{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T15:30:28Z","timestamp":1760369428791,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914510"},{"type":"electronic","value":"9783319914527"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91452-7_4","type":"book-chapter","created":{"date-parts":[[2018,5,12]],"date-time":"2018-05-12T06:43:19Z","timestamp":1526107399000},"page":"55-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BASSI: Balance and Status Combined Signed Network Embedding"],"prefix":"10.1007","author":[{"given":"Yiqi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tieyun","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Xuhui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,13]]},"reference":[{"key":"4_CR1","unstructured":"Bottou, L.: Stochastic gradient learning in neural networks. Proc. Neuro-N\u0131mes 91(8) (1991)"},{"issue":"18","key":"4_CR2","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1016\/j.comnet.2012.10.007","volume":"56","author":"S Brin","year":"2012","unstructured":"Brin, S., Page, L.: Reprint of: the anatomy of a large-scale hypertextual web search engine. Comput. Netw. 56(18), 3825\u20133833 (2012)","journal-title":"Comput. Netw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Chiang, K.Y., Natarajan, N., Tewari, A.: Exploiting longer cycles for link prediction in signed networks. In: Proceedings of CIKM, pp. 1157\u20131162 (2011)","DOI":"10.1145\/2063576.2063742"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: Scalable feature learning for networks. In: Proceedings of SIGKDD, pp. 855\u2013864 (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of WWW, pp. 403\u2013412. ACM (2004)","DOI":"10.1145\/988672.988727"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","volume":"21","author":"F Heider","year":"1946","unstructured":"Heider, F.: Attitudes and cognitive organization. J. Psychol. 21(1), 107\u2013112 (1946)","journal-title":"J. Psychol."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"de Kerchove, C., Van Dooren, P.: The PageTrust algorithm: how to rank web pages when negative links are allowed? In: Proceedings of SDM, pp. 346\u2013352. SIAM (2008)","DOI":"10.1137\/1.9781611972788.31"},{"issue":"5","key":"4_CR8","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. JACM 46(5), 604\u2013632 (1999)","journal-title":"JACM"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of WWW, pp. 641\u2013650. ACM (2010)","DOI":"10.1145\/1772690.1772756"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Signed networks in social media. In: Proceedings of SIGCHI, pp. 1361\u20131370. ACM (2010)","DOI":"10.1145\/1753326.1753532"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of SIGKDD, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"issue":"1","key":"4_CR12","first-page":"172","volume":"4","author":"M Shahriari","year":"2014","unstructured":"Shahriari, M., Jalili, M.: Ranking nodes in signed social networks. SNAM 4(1), 172 (2014)","journal-title":"SNAM"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of WWW, pp. 1067\u20131077 (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Tang, J., Chang, S., Aggarwal, C., Liu, H.: Negative link prediction in social media. In: Proceedings of ICDM, pp. 87\u201396. ACM (2015)","DOI":"10.1145\/2684822.2685295"},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2956185","volume":"49","author":"J Tang","year":"2016","unstructured":"Tang, J., Chang, Y., Aggarwal, C., Liu, H.: A survey of signed network mining in social media. ACM Comput. Surv. (CSUR) 49(3), 42 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-16567-2_14","volume-title":"Social Informatics","author":"VA Traag","year":"2010","unstructured":"Traag, V.A., Nesterov, Y.E., Van Dooren, P.: Exponential ranking: taking into account negative links. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol. 6430, pp. 192\u2013202. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16567-2_14"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., Aggarwal, C., Tang, J., Liu, H.: Attributed signed network embedding. In: Proceedings of CIKM, pp. 137\u2013146. ACM (2017)","DOI":"10.1145\/3132847.3132905"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1137\/1.9781611974973.37","volume-title":"Proceedings of the 2017 SIAM International Conference on Data Mining","author":"Suhang Wang","year":"2017","unstructured":"Wang, S., Tang, J., Aggarwal, C., Chang, Y., Liu, H.: Signed network embedding in social media. In: Proceedings of SDM, pp. 327\u2013335. SIAM (2017)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Wu, Z., Aggarwal, C.C., Sun, J.: The troll-trust model for ranking in signed networks. In: Proceedings of ICDM, pp. 447\u2013456. ACM (2016)","DOI":"10.1145\/2835776.2835816"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Zolfaghar, K., Aghaie, A.: Mining trust and distrust relationships in social web applications. In: Proceedings of ICCP, pp. 73\u201380. IEEE (2010)","DOI":"10.1109\/ICCP.2010.5606460"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91452-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:12:57Z","timestamp":1709831577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91452-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914510","9783319914527"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91452-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"13 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"1 July 2018","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Erratum","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The original version of this chapter titled \u201cFree-Rider Episode Screening via Dual Partition Model\u201d contained the following three mistakes:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"In the updated version these mistakes were corrected.","order":5,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"In the originally published version of chapters titled \u201cBASSI: Balance and Status Combined Signed Network Embedding\u201d and \u201cSample Location Selection for Efficient Distance-Aware Influence Maximization in Geo-Social Networks\u201d the funding information in the acknowledgement section was incomplete. This has now been corrected.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}