{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:31:51Z","timestamp":1770222711422,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330736","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"3093-3101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Uncovering the Co-driven Mechanism of Social and Content Links in User Churn Phenomena"],"prefix":"10.1145","author":[{"given":"Yunfei","family":"Lu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Linyun","family":"Yu","sequence":"additional","affiliation":[{"name":"Bytedance AI Lab, Beijing, China"}]},{"given":"Peng","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chengxi","family":"Zang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Renzhe","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yihao","family":"Liu","sequence":"additional","affiliation":[{"name":"Bytedance AI Lab, Beijing, China"}]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[{"name":"Bytedance AI Lab, Beijing, China"}]},{"given":"Wenwu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Bytedance AI Lab, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"T Althoff and J Leskovec. 2015. Donor Retention in Online Crowdfunding Communities: A Case Study of DonorsChoose.org.  T Althoff and J Leskovec. 2015. Donor Retention in Online Crowdfunding Communities: A Case Study of DonorsChoose.org.","DOI":"10.1145\/2736277.2741120"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30220-6_17"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/62.2.269"},{"key":"e_1_3_2_1_4_1","volume-title":"Analysis of survival data","author":"Cox David Roxbee"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353424"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488418"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Gideon Dror Pelleg Dan Oleg Rokhlenko and Idan Szpektor. 2012. Churn prediction in new users of Yahoo! Answers.  Gideon Dror Pelleg Dan Oleg Rokhlenko and Idan Szpektor. 2012. Churn prediction in new users of Yahoo! Answers.","DOI":"10.1145\/2187980.2188207"},{"key":"e_1_3_2_1_8_1","volume-title":"The dynamics of a mobile phone network. Physica A: Statistical Mechanics and its Applications","author":"Hidalgo Cesar A","year":"2008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.04.038"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063740"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.080"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623348"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527051"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.40"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.80"},{"key":"e_1_3_2_1_16_1","volume-title":"Kyungsub Stephen Choi, and Felicia Natali","author":"Young Soo","year":"2016"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J\u00e9r\u00f4me Kunegis Julia Preusse and Felix Schwagereit. 2013. What is the added value of negative links in online social networks?  J\u00e9r\u00f4me Kunegis Julia Preusse and Felix Schwagereit. 2013. What is the added value of negative links in online social networks?","DOI":"10.1145\/2488388.2488452"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_19_1","volume-title":"On the Breslow estimator. Lifetime data analysis","author":"Lin DY","year":"2007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1989.10478874"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00045"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the SAS Global Forum","volume":"2012","author":"Powell Teresa M","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2576965"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Dongjin Song and David A Meyer. 2015. Recommending Positive Links in Signed Social Networks by Optimizing a Generalized AUC.. In AAAI. 290--296.   Dongjin Song and David A Meyer. 2015. Recommending Positive Links in Signed Social Networks by Optimizing a Generalized AUC.. In AAAI. 290--296.","DOI":"10.1609\/aaai.v29i1.9167"},{"key":"e_1_3_2_1_25_1","first-page":"250","article-title":"Access to trusted user-generated content using social networks. (Aug. 21 2012)","volume":"8","author":"Su Qi","year":"2012","journal-title":"US Patent"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1609\/icwsm.v4i1.14010","article-title":"Activity Lifespan","volume":"10","author":"Yang Jiang","year":"2010","journal-title":"ICWSM"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.79"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939825"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220073"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098055"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939795"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3059214"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505518"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:50Z","timestamp":1750208270000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":33,"alternative-id":["10.1145\/3292500.3330736","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330736","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}