅴa在| 欧美成人午夜精品| 巨乳人妻的诱惑在线观看| 淫秽高清视频在线观看| 日韩高清综合在线| 午夜福利成人在线免费观看| 精品高清国产在线一区| 日本成人三级电影网站| 欧美日本亚洲视频在线播放| 国产精品一及| 国产成人精品久久二区二区91| 免费在线观看成人毛片| 亚洲av成人精品一区久久| 婷婷亚洲欧美| av中文乱码字幕在线| 深夜精品福利| 国产亚洲精品久久久久5区| tocl精华| 亚洲国产中文字幕在线视频| 国产成人精品久久二区二区免费| 亚洲人成网站在线播放欧美日韩| av中文乱码字幕在线| 国产精品免费一区二区三区在线| 香蕉丝袜av| 精品高清国产在线一区| 岛国在线观看网站| 神马国产精品三级电影在线观看 | 一卡2卡三卡四卡精品乱码亚洲| 国产精品电影一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 日本免费一区二区三区高清不卡| 亚洲国产看品久久| 国产av不卡久久| 国模一区二区三区四区视频 | 成年免费大片在线观看| 丰满人妻熟妇乱又伦精品不卡| 国产熟女xx| 中文亚洲av片在线观看爽| 日韩成人在线观看一区二区三区| 亚洲av成人av| 夜夜爽天天搞| 欧美丝袜亚洲另类 | 国产黄色小视频在线观看| 毛片女人毛片| 午夜成年电影在线免费观看| 国产精品亚洲美女久久久| ponron亚洲| 香蕉av资源在线| 国产黄色小视频在线观看| 国产成人aa在线观看| 99热这里只有精品一区 | 国产激情久久老熟女| 一区二区三区国产精品乱码| 精品不卡国产一区二区三区| 亚洲欧美日韩无卡精品| 亚洲中文av在线| 黄片大片在线免费观看| 人妻久久中文字幕网| 日韩欧美在线乱码| 999精品在线视频| 国产精品香港三级国产av潘金莲| 久久香蕉国产精品| 十八禁人妻一区二区| 亚洲第一欧美日韩一区二区三区| 黄色毛片三级朝国网站| 一边摸一边做爽爽视频免费| www日本黄色视频网| 亚洲人成77777在线视频| 久久性视频一级片| 欧美国产日韩亚洲一区| 欧美乱码精品一区二区三区| 精品国产亚洲在线| www日本黄色视频网| 成在线人永久免费视频| 久久九九热精品免费| 日韩欧美在线二视频| 又黄又粗又硬又大视频| 999精品在线视频| 两个人免费观看高清视频| 免费看美女性在线毛片视频| 国产成人影院久久av| 成人三级做爰电影| 搡老熟女国产l中国老女人| 国产爱豆传媒在线观看 | 亚洲aⅴ乱码一区二区在线播放 | 国产精品综合久久久久久久免费| 国产不卡一卡二| 最近视频中文字幕2019在线8| 后天国语完整版免费观看| 日本在线视频免费播放| 无限看片的www在线观看| 亚洲专区中文字幕在线| 午夜免费观看网址| 日本a在线网址| 成年免费大片在线观看| 一级毛片高清免费大全| 夜夜看夜夜爽夜夜摸| 国产蜜桃级精品一区二区三区| 国产高清有码在线观看视频 | 国产成+人综合+亚洲专区| 12—13女人毛片做爰片一| 美女高潮喷水抽搐中文字幕| 久久精品91无色码中文字幕| 精品久久蜜臀av无| 中文字幕av在线有码专区| 每晚都被弄得嗷嗷叫到高潮| 免费在线观看完整版高清| 这个男人来自地球电影免费观看| 色尼玛亚洲综合影院| 欧美不卡视频在线免费观看 | 99精品久久久久人妻精品| 久久午夜综合久久蜜桃| 精品福利观看| 欧美日本亚洲视频在线播放| 九九热线精品视视频播放| 欧美人与性动交α欧美精品济南到| 国产av一区在线观看免费| 亚洲一区中文字幕在线| 久久国产乱子伦精品免费另类| 琪琪午夜伦伦电影理论片6080| 成人手机av| 国产人伦9x9x在线观看| www日本在线高清视频| 日本在线视频免费播放| 日本三级黄在线观看| 韩国av一区二区三区四区| 亚洲专区中文字幕在线| 国产av不卡久久| 1024手机看黄色片| 午夜精品一区二区三区免费看| 国产亚洲av高清不卡| 国产精品久久久人人做人人爽| 欧美又色又爽又黄视频| 深夜精品福利| 桃红色精品国产亚洲av| 国产av一区在线观看免费| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲 国产 在线| 亚洲熟妇中文字幕五十中出| 一本久久中文字幕| 国产精品永久免费网站| 亚洲专区国产一区二区| 午夜a级毛片| 欧美成人性av电影在线观看| 欧美3d第一页| 色综合婷婷激情| 一区二区三区高清视频在线| 国产91精品成人一区二区三区| cao死你这个sao货| 欧美日韩亚洲国产一区二区在线观看| 欧美日韩瑟瑟在线播放| 欧美av亚洲av综合av国产av| 免费看美女性在线毛片视频| 国产视频内射| 无限看片的www在线观看| 国产成人系列免费观看| 18禁国产床啪视频网站| 久久久久国内视频| 丰满人妻熟妇乱又伦精品不卡| 一二三四在线观看免费中文在| 久久精品aⅴ一区二区三区四区| 一级片免费观看大全| 亚洲国产精品久久男人天堂| 久热爱精品视频在线9| 久久婷婷人人爽人人干人人爱| 国产精品 国内视频| 久久久久精品国产欧美久久久| 久久香蕉精品热| 亚洲av成人av| 欧美日韩福利视频一区二区| 日韩欧美在线二视频| 久久香蕉精品热| 琪琪午夜伦伦电影理论片6080| 久久久精品国产亚洲av高清涩受| 日日爽夜夜爽网站| 亚洲精品在线观看二区| 听说在线观看完整版免费高清| 老司机午夜十八禁免费视频| 国产亚洲精品av在线| 亚洲免费av在线视频| 精品久久久久久久人妻蜜臀av| 婷婷精品国产亚洲av在线| 一夜夜www| 高清在线国产一区| 国产一级毛片七仙女欲春2| 亚洲熟妇中文字幕五十中出| 久久香蕉激情| 亚洲国产欧美网| 午夜福利欧美成人| 在线观看午夜福利视频| 亚洲在线自拍视频| 国产精品免费视频内射| 国产私拍福利视频在线观看| 日韩高清综合在线| 99热这里只有是精品50| 国内少妇人妻偷人精品xxx网站 | 欧美日韩亚洲综合一区二区三区_| 国产日本99.免费观看| 亚洲欧美日韩东京热| 亚洲成人中文字幕在线播放| 大型av网站在线播放| 精品午夜福利视频在线观看一区| 欧美不卡视频在线免费观看 | 亚洲欧洲精品一区二区精品久久久| 国产亚洲av高清不卡| 精品乱码久久久久久99久播| 国产精品美女特级片免费视频播放器 | 色老头精品视频在线观看| 国产午夜精品论理片| 免费观看精品视频网站| 国产激情久久老熟女| 亚洲免费av在线视频| 国产欧美日韩一区二区精品| 久久久国产成人免费| 久久精品国产综合久久久| 老汉色∧v一级毛片| 国产一区二区在线av高清观看| xxxwww97欧美| 色老头精品视频在线观看| 国产欧美日韩一区二区三| 欧美成狂野欧美在线观看| 99精品在免费线老司机午夜| 国产爱豆传媒在线观看 | 高潮久久久久久久久久久不卡| ponron亚洲| 久久中文字幕一级| www国产在线视频色| 白带黄色成豆腐渣| 18禁国产床啪视频网站| 国产欧美日韩一区二区精品| 日日夜夜操网爽| 午夜免费成人在线视频| 亚洲七黄色美女视频| 人妻久久中文字幕网| 黑人巨大精品欧美一区二区mp4| 亚洲熟妇熟女久久| 久久久久性生活片| 国语自产精品视频在线第100页| 午夜激情av网站| 亚洲国产精品sss在线观看| 88av欧美| 99久久无色码亚洲精品果冻| 国产又黄又爽又无遮挡在线| 黄色 视频免费看| 视频区欧美日本亚洲| 欧美一级毛片孕妇| 亚洲熟女毛片儿| 天堂动漫精品| 很黄的视频免费| 欧美激情久久久久久爽电影| 亚洲激情在线av| 欧美色欧美亚洲另类二区| 久热爱精品视频在线9| 一二三四社区在线视频社区8| 欧美色欧美亚洲另类二区| 国产成人av激情在线播放| 成人av一区二区三区在线看| a级毛片a级免费在线| 97超级碰碰碰精品色视频在线观看| 亚洲va日本ⅴa欧美va伊人久久| 他把我摸到了高潮在线观看| 亚洲成人久久爱视频| 一本大道久久a久久精品| 久久精品国产清高在天天线| 免费在线观看黄色视频的| 怎么达到女性高潮| 婷婷精品国产亚洲av在线| 亚洲av熟女| 国产成人av激情在线播放| 免费看a级黄色片| 中国美女看黄片| 亚洲av成人一区二区三| 男女做爰动态图高潮gif福利片| 亚洲人成电影免费在线| 欧美日韩瑟瑟在线播放| 久久久久久久久久黄片| 国产成人av教育| 国产黄片美女视频| 天堂√8在线中文| 国产精品亚洲av一区麻豆| 在线观看免费视频日本深夜| 丰满人妻一区二区三区视频av | 两性午夜刺激爽爽歪歪视频在线观看 | 国产伦人伦偷精品视频| 亚洲国产精品久久男人天堂| 日本免费一区二区三区高清不卡| 成人午夜高清在线视频| 久久人妻av系列| 久久国产乱子伦精品免费另类| 在线观看午夜福利视频| 亚洲中文日韩欧美视频| 亚洲片人在线观看| 欧美日韩福利视频一区二区| 免费观看精品视频网站| 成人三级黄色视频| 91国产中文字幕| 国产亚洲精品一区二区www| 美女黄网站色视频| 久久久久久亚洲精品国产蜜桃av| 国产精品免费视频内射| av在线天堂中文字幕| 色尼玛亚洲综合影院| 嫩草影视91久久| 男女之事视频高清在线观看| 色综合欧美亚洲国产小说| 三级国产精品欧美在线观看 | а√天堂www在线а√下载| 99精品在免费线老司机午夜| 一区福利在线观看| 99久久国产精品久久久| av免费在线观看网站| 久久久久久大精品| 欧洲精品卡2卡3卡4卡5卡区| ponron亚洲| 亚洲精品中文字幕一二三四区| 中文字幕久久专区| 亚洲国产精品999在线| 两性夫妻黄色片| 国产精品亚洲美女久久久| 1024香蕉在线观看| 亚洲免费av在线视频| 中文亚洲av片在线观看爽| 欧美日韩亚洲综合一区二区三区_| 欧美久久黑人一区二区| 午夜福利18| 亚洲成av人片免费观看| 天天一区二区日本电影三级| 亚洲av美国av| 国产精品亚洲av一区麻豆| 不卡一级毛片| 51午夜福利影视在线观看| 日日爽夜夜爽网站| 亚洲片人在线观看| 国产精品亚洲av一区麻豆| 亚洲成人久久性| 啪啪无遮挡十八禁网站| 国产激情久久老熟女| 欧美日韩黄片免| av视频在线观看入口| 99精品在免费线老司机午夜| 欧美av亚洲av综合av国产av| 麻豆国产av国片精品| 天天一区二区日本电影三级| 久久久久久国产a免费观看| 国内久久婷婷六月综合欲色啪| 成人特级黄色片久久久久久久| 免费看美女性在线毛片视频| 日韩大尺度精品在线看网址| 国产真人三级小视频在线观看| 欧美日韩一级在线毛片| 变态另类成人亚洲欧美熟女| 极品教师在线免费播放| 亚洲欧美日韩高清在线视频| 日本 av在线| 欧美色欧美亚洲另类二区| 妹子高潮喷水视频| 大型av网站在线播放| 午夜日韩欧美国产| 日韩欧美三级三区| 色av中文字幕| 午夜福利在线在线| 精品欧美国产一区二区三| 色老头精品视频在线观看| 亚洲九九香蕉| 窝窝影院91人妻| 免费电影在线观看免费观看| 亚洲免费av在线视频| 老熟妇仑乱视频hdxx| 在线观看免费日韩欧美大片| 成人国产综合亚洲| 成在线人永久免费视频| 精品国内亚洲2022精品成人| 国产一区二区在线观看日韩 | 成人国产综合亚洲| 国产一区二区三区在线臀色熟女| 国产成人av激情在线播放| 婷婷六月久久综合丁香| 免费看日本二区| 此物有八面人人有两片| 亚洲五月婷婷丁香| www日本在线高清视频| 一个人免费在线观看的高清视频| 欧美久久黑人一区二区| 草草在线视频免费看| 夜夜夜夜夜久久久久| 欧美一区二区精品小视频在线| 欧美高清成人免费视频www| 很黄的视频免费| 国产精品综合久久久久久久免费| 午夜免费激情av| 亚洲av五月六月丁香网| 少妇裸体淫交视频免费看高清 | 日本五十路高清| 亚洲成人久久爱视频| 99久久久亚洲精品蜜臀av| 亚洲欧美日韩高清专用| 亚洲中文字幕日韩| 麻豆av在线久日| 欧美 亚洲 国产 日韩一| 99国产综合亚洲精品| 国产探花在线观看一区二区| 99热只有精品国产| 久久伊人香网站| 国产精品影院久久| 一级作爱视频免费观看| 亚洲精品中文字幕在线视频| 男插女下体视频免费在线播放| 国语自产精品视频在线第100页| 18禁美女被吸乳视频| 黑人操中国人逼视频| 久久久久久大精品| 国产激情欧美一区二区| 国产成年人精品一区二区| 中文字幕最新亚洲高清| 少妇被粗大的猛进出69影院| 午夜福利成人在线免费观看| 亚洲国产精品999在线| 中文字幕精品亚洲无线码一区| 一进一出抽搐gif免费好疼| 99riav亚洲国产免费| 变态另类成人亚洲欧美熟女| 一级片免费观看大全| 亚洲午夜精品一区,二区,三区| 一个人免费在线观看电影 | 757午夜福利合集在线观看| 日韩欧美免费精品| 亚洲成av人片在线播放无| 久久精品影院6| 久久精品成人免费网站| 成年版毛片免费区| 69av精品久久久久久| 亚洲欧美日韩东京热| 免费人成视频x8x8入口观看| 亚洲精品一卡2卡三卡4卡5卡| 一个人观看的视频www高清免费观看 | 最近最新免费中文字幕在线| 免费无遮挡裸体视频| 免费搜索国产男女视频| 国产黄片美女视频| 精品久久久久久久末码| 在线a可以看的网站| 国产精品 国内视频| 老熟妇乱子伦视频在线观看| 色播亚洲综合网| 老熟妇乱子伦视频在线观看| 欧美在线一区亚洲| 白带黄色成豆腐渣| av超薄肉色丝袜交足视频| 曰老女人黄片| 久久天躁狠狠躁夜夜2o2o| 老司机在亚洲福利影院| 亚洲黑人精品在线| 欧美日韩瑟瑟在线播放| 日韩av在线大香蕉| 午夜激情av网站| 午夜福利在线观看吧| 黑人巨大精品欧美一区二区mp4| 久久精品成人免费网站| 午夜两性在线视频| 久久性视频一级片| 日韩中文字幕欧美一区二区| 18禁裸乳无遮挡免费网站照片| 国产精品99久久99久久久不卡| 一级片免费观看大全| 久热爱精品视频在线9| 亚洲五月婷婷丁香| 久久精品91蜜桃| 欧美人与性动交α欧美精品济南到| 久久久久久人人人人人| bbb黄色大片| 久久久久亚洲av毛片大全| 桃色一区二区三区在线观看| 亚洲自拍偷在线| 亚洲一区高清亚洲精品| 国产一区在线观看成人免费| 亚洲国产中文字幕在线视频| 日韩欧美一区二区三区在线观看| 高清在线国产一区| 在线免费观看的www视频| 中文字幕久久专区| 久久久国产精品麻豆| 国产精品一区二区免费欧美| 美女高潮喷水抽搐中文字幕| 一本精品99久久精品77| 老汉色av国产亚洲站长工具| 淫妇啪啪啪对白视频| 亚洲中文av在线| 亚洲av成人一区二区三| 国内毛片毛片毛片毛片毛片| 亚洲国产精品合色在线| 欧美成人一区二区免费高清观看 | 女同久久另类99精品国产91| 嫁个100分男人电影在线观看| 色哟哟哟哟哟哟| 免费在线观看亚洲国产| 亚洲自拍偷在线| svipshipincom国产片| 亚洲男人天堂网一区| 黄色毛片三级朝国网站| 欧美日韩中文字幕国产精品一区二区三区| 精品久久久久久久人妻蜜臀av| 舔av片在线| 757午夜福利合集在线观看| 免费看十八禁软件| 身体一侧抽搐| 久久久精品国产亚洲av高清涩受| 久久精品人妻少妇| 成年免费大片在线观看| 在线观看一区二区三区| 久久午夜综合久久蜜桃| 五月玫瑰六月丁香| 一区二区三区国产精品乱码| 成在线人永久免费视频| www日本在线高清视频| 这个男人来自地球电影免费观看| 老汉色∧v一级毛片| 三级毛片av免费| 18禁黄网站禁片免费观看直播| 国产精品永久免费网站| 天堂√8在线中文| 国产熟女xx| 亚洲七黄色美女视频| 黑人巨大精品欧美一区二区mp4| 操出白浆在线播放| 搡老岳熟女国产| 午夜久久久久精精品| 长腿黑丝高跟| 香蕉久久夜色| 18禁美女被吸乳视频| 又紧又爽又黄一区二区| 别揉我奶头~嗯~啊~动态视频| av中文乱码字幕在线| 婷婷丁香在线五月| 久久中文看片网| 波多野结衣巨乳人妻| 亚洲av第一区精品v没综合| 国产亚洲精品久久久久久毛片| 午夜精品久久久久久毛片777| 此物有八面人人有两片| 老司机午夜福利在线观看视频| 91麻豆精品激情在线观看国产| 成人一区二区视频在线观看| 亚洲性夜色夜夜综合| 欧美精品啪啪一区二区三区| 午夜福利视频1000在线观看|