{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:18:21Z","timestamp":1759335501376,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1714741","IIS-1715940","CNS-1815636","CNS-1815636"],"award-info":[{"award-number":["IIS-1714741","IIS-1715940","CNS-1815636","CNS-1815636"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s13278-020-0630-6","type":"journal-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T19:02:36Z","timestamp":1583866956000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Link and interaction polarity predictions in signed networks"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0080-5998","authenticated-orcid":false,"given":"Tyler","family":"Derr","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jamell","family":"Dacon","sequence":"additional","affiliation":[]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,10]]},"reference":[{"key":"630_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi F, Muzammal M, Qu Q (2018) A decentralized approach for negative link prediction in large graphs. In: 2018 IEEE international conference on data mining workshops (ICDMW). IEEE, pp 144\u2013150","DOI":"10.1109\/ICDMW.2018.00027"},{"key":"630_CR2","unstructured":"Agrawal P, Garg VK, Narayanam R (2013) Link label prediction in signed social networks. In: Proceedings of the twenty-third international joint conference on artificial intelligence, IJCAI \u201913. AAAI Press, pp 2591\u20132597"},{"key":"630_CR3","doi-asserted-by":"crossref","unstructured":"Bhowmick AK, Meneni K, Mitra B (2019) On the network embedding in sparse signed networks. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 94\u2013106","DOI":"10.1007\/978-3-030-16142-2_8"},{"issue":"5","key":"630_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1037\/h0046049","volume":"63","author":"D Cartwright","year":"1956","unstructured":"Cartwright D, Harary F (1956) Structural balance: a generalization of Heider\u2019s theory. Psychol Rev 63(5):277","journal-title":"Psychol Rev"},{"key":"630_CR5","volume":"3","author":"Y Cen","year":"2013","unstructured":"Cen Y, Gu R, Ji Y (2013) Sign inference for dynamic signed networks via dictionary learning. J Appl Math 2013(3):708581","journal-title":"J Appl Math"},{"key":"630_CR6","doi-asserted-by":"crossref","unstructured":"Chiang KY, Natarajan N, Tewari A, Dhillon IS (2011) Exploiting longer cycles for link prediction in signed networks. In: Proceedings of the 20th ACM international conference on Information and knowledge management. ACM, pp 1157\u20131162","DOI":"10.1145\/2063576.2063742"},{"issue":"1","key":"630_CR7","first-page":"1177","volume":"15","author":"KY Chiang","year":"2014","unstructured":"Chiang KY, Hsieh CJ, Natarajan N, Dhillon IS, Tewari A (2014) Prediction and clustering in signed networks: a local to global perspective. J Mach Learn Res 15(1):1177\u20131213","journal-title":"J Mach Learn Res"},{"key":"630_CR8","doi-asserted-by":"crossref","unstructured":"Derr T (2020) Network analysis with negative links. In: Proceedings of the 13th international conference on web search and data mining. ACM","DOI":"10.1145\/3336191.3372188"},{"key":"630_CR9","doi-asserted-by":"crossref","unstructured":"Derr T, Tang J (2018) Congressional vote analysis using signed networks. In: 2018 IEEE international conference on data mining workshops (ICDMW). IEEE, pp 1501\u20131502","DOI":"10.1109\/ICDMW.2018.00218"},{"key":"630_CR10","doi-asserted-by":"crossref","unstructured":"Derr T, Ma Yao, J Tang (2018a) Signed graph convolutional networks. In: 2018 IEEE international conference on data mining (ICDM). IEEE","DOI":"10.1109\/ICDM.2018.00113"},{"key":"630_CR11","doi-asserted-by":"crossref","unstructured":"Derr T, Aggarwal C, Tang J (2018b) Signed network modeling based on structural balance theory. In: Proceedings of the 2018 ACM on conference on information and knowledge management. ACM","DOI":"10.1145\/3269206.3271746"},{"key":"630_CR12","unstructured":"Derr T, Wang C, Wang S, Tang J (2018c) Relevance measurements in online signed social networks. In: Proceedings of the 14th international workshop on mining and learning with graphs (MLG)"},{"key":"630_CR13","doi-asserted-by":"crossref","unstructured":"Derr T, Wang Z, Tang J (2018d) Opinions power opinions: joint link and interaction polarity predictions in signed networks. In: Proceedings of the 2018 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM \u201918. ACM","DOI":"10.1109\/ASONAM.2018.8508263"},{"key":"630_CR14","doi-asserted-by":"crossref","unstructured":"Derr T, Johnson C, Chang Y, Tang J (2019) Balance in signed bipartite networks. In: Proceedings of the 28th ACM international conference on information and knowledge management. ACM, pp 1221\u20131230","DOI":"10.1145\/3357384.3358009"},{"issue":"4","key":"630_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2641564","volume":"32","author":"R Forsati","year":"2014","unstructured":"Forsati R, Mahdavi M, Shamsfard M, Sarwat M (2014) Matrix factorization with explicit trust and distrust side information for improved social recommendation. ACM Trans Inf Syst (TOIS) 32(4):17","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"630_CR16","doi-asserted-by":"crossref","unstructured":"Forsati R, Barjasteh I, Masrour F, Esfahanian AH, Radha H (2015) Pushtrust: an efficient recommendation algorithm by leveraging trust and distrust relations. In: Proceedings of the 9th ACM conference on recommender systems. ACM, pp 51\u201358","DOI":"10.1145\/2792838.2800198"},{"key":"630_CR17","doi-asserted-by":"crossref","unstructured":"Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web. ACM, pp 403\u2013412","DOI":"10.1145\/988672.988727"},{"key":"630_CR18","unstructured":"Hamilton WL, Ying R, Leskovec J (2017) Representation learning on graphs: methods and applications. arXiv preprint arXiv:170905584"},{"issue":"1","key":"630_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","volume":"21","author":"F Heider","year":"1946","unstructured":"Heider F (1946) Attitudes and cognitive organization. J Psychol 21(1):107\u2013112","journal-title":"J Psychol"},{"key":"630_CR20","doi-asserted-by":"crossref","unstructured":"Hsieh CJ, Chiang KY, Dhillon IS (2012) Low rank modeling of signed networks. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 507\u2013515","DOI":"10.1145\/2339530.2339612"},{"key":"630_CR21","doi-asserted-by":"crossref","unstructured":"Huang J, Shen H, Hou L, Cheng X (2019) Signed graph attention networks. arXiv preprint arXiv:190610958","DOI":"10.1007\/978-3-030-30493-5_53"},{"key":"630_CR22","doi-asserted-by":"crossref","unstructured":"Islam MR, Prakash BA, Ramakrishnan N (2018) Signet: scalable embeddings for signed networks. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 157\u2013169","DOI":"10.1007\/978-3-319-93037-4_13"},{"key":"630_CR23","doi-asserted-by":"crossref","unstructured":"Ito T, Shimbo M, Kudo T, Matsumoto Y (2005) Application of kernels to link analysis. In: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM, pp 586\u2013592","DOI":"10.1145\/1081870.1081941"},{"issue":"2","key":"630_CR24","first-page":"24","volume":"5","author":"A Javari","year":"2014","unstructured":"Javari A, Jalili M (2014) Cluster-based collaborative filtering for sign prediction in social networks with positive and negative links. ACM Trans Intell Syst Technol (TIST) 5(2):24","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"630_CR25","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"key":"630_CR26","doi-asserted-by":"crossref","unstructured":"Kunegis J, Lommatzsch A, Bauckhage C (2009) The slashdot zoo: mining a social network with negative edges. In: Proceedings of the 18th international conference on World wide web. ACM, pp 741\u2013750","DOI":"10.1145\/1526709.1526809"},{"key":"630_CR27","doi-asserted-by":"crossref","unstructured":"Kunegis J, Schmidt S, Lommatzsch A, Lerner J, De\u00a0Luca EW, Albayrak S (2010) Spectral analysis of signed graphs for clustering, prediction and visualization. In: Proceedings of the 2010 SIAM international conference on data mining. SIAM, pp 559\u2013570","DOI":"10.1137\/1.9781611972801.49"},{"key":"630_CR28","doi-asserted-by":"crossref","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010a) Predicting positive and negative links in online social networks. In: Proceedings of the 19th international conference on World wide web. ACM, pp 641\u2013650","DOI":"10.1145\/1772690.1772756"},{"key":"630_CR29","doi-asserted-by":"crossref","unstructured":"Leskovec J, Huttenlocher D, Kleinberg J (2010b) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1361\u20131370","DOI":"10.1145\/1753326.1753532"},{"key":"630_CR30","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.physa.2017.12.089","volume":"495","author":"L Li","year":"2018","unstructured":"Li L, Gu K, Zeng A, Fan Y, Di Z (2018) Modeling online social signed networks. Physica A 495:345\u2013352","journal-title":"Physica A"},{"key":"630_CR31","doi-asserted-by":"crossref","unstructured":"Lu C, Jiao P, Liu H, Wang Y, Xu H, Wang W (2019) SSNE: status signed network embedding. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 81\u201393","DOI":"10.1007\/978-3-030-16142-2_7"},{"key":"630_CR32","doi-asserted-by":"crossref","unstructured":"Ma H, Lyu MR, King I (2009) Learning to recommend with trust and distrust relationships. In: Proceedings of the third ACM conference on Recommender systems. ACM, pp 189\u2013196","DOI":"10.1145\/1639714.1639746"},{"key":"630_CR33","doi-asserted-by":"crossref","unstructured":"Moghaddam S, Jamali M, Ester M (2011) Review recommendation: personalized prediction of the quality of online reviews. In: Proceedings of the 20th ACM international conference on Information and knowledge management. ACM, pp 2249\u20132252","DOI":"10.1145\/2063576.2063938"},{"key":"630_CR34","doi-asserted-by":"crossref","unstructured":"Moghaddam S, Jamali M, Ester M (2012) Etf: extended tensor factorization model for personalizing prediction of review helpfulness. In: Proceedings of the fifth ACM international conference on Web search and data mining. ACM, pp 163\u2013172","DOI":"10.1145\/2124295.2124316"},{"key":"630_CR35","doi-asserted-by":"crossref","unstructured":"Sharma T (2012) Finding communities in weighted signed social networks. In: 2012 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE, pp 978\u2013982","DOI":"10.1109\/ASONAM.2012.242"},{"key":"630_CR36","volume":"2019","author":"P Shen","year":"2019","unstructured":"Shen P, Liu S, Wang Y, Han L (2019) Unsupervised negative link prediction in signed social networks. Math Probl Eng 2019:7348301","journal-title":"Math Probl Eng"},{"key":"630_CR37","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1155\/2009\/421425","volume":"2009","author":"X Su","year":"2009","unstructured":"Su X, Khoshgoftaar TM (2009) A survey of collaborative filtering techniques. Adv Artif Intell 2009:4","journal-title":"Adv Artif Intell"},{"issue":"4","key":"630_CR38","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1007\/s13278-013-0128-6","volume":"3","author":"P Symeonidis","year":"2013","unstructured":"Symeonidis P, Mantas N (2013) Spectral clustering for link prediction in social networks with positive and negative links. Soc Netw Anal Min 3(4):1433\u20131447","journal-title":"Soc Netw Anal Min"},{"issue":"4","key":"630_CR39","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s11280-013-0228-2","volume":"17","author":"P Symeonidis","year":"2014","unstructured":"Symeonidis P, Tiakas E (2014) Transitive node similarity: predicting and recommending links in signed social networks. World Wide Web 17(4):743\u2013776","journal-title":"World Wide Web"},{"key":"630_CR40","doi-asserted-by":"crossref","unstructured":"Tang J, Gao H, Hu X, Liu H (2013) Context-aware review helpfulness rating prediction. In: Proceedings of the 7th ACM conference on Recommender systems. ACM, pp 1\u20138","DOI":"10.1145\/2507157.2507183"},{"key":"630_CR41","doi-asserted-by":"crossref","unstructured":"Tang J, Hu X, Liu H (2014) Is distrust the negation of trust? The value of distrust in social media. In: Proceedings of the 25th ACM conference on Hypertext and social media. ACM, pp 148\u2013157","DOI":"10.1145\/2631775.2631793"},{"key":"630_CR42","doi-asserted-by":"crossref","unstructured":"Tang J, Chang S, Aggarwal C, Liu H (2015) Negative link prediction in social media. In: Proceedings of the eighth ACM international conference on web search and data mining. ACM, pp 87\u201396","DOI":"10.1145\/2684822.2685295"},{"key":"630_CR43","doi-asserted-by":"crossref","unstructured":"Tang J, Aggarwal C, Liu H (2016a) Node classification in signed social networks. In: Proceedings of the 2016 SIAM international conference on data mining. SIAM, pp 54\u201362","DOI":"10.1137\/1.9781611974348.7"},{"issue":"3","key":"630_CR44","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2956185","volume":"49","author":"J Tang","year":"2016","unstructured":"Tang J, Chang Y, Aggarwal C, Liu H (2016b) A survey of signed network mining in social media. ACM Comput Surv (CSUR) 49(3):42","journal-title":"ACM Comput Surv (CSUR)"},{"key":"630_CR45","unstructured":"Victor P, Cornelis C, De Cock M, Teredesai A (2009) Trust-and distrust-based recommendations for controversial reviews. In: Web Science Conference (WebSci\u201909: Society On-Line), 161"},{"issue":"2","key":"630_CR46","first-page":"6","volume":"7","author":"P Victor","year":"2013","unstructured":"Victor P, Verbiest N, Cornelis C, Cock MD (2013) Enhancing the trust-based recommendation process with explicit distrust. ACM Trans Web (TWEB) 7(2):6","journal-title":"ACM Trans Web (TWEB)"},{"key":"630_CR47","volume":"2019","author":"C Wan","year":"2019","unstructured":"Wan C, Fang Y, Wang C, Lv Y, Tian Z, Wang Y (2019) SignRank: a novel random walking based ranking algorithm in signed networks. Wirel Commun Mobile Comput 2019:4813717","journal-title":"Wirel Commun Mobile Comput"},{"key":"630_CR48","doi-asserted-by":"crossref","unstructured":"Wang S, Tang J, Liu H (2015) Toward dual roles of users in recommender systems. In: Proceedings of the 24th ACM international on conference on information and knowledge management. ACM, pp 1651\u20131660","DOI":"10.1145\/2806416.2806520"},{"key":"630_CR49","doi-asserted-by":"crossref","unstructured":"Wang S, Tang J, Aggarwal C, Chang Y, Liu H (2017) Signed network embedding in social media. In: Proceedings of the 2017 SIAM international conference on data mining. SIAM, pp 327\u2013335","DOI":"10.1137\/1.9781611974973.37"},{"key":"630_CR50","doi-asserted-by":"crossref","unstructured":"Wu Z, Aggarwal CC, Sun J (2016) The troll-trust model for ranking in signed networks. In: Proceedings of the Ninth ACM international conference on Web Search and Data Mining. ACM, pp 447\u2013456","DOI":"10.1145\/2835776.2835816"},{"key":"630_CR51","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2019) A comprehensive survey on graph neural networks. arXiv preprint arXiv:190100596"},{"issue":"1","key":"630_CR52","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TBDATA.2018.2850013","volume":"6","author":"D Zhang","year":"2018","unstructured":"Zhang D, Yin J, Zhu X, Zhang C (2018) Network representation learning: a survey. IEEE Trans Big Data 6(1):3\u201328","journal-title":"IEEE Trans Big Data"},{"key":"630_CR53","doi-asserted-by":"crossref","unstructured":"Zheng Q, Skillicorn DB (2015) Spectral embedding of signed networks. In: Proceedings of the 2015 SIAM international conference on data mining. SIAM, pp 55\u201363","DOI":"10.1137\/1.9781611974010.7"},{"issue":"4\u20135","key":"630_CR54","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","volume":"7","author":"CN Ziegler","year":"2005","unstructured":"Ziegler CN, Lausen G (2005) Propagation models for trust and distrust in social networks. Inf Syst Front 7(4\u20135):337\u2013358","journal-title":"Inf Syst Front"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-0630-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-020-0630-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-0630-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T01:11:52Z","timestamp":1615338712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-020-0630-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,10]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["630"],"URL":"https:\/\/doi.org\/10.1007\/s13278-020-0630-6","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2020,3,10]]},"assertion":[{"value":"6 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"18"}}