{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:14:30Z","timestamp":1773299670618,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T00:00:00Z","timestamp":1590883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2018JM6086"],"award-info":[{"award-number":["2018JM6086"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1003400"],"award-info":[{"award-number":["2018YFB1003400"]}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732014, 61672432, 61925205, 61632016"],"award-info":[{"award-number":["61732014, 61672432, 61925205, 61632016"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3318464.3380572","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T17:12:33Z","timestamp":1590772353000},"page":"1165-1180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards Interpretable and Learnable Risk Analysis for Entity Resolution"],"prefix":"10.1145","author":[{"given":"Zhaoqiang","family":"Chen","sequence":"first","affiliation":[{"name":"Northwestern Polytechnical University, Xi'an, China"}]},{"given":"Qun","family":"Chen","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, Xi'an, China"}]},{"given":"Boyi","family":"Hou","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, Xi'an, China"}]},{"given":"Zhanhuai","family":"Li","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, Xi'an, China"}]},{"given":"Guoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,5,31]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"265","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Abadi M.","year":"2016","unstructured":"M. Abadi , P. Barham, and et al. Tensorflow: A system for large-scale machine learning . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) , pages 265 -- 283 , 2016 . M. Abadi, P. Barham, and et al. Tensorflow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 265--283, 2016."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732967.2732975"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702509"},{"key":"e_1_3_2_2_4_1","volume-title":"Concrete problems in ai safety. arXiv preprint, arXiv:1606.06565","author":"Amodei D.","year":"2016","unstructured":"D. Amodei , C. Olah , J. Steinhardt , P. Christiano , J. Schulman , and D. Man\u00e9 . Concrete problems in ai safety. arXiv preprint, arXiv:1606.06565 , 2016 . D. Amodei, C. Olah, J. Steinhardt, P. Christiano, J. Schulman, and D. Man\u00e9. Concrete problems in ai safety. arXiv preprint, arXiv:1606.06565, 2016."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807252"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9965.00068"},{"key":"e_1_3_2_2_7_1","volume-title":"M Avz ller. How to explain individual classification decisions. Journal of Machine Learning Research, 11(Jun):1803--1831","author":"Baehrens D.","year":"2010","unstructured":"D. Baehrens , T. Schroeter , S. Harmeling , M. Kawanabe , K. Hansen , and K.- R. M Avz ller. How to explain individual classification decisions. Journal of Machine Learning Research, 11(Jun):1803--1831 , 2010 . D. Baehrens, T. Schroeter, S. Harmeling, M. Kawanabe, K. Hansen, and K.-R. M Avz ller. How to explain individual classification decisions. Journal of Machine Learning Research, 11(Jun):1803--1831, 2010."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339707"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"e_1_3_2_2_12_1","first-page":"1","volume-title":"Department of Scientific Computing Website","author":"Burkardt J.","year":"2014","unstructured":"J. Burkardt . The truncated normal distribution. Department of Scientific Computing Website , Florida State University , pages 1 -- 35 , 2014 . J. Burkardt. The truncated normal distribution. Department of Scientific Computing Website, Florida State University, pages 1--35, 2014."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915252"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242153.3242156"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401913"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-642-31164-2","volume-title":"Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection","author":"Christen P.","year":"2012","unstructured":"P. Christen . Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection , chapter 2, pages 32 -- 34 . Springer Science & Business Media , 2012 . P. Christen. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection, chapter 2, pages 32--34. Springer Science & Business Media, 2012."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00655ED1V01Y201507WBE013"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749431"},{"key":"e_1_3_2_2_19_1","volume-title":"Efficient data reconciliation. Information Sciences, 137(1--4):1--15","author":"Cochinwala M.","year":"2001","unstructured":"M. Cochinwala , V. Kurien , G. Lalk , and D. Shasha . Efficient data reconciliation. Information Sciences, 137(1--4):1--15 , 2001 . M. Cochinwala, V. Kurien, G. Lalk, and D. Shasha. Efficient data reconciliation. Information Sciences, 137(1--4):1--15, 2001."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-00102-3"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236198"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1191547.1191739"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687674"},{"key":"e_1_3_2_2_24_1","volume-title":"An introduction to roc analysis. Pattern recognition letters, 27(8):861--874","author":"Fawcett T.","year":"2006","unstructured":"T. Fawcett . An introduction to roc analysis. Pattern recognition letters, 27(8):861--874 , 2006 . T. Fawcett. An introduction to roc analysis. Pattern recognition letters, 27(8):861--874, 2006."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1969.10501049"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/2876473.2876474"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367564"},{"key":"e_1_3_2_2_28_1","volume-title":"Discriminative active learning. arXiv preprint, arXiv:1907.06347","author":"Gissin D.","year":"2019","unstructured":"D. Gissin and S. Shalev-Shwartz . Discriminative active learning. arXiv preprint, arXiv:1907.06347 , 2019 . D. Gissin and S. Shalev-Shwartz. Discriminative active learning. arXiv preprint, arXiv:1907.06347, 2019."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588576"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305381.3305518"},{"key":"e_1_3_2_2_32_1","first-page":"1","volume-title":"Proceedings of the 5th International Conference on Learning Representations (ICLR)","author":"Hendrycks D.","year":"2017","unstructured":"D. Hendrycks and K. Gimpel . A baseline for detecting misclassified and out-of-distribution examples in neural networks . In Proceedings of the 5th International Conference on Learning Representations (ICLR) , pages 1 -- 12 , 2017 . D. Hendrycks and K. Gimpel. A baseline for detecting misclassified and out-of-distribution examples in neural networks. In Proceedings of the 5th International Conference on Learning Representations (ICLR), pages 1--12, 2017."},{"key":"e_1_3_2_2_33_1","first-page":"1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR)","author":"Hendrycks D.","year":"2019","unstructured":"D. Hendrycks , M. Mazeika , and T. G. Dietterich . Deep anomaly detection with outlier exposure . In Proceedings of the 7th International Conference on Learning Representations (ICLR) , pages 1 -- 18 , 2019 . D. Hendrycks, M. Mazeika, and T. G. Dietterich. Deep anomaly detection with outlier exposure. In Proceedings of the 7th International Conference on Learning Representations (ICLR), pages 1--18, 2019."},{"key":"e_1_3_2_2_34_1","article-title":"A risk-aware human-machine cooperation framework for entity resolution with quality guarantees","author":"Hou B.","year":"2018","unstructured":"B. Hou , Q. Chen , Z. Chen , Y. Nafa , and Z. Li. r-humo : A risk-aware human-machine cooperation framework for entity resolution with quality guarantees . IEEE Transactions on Knowledge and Data Engineering (TKDE) (Early Access), pages 1--12 , 2018 . B. Hou, Q. Chen, Z. Chen, Y. Nafa, and Z. Li. r-humo: A risk-aware human-machine cooperation framework for entity resolution with quality guarantees. IEEE Transactions on Knowledge and Data Engineering (TKDE) (Early Access), pages 1--12, 2018.","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE) (Early Access), pages 1--12"},{"key":"e_1_3_2_2_35_1","first-page":"892","volume-title":"Advances in neural information processing systems","author":"Huang S.-J.","year":"2010","unstructured":"S.-J. Huang , R. Jin , and Z.-H. Zhou . Active learning by querying informative and representative examples . In Advances in neural information processing systems , pages 892 -- 900 , 2010 . S.-J. Huang, R. Jin, and Z.-H. Zhou. Active learning by querying informative and representative examples. In Advances in neural information processing systems, pages 892--900, 2010."},{"key":"e_1_3_2_2_36_1","first-page":"5546","volume-title":"Advances in Neural Information Processing Systems","author":"Jiang H.","year":"2018","unstructured":"H. Jiang , B. Kim , M. Guan , and M. Gupta . To trust or not to trust a classifier . In Advances in Neural Information Processing Systems , pages 5546 -- 5557 , 2018 . H. Jiang, B. Kim, M. Guan, and M. Gupta. To trust or not to trust a classifier. In Advances in Neural Information Processing Systems, pages 5546--5557, 2018."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.32"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487592"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137833"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320713"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735471.2735474"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196926"},{"key":"e_1_3_2_2_43_1","volume-title":"Advances in large margin classifiers, 10(3):61--74","author":"Platt J.","year":"1999","unstructured":"J. Platt . Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61--74 , 1999 . J. Platt. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61--74, 1999."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137631"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_46_1","volume-title":"Conditional value-at-risk for general loss distributions. Journal of banking & finance, 26(7):1443--1471","author":"Rockafellar R. T.","year":"2002","unstructured":"R. T. Rockafellar and S. Uryasev . Conditional value-at-risk for general loss distributions. Journal of banking & finance, 26(7):1443--1471 , 2002 . R. T. Rockafellar and S. Uryasev. Conditional value-at-risk for general loss distributions. Journal of banking & finance, 26(7):1443--1471, 2002."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775087"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3058739"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.65"},{"issue":"1","key":"e_1_3_2_2_50_1","first-page":"16","article-title":"Value at risk (var): The new benchmark for managing market risk","volume":"15","author":"Tardivo G.","year":"2002","unstructured":"G. Tardivo . Value at risk (var): The new benchmark for managing market risk . Journal of Financial Management & Analysis , 15 ( 1 ): 16 , 2002 . G. Tardivo. Value at risk (var): The new benchmark for managing market risk. Journal of Financial Management & Analysis, 15(1):16, 2002.","journal-title":"Journal of Financial Management & Analysis"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035931"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732982"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350263"},{"key":"e_1_3_2_2_54_1","first-page":"1263","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD)","author":"Wang S.","year":"2015","unstructured":"S. Wang , X. Xiao , and C.-H. Lee . Crowd-based deduplication : An adaptive approach . Proceedings of the ACM International Conference on Management of Data (SIGMOD) , pages 1263 -- 1277 , 2015 . S. Wang, X. Xiao, and C.-H. Lee. Crowd-based deduplication: An adaptive approach. Proceedings of the ACM International Conference on Management of Data (SIGMOD), pages 1263--1277, 2015."},{"key":"e_1_3_2_2_55_1","volume-title":"Querying discriminative and representative samples for batch mode active learning. ACM Transactions on Knowledge Discovery from Data (TKDD), 9(3):17","author":"Wang Z.","year":"2015","unstructured":"Z. Wang and J. Ye . Querying discriminative and representative samples for batch mode active learning. ACM Transactions on Knowledge Discovery from Data (TKDD), 9(3):17 , 2015 . Z. Wang and J. Ye. Querying discriminative and representative samples for batch mode active learning. ACM Transactions on Knowledge Discovery from Data (TKDD), 9(3):17, 2015."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536336.2536337"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.43"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"M. Wise. On normalizing the incomplete beta-function for fitting to dose-response curves. Biometrika 47(1--2):173--175 1960.  M. Wise. On normalizing the incomplete beta-function for fitting to dose-response curves. Biometrika 47(1--2):173--175 1960.","DOI":"10.1093\/biomet\/47.1-2.173"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/3275536.3275541"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.456"}],"event":{"name":"SIGMOD\/PODS '20: International Conference on Management of Data","location":"Portland OR USA","acronym":"SIGMOD\/PODS '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3380572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318464.3380572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:52Z","timestamp":1750208512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3380572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,31]]},"references-count":59,"alternative-id":["10.1145\/3318464.3380572","10.1145\/3318464"],"URL":"https:\/\/doi.org\/10.1145\/3318464.3380572","relation":{},"subject":[],"published":{"date-parts":[[2020,5,31]]},"assertion":[{"value":"2020-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}