{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:09Z","timestamp":1750306809903,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":0,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,2,24]],"date-time":"2014-02-24T00:00:00Z","timestamp":1393200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,24]]},"DOI":"10.1145\/2556195.2556198","type":"proceedings-article","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T14:10:41Z","timestamp":1392732641000},"page":"677-678","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Big graph mining for the web and social media"],"prefix":"10.1145","author":[{"given":"U.","family":"Kang","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Leman","family":"Akoglu","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Duen Horng","family":"Chau","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,2,24]]},"event":{"name":"WSDM 2014: Seventh ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"New York New York USA","acronym":"WSDM 2014"},"container-title":["Proceedings of the 7th ACM international conference on Web search and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556195.2556198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556195.2556198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:05Z","timestamp":1750232105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556195.2556198"}},"subtitle":["algorithms, anomaly detection, and applications"],"short-title":[],"issued":{"date-parts":[[2014,2,24]]},"references-count":0,"alternative-id":["10.1145\/2556195.2556198","10.1145\/2556195"],"URL":"https:\/\/doi.org\/10.1145\/2556195.2556198","relation":{},"subject":[],"published":{"date-parts":[[2014,2,24]]},"assertion":[{"value":"2014-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}