{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T02:17:45Z","timestamp":1774491465164,"version":"3.50.1"},"reference-count":113,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGKDD Explor. Newsl."],"published-print":{"date-parts":[[2018,5,29]]},"abstract":"<jats:p>Urban safety and security play a crucial role in improving life quality of citizen and the sustainable development of urban. Traditional urban crime research focused on leveraging demographic data, which is insufficient to capture the complexity and dynamics of urban crimes. In the era of big data, we have witnessed advanced ways to collect and integrate fine-grained urban, mobile, and public service data that contains various crime-related sources as well as rich environmental and social information. The availability of big urban data provides unprecedented opportunities, which enable us to conduct advanced urban crime research. Meanwhile, environmental and social crime theories from criminology provide better understandings about the behaviors of offenders and complex patterns of crime in urban. They can not only help bridge the gap from what we have (big urban data) to what we want to understand about urban crime (urban crime analysis); but also guide us to build computational models for crime. In this article, we give an overview to key theories from criminology, summarize crime analysis on urban data, review state-of-the-art algorithms for various types of computational crime tasks and discuss some appealing research directions that can bring the urban crime research into a new frontier.<\/jats:p>","DOI":"10.1145\/3229329.3229331","type":"journal-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T12:24:34Z","timestamp":1527769474000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Crime in Urban Areas:"],"prefix":"10.1145","volume":"20","author":[{"given":"Xiangyu","family":"Zhao","sequence":"first","affiliation":[{"name":"Data Science and Engineering Lab, Michigan State University"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Data Science and Engineering Lab, Michigan State University"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2016.0089"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.08.001"},{"key":"e_1_2_1_3_1","volume-title":"Research Bulletin","author":"Bates S.","year":"1987"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/ecoj.12099"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/130922744"},{"key":"e_1_2_1_6_1","unstructured":"K. Bowers M. Newton and R. Nutter. A gis-linked database for monitoring repeat domestic burglary. Mapping and Analysing Crime Data-Lessons from Research and Practice pages 120-137 2001.  K. Bowers M. Newton and R. Nutter. A gis-linked database for monitoring repeat domestic burglary. Mapping and Analysing Crime Data-Lessons from Research and Practice pages 120-137 2001."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804618"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Braithwaite. Inequality Crime and Public Policy (Routledge Revivals). Routledge 2013.  J. Braithwaite. Inequality Crime and Public Policy (Routledge Revivals). Routledge 2013.","DOI":"10.4324\/9780203796436"},{"key":"e_1_2_1_9_1","unstructured":"P. J. Brantingham P. L. Brantingham etal Environmental criminology. Sage Publications Beverly Hills CA 1981.  P. J. Brantingham P. L. Brantingham et al. Environmental criminology. Sage Publications Beverly Hills CA 1981."},{"key":"e_1_2_1_10_1","unstructured":"P. J. Brantingham and C. R. Jeffery. Afterword: Crime space and criminological theory. Environmental criminology pages 227-237 1981.  P. J. Brantingham and C. R. Jeffery. Afterword: Crime space and criminological theory. Environmental criminology pages 227-237 1981."},{"key":"e_1_2_1_11_1","unstructured":"P. L. Brantingham and P. J. Brantingham. Notes on the geometry of crime. Environmental criminology 1981.  P. L. Brantingham and P. J. Brantingham. Notes on the geometry of crime. Environmental criminology 1981."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.012"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.023"},{"key":"e_1_2_1_14_1","volume-title":"John Wiley & Sons","author":"Chainey S.","year":"2013"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379538"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2017.1380201"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.222"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2183361"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484767"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2010.5642353"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"R. Clarke. Introduction: Criminology routine activity and rational choice (from routine activity and rational choice: Advances in criminological theory volume 5 p 1-14 1993 ronald v. clarke and marcus felson eds.-see ncj-159998). 1993.  R. Clarke. Introduction: Criminology routine activity and rational choice (from routine activity and rational choice: Advances in criminological theory volume 5 p 1-14 1993 ronald v. clarke and marcus felson eds.-see ncj-159998). 1993.","DOI":"10.4324\/9781315128788-1"},{"key":"e_1_2_1_22_1","volume-title":"Police Research Series","author":"Clarke R. V.","year":"1998"},{"key":"e_1_2_1_23_1","unstructured":"R. V. G. Clarke. Situational crime prevention. Criminal Justice Press Monsey NY 1997.  R. V. G. Clarke. Situational crime prevention. Criminal Justice Press Monsey NY 1997."},{"key":"e_1_2_1_24_1","unstructured":"A. K. Cohen. Delinquent boys (glencoe ill 1955.  A. K. Cohen. Delinquent boys (glencoe ill 1955."},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"L. E. Cohen and M. Felson. Social change and crime rate trends: A routine activity approach. American sociological review pages 588-608 1979.  L. E. Cohen and M. Felson. Social change and crime rate trends: A routine activity approach. American sociological review pages 588-608 1979.","DOI":"10.2307\/2094589"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"E. G. Cohn. Weather and crime. British journal of criminology 30(1):51-64 1990.  E. G. Cohn. Weather and crime. British journal of criminology 30(1):51-64 1990.","DOI":"10.1093\/oxfordjournals.bjc.a047980"},{"key":"e_1_2_1_27_1","volume-title":"Transaction Publishers","author":"Cornish D. B.","year":"2014"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0264-2751(00)00008-1"},{"key":"e_1_2_1_29_1","volume-title":"Oxford University Press","author":"Crawford A.","year":"2017"},{"key":"e_1_2_1_30_1","volume-title":"Springer Science & Business Media","author":"Daley D. J.","year":"2007"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2016.049"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.37"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"M. R. D'Orsogna and M. Perc. Statistical physics of crime: A review. Physics of life reviews 12:1-21 2015.  M. R. D'Orsogna and M. Perc. Statistical physics of crime: A review. Physics of life reviews 12:1-21 2015.","DOI":"10.1016\/j.plrev.2014.11.001"},{"key":"e_1_2_1_34_1","unstructured":"J. Eck S. Chainey J. Cameron and R. Wilson. Mapping crime: Understanding hotspots. 2005.  J. Eck S. Chainey J. Cameron and R. Wilson. Mapping crime: Understanding hotspots. 2005."},{"key":"e_1_2_1_35_1","volume-title":"National Institute of Justice","author":"Eck J. E.","year":"1997"},{"key":"e_1_2_1_36_1","first-page":"313","volume-title":"Education, income, and human behavior","author":"Ehrlich I.","year":"1975"},{"key":"e_1_2_1_37_1","volume-title":"CA: Pine","author":"Felson M.","year":"1994"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01561001"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.024"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.bjc.a048222"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/00222500500544052"},{"key":"e_1_2_1_42_1","first-page":"7","volume-title":"Proceedings of the 2012 Symposium on Agent Directed Simulation","author":"Fox J."},{"key":"e_1_2_1_43_1","first-page":"68","volume-title":"FLAIRS Conference","author":"Furtado V.","year":"2006"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.02.041"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"e_1_2_1_46_1","unstructured":"S. Gholami C. Zhang A. Sinha and M. Tambe. An extensive study of dynamic bayesian network for patrol allocation against adaptive opportunistic criminals. 2015.  S. Gholami C. Zhang A. Sinha and M. Tambe. An extensive study of dynamic bayesian network for patrol allocation against adaptive opportunistic criminals. 2015."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.164"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(03)00092-X"},{"key":"e_1_2_1_49_1","volume-title":"Stanford University Press","author":"Gottfredson M. R.","year":"1990"},{"key":"e_1_2_1_50_1","volume-title":"Stanford University Press","author":"Hagan J.","year":"1995"},{"key":"e_1_2_1_51_1","unstructured":"K. A. Harries. Mapping crime: Principle and practice. Technical report 1999.  K. A. Harries. Mapping crime: Principle and practice. Technical report 1999."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-04-2013-0039"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.05.040"},{"key":"e_1_2_1_54_1","unstructured":"T. Hirschi. Causes of delinquency. Transaction publishers 2002.  T. Hirschi. Causes of delinquency. Transaction publishers 2002."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/GEOINFORMATICS.2017.8090949"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.bjc.a014156"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/44.1.55"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0176244"},{"key":"e_1_2_1_59_1","doi-asserted-by":"crossref","unstructured":"B. P. Kennedy I. Kawachi D. Prothrow-Stith K. Lochner and V. Gupta. Social capital income inequality and firearm violent crime. Social science & medicine 47(1):7-17 1998.  B. P. Kennedy I. Kawachi D. Prothrow-Stith K. Lochner and V. Gupta. Social capital income inequality and firearm violent crime. Social science & medicine 47(1):7-17 1998.","DOI":"10.1016\/S0277-9536(98)00097-5"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093854886013001004"},{"key":"e_1_2_1_61_1","volume-title":"University of Chicago Press Chicago","author":"Kornhauser R. R.","year":"1978"},{"key":"e_1_2_1_62_1","unstructured":"J. L. LeBeau. 7 mapping out hazardous space for police work1 2. Mapping and analysing crime data: Lessons from research and practice page 139 2001.  J. L. LeBeau. 7 mapping out hazardous space for police work1 2. Mapping and analysing crime data: Lessons from research and practice page 139 2001."},{"key":"e_1_2_1_63_1","first-page":"1","article-title":"A review of spatio-temporal pattern analysis approaches on crime analysis","volume":"9","author":"Leong K.","year":"2015","journal-title":"International E-journal of Criminal Sciences"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0016-7363.2005.00673.x"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2011.21"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/01944369908976070"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/00222500500544086"},{"key":"e_1_2_1_68_1","volume-title":"Simon and Schuster","author":"Merton R. K.","year":"1968"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2011.ap09546"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03024855"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25975-3_26"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_9"},{"key":"e_1_2_1_73_1","first-page":"23","volume-title":"University of Massachusetts-New School University Economics Graduate Student Workshop","author":"Oyvat C.","year":"2010"},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","unstructured":"A. V. Papachristos D. M. Hureau and A. A. Braga. The corner and the crew: the influence of geography and social networks on gang violence. American sociological review 78(3):417-447 2013.  A. V. Papachristos D. M. Hureau and A. A. Braga. The corner and the crew: the influence of geography and social networks on gang violence. American sociological review 78(3):417-447 2013.","DOI":"10.1177\/0003122413486800"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1991.tb01087.x"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500238"},{"key":"e_1_2_1_77_1","doi-asserted-by":"crossref","unstructured":"M. Perc J. G\u00f3mez-Garde\u00f1es A. Szolnoki L. M. Floria and Y. Moreno. Evolutionary dynamics of group interactions on structured populations: a review. Journal of the royal society interface 10(80):20120997 2013.  M. Perc J. G\u00f3mez-Garde\u00f1es A. Szolnoki L. M. Floria and Y. Moreno. Evolutionary dynamics of group interactions on structured populations: a review. Journal of the royal society interface 10(80):20120997 2013.","DOI":"10.1098\/rsif.2012.0997"},{"key":"e_1_2_1_78_1","unstructured":"Z. Qi T. Wang G. Song W. Hu X. Li etal Deep air learning: Interpolation prediction and feature analysis of fine-grained air quality. arXiv preprint arXiv:1711.00939 2017.  Z. Qi T. Wang G. Song W. Hu X. Li et al. Deep air learning: Interpolation prediction and feature analysis of fine-grained air quality. arXiv preprint arXiv:1711.00939 2017."},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","unstructured":"C. Qian Y. Wang J. Cao J. Lu and J. Kurths. Weighted-traffic-network-based geographic profiling for serial crime location prediction. EPL (Europhysics Letters) 93(6):68006 2011.  C. Qian Y. Wang J. Cao J. Lu and J. Kurths. Weighted-traffic-network-based geographic profiling for serial crime location prediction. EPL (Europhysics Letters) 93(6):68006 2011.","DOI":"10.1209\/0295-5075\/93\/68006"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"M. Ranson. Crime weather and climate change. Journal of environmental economics and management 67(3):274-302 2014.  M. Ranson. Crime weather and climate change. Journal of environmental economics and management 67(3):274-302 2014.","DOI":"10.1016\/j.jeem.2013.11.008"},{"key":"e_1_2_1_81_1","unstructured":"J. Ratcliffe and M. McCullagh. Crime repeat victimisation and gis. Mapping and analysing crime data pages 61-92 2001.  J. Ratcliffe and M. McCullagh. Crime repeat victimisation and gis. Mapping and analysing crime data pages 61-92 2001."},{"key":"e_1_2_1_82_1","doi-asserted-by":"crossref","unstructured":"J. H. Ratcliffe and M. J. McCullagh. Hotbeds of crime and the search for spatial accuracy. Journal of geographical systems 1(4):385-398 1999.  J. H. Ratcliffe and M. J. McCullagh. Hotbeds of crime and the search for spatial accuracy. Journal of geographical systems 1(4):385-398 1999.","DOI":"10.1007\/s101090050020"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.277.5328.918"},{"key":"e_1_2_1_84_1","doi-asserted-by":"crossref","unstructured":"T. C. Schelling. Dynamic models of segregation. Journal of mathematical sociology 1(2):143-186 1971.  T. C. Schelling. Dynamic models of segregation. Journal of mathematical sociology 1(2):143-186 1971.","DOI":"10.1080\/0022250X.1971.9989794"},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"C. R. Shaw and H. D. McKay. Juvenile delinquency and urban areas. 1942.  C. R. Shaw and H. D. McKay. Juvenile delinquency and urban areas. 1942.","DOI":"10.2307\/1334446"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1137\/090759069"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0910921107"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-009-9068-8"},{"key":"e_1_2_1_89_1","volume-title":"Univ of California Press","author":"Skogan W. G.","year":"1990"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.120"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/3191835.3191930"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623353"},{"key":"e_1_2_1_93_1","doi-asserted-by":"crossref","unstructured":"M. Townsley R. Homel and J. Chaseling. Repeat burglary victimisation: Spatial and temporal patterns. Australian & New Zealand journal of criminology 33(1):37-63 2000.  M. Townsley R. Homel and J. Chaseling. Repeat burglary victimisation: Spatial and temporal patterns. Australian & New Zealand journal of criminology 33(1):37-63 2000.","DOI":"10.1177\/000486580003300104"},{"key":"e_1_2_1_94_1","volume-title":"Routledge","year":"2012"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1137\/120882093"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0400-x"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31087-4_57"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939736"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.138"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284088"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi6050148"},{"key":"e_1_2_1_103_1","unstructured":"D. Williamson S. McLafferty P. McGuire T. Ross J. Mollenkopf V. Goldsmith and S. Quinn. Tools in the spatial analysis of crime. Mapping and analysing crime data: Lessons from research and practice 187 2001.  D. Williamson S. McLafferty P. McGuire T. Ross J. Mollenkopf V. Goldsmith and S. Quinn. Tools in the spatial analysis of crime. Mapping and analysing crime data: Lessons from research and practice 187 2001."},{"issue":"3","key":"e_1_2_1_104_1","first-page":"29","article-title":"Broken windows","volume":"249","author":"Wilson J. Q.","year":"1982","journal-title":"Atlantic monthly"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792094.1792117"},{"key":"e_1_2_1_106_1","unstructured":"Z. Yin and X. Shi. Taming near repeat calculation for crime analysis via cohesive subgraph computing. arXiv preprint arXiv:1705.07746 2017.  Z. Yin and X. Shi. Taming near repeat calculation for crime analysis via cohesive subgraph computing. arXiv preprint arXiv:1705.07746 2017."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_15"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.3390\/g7030015"},{"key":"e_1_2_1_109_1","first-page":"1351","volume-title":"Proceedings of the 2015 international conference on Autonomous agents and multiagent systems","author":"Zhang C.","year":"2015"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298239.3298479"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2997016"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1177\/0037549714533159"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133024"}],"container-title":["ACM SIGKDD Explorations Newsletter"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229329.3229331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229329.3229331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:37:52Z","timestamp":1750282672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229329.3229331"}},"subtitle":["A Data Mining Perspective"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":113,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,5,29]]}},"alternative-id":["10.1145\/3229329.3229331"],"URL":"https:\/\/doi.org\/10.1145\/3229329.3229331","relation":{},"ISSN":["1931-0145","1931-0153"],"issn-type":[{"value":"1931-0145","type":"print"},{"value":"1931-0153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}