{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:37:45Z","timestamp":1740202665624,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/spac46244.2018.8965440","type":"proceedings-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T02:51:08Z","timestamp":1579834268000},"page":"85-90","source":"Crossref","is-referenced-by-count":2,"title":["A Co-Evolutionary Model for Inferring Online Social Network User Behaviors"],"prefix":"10.1109","author":[{"given":"Xiaoming","family":"Liu","sequence":"first","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China,710049"}]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China,710049"}]},{"given":"Yingyue","family":"Fan","sequence":"additional","affiliation":[{"name":"Tsinghua University,Center for Intelligent and Networked Systems and TNLIST Lab,Beijing,China,100084"}]},{"given":"Xiaozi","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China,710049"}]},{"given":"Yadong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China,710049"}]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab for Intelligent Networks and Network Security,Xi&#x2019;an,China,710049"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"article-title":"Deep coevolutionary network: Embedding user and item features for recommendation","year":"2016","author":"dai","key":"ref11"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref12"},{"key":"ref13","first-page":"1717","article-title":"Learning granger causality for hawkes processes","author":"xu","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525343"},{"key":"ref16","first-page":"210","article-title":"Effectively predicting whether and when a topic will become prevalent in a social network","author":"liu","year":"2015","journal-title":"Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2016.02.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2375185"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055332"},{"key":"ref4","article-title":"Digger: Detect similar groups in heterogeneous social networks","author":"liu","year":"0","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSMC.2018.2841063","article-title":"We know who you are: Discovering similar groups across multiple social networks","author":"liu","year":"2018","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835837"},{"key":"ref8","first-page":"4296","article-title":"Inferring latent user properties from texts published in social media","author":"volkova","year":"2015","journal-title":"AAAI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5415-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2580060"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14778\/3115404.3115406"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.08.001"},{"key":"ref21","first-page":"4986","article-title":"A feasible graph partition framework for random walks implemented by parallel computing in big graph","author":"liu","year":"2015","journal-title":"Control Conference (CCC) 2015 34th Chinese"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1108243108"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1185231"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1109739109"}],"event":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2018,12,14]]},"location":"Jinan, China","end":{"date-parts":[[2018,12,17]]}},"container-title":["2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8959268\/8965430\/08965440.pdf?arnumber=8965440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:38:21Z","timestamp":1740163101000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8965440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/spac46244.2018.8965440","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}