{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:47:25Z","timestamp":1743112045423,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031200953"},{"type":"electronic","value":"9783031200960"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20096-0_5","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:04:11Z","timestamp":1673535851000},"page":"57-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7589-3160","authenticated-orcid":false,"given":"Peng","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8027-3572","authenticated-orcid":false,"given":"Changsheng","family":"Dou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-5338","authenticated-orcid":false,"given":"Nannan","family":"Gu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7073-2245","authenticated-orcid":false,"given":"Zhiyuan","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0188-7259","authenticated-orcid":false,"given":"Lili","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"key":"5_CR1","volume-title":"Probabilistic Graphical Models - Principles and Techniques","author":"D Koller","year":"2009","unstructured":"Koller, D., Friedman, N.: Probabilistic Graphical Models - Principles and Techniques. MIT Press, Cambridge (2009)"},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality","author":"J Pearl","year":"2009","unstructured":"Pearl, J.: Causality. Cambridge University Press, Cambridge (2009)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"101659","DOI":"10.1016\/j.cose.2019.101659","volume":"89","author":"J Wang","year":"2020","unstructured":"Wang, J., Neil, M., Fenton, N.: A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. Comput. Secur. 89, 101659 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/b21982","volume-title":"Risk Assessment and Decision Analysis with Bayesian Networks","author":"N Fenton","year":"2018","unstructured":"Fenton, N., Neil, M.: Risk Assessment and Decision Analysis with Bayesian Networks. CRC Press, Boca Raton (2018)"},{"key":"5_CR5","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"SL Lauritzen","year":"1988","unstructured":"Lauritzen, S.L., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their application to expert systems. J. R. Stat. Soc. Ser. B 50, 157\u2013224 (1988)","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"5_CR6","volume-title":"Variational Algorithms for Approximate Bayesian Inference","author":"MJ Beal","year":"2003","unstructured":"Beal, M.J.: Variational Algorithms for Approximate Bayesian Inference. The Gatsby Computational Neuroscience Unit. University College London, London (2003)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIT.2005.850085","volume":"51","author":"JS Yedidia","year":"2005","unstructured":"Yedidia, J.S., Freeman, W.T., Weiss, Y.: Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. Inf. Theory 51, 2282\u20132312 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11222-007-9018-y","volume":"17","author":"M Neil","year":"2007","unstructured":"Neil, M., Tailor, M., Marquez, D.: Inference in hybrid Bayesian networks using dynamic discretization. Stat. Comput. 17, 219\u2013233 (2007)","journal-title":"Stat. Comput."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1613\/jair.2842","volume":"37","author":"R Mateescu","year":"2010","unstructured":"Mateescu, R., Kask, K., Gogate, V., Dechter, R.: Join-graph propagation algorithms J. . Artif. Intell. Res. 37, 279\u2013328 (2010)","journal-title":". Artif. Intell. Res."},{"key":"5_CR10","unstructured":"Gelfand, A., Welling, M.: Generalized belief propagation on tree robust structured region graphs. In: UAI 2012: Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, pp. 296\u2013305 (2012)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1613\/jair.1.12198","volume":"69","author":"P Lin","year":"2020","unstructured":"Lin, P., Neil, M., Fenton, N.: Improved high dimensional discrete bayesian network inference using triplet region construction. J. Artif. Intell. Res. 69, 231\u2013295 (2020)","journal-title":"J. Artif. Intell. Res."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Yoon, K., et al.: Inference in probabilistic graphical models by graph neural networks. In: Sixth International Conference on Learning Representations (ICLR) Workshop (2018)","DOI":"10.1109\/IEEECONF44664.2019.9048920"},{"key":"5_CR13","unstructured":"Zhang, Z., Wu, F., Lee, W.S.: Factor graph neural network. In: Thirty-Fourth Conference on Neural Information Processing Systems, pp. 8577\u20138587 (2020)"},{"key":"5_CR14","unstructured":"Srikumar, V., Kundu, G., Roth, D.: On amortizing inference cost for structured prediction. In: Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, pp. 1114\u20131124. Association for Computational Linguistics (2012)"},{"key":"5_CR15","unstructured":"Wiseman, S., Kim, Y.: Amortized Bethe free energy minimization for learning MRFs. In: Thirty-Third Conference on Neural Information Processing Systems, pp. 15520\u201315531 (2019)"},{"key":"5_CR16","unstructured":"Liu, D., Thobaben, R., Rasmussen, L.K.: Region-based energy neural network for approximate inference. arXiv preprint arXiv:2006.09927 (2020)"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TKDE.2011.87","volume":"24","author":"M Neil","year":"2012","unstructured":"Neil, M., Chen, X., Fenton, N.: Optimizing the calculation of conditional probability tables in hybrid Bayesian networks using binary factorization. IEEE Trans. Knowl. Data Eng. 24, 1306\u20131322 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000001","volume":"1","author":"MJ Wainwright","year":"2008","unstructured":"Wainwright, M.J., Jordan, M.I.: Graphical models, exponential families, and variational inference. Found. Trends Mach. Learn. 1, 1\u2013305 (2008)","journal-title":"Found. Trends Mach. Learn."},{"key":"5_CR19","unstructured":"Agena Ltd. AgenaRisk. https:\/\/www.agenarisk.com"},{"key":"5_CR20","unstructured":"Lin, P.: Amortized BN inference. https:\/\/github.com\/penglin17\/amortizedBNinference"},{"key":"5_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30, pp. 5998\u20136008 (2017)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20096-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T02:49:14Z","timestamp":1728701354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20096-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031200953","9783031200960"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20096-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}