{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:26:21Z","timestamp":1775244381781,"version":"3.50.1"},"reference-count":163,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,8,17]],"date-time":"2016-08-17T00:00:00Z","timestamp":1471392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"the U.S. Army Research Office","doi-asserted-by":"crossref","award":["W911NF-15-1-0328"],"award-info":[{"award-number":["W911NF-15-1-0328"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000183","name":"U.S. Army Research Office","doi-asserted-by":"crossref","award":["025071"],"award-info":[{"award-number":["025071"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000006","name":"the Office of Naval Research","doi-asserted-by":"crossref","award":["N000141410095"],"award-info":[{"award-number":["N000141410095"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Army Research Laboratory","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2017,9,30]]},"abstract":"<jats:p>Many real-world relations can be represented by signed networks with positive and negative links, as a result of which signed network analysis has attracted increasing attention from multiple disciplines. With the increasing prevalence of social media networks, signed network analysis has evolved from developing and measuring theories to mining tasks. In this article, we present a review of mining signed networks in the context of social media and discuss some promising research directions and new frontiers. We begin by giving basic concepts and unique properties and principles of signed networks. Then we classify and review tasks of signed network mining with representative algorithms. We also delineate some tasks that have not been extensively studied with formal definitions and also propose research directions to expand the field of signed network mining.<\/jats:p>","DOI":"10.1145\/2956185","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:25:39Z","timestamp":1472214339000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":217,"title":["A Survey of Signed Network Mining in Social Media"],"prefix":"10.1145","volume":"49","author":[{"given":"Jiliang","family":"Tang","sequence":"first","affiliation":[{"name":"Michigan State University, East Lansing, MI"}]},{"given":"Yi","family":"Chang","sequence":"additional","affiliation":[{"name":"Yahoo Research, Sunnyvalue, CA"}]},{"given":"Charu","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown, NY"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ"}]}],"member":"320","published-online":{"date-parts":[[2016,8,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631796"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601412"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Charu C. Aggarwal. 2011. An Introduction to Social Network Data Analytics. Springer.   Charu C. Aggarwal. 2011. An Introduction to Social Network Data Analytics. Springer.","DOI":"10.1007\/978-1-4419-8462-3"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 23rd International Joint Conference on Artificial Intelligence. AAAI Press, 2591--2597","author":"Agrawal Priyanka","year":"2013"},{"key":"e_1_2_1_5_1","unstructured":"Nir Ailon Yudong Chen and Xu Huan. 2013. Breaking the small cluster barrier of graph clustering. arXiv preprint arXiv:1302.4549 (2013).  Nir Ailon Yudong Chen and Xu Huan. 2013. Breaking the small cluster barrier of graph clustering. arXiv preprint arXiv:1302.4549 (2013)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492641"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.48"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.72.036121"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1017\/S000712340000973X"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000033116.57574.95"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 10th International AAAI Conference on Web and Social Media.","author":"Beigi Ghazaleh","year":"2016"},{"key":"e_1_2_1_12_1","first-page":"585","article-title":"Laplacian eigenmaps and spectral techniques for embedding and clustering","volume":"14","author":"Belkin Mikhail","year":"2001","journal-title":"NIPS"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248632"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Smriti Bhagat Graham Cormode and S. Muthukrishnan. 2011. Node classification in social networks. In Social Network Data Analytics. Springer 115--148.   Smriti Bhagat Graham Cormode and S. Muthukrishnan. 2011. Node classification in social networks. In Social Network Data Analytics. Springer 115--148.","DOI":"10.1007\/978-1-4419-8462-3_5"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104334"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.174"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.08.007"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Christian Borgs Jennifer Chayes Adam Kalai Azarakhsh Malekian and Moshe Tennenholtz. 2010. A novel approach to propagating distrust. Internet Netw. Econ. (2010) 87--105.   Christian Borgs Jennifer Chayes Adam Kalai Azarakhsh Malekian and Moshe Tennenholtz. 2010. A novel approach to propagating distrust. Internet Netw. Econ. (2010) 87--105.","DOI":"10.1007\/978-3-642-17572-5_8"},{"key":"e_1_2_1_19_1","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"Borzymek Piotr"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835848"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289506"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Yi Cen Rentao Gu and Yuefeng Ji. 2013. Sign inference for dynamic signed networks via dictionary learning. J. Appl. Math. 2013 (2013).  Yi Cen Rentao Gu and Yuefeng Ji. 2013. Sign inference for dynamic signed networks via dictionary learning. J. Appl. Math. 2013 (2013).","DOI":"10.1155\/2013\/708581"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.10.037"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00527ED1V01Y201308DTM037"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_2_1_27_1","unstructured":"Yi Chen Xiao-long Wang and Bo Yuan. 2013. Overlapping community detection in signed networks. arXiv preprint arXiv:1310.4023 (2013).  Yi Chen Xiao-long Wang and Bo Yuan. 2013. Overlapping community detection in signed networks. arXiv preprint arXiv:1310.4023 (2013)."},{"key":"e_1_2_1_28_1","unstructured":"Kai-Yang Chiang Cho-Jui Hsieh Nagarajan Natarajan Ambuj Tewari and Inderjit S. Dhillon. 2013. Prediction and clustering in signed networks: A local to global perspective. arXiv preprint arXiv:1302.5145 (2013).  Kai-Yang Chiang Cho-Jui Hsieh Nagarajan Natarajan Ambuj Tewari and Inderjit S. Dhillon. 2013. Prediction and clustering in signed networks: A local to global perspective. arXiv preprint arXiv:1302.5145 (2013)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063742"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396841"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2005.11.002"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2012.678194"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/60.3.581"},{"key":"e_1_2_1_34_1","unstructured":"David Cohn and Huan Chang. 2000. Learning to probabilistically identify authoritative documents. In ICML. Citeseer 167--174.   David Cohn and Huan Chang. 2000. Learning to probabilistically identify authoritative documents. In ICML. Citeseer 167--174."},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"James S. Coleman. 1988. Social capital in the creation of human capital. Am. J. Sociol. (1988) S95--S120.  James S. Coleman. 1988. Social capital in the creation of human capital. Am. J. Sociol. (1988) S95--S120.","DOI":"10.1086\/228943"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32589-2_28"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872676702000206"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11676935_14"},{"key":"e_1_2_1_39_1","unstructured":"Cristobald de Kerchove and others. 2009. Ranking Large Networks: Leadership Optimization and Distrust. Ph.D. Dissertation. UCL.  Cristobald de Kerchove and others. 2009. Ranking Large Networks: Leadership Optimization and Distrust. Ph.D. Dissertation. UCL."},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Cristobald De Kerchove and Paul Van Dooren. 2008. The PageTrust algorithm: How to rank web pages when negative links are allowed? In SDM. SIAM 346--352.  Cristobald De Kerchove and Paul Van Dooren. 2008. The PageTrust algorithm: How to rank web pages when negative links are allowed? In SDM. SIAM 346--352.","DOI":"10.1137\/1.9781611972788.31"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(95)00259-6"},{"key":"e_1_2_1_42_1","volume-title":"Risk and Trust (Passat), 2011 IEEE 3rd International Conference on and 2011 IEEE 3rd International Conference on Social Computing (SocialCom). IEEE, 418--424","author":"DuBois Thomas","year":"2011"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1109521108"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2012\/08\/P08003"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641564"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(79)90004-2"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117456"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_2_1_49_1","first-page":"1","article-title":"Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata","volume":"9","author":"Goldenberg Jacob","year":"2001","journal-title":"Acad. Market. Sci. Rev."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.016114"},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Mark Granovetter. 1978. Threshold models of collective behavior. Am. J. Sociol. (1978) 1420--1443.  Mark Granovetter. 1978. Threshold models of collective behavior. Am. J. Sociol. (1978) 1420--1443.","DOI":"10.1086\/226707"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/bs.3830040405"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1307\/mmj\/1028989917"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-4896(80)90010-4"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1979.9989889"},{"key":"e_1_2_1_57_1","first-page":"3","article-title":"Distrust: Manifestations and management","volume":"8","author":"Hardin Russell","year":"2004","journal-title":"Distrust"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390948.2390956"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/2392954.2392956"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511513"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1946.9917275"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0027358"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10114-004-0437-9"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339612"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433465"},{"key":"e_1_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Bernardo A. Huberman Daniel M. Romero and Fang Wu. 2008. Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045 (2008).  Bernardo A. Huberman Daniel M. Romero and Fang Wu. 2008. Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045 (2008).","DOI":"10.5210\/fm.v14i1.2317"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501977"},{"key":"e_1_2_1_68_1","unstructured":"Jonathan Q. Jiang. 2015. Stochastic blockmodel and exploratory analysis in signed networks. arXiv preprint arXiv:1501.00594 (2015).  Jonathan Q. Jiang. 2015. Stochastic blockmodel and exploratory analysis in signed networks. arXiv preprint arXiv:1501.00594 (2015)."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_71_1","unstructured":"Anne-Marie Kermarrec and Christopher Thraves. 2014. Signed graph embedding: When everybody can sit closer to friends than enemies. arXiv preprint arXiv:1405.5023 (2014).  Anne-Marie Kermarrec and Christopher Thraves. 2014. Signed graph embedding: When everybody can sit closer to friends than enemies. arXiv preprint arXiv:1405.5023 (2014)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 21st National Security Conference. Citeseer, 16--29","author":"Knapskog S. J.","year":"1998"},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","unstructured":"David Knoke and Song Yang. 2008. Social Network Analysis. Vol. 154. Sage.  David Knoke and Song Yang. 2008. Social Network Analysis. Vol. 154. Sage.","DOI":"10.4135\/9781412985864"},{"key":"e_1_2_1_75_1","first-page":"1395","article-title":"Improvement of clustering algorithm FEC for signed networks","volume":"31","author":"Kong Ling-Qi","year":"2011","journal-title":"J. Comput. Appl."},{"key":"e_1_2_1_76_1","unstructured":"J\u00e9r\u00f4me Kunegis. 2014. Applications of structural balance in signed social networks. arXiv preprint arXiv:1402.6865 (2014).  J\u00e9r\u00f4me Kunegis. 2014. Applications of structural balance in signed social networks. arXiv preprint arXiv:1402.6865 (2014)."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526809"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488452"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.49"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Yann Lecun Bengio Yoshua and Hinton Geoffrey. 2015. Deep learning. Nature 521 7553 (2015) 436--444.  Yann Lecun Bengio Yoshua and Hinton Geoffrey. 2015. Deep learning. Nature 521 7553 (2015) 436--444.","DOI":"10.1038\/nature14539"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0102199"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021798491350084X"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433478"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2013.862884"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-013-1060-4"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:7"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143918"},{"key":"e_1_2_1_90_1","first-page":"1","article-title":"Random walks on graphs: A survey","volume":"2","author":"Lov\u00e1sz L\u00e1szl\u00f3","year":"1993","journal-title":"Combinatorics"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639746"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935877"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124193022001006"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1013213108"},{"key":"e_1_2_1_95_1","volume-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)","author":"Masaeli Mahdokht"},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of the National Conference on artificial Intelligence","volume":"20","author":"Massa Paolo","year":"2005"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.066112"},{"key":"e_1_2_1_98_1","doi-asserted-by":"crossref","unstructured":"Miller McPherson Lynn Smith-Lovin and James M. Cook. 2001. Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. (2001) 415--444.  Miller McPherson Lynn Smith-Lovin and James M. Cook. 2001. Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. (2001) 415--444.","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420080313"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420090309"},{"key":"e_1_2_1_102_1","unstructured":"Uma Nalluri. 2014. Utility of distrust in online recommender systems. Capstone Project Report.  Uma Nalluri. 2014. Utility of distrust in online recommender systems. Capstone Project Report."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_2_1_104_1","unstructured":"Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd. 1999. The PageRank citation ranking: Bringing order to the web. Stanford InfoLab.  Lawrence Page Sergey Brin Rajeev Motwani and Terry Winograd. 1999. The PageRank citation ranking: Bringing order to the web. Stanford InfoLab."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0224-z"},{"key":"e_1_2_1_106_1","doi-asserted-by":"crossref","unstructured":"Athanasios Papaoikonomou Magdalini Kardara Konstantinos Tserpes and Dora Varvarigou. 2014. Edge sign prediction in social networks via frequent subgraph discovery. IEEE Internet Comput. (2014).  Athanasios Papaoikonomou Magdalini Kardara Konstantinos Tserpes and Dora Varvarigou. 2014. Edge sign prediction in social networks via frequent subgraph discovery. IEEE Internet Comput. (2014).","DOI":"10.1109\/MIC.2014.82"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-013-9604-1"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.69"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2009.58"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459357"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.021118"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.75.026106"},{"key":"e_1_2_1_113_1","volume-title":"The Semantic Web-ISWC","author":"Richardson Matthew","year":"2003"},{"key":"e_1_2_1_114_1","unstructured":"Thomas C. Schelling. 2006. Micromotives and Macrobehavior. W. W. Norton & Company.  Thomas C. Schelling. 2006. Micromotives and Macrobehavior. W. W. Norton & Company."},{"key":"e_1_2_1_115_1","unstructured":"Matthew Schultz and Thorsten Joachims. 2004. Learning a distance metric from relative comparisons. Advances in Neural Information Processing Systems (NIPS) (2004) 41.   Matthew Schultz and Thorsten Joachims. 2004. Learning a distance metric from relative comparisons. Advances in Neural Information Processing Systems (NIPS) (2004) 41."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-014-0404-7"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0172-x"},{"key":"e_1_2_1_119_1","volume-title":"ICCEA09, Manila 9","author":"Sharma Tushar","year":"2009"},{"key":"e_1_2_1_120_1","volume-title":"Community Structure: An Introduction","author":"Shen Hua-Wei","year":"2013"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102455"},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the 1st Workshop on Unsupervised Learning in NLP. Association for Computational Linguistics, 53--63","author":"Speriosu Michael","year":"2011"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1994.2.3.221"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0128-6"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-013-0228-2"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1004008107"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020614"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.7"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882971"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685295"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661988"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0141-9"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631793"},{"key":"e_1_2_1_134_1","doi-asserted-by":"crossref","unstructured":"Jiliang Tang and Huan Liu. 2012. Feature selection with linked data in social media. In SDM. SIAM 118--128.  Jiliang Tang and Huan Liu. 2012. Feature selection with linked data in social media. In SDM. SIAM 118--128.","DOI":"10.1137\/1.9781611972825.11"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124382"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2630813"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019280"},{"key":"e_1_2_1_138_1","unstructured":"Howard Francis Taylor. 1970. Balance in Small Groups. Van Nostrand Reinhold Co.  Howard Francis Taylor. 1970. Balance in Small Groups. Van Nostrand Reinhold Co."},{"key":"e_1_2_1_139_1","volume-title":"Algorithms and Models for the Web Graph","author":"Terzi Evimaria"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.036115"},{"key":"e_1_2_1_141_1","doi-asserted-by":"crossref","unstructured":"Vincent Traag Yurii Nesterov and Paul Van Dooren. 2010. Exponential ranking: Taking into account negative links. Soc. Inform. (2010) 192--202.   Vincent Traag Yurii Nesterov and Paul Van Dooren. 2010. Exponential ranking: Taking into account negative links. Soc. Inform. (2010) 192--202.","DOI":"10.1007\/978-3-642-16567-2_14"},{"key":"e_1_2_1_142_1","volume-title":"WWW2006 Conference Proceedings, Special Interest Tracks, Posters and Workshops.","author":"Victor Patricia"},{"key":"e_1_2_1_143_1","volume-title":"Web Science Conference (WebSci\u201909: Society On-Line).","author":"Victor Patricia","year":"2009"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460383.2460385"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2007.1159"},{"key":"e_1_2_1_146_1","first-page":"577","article-title":"Constrained k-means clustering with background knowledge","volume":"1","author":"Wagstaff Kiri","year":"2001","journal-title":"ICML"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1002\/tee.22017"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835816"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1061"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348359"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488517"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662056"},{"key":"e_1_2_1_154_1","unstructured":"Xiaofeng Yu and Jun Qing Xie. 2014b. Modeling mutual influence between social actions and social ties. (2014).  Xiaofeng Yu and Jun Qing Xie. 2014b. Modeling mutual influence between social actions and social ties. (2014)."},{"key":"e_1_2_1_155_1","doi-asserted-by":"crossref","unstructured":"Reza Zafarani Mohammad Ali Abbasi and Huan Liu. 2014. Social Media Mining: An Introduction. Cambridge University Press.   Reza Zafarani Mohammad Ali Abbasi and Huan Liu. 2014. Social Media Mining: An Introduction. Cambridge University Press.","DOI":"10.1017\/CBO9781139088510"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_44"},{"key":"e_1_2_1_157_1","article-title":"Characterization and edge sign prediction in signed networks","volume":"1","author":"Zhang Tongda","year":"2013","journal-title":"J. Industr. Intell. Inform."},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_2_1_159_1","doi-asserted-by":"crossref","unstructured":"Q. Zheng and D. B. Skillicorn. 2015. Spectral embedding of signed networks. In SDM. SIAM.  Q. Zheng and D. B. Skillicorn. 2015. Spectral embedding of signed networks. In SDM. SIAM.","DOI":"10.1137\/1.9781611974010.7"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9483-8"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277825"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2010.5606460"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2956185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2956185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:43Z","timestamp":1750217983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2956185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,17]]},"references-count":163,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9,30]]}},"alternative-id":["10.1145\/2956185"],"URL":"https:\/\/doi.org\/10.1145\/2956185","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,17]]},"assertion":[{"value":"2015-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}