{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T21:23:50Z","timestamp":1746307430080,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003213","name":"Beijing Municipal Education Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,21]]},"DOI":"10.1109\/cog51982.2022.9893595","type":"proceedings-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T19:33:31Z","timestamp":1663702411000},"page":"338-344","source":"Crossref","is-referenced-by-count":7,"title":["MOBA Game Item Recommendation via Relation-aware Graph Attention Network"],"prefix":"10.1109","author":[{"given":"Lijuan","family":"Duan","sequence":"first","affiliation":[{"name":"Beijing University of Technology China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection,Faculty of Information Technology,Beijing,China"}]},{"given":"Shuxin","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Technology Beijing Key Laboratory of Trusted Computing,Faculty of Information Technology,Beijing,China"}]},{"given":"Wenbo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Technology Beijing Key Laboratory of Trusted Computing,Faculty of Information Technology,Beijing,China"}]},{"given":"Wenjian","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Technology China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection,Faculty of Information Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"journal-title":"League of Legends Ranked Matches","year":"2017","author":"campanelli","key":"ref11"},{"journal-title":"Dota 2 Matches Dataset","year":"2020","author":"anzelmo","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411996"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411876"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290989"},{"key":"ref16","article-title":"Contextualized graph attention network for chararecommendation with item knowledge graph","author":"liu","year":"2021","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"journal-title":"Improving Accuracy and Diversity in Matching of ecommendation with Diversified Preference Network","year":"2021","author":"xie","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313442"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316457"},{"key":"ref3","article-title":"Draft-analysis of the ancients: predicting draft picks in dota 2 using machine learning","author":"summerville","year":"2016","journal-title":"Artificial Intelligence for Interactive Digital Entertainment Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01681-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3346986"},{"key":"ref7","article-title":"Riot&#x2019;s&#x2019; League of Legends&#x2019; reveals astonishing 27 million daily players","author":"tassi","year":"2014","journal-title":"67 million monthly Retrieved"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2018.2844121"},{"key":"ref1","article-title":"Moba: a new arena for game ai","author":"silva","year":"2017","journal-title":"arXiv preprint arXiv 1705 10443"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412211"}],"event":{"name":"2022 IEEE Conference on Games (CoG)","start":{"date-parts":[[2022,8,21]]},"location":"Beijing, China","end":{"date-parts":[[2022,8,24]]}},"container-title":["2022 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9893561\/9893544\/09893595.pdf?arnumber=9893595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T20:25:36Z","timestamp":1665433536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9893595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,21]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cog51982.2022.9893595","relation":{},"subject":[],"published":{"date-parts":[[2022,8,21]]}}}