{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:51:56Z","timestamp":1743040316924,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031221361"},{"type":"electronic","value":"9783031221378"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22137-8_25","type":"book-chapter","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T04:36:29Z","timestamp":1669178189000},"page":"337-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAME: Sampling Attack in\u00a0Multiplex Network Embedding"],"prefix":"10.1007","author":[{"given":"Chao","family":"Kong","sequence":"first","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mengfei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qijie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Pingfu","family":"Chao","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-030-66046-8_19","volume-title":"Computational Data and Social Networks","author":"C Kong","year":"2020","unstructured":"Kong, C., et al.: Privacy attack and defense in network embedding. In: Chellappan, S., Choo, K.-K.R., Phan, N.H. (eds.) CSoNet 2020. LNCS, vol. 12575, pp. 231\u2013242. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66046-8_19"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TKDE.2020.2979980","volume":"34","author":"M Gao","year":"2022","unstructured":"Gao, M., He, X., Chen, L., Liu, T., Zhang, J., Zhou, A.: Learning vertex representations for bipartite networks. IEEE Trans. Knowl. Data Eng. 34(1), 379\u2013393 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Wu, J., Xu, Y., Zhang, Y., Ma, C., Coates, M., Cheung, J.C.K.: TIE: a framework for embedding-based incremental temporal knowledge graph completion. In: SIGIR 2021, pp. 428\u2013437 (2021)","DOI":"10.1145\/3404835.3462961"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Cui, L., et al.: Refining sample embeddings with relation prototypes to enhance continual relation extraction. In: ACL 2021, pp. 232\u2013243","DOI":"10.18653\/v1\/2021.acl-long.20"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Yao, J., Dou, Z., Wen, J.: FedPS: a privacy protection enhanced personalized search framework. In: WWW 2021, pp. 3757\u20133766 (2021)","DOI":"10.1145\/3442381.3449936"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1002\/int.22315","volume":"36","author":"K Mo","year":"2021","unstructured":"Mo, K., Liu, X., Huang, T., Yan, A.: Querying little is enough: model inversion attack via latent information. Int. J. Intell. Syst. 36(2), 681\u2013690 (2021)","journal-title":"Int. J. Intell. Syst."},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TII.2020.3046648","volume":"18","author":"H Chen","year":"2022","unstructured":"Chen, H.: Practical membership inference attack against collaborative inference in industrial IoT. IEEE Trans. Ind. Inf. 18(1), 477\u2013487 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"9","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai, H., Zheng, V.W., Chang, K.C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616\u20131637 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: SIGKDD 2014, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Cao, S., Lu, W., Xu, Q.: GraREP: learning graph representations with global structural information. In: CIKM 2015, pp. 891\u2013900 (2015)","DOI":"10.1145\/2806416.2806512"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.neunet.2021.11.026","volume":"146","author":"E Tu","year":"2022","unstructured":"Tu, E., Wang, Z., Yang, J., Kasabov, N.K.: Deep semi-supervised learning via dynamic anchor graph embedding in latent space. Neural Netw. 146, 350\u2013360 (2022)","journal-title":"Neural Netw."},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: Scalable feature learning for networks. In: KDD 2016, pp. 855\u2013864 (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: WWW 2015, pp. 1067\u20131077 (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.ins.2020.07.001","volume":"543","author":"Z Zhao","year":"2021","unstructured":"Zhao, Z., Zhou, H., Li, C., Tang, J., Zeng, Q.: Deepemlan: deep embedding learning for attributed networks. Inf. Sci. 543, 382\u2013397 (2021)","journal-title":"Inf. Sci."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, S., et al.: Direction-aware user recommendation based on asymmetric network embedding. ACM Trans. Inf. Syst. 40(2), 29:1\u201329:23 (2022)","DOI":"10.1145\/3466754"},{"issue":"3","key":"25_CR16","doi-asserted-by":"publisher","first-page":"711","DOI":"10.3233\/IDA-205168","volume":"25","author":"P Pham","year":"2021","unstructured":"Pham, P., Do, P.: W-mmp2vec: topic-driven network embedding model for link prediction in content-based heterogeneous information network. Intell. Data Anal. 25(3), 711\u2013738 (2021)","journal-title":"Intell. Data Anal."},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"104487","DOI":"10.1016\/j.engappai.2021.104487","volume":"106","author":"B Zhang","year":"2021","unstructured":"Zhang, B., Yuan, C., Wang, T., Liu, H.: STENET: a hybrid spatio-temporal embedding network for human trajectory forecasting. Eng. Appl. Artif. Intell. 106, 104487 (2021)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Ning, N., Long, F., Wang, C., Zhang, Y., Yang, Y., Wu, B.: Nonlinear structural fusion for multiplex network. Complex. 2020, 7041564:1\u20137041564:17 (2020)","DOI":"10.1155\/2020\/7041564"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, H., Qiu, L., Yi, L., Song, Y.: Scalable multiplex network embedding. In: IJCAI 2018, pp. 3082\u20133088 (2018)","DOI":"10.24963\/ijcai.2018\/428"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Ma, Y., Ren, Z., Jiang, Z., Tang, J., Yin, D.: Multi-dimensional network embedding with hierarchical structure. In: WSDM 2018, pp. 387\u2013395 (2018)","DOI":"10.1145\/3159652.3159680"},{"issue":"5","key":"25_CR21","doi-asserted-by":"publisher","first-page":"2699","DOI":"10.1007\/s11280-020-00799-7","volume":"23","author":"W Yuan","year":"2020","unstructured":"Yuan, W., et al.: Multi-view network embedding with node similarity ensemble. World Wide Web 23(5), 2699\u20132714 (2020). https:\/\/doi.org\/10.1007\/s11280-020-00799-7","journal-title":"World Wide Web"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Qu, M., Tang, J., Shang, J., Ren, X., Zhang, M., Han, J.: An attention-based collaboration framework for multi-view network representation learning. In: CIKM 2017, pp. 1767\u20131776 (2017)","DOI":"10.1145\/3132847.3133021"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Ning, N., Li, Q., Zhao, K., Wu, B.: Multiplex network embedding model with high-order node dependence. Complex. 2021, 6644111:1\u20136644111:18 (2021)","DOI":"10.1155\/2021\/6644111"},{"key":"25_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-71703-4_37","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"C Li","year":"2007","unstructured":"Li, C., Shirani-Mehr, H., Yang, X.: Protecting individual information against inference attacks in data publishing. In: Kotagiri, R., Krishna, P.R., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 422\u2013433. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71703-4_37"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: SSP 2017, pp. 3\u201318 (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"25_CR26","doi-asserted-by":"publisher","first-page":"103977","DOI":"10.1016\/j.jbi.2021.103977","volume":"125","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Yan, C., Malin, B.A.: Membership inference attacks against synthetic health data. J. Biomed. Inf. 125, 103977 (2022)","journal-title":"J. Biomed. Inf."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22137-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T08:08:24Z","timestamp":1669190904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22137-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031221361","9783031221378"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22137-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2022.uqcloud.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT3","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"198","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}