File size: 27,347 Bytes
3a03d0b
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
# A Re-evaluation of Knowledge Graph Completion Methods

Zhiqing Sun $^{1*}$  Shikhar Vashisht $^{1,2*}$  Soumya Sanyal $^{2*}$  Partha Talukdar $^{2}$  Yiming Yang $^{1}$

$^{1}$  Carnegie Mellon University,  $^{2}$  Indian Institute of Science

{zhiqings,svashish,yiming}@cs.cmu.edu

{Soumyasanyal,ppt}@iisc.ac.in

# Abstract

Knowledge Graph Completion (KGC) aims at automatically predicting missing links for large-scale knowledge graphs. A vast number of state-of-the-art KGC techniques have got published at top conferences in several research fields, including data mining, machine learning, and natural language processing. However, we notice that several recent papers report very high performance, which largely outperforms previous state-of-the-art methods. In this paper, we find that this can be attributed to the inappropriate evaluation protocol used by them and propose a simple evaluation protocol to address this problem. The proposed protocol is robust to handle bias in the model, which can substantially affect the final results. We conduct extensive experiments and report performance of several existing methods using our protocol. The reproducible code has been made publicly available.

# 1 Introduction

Real-world knowledge bases are usually expressed as multi-relational graphs, which are collections of factual triplets, where each triplet  $(h,r,t)$  represents a relation  $r$  between a head entity  $h$  and a tail entity  $t$ . However, real-word knowledge bases are usually incomplete (Dong et al., 2014), which motivates the research of automatically predicting missing links. A popular approach for Knowledge Graph Completion (KGC) is to embed entities and relations into continuous vector or matrix space, and use a well-designed score function  $f(h,r,t)$  to measure the plausibility of the triplet  $(h,r,t)$ . Most of the previous methods use translation distance based (Bordes et al., 2013; Wang et al., 2014; Xiao et al., 2016; Sun et al., 2019) and semantic matching based (Nickel and Tresp, 2013; Yang et al., 2014; Nickel et al., 2016; Trouillon et al., 2016;

Liu et al., 2017) scoring functions which are easy to analyze.

However, recently, a vast number of neural network-based methods have been proposed. They have complex score functions which utilize blackbox neural networks including Convolutional Neural Networks (CNNs) (Dettmers et al., 2018; Nguyen et al., 2018), Recurrent Neural Networks (RNNs) (Lin et al., 2015; Wang et al., 2018), Graph Neural Networks (GNNs) (Schlichtkrull et al., 2017; Shang et al., 2019), and Capsule Networks (Nguyen et al., 2019). While some of them report state-of-the-art performance on several benchmark datasets that are competitive to previous embedding-based approaches, a considerable portion of recent neural network-based papers report very high performance gains which are not consistent across different datasets. Moreover, most of these unusual behaviors are not at all analyzed. Such a pattern has become prominent and is misleading the whole community.

In this paper, we investigate this problem and find that this is attributed to the inappropriate evaluation protocol used by these approaches. We demonstrate that their evaluation protocol gives a perfect score to a model that always outputs a constant irrespective of the input. This has lead to artificial inflation of performance of several models. For this, we find a simple evaluation protocol that creates a fair comparison environment for all types of score functions. We conduct extensive experiments to re-examine some recent methods and fairly compare them with existing approaches. The source code of the paper has been publicly available at http://github.com/svjan5/kg-reeval.

# 2 Background

Knowledge Graph Completion Given a Knowledge Graph  $\mathcal{G} = (\mathcal{E},\mathcal{R},\mathcal{T})$  , where  $\mathcal{E}$  and  $\mathcal{R}$  de

<table><tr><td></td><td>FB15k-237</td><td>WN18RR</td></tr><tr><td>ConvE</td><td>.325</td><td>.430</td></tr><tr><td>RotatE</td><td>.338 (+4.0%)</td><td>.476 (+10.6%)</td></tr><tr><td>TuckER</td><td>.358 (+10.2%)</td><td>.470 (+9.3%)</td></tr><tr><td>ConvKB</td><td>.396 (+21.8%)</td><td>.248 (-42.3%)</td></tr><tr><td>CapsE</td><td>.523 (+60.9%)</td><td>.415 (-3.4%)</td></tr><tr><td>KBAT</td><td>.518 (+59.4%)</td><td>.440 (+2.3%)</td></tr><tr><td>TransGate</td><td>.404 (+24.3%)</td><td>.409 (-4.9%)</td></tr></table>

Table 1: Changes in MRR for different methods on FB15k-237 and WN18RR datasets with respect to ConvE show inconsistent improvements.

note the set of entities and relations and  $\mathcal{T} = \{(h,r,t)\mid h,t\in \mathcal{E},r\in \mathcal{R}\}$  is the set of triplets (facts), the task of Knowledge Graph Completion (KGC) involves inferring missing facts based on the known facts. Most the existing methods define an embedding for each entity and relation in  $\mathcal{G}$ , i.e.,  $e_h,e_r\forall h\in \mathcal{E},r\in \mathcal{R}$  and a score function  $f(h,r,t):\mathcal{E}\times \mathcal{R}\times \mathcal{E}\to \mathbb{R}$  which assigns a high score for valid triplets than the invalid ones.

KGC Evaluation During KGC evaluation, for predicting  $t$  in a given triplet  $(h,r,t)$ , a KGC model scores all the triplets in the set  $\mathcal{T}' = \{(h,r,t') \mid t' \in \mathcal{E}\}$ . Based on the score, the model first sorts all the triplets and subsequently finds the rank of the valid triplet  $(h,r,t)$  in the list. In a more relaxed setting called filtered setting, all the known correct triplets (from train, valid, and test triplets) are removed from  $\mathcal{T}'$  except the one being evaluated (Bordes et al., 2013). The triplets in  $\mathcal{T}' - \{t\}$  are called negative samples.

Related Work Prior to our work, Kadlec et al. (2017) cast doubt on the claim that performance improvement of several models is due to architectural changes as opposed to hyperparameter tuning or different training objective. In our work, we raise similar concerns but through a different angle by highlighting issues with the evaluation procedure used by several recent methods. Chandrahas et al. (2018) analyze the geometry of KG embeddings and its correlation with task performance while Nayyeri et al. (2019) examine the effect of different loss functions on performance. However, their analysis is restricted to non-neural approaches.

![](images/340af16a3845eaa4227f90213b5ac0c2d87ea5e04d24b76deac8f572218818de.jpg)  
Figure 1: Sorted score distribution of ConvKB for an example valid triplet and its negative samples. The score is normalized into [0, 1] (lower the better). Dotted line indicates the score for the valid triplet. We find that in this example, around  $58.5\%$  negative sampled triplets obtain the exact same score as the valid triplet.

# 3 Observations

In this section, we first describe our observations and concerns and then investigate the reason behind.

# 3.1 Inconsistent Improvements over Benchmark Datasets

Several recently proposed methods report high performance gains on a particular dataset. However, their performance on another dataset is not consistently improved. In Table 1, we report change in MRR score on FB15k-237 (Toutanova and Chen, 2015) and WN18RR (Dettmers et al., 2018) datasets with respect to ConvE (Dettmers et al., 2018) for different methods including RotatE (Sun et al., 2019), TuckER (Balažević et al., 2019), ConvKB (Nguyen et al., 2018), CapsE (Nguyen et al., 2019), KBAT (Nathani et al., 2019), and TransGate (Yuan et al., 2019). Overall, we find that for a few recent NN based methods, there are inconsistent gains on these two datasets. For instance, in ConvKB, there is a  $21.8\%$  improvement over ConvE on FB15k-237, but a degradation of  $42.3\%$  on WN18RR, which is surprising given the method is claimed to be better than ConvE. On the other hand, methods like RotatE and TuckER give consistent improvement across both benchmark datasets.

# 3.2 Observations on Score Functions

Score distribution When evaluating KGC methods, for a given triplet  $(h,r,t)$ , the ranking of  $t$  given  $h$  and  $r$  is computed by scoring all the triplets of form  $\{(h,r,t') \mid t' \in \mathcal{E}\}$ , where  $\mathcal{E}$  is the set of

![](images/51e8f910db13ab5b8c166c81db6e9ea6a3956c98d6e627833e499d7643f1c6be.jpg)  
Figure 2: Plot shows the frequency of the number of negative triplets with the same assigned score as the valid triplet during evaluation on FB15k-237 dataset. The results show that for methods like ConvKB and CapsE, a large number of negative triplets get the same score as the valid triplets whereas for methods like ConvE such occurrences are rare.

all entities. On investing a few recent NN based approaches, we find that they have unusual score distribution, where some negatively sampled triplets have the same score as the valid triplet. An instance of FB15k-237 dataset is presented in Figure 1. Here, out of 14,541 negatively sampled triplets, 8,520 have the exact same score as the valid triplet.

Statistics on the whole dataset In Figure 2, we report the total number of triplets with the exact same score over the entire dataset for ConvKB (Nguyen et al., 2018) and CapsE (Nguyen et al., 2019) and compare them with ConvE (Dettmers et al., 2018) which does not suffer from this issue. We find that both ConvKB and CapsE have multiple occurrences of such unusual score distribution. On average, ConvKB and CapsE have 125 and 197 entities with exactly same score as the valid triplet over the entire evaluation dataset of FB15k-237, whereas ConvE has around 0.002, which is almost negligible. In Section 4, we demonstrate how this leads to massive performance gain for methods like ConvKB and CapsE.

Root of the problem Further, we investigate the cause behind such unusual score distribution. In Figure 3, we plot the ratio of neurons becoming zero after ReLU activation for the valid triplets vs. their normalized frequency on FB15k-237 dataset. The results show that in ConvKB and CapsE, a large fraction (87.3% and 92.2% respectively) of the neurons become zeros after applying ReLU

![](images/4fa13b23ab9a1ce649064958c1a2babcbed94d2db3636f1db7108ebd852d9255.jpg)  
Figure 3: Distribution of ratio of neurons becoming zero after ReLU activation in different methods for the valid triplets in FB15k-237 dataset. We find that for ConvKB and CapsE an unusually large fraction of neurons become zero after ReLU activation whereas the does not hold with ConvE.

activation. However, with ConvE, this count is substantially less (around  $41.1\%$ ). Because of the zeroing of nearly all neurons (at least  $14.2\%$  for ConvKB and  $22.0\%$  for CapsE), the representation of several triplets become very similar during forward pass and thus leading to obtaining the exact same score.

# 4 Evaluation Protocols for KGC

In this section, we present different evaluation protocols that can be adopted in knowledge graph completion. We further show that inappropriate evaluation protocol is the key reason behind the unusual behavior of some recent NN-based methods.

How to deal with the same scores? An essential aspect of the evaluation method is to decide how to break ties for triplets with the same score. More concretely, while scoring the candidate set  $\mathcal{T}'$ , if there are multiple triplets with the same score from the model, one should decide which triplet to pick. Assuming that the triplets are sorted in a stable manner, we design a general evaluation scheme for KGC, which consists of the following three different protocols:

- TOP: In this setting, the correct triplet is inserted in the beginning of  $\mathcal{T}'$ .  
- BOTTOM: Here, the correct triplet is inserted at the end of  $\mathcal{T}'$ .  
- RANDOM: In this, the correct triplet is placed randomly in  $\mathcal{T}'$ .

<table><tr><td rowspan="2"></td><td colspan="3">Reported</td><td colspan="3">RANDOM</td><td colspan="3">TOP</td><td colspan="3">BOTTOM</td></tr><tr><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td></tr><tr><td>ConvE</td><td>.325</td><td>244</td><td>.501</td><td>.324 ± .0</td><td>285 ± 0</td><td>.501 ± .0</td><td>.324</td><td>285</td><td>.501</td><td>.324</td><td>285</td><td>.501</td></tr><tr><td>RotatE</td><td>.338</td><td>177</td><td>.533</td><td>.336 ± .0</td><td>178 ± 0</td><td>.530 ± .0</td><td>.336</td><td>178</td><td>.530</td><td>.336</td><td>178</td><td>.530</td></tr><tr><td>TuckER</td><td>.358</td><td>-</td><td>.544</td><td>.353 ± .0</td><td>162 ± 0</td><td>.536 ± .0</td><td>.353</td><td>162</td><td>.536</td><td>.353</td><td>162</td><td>.536</td></tr><tr><td>ConvKB</td><td>.396</td><td>257</td><td>.517</td><td>.243 ± .0</td><td>309 ± 2</td><td>.421 ± .0</td><td>.407 (+.164)</td><td>246 (-63)</td><td>.527 (+.106)</td><td>.130 (-.113)</td><td>373 (+64)</td><td>.383 (-.038)</td></tr><tr><td>CapsE</td><td>.523</td><td>303</td><td>.593</td><td>.150 ± .0</td><td>403 ± 2</td><td>.356 ± .0</td><td>.511 (+.361)</td><td>305 (-99)</td><td>.586 (+.229)</td><td>.134 (-.016)</td><td>502 (+99)</td><td>.297 (-.059)</td></tr><tr><td>KBAT</td><td>.518†</td><td>210†</td><td>.626†</td><td>.157 ± .0</td><td>270 ± 0</td><td>.331 ± .0</td><td>.157</td><td>270</td><td>.331</td><td>.157</td><td>270</td><td>.331</td></tr></table>

Table 2: Effect of different evaluation protocols on recent KG embedding methods on FB15k-237 dataset. For TOP and BOTTOM, we report changes in performance with respect to RANDOM protocol. Please refer to Section 5.4 for details.  $\dagger$ : KBAT has test data leakage in their original implementation, which is fixed in our experiments.

Discussion Based on the definition of the three evaluation protocols, it is clear that TOP evaluation protocol does not evaluate the model rigorously. It gives the models that have a bias to provide the same score for different triplets, an inappropriate advantage. On the other hand, BOTTOM evaluation protocol can be unfair to the model during inference time because it penalizes the model for giving the same score to multiple triplets, i.e., if many triplets have the same score as the correct triple, the correct triplet gets the least rank possible.

As a result, RANDOM is the best evaluation technique which is both rigorous and fair to the model. It is in line with the situation we meet in the real world: given several same scored candidates, the only option is to select one of them randomly. Hence, we propose to use RANDOM evaluation scheme for all model performance comparisons.

# 5 Experiments

In this section, we conduct extensive experiments using our proposed evaluation protocols and make a fair comparison for several existing methods.

# 5.1 Datasets

We evaluate the proposed protocols on FB15k-237 (Toutanova and Chen, 2015) dataset<sup>1</sup>, which is a subset of FB15k (Bordes et al., 2013) with inverse relations deleted to prevent direct inference of test triples from training.

# 5.2 Methods Analyzed

In our experiments, we categorize existing KGC methods into the following two categories:

- Non-Affected: This includes methods which give consistent performance under different evaluation protocols. For experiments in this paper, we consider three such methods - ConvE, RotatE, and TuckER.  
- Affected: This category consists of recently proposed neural-network based methods whose performance is affected by different evaluation protocols. ConvKB, CapsE, TransGate $^2$ , and KBAT are methods in this category.

# 5.3 Evaluation Metrics

For all the methods, we use the code and the hyperparameters provided by the authors in their respective papers. Model performance is evaluated by Mean Reciprocal Rank (MRR), Mean Rank (MR) and Hits@10 (H@10) on the filtered setting (Bordes et al., 2013).

# 5.4 Evaluation Results

To analyze the effect of different evaluation protocols described in Section 4, we study the performance variation of the models listed in Section 5.2. We study the effect of using TOP and BOTTOM protocols and compare them to RANDOM protocol. In their original paper, ConvE, RotatE, and TuckER use a strategy similar to the proposed RANDOM protocol, while ConvKB, CapsE, and KBAT use TOP protocol. We also study the random error in RANDOM protocol with multiple runs, where we report the average and standard deviation on 5 runs with different random seeds. The results are presented in Tables 2.

We observe that for Non-Affected methods like ConvE, RotatE, and TuckER, the performance remains consistent across different evaluation protocols. However, with Affected methods, there is a considerable variation in performance. Specifically, we can observe that these models perform best when evaluated using TOP and worst when evaluated using BOTTOM<sup>3</sup>. Finally, we find that the proposed RANDOM protocol is very robust to different random seeds. Although the theoretic upper and lower bounds of a RANDOM score are TOP and BOTTOM scores respectively, when we evaluate knowledge graph completion for real-world large-scale knowledge graphs, the randomness doesn't affect the evaluation results much.

# 6 Conclusion

In this paper, we performed an extensive reexamination study of recent neural network based KGC techniques. We find that many such models have issues with their score functions. Combined with inappropriate evaluation protocol, such methods reported inflated performance. Based on our observations, we propose RANDOM evaluation protocol that can clearly distinguish between these affected methods from others. We also strongly encourage the research community to follow the RANDOM evaluation protocol for all KGC evaluation purposes.

# Acknowledgements

We thank the reviewers for their helpful comments. This work is supported in part by the National Science Foundation (NSF) under grant IIS-1546329 and Google PhD Fellowship.

# References

Ivana Balažević, Carl Allen, and Timothy M. Hospedales. 2019. Tucker: Tensor factorization for knowledge graph completion. In Empirical Methods in Natural Language Processing.  
Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. In C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, editors, Advances in Neural Information Processing

Systems 26, pages 2787-2795. Curran Associates, Inc.  
Chandrahas, Aditya Sharma, and Partha Talukdar. 2018. Towards understanding the geometry of knowledge graph embeddings. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pages 122-131, Melbourne, Australia. Association for Computational Linguistics.  
Tim Dettmers, Minervini Pasquale, Stenetorp Pontus, and Sebastian Riedel. 2018. Convolutional 2d knowledge graph embeddings. In Proceedings of the 32th AAAI Conference on Artificial Intelligence, pages 1811-1818.  
Xin Dong, Evgeniy Gabrilovich, Geremy Heitz, Wilko Horn, Ni Lao, Kevin Murphy, Thomas Strohmann, Shaohua Sun, and Wei Zhang. 2014. Knowledge vault: A web-scale approach to probabilistic knowledge fusion. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '14, pages 601-610, New York, NY, USA. ACM.  
Rudolf Kadlec, Ondrej Bajgar, and Jan Kleindienst. 2017. Knowledge base completion: Baselines strike back. In Proceedings of the 2nd Workshop on Representation Learning for NLP, pages 69-74, Vancouver, Canada. Association for Computational Linguistics.  
Yankai Lin, Zhiyuan Liu, Huanbo Luan, Maosong Sun, Siwei Rao, and Song Liu. 2015. Modeling relation paths for representation learning of knowledge bases. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pages 705-714, Lisbon, Portugal. Association for Computational Linguistics.  
Hanxiao Liu, Yuexin Wu, and Yiming Yang. 2017. Analogical inference for multi-relational embeddings. In Proceedings of the 34th International Conference on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages 2168-2178, International Convention Centre, Sydney, Australia. PMLR.  
Deepak Nathani, Jatin Chauhan, Charu Sharma, and Manohar Kaul. 2019. Learning attention-based embeddings for relation prediction in knowledge graphs. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics.  
Mojtaba Nayyeri, Chengjin Xu, Yadollah Yaghoobzadeh, Hamed Shariat Yazdi, and Jens Lehmann. 2019. Toward Understanding The Effect Of Loss function On Then Performance Of Knowledge Graph Embedding. arXiv e-prints, page arXiv:1909.00519.  
Dai Quoc Nguyen, Tu Dinh Nguyen, Dat Quoc Nguyen, and Dinh Phung. 2018. A novel embedding model for knowledge base completion based

on convolutional neural network. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 2 (Short Papers), pages 327-333. Association for Computational Linguistics.  
Dai Quoc Nguyen, Thanh Vu, Tu Dinh Nguyen, Dat Quoc Nguyen, and Dinh Phung. 2019. A Capsule Network-based Embedding Model for Knowledge Graph Completion and Search Personalization. In Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), pages 2180-2189.  
Maximilian Nickel, Lorenzo Rosasco, and Tomaso Poggio. 2016. Holographic embeddings of knowledge graphs. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, AAAI'16, pages 1955-1961. AAAI Press.  
Maximilian Nickel and Volker Tresp. 2013. Tensor factorization for multi-relational learning. In Machine Learning and Knowledge Discovery in Databases, pages 617-621, Berlin, Heidelberg. Springer Berlin Heidelberg.  
Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pages 1532-1543.  
Michael Schlichtkrull, Thomas N Kipf, Peter Bloem, Rianne van den Berg, Ivan Titov, and Max Welling. 2017. Modeling relational data with graph convolutional networks. arXiv preprint arXiv:1703.06103.  
Chao Shang, Yun Tang, Jing Huang, Jinbo Bi, Xiaodong He, and Bowen Zhou. 2019. End-to-end structure-aware convolutional networks for knowledge base completion.  
Zhiqing Sun, Zhi-Hong Deng, Jian-Yun Nie, and Jian Tang. 2019. Rotate: Knowledge graph embedding by relational rotation in complex space. In International Conference on Learning Representations.  
Kristina Toutanova and Danqi Chen. 2015. Observed versus latent features for knowledge base and text inference. In Proceedings of the 3rd Workshop on Continuous Vector Space Models and their Compositionality, pages 57-66.  
Théo Trouillon, Johannes Welbl, Sebastian Riedel, Éric Gaussier, and Guillaume Bouchard. 2016. Complex embeddings for simple link prediction. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48, ICML'16, pages 2071-2080. JMLR.org.  
Haoyu Wang, Vivek Kulkarni, and William Yang Wang. 2018. DOLORES: deep contextualized knowledge graph embeddings. CoRR, abs/1811.00147.

Zhen Wang, Jianwen Zhang, Jianlin Feng, and Zheng Chen. 2014. Knowledge graph embedding by translating on hyperplanes. In Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, AAAI'14, pages 1112-1119. AAAI Press.  
Han Xiao, Minlie Huang, and Xiaoyan Zhu. 2016. Transg: A generative model for knowledge graph embedding. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pages 2316-2325. Association for Computational Linguistics.  
Bishan Yang, Wen-tau Yih, Xiaodong He, Jianfeng Gao, and Li Deng. 2014. Embedding entities and relations for learning and inference in knowledge bases. CoRR, abs/1412.6575.  
Jun Wen Yuan, Neng Gao, and Ji Xiang. 2019. Transgate: Knowledge graph embedding with shared gate structure. In AAAI.

# Appendix

# A Results on WN18RR dataset

Besides FB15k-237, we also evaluate the proposed protocols on WN18RR (Dettmers et al., 2018) dataset, which is a subset of WN18 (Bordes et al., 2013) containing lexical relations between words. Similar to FB15k-237, inverse relations are removed in WN18RR. The results on WN18RR are shown in Table 3. From these results, we can draw similar conclusions as in Section 5. We also show the total number of triplets with the exact same score over the entire WN18RR dataset for ConvKB, CapsE and ConvE in Figure 4.

<table><tr><td rowspan="2"></td><td colspan="3">Reported</td><td colspan="3">RANDOM</td><td colspan="3">TOP</td><td colspan="3">BOTTOM</td></tr><tr><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td><td>MRR ↑</td><td>MR ↓</td><td>H@10 ↑</td></tr><tr><td>ConvE</td><td>.43</td><td>4187</td><td>.52</td><td>.444 ± .0</td><td>4950 ± 0</td><td>.503 ± .0</td><td>.444</td><td>4950</td><td>.503</td><td>.444</td><td>4950</td><td>.503</td></tr><tr><td>RotatE</td><td>.476</td><td>3340</td><td>.571</td><td>.473 ± .0</td><td>3343 ± 0</td><td>.571 ± .0</td><td>.473</td><td>3343</td><td>.571</td><td>.473</td><td>3343</td><td>.571</td></tr><tr><td>TuckER</td><td>.470</td><td>-</td><td>.526</td><td>.461 ± .0</td><td>6324 ± 0</td><td>.516 ± .0</td><td>.461</td><td>6324</td><td>.516</td><td>.461</td><td>6324</td><td>.516</td></tr><tr><td>ConvKB</td><td>.248</td><td>2554</td><td>.525</td><td>.249 ± .0</td><td>3433 ± 42</td><td>.524 ± .0</td><td>.251 (+.002)</td><td>1696 (-1737)</td><td>.529 (+.005)</td><td>.164 (-.085)</td><td>5168 (+1735)</td><td>.516 (-.008)</td></tr><tr><td>CapsE‡</td><td>.415</td><td>719</td><td>.560</td><td>.415 ± .0</td><td>718 ± 0</td><td>.559 ± .0</td><td>.415</td><td>718</td><td>.559</td><td>.323 (-.092)</td><td>719 (+1)</td><td>.555 (-.004)</td></tr><tr><td>KBAT</td><td>.440†</td><td>1940†</td><td>.581†</td><td>.412 ± .0</td><td>1921 ± 0</td><td>.554 ± .0</td><td>.412</td><td>1921</td><td>.554</td><td>.412</td><td>1921</td><td>.554</td></tr></table>

Table 3: Performance comparison under different evaluation protocols on WN18RR dataset. For TOP and BOTOM, we report changes in performance with respect to RANDOM protocol.  $\ddagger$ : CapsE uses the pre-trained 100-dimensional Glove (Pennington et al., 2014) word embeddings for initialization on WN18RR dataset, which makes the comparison on WN18RR still unfair.  $\dagger$ : KBAT has test data leakage in their original implementation, which is fixed in our experiments.

![](images/8639171ff292ea6d3113f53d169179055215fa56082fb260f2b484e0f14ea2dd.jpg)  
Figure 4: Plot shows the frequency of the number of negative triplets with the same assigned score as the valid triplet during evaluation on WN18RR dataset. The results show that Unlike FB15k-237, in this dataset, only ConvKB has a large number of negative triplets get the same score as the valid triplets.