{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:56:42Z","timestamp":1760597802570,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772082","61375058","61320106006"],"award-info":[{"award-number":["61772082","61375058","61320106006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2017YFB0803304"],"award-info":[{"award-number":["2017YFB0803304"]}]},{"name":"National High-tech R&amp;D Program","award":["2015AA050203"],"award-info":[{"award-number":["2015AA050203"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/tbdata.2018.2805366","type":"journal-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T19:16:31Z","timestamp":1518462991000},"page":"616-629","source":"Crossref","is-referenced-by-count":10,"title":["A Meta Path Based Method for Entity Set Expansion in Knowledge Graph"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5639-928X","authenticated-orcid":false,"given":"Yuyan","family":"Zheng","sequence":"first","affiliation":[{"name":"Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3734-0266","authenticated-orcid":false,"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiaohuan","family":"Cao","sequence":"additional","affiliation":[{"name":"Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0762-6562","authenticated-orcid":false,"given":"Xiaoli","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, A*STAR, Singapore"}]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014065"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775138"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401995"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1995966.1996002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963467"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.104"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.145"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321585"},{"key":"ref10","first-page":"359","article-title":"Distributional similarity vs. PU learning for entity set expansion","volume-title":"Proc. ACL Conf. Short Papers","author":"Li"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33506-8_80"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2598561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57454-7_25"},{"key":"ref16","article-title":"Introducing the knowledge graph: Things, not strings","author":"Singhal","year":"2012","journal-title":"Official Google Blog"},{"key":"ref17","article-title":"Towards a definition of knowledge graphs","author":"Ehrlinger","year":"2016","journal-title":"SEMANTiCS (Posters, Demos, SuCCESS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/SW-160218"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187923"},{"key":"ref20","first-page":"379","article-title":"Natural language questions for the web of data","volume-title":"Proc. Joint Conf Empir. Methods Natural Lang. Process. Comput Natural Lang. Learn","author":"Yahya"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610525"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5205-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.2297920"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140437"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124363"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487577"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623737"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.112"},{"key":"ref30","first-page":"1217","article-title":"MultiRank: Co-ranking for objects and relations in multi-relational data","volume-title":"Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining","author":"Li"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.57"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488445"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339778"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2483592"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2500492"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556259"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3097990"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220646"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321536"},{"volume-title":"The Philosophy of Linguistics","year":"1985","author":"Katz","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71249-9_18"},{"key":"ref42","first-page":"2280","article-title":"A probabilistic co-bootstrapping method for entity set expansion","volume-title":"Proc. Int. Conf. Comput. Linguistics","author":"Shi"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48740-3_11"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10385"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433468"},{"issue":"2","key":"ref46","first-page":"1","article-title":"A novel entity set expansion method leveraging entity semantic knowledge","volume":"27","author":"Qi","year":"2013","journal-title":"J. Chin. Inf. Process."},{"key":"ref47","first-page":"726","article-title":"Entity set expansion using topic information","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics Human Language Technol Short Papers","author":"Sadamitsu"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.86"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398565"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507873"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2014.17"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25007-6_28"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348452"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498342"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76298-0_52"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"ref57","first-page":"2802","article-title":"Learning to identify unexpected instances in the test set","volume-title":"Proc. Int. Joint Conf. Artif. Intell.","volume":"7","author":"Li"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401920"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/9773178\/08290710.pdf?arnumber=8290710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T07:21:07Z","timestamp":1709277667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8290710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":58,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2018.2805366","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2022,6,1]]}}}