{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T05:09:10Z","timestamp":1764133750804,"version":"3.40.3"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s13042-024-02392-0","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T09:02:13Z","timestamp":1727341333000},"page":"2297-2314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["GNNRI: detecting anomalous social network users through heterogeneous information networks and user relevance exploration"],"prefix":"10.1007","volume":"16","author":[{"given":"Yangyang","family":"Li","sequence":"first","affiliation":[]},{"given":"Xinyue","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Renyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoyang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Shiru","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shuhai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Albert Y.","family":"Zomaya","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Jiang M, Cui P, Beutel A, Faloutsos C, Yang S (2014) Detecting suspicious following behavior in multimillion-node social networks. In: Proceedings of the WWW, pp 305\u2013306","key":"2392_CR1","DOI":"10.1145\/2567948.2577306"},{"key":"2392_CR2","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ins.2020.03.113","volume":"537","author":"J Zhao","year":"2020","unstructured":"Zhao J, Liu X, Yan Q, Li B, Shao M, Peng H (2020) Multi-attributed heterogeneous graph convolutional network for bot detection. Inf Sci 537:380\u2013393","journal-title":"Inf Sci"},{"key":"2392_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2015) Fame for sale: efficient detection of fake twitter followers. Decis Support Syst 80:56\u201371","journal-title":"Decis Support Syst"},{"issue":"6","key":"2392_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.18178\/ijmlc.2017.7.6.646","volume":"7","author":"A Khalil","year":"2017","unstructured":"Khalil A, Hajjdiab H, Al-Qirim N (2017) Detecting fake followers in twitter: a machine learning approach. Int J Mach Learn Comput 7(6):198\u2013202","journal-title":"Int J Mach Learn Comput"},{"doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2007) Review spam detection. In: Proceedings of the WWW, pp 1189\u20131190","key":"2392_CR5","DOI":"10.1145\/1242572.1242759"},{"doi-asserted-by":"crossref","unstructured":"Wald R, Khoshgoftaar TM, Napolitano A, Sumner C (2013) Predicting susceptibility to social bots on Twitter. In: Proceedings of the IRI. IEEE, pp 6\u201313","key":"2392_CR6","DOI":"10.1109\/IRI.2013.6642447"},{"doi-asserted-by":"crossref","unstructured":"Grier C, Thomas K, Paxson V, Zhang M (2010) @ spam: the underground on 140 characters or less. In: Proceedings of the CCS, pp 27\u201337","key":"2392_CR7","DOI":"10.1145\/1866307.1866311"},{"key":"2392_CR8","first-page":"12","volume":"6","author":"F Benevenuto","year":"2010","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. CEAS 6:12","journal-title":"CEAS"},{"doi-asserted-by":"crossref","unstructured":"Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the ACSAC, pp 1\u20139","key":"2392_CR9","DOI":"10.1145\/1920261.1920263"},{"unstructured":"Shao C, Ciampaglia GL, Varol O, Flammini A, Menczer F (2017) The spread of fake news by social bots. arXiv preprint arXiv:1707.07592 96, 104","key":"2392_CR10"},{"issue":"1","key":"2392_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10588-018-09290-1","volume":"25","author":"DM Beskow","year":"2019","unstructured":"Beskow DM, Carley KM (2019) Its all in a name: detecting and labeling bots by their name. Comput Math Organ Theory 25(1):24\u201335","journal-title":"Comput Math Organ Theory"},{"doi-asserted-by":"crossref","unstructured":"Gilani Z, Kochmar E, Crowcroft J (2017) Classification of twitter accounts into automated agents and human users. In: Proceedings of the ASONAM, pp 489\u2013496","key":"2392_CR12","DOI":"10.1145\/3110025.3110091"},{"doi-asserted-by":"crossref","unstructured":"Varol O, Ferrara E, Davis CA, Menczer F, Flammini A (2017) Online human\u2013bot interactions: detection, estimation, and characterization. In: Proceedings of the ICWSM. AAAI Press, pp 280\u2013289","key":"2392_CR13","DOI":"10.1609\/icwsm.v11i1.14871"},{"unstructured":"Huang S, Xie J, Dai X, Jiajun C (2020) A reinforced generation of adversarial examples for neural machine translation. In: Proceedings of the ACL, pp 3486\u20133497","key":"2392_CR14"},{"doi-asserted-by":"crossref","unstructured":"Bao M, Li J, Zhang J, Peng H, Liu X (2019) Learning semantic coherence for machine generated spam text detection. In: 2019 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","key":"2392_CR15","DOI":"10.1109\/IJCNN.2019.8852340"},{"issue":"7","key":"2392_CR16","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96\u2013104","journal-title":"Commun ACM"},{"key":"2392_CR17","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta S, Ferrara E (2018) Deep neural networks for bot detection. Inf Sci 467:312\u2013322","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Ping H, Qin S (2018) A social bots detection model based on deep learning algorithm. In: Proceedings of the ICCT, pp 1435\u20131439","key":"2392_CR18","DOI":"10.1109\/ICCT.2018.8600029"},{"doi-asserted-by":"crossref","unstructured":"Stine ZK, Khaund T, Agarwal N (2018) Measuring the information-foraging behaviors of social bots through word usage. In: Proceedings of the ASONAM. IEEE Computer Society, pp 570\u2013571","key":"2392_CR19","DOI":"10.1109\/ASONAM.2018.8508811"},{"doi-asserted-by":"crossref","unstructured":"Li A, Qin Z (2019) Spam review detection with graph convolutional networks. In: Proceedings of the 28th ACM international conference on information and knowledge management, pp 2703\u20132711","key":"2392_CR20","DOI":"10.1145\/3357384.3357820"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Fan Y, Ye Y, Zhao L, Shi C (2019) Key player identification in underground forums over attributed heterogeneous information network embedding framework. In: Proceedings of the 28th ACM international conference on information and knowledge management, pp 549\u2013558","key":"2392_CR21","DOI":"10.1145\/3357384.3357876"},{"doi-asserted-by":"crossref","unstructured":"Zhang C, Song D, Huang C, Swami A, Chawla NV (2019) Heterogeneous graph neural network. In: Proceedings of the KDD, pp 793\u2013803","key":"2392_CR22","DOI":"10.1145\/3292500.3330961"},{"doi-asserted-by":"crossref","unstructured":"Hu Z, Dong Y, Wang K, Sun Y (2020) Heterogeneous graph transformer. In: Proceedings of the WWW, pp 2704\u20132710","key":"2392_CR23","DOI":"10.1145\/3366423.3380027"},{"doi-asserted-by":"crossref","unstructured":"Dou Y, Liu Z, Sun L, Deng Y, Peng H, Yu PS (2020) Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM international conference on information and knowledge management, pp 315\u2013324","key":"2392_CR24","DOI":"10.1145\/3340531.3411903"},{"issue":"10","key":"2392_CR25","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci S (2020) A decade of social bot detection. Commun ACM 63(10):72\u201383","journal-title":"Commun ACM"},{"doi-asserted-by":"crossref","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2017) The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: WWW, pp 963\u2013972","key":"2392_CR26","DOI":"10.1145\/3041021.3055135"},{"issue":"1","key":"2392_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TKDE.2016.2598561","volume":"29","author":"C Shi","year":"2016","unstructured":"Shi C, Li Y, Zhang J, Sun Y, Philip SY (2016) A survey of heterogeneous information network analysis. IEEE Trans Knowl Data Eng 29(1):17\u201337","journal-title":"IEEE Trans Knowl Data Eng"},{"unstructured":"John GH (1995) Robust decision trees: removing outliers from databases. In: Proceedings of the KDD. AAAI Press, pp 174\u2013179","key":"2392_CR28"},{"doi-asserted-by":"crossref","unstructured":"Aggarwal A, Kumar S, Bhargava K, Kumaraguru P (2018) The follower count fallacy: detecting twitter users with manipulated follower count. In: Proceedings of the SAC, pp 1748\u20131755","key":"2392_CR29","DOI":"10.1145\/3167132.3167318"},{"doi-asserted-by":"crossref","unstructured":"Mehrotra A, Sarreddy M, Singh S (2016) Detection of fake twitter followers using graph centrality measures. In: Proceedings of the IC3I. IEEE, pp 499\u2013504","key":"2392_CR30","DOI":"10.1109\/IC3I.2016.7918016"},{"doi-asserted-by":"crossref","unstructured":"Chu Z, Widjaja I, Wang H (2012) Detecting social spam campaigns on twitter. In: Proceedings of the ACNS. Springer, pp 455\u2013472","key":"2392_CR31","DOI":"10.1007\/978-3-642-31284-7_27"},{"issue":"1","key":"2392_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao C, Ciampaglia GL, Varol O, Yang K-C, Flammini A, Menczer F (2018) The spread of low-credibility content by social bots. Nat Commun 9(1):1\u20139","journal-title":"Nat Commun"},{"doi-asserted-by":"crossref","unstructured":"Cai C, Li L, Zeng D (2017) Detecting social bots by jointly modeling deep behavior and content information. In: Proceedings of the CIKM, pp 1995\u20131998","key":"2392_CR33","DOI":"10.1145\/3132847.3133050"},{"issue":"2","key":"2392_CR34","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2481244.2481248","volume":"14","author":"Y Sun","year":"2013","unstructured":"Sun Y, Han J (2013) Mining heterogeneous information networks: a structural analysis approach. ACM SIGKDD Explor Newsl 14(2):20\u201328","journal-title":"ACM SIGKDD Explor Newsl"},{"doi-asserted-by":"crossref","unstructured":"Huang Z, Zheng Y, Cheng R, Sun Y, Mamoulis N, Li X (2016) Meta structure: computing relevance in large heterogeneous information networks. In: Proceedings of the SIGKDD. ACM, pp 1595\u20131604","key":"2392_CR35","DOI":"10.1145\/2939672.2939815"},{"unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Proceedings of the NIPS, pp 5998\u20136008","key":"2392_CR36"},{"doi-asserted-by":"crossref","unstructured":"Peng H, Li J, Gong Q, Song Y, Ning Y, Lai K, Yu PS (2019) Fine-grained event categorization with heterogeneous graph convolutional networks. In: Kraus S (ed) Proceedings of the IJCAI. AAAI Press, pp 3238\u20133245","key":"2392_CR37","DOI":"10.24963\/ijcai.2019\/449"},{"issue":"1","key":"2392_CR38","first-page":"48","volume":"1","author":"K-C Yang","year":"2019","unstructured":"Yang K-C, Varol O, Davis CA, Ferrara E, Flammini A, Menczer F (2019) Arming the public with artificial intelligence to counter social bots. Comput Hum Behav 1(1):48\u201361","journal-title":"Comput Hum Behav"},{"doi-asserted-by":"crossref","unstructured":"Feng S, Wan H, Wang N, Li J, Luo M (2021) Twibot-20: a comprehensive twitter bot detection benchmark. In: CIKM, pp 4485\u20134494","key":"2392_CR39","DOI":"10.1145\/3459637.3482019"},{"doi-asserted-by":"crossref","unstructured":"Yang K-C, Varol O, Hui P-M, Menczer F (2020) Scalable and generalizable social bot detection through data selection. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, pp 1096\u20131103","key":"2392_CR40","DOI":"10.1609\/aaai.v34i01.5460"},{"unstructured":"Botometer\u00c2\u00ae by OSoMe. https:\/\/botometer.iuni.iu.edu\/#!\/. Accessed 31 May 2023","key":"2392_CR41"},{"issue":"5","key":"2392_CR42","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"S Pal","year":"1992","unstructured":"Pal S, Mitra S (1992) Multilayer perceptron, fuzzy sets, and classification. IEEE Trans Neural Netw 3(5):683\u2013697","journal-title":"IEEE Trans Neural Netw"},{"doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the SIGKDD. ACM, pp 701\u2013710","key":"2392_CR43","DOI":"10.1145\/2623330.2623732"},{"doi-asserted-by":"crossref","unstructured":"Dong Y, Chawla NV, Swami A (2017) metapath2vec: Scalable representation learning for heterogeneous networks. In: Proceedings of the SIGKDD. ACM, pp 135\u2013144","key":"2392_CR44","DOI":"10.1145\/3097983.3098036"},{"unstructured":"Kipf TN, Welling M (2017) Semi-supervised classification with graph convolutional networks. In: Proceedings of the ICLR. OpenReview.net","key":"2392_CR45"},{"unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2018) Graph attention networks. In: Proceedings of the ICLR, pp 1\u201312","key":"2392_CR46"},{"doi-asserted-by":"crossref","unstructured":"Wang X, Ji H, Shi C, Wang B, Ye Y, Cui P, Yu PS (2019) Heterogeneous graph attention network. In: Proceedings of the WWW, pp 2022\u20132032","key":"2392_CR47","DOI":"10.1145\/3308558.3313562"},{"doi-asserted-by":"crossref","unstructured":"Fu X, Zhang J, Meng Z, King I (2020) Magnn: metapath aggregated graph neural network for heterogeneous graph embedding. In: Proceedings of the WWW, pp 2331\u20132341","key":"2392_CR48","DOI":"10.1145\/3366423.3380297"},{"doi-asserted-by":"crossref","unstructured":"Zhu S, Zhou C, Pan S, Zhu X, Wang B (2019) Relation structure-aware heterogeneous graph neural network. In: Proceedings of the ICDM. IEEE, pp 1534\u20131539","key":"2392_CR49","DOI":"10.1109\/ICDM.2019.00203"},{"doi-asserted-by":"crossref","unstructured":"Chen Y, Bouazizi M, Ohtsuki T (2022) Social robot detection using roberta classifier and random forest regressor with similarity analysis. In: GLOBECOM 2022-2022 IEEE global communications conference. IEEE, pp 6433\u20136438","key":"2392_CR50","DOI":"10.1109\/GLOBECOM48099.2022.10001445"},{"doi-asserted-by":"crossref","unstructured":"Ng LHX, Carley KM (2023) Botbuster: multi-platform bot detection using a mixture of experts. In: Proceedings of the international AAAI conference on web and social media, vol 17, pp 686\u2013697","key":"2392_CR51","DOI":"10.1609\/icwsm.v17i1.22179"},{"issue":"2","key":"2392_CR52","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TNN.2008.2005601","volume":"20","author":"PA Est\u00e9vez","year":"2009","unstructured":"Est\u00e9vez PA, Tesmer M, Perez CA, Zurada JM (2009) Normalized mutual information feature selection. IEEE Trans Neural Netw 20(2):189\u2013201","journal-title":"IEEE Trans Neural Netw"},{"doi-asserted-by":"crossref","unstructured":"Santos JM, Embrechts M (2009) On the use of the adjusted rand index as a metric for evaluating supervised classification. In: International conference on artificial neural networks. Springer, pp 175\u2013184","key":"2392_CR53","DOI":"10.1007\/978-3-642-04277-5_18"},{"doi-asserted-by":"crossref","unstructured":"Alowibdi JS, Buy UA, Philip SY, Stenneth L (2014) Detecting deception in online social networks. In: Proceedings of the ASONAM, pp 383\u2013390 . IEEE","key":"2392_CR54","DOI":"10.1109\/ASONAM.2014.6921614"},{"doi-asserted-by":"crossref","unstructured":"Ala\u2019M A-Z, Alqatawna J, Faris H (2017) Spam profile detection in social networks based on public features. In: Proceedings of the ICICS. IEEE, pp 130\u2013135","key":"2392_CR55","DOI":"10.1109\/IACS.2017.7921959"},{"doi-asserted-by":"crossref","unstructured":"Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the SIGIR, pp 435\u2013442","key":"2392_CR56","DOI":"10.1145\/1835449.1835522"},{"doi-asserted-by":"crossref","unstructured":"Chen C, Zhang J, Chen X, Xiang Y, Zhou W (2015) 6 million spam tweets: a large ground truth for timely twitter spam detection. In: Proceedings of the ICC. IEEE, pp 7065\u20137070","key":"2392_CR57","DOI":"10.1109\/ICC.2015.7249453"},{"unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Proceedings of the CEAS, vol 6, p 12","key":"2392_CR58"},{"key":"2392_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z Alom","year":"2020","unstructured":"Alom Z, Carminati B, Ferrari E (2020) A deep learning model for twitter spam detection. Online Soc Netw Media 18:100079","journal-title":"Online Soc Netw Media"},{"doi-asserted-by":"crossref","unstructured":"Wang P, Angarita R, Renna I (2018) Is this the era of misinformation yet: combining social bots and fake news to deceive the masses. In: Proceedings of the WWW, pp 1557\u20131561","key":"2392_CR60","DOI":"10.1145\/3184558.3191610"},{"doi-asserted-by":"crossref","unstructured":"Ferrara E (2017) Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday","key":"2392_CR61","DOI":"10.5210\/fm.v22i8.8005"},{"doi-asserted-by":"crossref","unstructured":"Sayyadiharikandeh M, Varol O, Yang K-C, Flammini A, Menczer F (2020) Detection of novel social bots by ensembles of specialized classifiers. In: Proceedings of the CIKM, pp 2725\u20132732","key":"2392_CR62","DOI":"10.1145\/3340531.3412698"},{"doi-asserted-by":"crossref","unstructured":"Wang J (2019) Fdgars: Fraudster detection via graph convolutional networks in online app review system. In: Companion Proceedings of The 2019 World Wide Web conference, pp 310\u2013316","key":"2392_CR63","DOI":"10.1145\/3308560.3316586"},{"doi-asserted-by":"crossref","unstructured":"Yang Y, Yang R, Li Y, Cui K, Yang Z, Wang Y, Xu J, Xie H (2022) Rosgas: adaptive social bot detection with reinforced self-supervised gnn architecture search. arXiv preprint arXiv:2206.06757","key":"2392_CR64","DOI":"10.1145\/3572403"},{"issue":"1","key":"2392_CR65","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s13278-022-01020-5","volume":"13","author":"M Aljabri","year":"2023","unstructured":"Aljabri M, Zagrouba R, Shaahid A, Alnasser F, Saleh A, Alomari DM (2023) Machine learning-based social media bot detection: a comprehensive literature review. Soc Netw Anal Min 13(1):20","journal-title":"Soc Netw Anal Min"},{"key":"2392_CR66","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1109\/TIFS.2023.3254429","volume":"18","author":"E Arin","year":"2023","unstructured":"Arin E, Kutlu M (2023) Deep learning based social bot detection on twitter. IEEE Trans Inf Forensics Secur 18:1763\u20131772","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"2392_CR67","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61\u201380","journal-title":"IEEE Trans Neural Netw"},{"key":"2392_CR68","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.ins.2021.08.042","volume":"577","author":"A Ali","year":"2021","unstructured":"Ali A, Zhu Y, Zakarya M (2021) Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks. Inf Sci 577:852\u2013870","journal-title":"Inf Sci"},{"key":"2392_CR69","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.neunet.2021.10.021","volume":"145","author":"A Ali","year":"2022","unstructured":"Ali A, Zhu Y, Zakarya M (2022) Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction. Neural Netw 145:233\u2013247","journal-title":"Neural Netw"},{"doi-asserted-by":"crossref","unstructured":"Sun X, Ye Q, Hu H, Wang Y, Huang K, Wo T, Xu J (2023) Synthesizing realistic trajectory data with differential privacy. IEEE Trans Intell Transport Syst 24:5502\u20135515","key":"2392_CR70","DOI":"10.1109\/TITS.2023.3241290"},{"key":"2392_CR71","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TKDE.2023.3288154","volume":"36","author":"X Sun","year":"2023","unstructured":"Sun X, Ye Q, Hu H, Duan J, Xue Q, Wo T, Xu J (2023) Puts: Privacy-preserving and utility-enhancing framework for trajectory synthesization. IEEE Trans Knowl Data Eng 36:296\u2013310","journal-title":"IEEE Trans Knowl Data Eng"},{"doi-asserted-by":"crossref","unstructured":"Sun X, Ye Q, Hu H, Duan J, Wo T, Xu J, Yang R (2024) Ldprecover: recovering frequencies from poisoning attacks against local differential privacy. In: 2020 IEEE 36th international conference on data engineering (ICDE). IEEE","key":"2392_CR72","DOI":"10.1109\/ICDE60146.2024.00132"},{"doi-asserted-by":"crossref","unstructured":"Sun Y, Han J, Zhao P, Yin Z, Cheng H, Wu T (2009) Rankclus: integrating clustering with ranking for heterogeneous information network analysis. In: Proceedings of the EDBT, pp 565\u2013576","key":"2392_CR73","DOI":"10.1145\/1516360.1516426"},{"doi-asserted-by":"crossref","unstructured":"Zhao H, Yao Q, Li J, Song Y, Lee DL (2017) Meta-graph based recommendation fusion over heterogeneous information networks. In: Proceedings of the SIGKDD. ACM, pp 635\u2013644","key":"2392_CR74","DOI":"10.1145\/3097983.3098063"},{"doi-asserted-by":"crossref","unstructured":"Yu X, Ren X, Sun Y, Gu Q, Sturt B, Khandelwal U, Norick B, Han J (2014) Personalized entity recommendation: a heterogeneous information network approach. In: Proceedings of the WSDM, pp 283\u2013292","key":"2392_CR75","DOI":"10.1145\/2556195.2556259"},{"doi-asserted-by":"crossref","unstructured":"Chen H, Iyengar SK, Li J (2019) Large-scale analysis of drug combinations by integrating multiple heterogeneous information networks. In: Proceedings of the ACM-BCB, pp 67\u201376","key":"2392_CR76","DOI":"10.1145\/3307339.3342142"},{"issue":"1","key":"2392_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-017-00680-8","volume":"8","author":"Y Luo","year":"2017","unstructured":"Luo Y, Zhao X, Zhou J, Yang J, Zhang Y, Kuang W, Peng J, Chen L, Zeng J (2017) A network integration approach for drug\u2013target interaction prediction and computational drug repositioning from heterogeneous information. Nat Commun 8(1):1\u201313","journal-title":"Nat Commun"},{"doi-asserted-by":"crossref","unstructured":"Hong H, Lin Y, Yang X, Li Z, Fu K, Wang Z, Qie X, Ye J (2020) Heteta: heterogeneous information network embedding for estimating time of arrival. In: Proceedings of the SIGKDD. ACM, pp 2444\u20132454","key":"2392_CR78","DOI":"10.1145\/3394486.3403294"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02392-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02392-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02392-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T07:28:45Z","timestamp":1744010925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02392-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":78,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2392"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02392-0","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2024,9,26]]},"assertion":[{"value":"2 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}