{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:24:22Z","timestamp":1771525462280,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330848","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"216-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["AutoNE"],"prefix":"10.1145","author":[{"given":"Ke","family":"Tu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jianxin","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Peng","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[{"name":"Simon Fraser University and JD.com, Burnaby, Canada"}]},{"given":"Wenwu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Peter Auer. 2002. Using Confidence Bounds for Exploitation-Exploration Trade-offs. (2002).  Peter Auer. 2002. Using Confidence Bounds for Exploitation-Exploration Trade-offs. (2002)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806512"},{"key":"e_1_3_2_1_4_1","unstructured":"Fan RK Chung and Fan Chung Graham. 1997. Spectral graph theory. Number 92. American Mathematical Soc.  Fan RK Chung and Fan Chung Graham. 1997. Spectral graph theory. Number 92. American Mathematical Soc."},{"key":"e_1_3_2_1_5_1","volume-title":"Finding community structure in very large networks. Physical Review","author":"Clauset Aaron","year":"2004"},{"key":"e_1_3_2_1_6_1","volume-title":"A survey on network embedding","author":"Cui Peng","year":"2018"},{"key":"e_1_3_2_1_7_1","volume-title":"Learning how to active learn: A deep reinforcement learning approach. arXiv preprint arXiv:1708.02383","author":"Fang Meng","year":"2017"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBRN.2010.22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_10_1","volume-title":"Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584","author":"Hamilton William L","year":"2017"},{"key":"e_1_3_2_1_11_1","volume-title":"Radiology","volume":"143","author":"Hanley James A","year":"1982"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25566-3_40"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2015.7344858"},{"key":"e_1_3_2_1_14_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the ASE BigData Conference","author":"Klymko Christine","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220062"},{"key":"e_1_3_2_1_18_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_1_19_1","first-page":"12","article-title":"Tri-party deep network representation","volume":"11","author":"Pan Shirui","year":"2016","journal-title":"Network"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159706"},{"key":"e_1_3_2_1_22_1","volume-title":"Guyon Isabelle, Hu Yi-Qi, Li Yu-Feng, Tu Wei-Wei, Yang Qiang, and Yu Yang.","author":"Quanming Yao","year":"2018"},{"key":"e_1_3_2_1_23_1","volume-title":"Advanced lectures on machine learning","author":"Rasmussen Carl Edward"},{"key":"e_1_3_2_1_24_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"e_1_3_2_1_26_1","unstructured":"Jasper Snoek Hugo Larochelle and Ryan P Adams. 2012. Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems. 2951--2959.   Jasper Snoek Hugo Larochelle and Ryan P Adams. 2012. Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems. 2951--2959."},{"key":"e_1_3_2_1_27_1","volume-title":"In Proceedings of the 27th International Conference on Machine Learning.","author":"Srinivas Niranjan","year":"2010"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487629"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219991"},{"key":"e_1_3_2_1_31_1","volume-title":"Structural Deep Embedding for Hyper-Networks. In Thirty-Second AAAI Conference on Artificial Intelligence","author":"Tu Ke","year":"2018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220068"},{"key":"e_1_3_2_1_33_1","volume-title":"Haemers","author":"van Dam Edwin R.","year":"2003"},{"key":"e_1_3_2_1_34_1","volume-title":"Meta-learning: A survey. arXiv preprint arXiv:1810.03548","author":"Vanschoren Joaquin","year":"2018"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang Peng Cui Jing Wang Jian Pei Wenwu Zhu and Shiqiang Yang. 2017. Community Preserving Network Embedding.. In AAAI. 203--209.   Xiao Wang Peng Cui Jing Wang Jian Pei Wenwu Zhu and Shiqiang Yang. 2017. Community Preserving Network Embedding.. In AAAI. 203--209.","DOI":"10.1609\/aaai.v31i1.10488"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219969"},{"key":"e_1_3_2_1_39_1","volume-title":"Deep Learning on Graphs: A Survey. arXiv preprint arXiv:1812.04202","author":"Zhang Ziwei","year":"2018"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/279232.279236"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220052"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of ICLR","author":"Zoph Barret","year":"2017"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:02Z","timestamp":1750206362000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330848"}},"subtitle":["Hyperparameter Optimization for Massive Network Embedding"],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":42,"alternative-id":["10.1145\/3292500.3330848","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330848","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}