{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T06:55:00Z","timestamp":1776495300306,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61772082, 61702296"],"award-info":[{"award-number":["61772082, 61702296"]}]},{"name":"National Key Research and Development Program of China","award":["2017YFB0803304"],"award-info":[{"award-number":["2017YFB0803304"]}]},{"name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1 grant","award":["18-C220-SMU-006"],"award-info":[{"award-number":["18-C220-SMU-006"]}]},{"name":"BeijingMunicipal Natural Science Foundation","award":["4182043"],"award-info":[{"award-number":["4182043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330970","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"120-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":173,"title":["Adversarial Learning on Heterogeneous Information Networks"],"prefix":"10.1145","author":[{"given":"Binbin","family":"Hu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications &amp; Ant Financial Services Group, Beijing &amp;&amp; Hangzhou, China"}]},{"given":"Yuan","family":"Fang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In ICML. 214--223.   Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In ICML. 214--223."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymeth.2017.06.036"},{"key":"e_1_3_2_1_3_1","volume-title":"A comprehensive survey of graph embedding: problems, techniques and applications","author":"Cai Hongyun","year":"2018"},{"key":"e_1_3_2_1_4_1","unstructured":"Xiaoyan Cai Junwei Han and Libin Yang. 2018. Generative Adversarial Network Based Heterogeneous Bibliographic Network Representation for Personalized Citation Recommendation.. In AAAI. 5747--5754.  Xiaoyan Cai Junwei Han and Libin Yang. 2018. Generative Adversarial Network Based Heterogeneous Bibliographic Network Representation for Personalized Citation Recommendation.. In AAAI. 5747--5754."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806512"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783296"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219986"},{"key":"e_1_3_2_1_8_1","volume-title":"A survey on network embedding","author":"Cui Peng","year":"2018"},{"key":"e_1_3_2_1_9_1","unstructured":"Quanyu Dai Qiang Li Jian Tang and Dan Wang. 2018. Adversarial network embedding. In AAAI. 2167--2174.  Quanyu Dai Qiang Li Jian Tang and Dan Wang. 2018. Adversarial network embedding. In AAAI. 2167--2174."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271768"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132953"},{"key":"e_1_3_2_1_13_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672--2680.   Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672--2680."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219965"},{"key":"e_1_3_2_1_17_1","unstructured":"Binbin Hu Zhiqiang Zhang Chuan Shi Jun Zhou Xiaolong Li and Yuan Qi. 2019. Cash-out User Detection based on Attributed Heterogeneous Information Network with a Hierarchical Attention Mechanism. In AAAI.  Binbin Hu Zhiqiang Zhang Chuan Shi Jun Zhou Xiaolong Li and Yuan Qi. 2019. Cash-out User Detection based on Attributed Heterogeneous Information Network with a Hierarchical Attention Mechanism. In AAAI."},{"key":"e_1_3_2_1_18_1","unstructured":"Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR.  Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219956"},{"key":"e_1_3_2_1_20_1","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_21_1","volume-title":"ICLR Workshop.","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Shirui Pan Ruiqi Hu Guodong Long Jing Jiang Lina Yao and Chengqi Zhang. 2018. Adversarially Regularized Graph Autoencoder for Graph Embedding.. In IJCAI. 2609--2615.   Shirui Pan Ruiqi Hu Guodong Long Jing Jiang Lina Yao and Chengqi Zhang. 2018. Adversarially Regularized Graph Autoencoder for Graph Embedding.. In IJCAI. 2609--2615.","DOI":"10.24963\/ijcai.2018\/362"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_24_1","unstructured":"Alec Radford Luke Metz and Soumith Chintala. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In ICLR.  Alec Radford Luke Metz and Soumith Chintala. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In ICLR."},{"key":"e_1_3_2_1_25_1","unstructured":"Scott Reed Zeynep Akata Xinchen Yan Lajanugen Logeswaran Bernt Schiele and Honglak Lee. 2016. Generative adversarial text to image synthesis. In ICML. 1060--1069.   Scott Reed Zeynep Akata Xinchen Yan Lajanugen Logeswaran Bernt Schiele and Honglak Lee. 2016. Generative adversarial text to image synthesis. In ICML. 1060--1069."},{"key":"e_1_3_2_1_26_1","volume-title":"Meta-path guided embedding for similarity search in large-scale heterogeneous information networks. arXiv preprint arXiv:1610.09769","author":"Shang Jingbo","year":"2016"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2833443"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2598561"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Yu Shi Huan Gui Qi Zhu Lance Kaplan and Jiawei Han. 2018a. AspEm: Embedding Learning by Aspects in Heterogeneous Information Networks. In SDM. 144--152.  Yu Shi Huan Gui Qi Zhu Lance Kaplan and Jiawei Han. 2018a. AspEm: Embedding Learning by Aspects in Heterogeneous Information Networks. In SDM. 144--152.","DOI":"10.1137\/1.9781611975321.16"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783307"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Hongwei Wang Jia Wang Jialin Wang Miao Zhao Weinan Zhang Fuzheng Zhang Xing Xie and Minyi Guo. 2018a. GraphGan: Graph representation learning with generative adversarial nets. In AAAI. 2508--2515.  Hongwei Wang Jia Wang Jialin Wang Miao Zhao Weinan Zhang Fuzheng Zhang Xing Xie and Minyi Guo. 2018a. GraphGan: Graph representation learning with generative adversarial nets. In AAAI. 2508--2515.","DOI":"10.1609\/aaai.v32i1.11872"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159666"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080786"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Cheng Yang Maosong Sun Zhiyuan Liu and Cunchao Tu. 2017. Fast network embedding enhancement via high order proximity approximation. In IJCAI. 19--25.   Cheng Yang Maosong Sun Zhiyuan Liu and Cunchao Tu. 2017. Fast network embedding enhancement via high order proximity approximation. In IJCAI. 19--25.","DOI":"10.24963\/ijcai.2017\/544"},{"key":"e_1_3_2_1_37_1","unstructured":"Lantao Yu Weinan Zhang Jun Wang and Yong Yu. 2017. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient.. In AAAI. 2852--2858.   Lantao Yu Weinan Zhang Jun Wang and Yong Yu. 2017. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient.. In AAAI. 2852--2858."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220000"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186106"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219969"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Tom Chao Zhou Hao Ma Michael R Lyu and Irwin King. 2010. UserRec: A User Recommendation Framework in Social Tagging Systems. In AAAI. 1486--1491.   Tom Chao Zhou Hao Ma Michael R Lyu and Irwin King. 2010. UserRec: A User Recommendation Framework in Social Tagging Systems. In AAAI. 1486--1491.","DOI":"10.1609\/aaai.v24i1.7524"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:04Z","timestamp":1750206364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":41,"alternative-id":["10.1145\/3292500.3330970","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330970","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}