{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:50Z","timestamp":1742912990958,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030607951"},{"type":"electronic","value":"9783030607968"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60796-8_40","type":"book-chapter","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T07:02:59Z","timestamp":1602745379000},"page":"467-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Joint Deep Recurrent Network Embedding and Edge Flow Estimation"],"prefix":"10.1007","author":[{"given":"Gaoyuan","family":"Liang","sequence":"first","affiliation":[]},{"given":"Haoran","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chao-Qun","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jing-Yan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"40_CR1","series-title":"STSP","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00296-0_5","volume-title":"Noise Reduction in Speech Processing","author":"J Benesty","year":"2009","unstructured":"Benesty, J., Chen, J., Huang, Y., Cohen, I.: Pearson correlation coefficient. In: Cohen, I., Huang, Y., Chen, J., Benesty, J. (eds.) Noise Reduction in Speech Processing. STSP, vol. 2, pp. 1\u20134. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-00296-0_5"},{"issue":"4-5","key":"40_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BF00332918","volume":"59","author":"H Bourlard","year":"1988","unstructured":"Bourlard, H., Kamp, Y.: Auto-association by multilayer perceptrons and singular value decomposition. Biol. Cybern. 59(4-5), 291\u2013294 (1988). \n                    https:\/\/doi.org\/10.1007\/BF00332918","journal-title":"Biol. Cybern."},{"issue":"1","key":"40_CR3","first-page":"1","volume":"3","author":"S Boyd","year":"2011","unstructured":"Boyd, S., Parikh, N., Chu, E., Peleato, B., Eckstein, J.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends\u00ae Mach. Learn. 3(1), 1\u2013122 (2011)","journal-title":"Found. Trends\u00ae Mach. Learn."},{"issue":"4","key":"40_CR4","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1137\/0204043","volume":"4","author":"S Even","year":"1975","unstructured":"Even, S., Tarjan, R.E.: Network flow and testing graph connectivity. SIAM J. Comput. 4(4), 507\u2013518 (1975)","journal-title":"SIAM J. Comput."},{"key":"40_CR5","unstructured":"Geng, Y., et al.: Learning convolutional neural network to maximize pos@ top performance measure. In: ESANN 2017 - Proceedings, pp. 589\u2013594 (2016)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-319-68612-7_61","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2017","author":"Y Geng","year":"2017","unstructured":"Geng, Y., et al.: A novel image tag completion method based on convolutional neural transformation. In: Lintas, A., Rovetta, S., Verschure, P.F.M.J., Villa, A.E.P. (eds.) ICANN 2017. LNCS, vol. 10614, pp. 539\u2013546. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-68612-7_61"},{"key":"40_CR7","unstructured":"Gleich, D.F., Saunders, M.: Models and algorithms for pagerank sensitivity. Stanford University, Stanford (2009)"},{"key":"40_CR8","series-title":"HDBKAUCO","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-662-39778-7_10","volume-title":"Linear Algebra","author":"GH Golub","year":"1971","unstructured":"Golub, G.H., Reinsch, C.: Singular value decomposition and least squares solutions. In: Bauer, F.L. (ed.) Linear Algebra. HDBKAUCO, vol. 2, pp. 134\u2013151. Springer, Heidelberg (1971). \n                    https:\/\/doi.org\/10.1007\/978-3-662-39778-7_10"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855\u2013864. ACM (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Jia, J., Schaub, M.T., Segarra, S., Benson, A.R.: Graph-based semi-supervised & active learning for edge flows. arXiv preprint \n                    arXiv:1905.07451\n                    \n                   (2019)","DOI":"10.1145\/3292500.3330872"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Kunegis, J.: KONECT: the Koblenz network collection. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 1343\u20131350. ACM (2013)","DOI":"10.1145\/2487788.2488173"},{"key":"40_CR12","unstructured":"Liwicki, M., Graves, A., Fern\u00e0ndez, S., Bunke, H., Schmidhuber, J.: A novel approach to on-line handwriting recognition based on bidirectional long short-term memory networks. In: Proceedings of the 9th International Conference on Document Analysis and Recognition, ICDAR 2007 (2007)"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Reca, J., Mart\u00ednez, J.: Genetic algorithms for the design of looped irrigation water distribution networks. Water Resour. Res. 42(5) (2006)","DOI":"10.1029\/2005WR004383"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Tu, K., Cui, P., Wang, X., Yu, P.S., Zhu, W.: Deep recursive network embedding with regular equivalence. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2357\u20132366. ACM (2018)","DOI":"10.1145\/3219819.3220068"},{"key":"40_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-68935-7_1","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2017","author":"G Zhang","year":"2017","unstructured":"Zhang, G., et al.: Learning convolutional ranking-score function by query preference regularization. In: Yin, H., et al. (eds.) IDEAL 2017. LNCS, vol. 10585, pp. 1\u20138. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-68935-7_1"},{"key":"40_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-95957-3_15","volume-title":"Intelligent Computing Methodologies","author":"G Zhang","year":"2018","unstructured":"Zhang, G., Liang, G., Su, F., Qu, F., Wang, J.-Y.: Cross-domain attribute representation based on convolutional neural network. In: Huang, D.-S., Gromiha, M.Michael, Han, K., Hussain, A. (eds.) ICIC 2018. LNCS (LNAI), vol. 10956, pp. 134\u2013142. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-95957-3_15"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Cui, P., Wang, X., Pei, J., Yao, X., Zhu, W.: Arbitrary-order proximity preserved network embedding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2778\u20132786. ACM (2018)","DOI":"10.1145\/3219819.3219969"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, D., Cui, P., Wang, D., Zhu, W.: Deep variational network embedding in wasserstein space. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2827\u20132836. ACM (2018)","DOI":"10.1145\/3219819.3220052"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60796-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T21:04:33Z","timestamp":1602882273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60796-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030607951","9783030607968"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60796-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2020\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}