{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:02:39Z","timestamp":1776888159508,"version":"3.51.2"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-22-1-2363"],"award-info":[{"award-number":["N00014-22-1-2363"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"ARO","doi-asserted-by":"publisher","award":["W911NF2410094,W911NF1910269"],"award-info":[{"award-number":["W911NF2410094,W911NF1910269"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-2311653,DBI2412522,A25-0139-S009"],"award-info":[{"award-number":["CCF-2311653,DBI2412522,A25-0139-S009"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007911","name":"UCSD\/NSF","doi-asserted-by":"publisher","award":["CCF-2148313"],"award-info":[{"award-number":["CCF-2148313"]}],"id":[{"id":"10.13039\/100007911","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/isit63088.2025.11195567","type":"proceedings-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:48:08Z","timestamp":1760982488000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Causal Graph Identification Under Soft Intervention"],"prefix":"10.1109","author":[{"given":"Chen","family":"Peng","sequence":"first","affiliation":[{"name":"University of Southern California,Department of Electrical &#x0026; Computer Engineering,Los Angeles,CA,US"}]},{"given":"Urbashi","family":"Mitra","sequence":"additional","affiliation":[{"name":"University of Southern California,Department of Electrical &#x0026; Computer Engineering,Los Angeles,CA,US"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.012809.102702"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510479113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139979573"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0197-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1754.001.0001"},{"key":"ref7","first-page":"507","article-title":"Optimal structure identification with greedy search","volume":"3","author":"Chickering","year":"2002","journal-title":"Journal of machine learning research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000000281"},{"key":"ref9","first-page":"241","article-title":"Advances in exact bayesian structure discovery in bayesian networks","volume-title":"Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence","author":"Koivisto","year":"2006"},{"key":"ref10","article-title":"Dags with no tears: Continuous optimization for structure learning","volume":"31","author":"Zheng","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref11","first-page":"17943","article-title":"On the role of sparsity and dag constraints for learning linear dags","volume":"33","author":"Ng","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref12","first-page":"8226","article-title":"Dagma: Learning dags via mmatrices and a log-determinant acyclicity characterization","volume":"35","author":"Bello","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","volume-title":"Elements of causal inference: foundations and learning algorithms","author":"Peters","year":"2017"},{"key":"ref14","article-title":"Almost optimal intervention sets for causal discovery","author":"Eberhardt","year":"2012","journal-title":"arXiv preprint"},{"issue":"99","key":"ref15","first-page":"1","article-title":"Joint causal inference from multiple contexts","volume":"21","author":"Mooij","year":"2020","journal-title":"Journal of machine learning research"},{"key":"ref16","article-title":"Efficient neural causal discovery without acyclicity constraints","volume-title":"International Conference on Learning Representations","author":"Lippe","year":"2021"},{"key":"ref17","first-page":"13104","article-title":"Amortized inference for causal structure learning","volume":"35","author":"Lorch","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3487301"},{"key":"ref19","first-page":"86574","article-title":"Interventional causal discovery in a mixture of dags","volume":"37","author":"Var\u0131c\u0131","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2007.10.053"},{"issue":"11","key":"ref21","article-title":"Counterfactual reasoning and learning systems: The example of computational advertising","volume":"14","author":"Bottou","year":"2013","journal-title":"Journal of Machine Learning Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510493113"},{"key":"ref23","article-title":"Characterization and learning of causal graphs with latent variables from soft interventions","volume":"32","author":"Kocaoglu","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2025.3564303"},{"key":"ref25","article-title":"Identifiability guarantees for causal disentanglement from soft interventions","volume":"36","author":"Zhang","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref26","article-title":"Linear causal bandits: Unknown graph and soft interventions","author":"Yan","year":"2024","journal-title":"arXiv preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619696"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/ast043"},{"key":"ref29","volume-title":"Introduction to linear algebra","author":"Strang","year":"2022"},{"key":"ref30","volume-title":"Supplementary file for causal graph identification under soft intervention","author":"Peng","year":"2025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"}],"event":{"name":"2025 IEEE International Symposium on Information Theory (ISIT)","location":"Ann Arbor, MI, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11195206\/11195207\/11195567.pdf?arnumber=11195567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:30:23Z","timestamp":1773347423000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11195567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/isit63088.2025.11195567","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}