{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T13:28:55Z","timestamp":1663939735299},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1909702"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371851","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"source":"Crossref","is-referenced-by-count":34,"title":["Transferring Robustness for Graph Neural Network Against Poisoning Attacks"],"prefix":"10.1145","author":[{"given":"Xianfeng","family":"Tang","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Yandong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Yiwei","family":"Sun","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Huaxiu","family":"Yao","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Prasenjit","family":"Mitra","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Suhang","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Leman Akoglu Hanghang Tong and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery Vol. 29 3 (2015) 626--688. Leman Akoglu Hanghang Tong and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery Vol. 29 3 (2015) 626--688."},{"key":"e_1_3_2_1_2_1","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML. Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Node Embeddings via Graph Poisoning. In ICML."},{"key":"e_1_3_2_1_3_1","unstructured":"Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 (2013). Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 (2013)."},{"key":"e_1_3_2_1_4_1","unstructured":"Jinyin Chen Yangyang Wu Xuanheng Xu Yixian Chen Haibin Zheng and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018). Jinyin Chen Yangyang Wu Xuanheng Xu Yixian Chen Haibin Zheng and Qi Xuan. 2018. Fast gradient attack on network embedding. arXiv preprint arXiv:1809.02797 (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"Minhao Cheng Thong Le Pin-Yu Chen Jinfeng Yi Huan Zhang and Cho-Jui Hsieh. 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 (2018). Minhao Cheng Thong Le Pin-Yu Chen Jinfeng Yi Huan Zhang and Cho-Jui Hsieh. 2018. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457 (2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. ICML (2018). Hanjun Dai Hui Li Tian Tian Xin Huang Lin Wang Jun Zhu and Le Song. 2018. Adversarial attack on graph structured data. ICML (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in neural information processing systems. 3844--3852. Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in neural information processing systems. 3844--3852."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019 a. Deep Anomaly Detection on Attributed Networks. In SDM. Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019 a. Deep Anomaly Detection on Attributed Networks. In SDM.","DOI":"10.1145\/3289600.3290964"},{"key":"e_1_3_2_1_9_1","unstructured":"Kaize Ding Yichuan Li Jundong Li Chenghao Liu and Huan Liu. 2019 b. Graph Neural Networks with High-order Feature Interactions. arXiv preprint arXiv:1908.07110 (2019). Kaize Ding Yichuan Li Jundong Li Chenghao Liu and Huan Liu. 2019 b. Graph Neural Networks with High-order Feature Interactions. arXiv preprint arXiv:1908.07110 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Graph Neural Networks for Social Recommendation. In The World Wide Web Conference. ACM, 417--426","author":"Fan Wenqi","year":"2019"},{"key":"e_1_3_2_1_11_1","unstructured":"Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML. Chelsea Finn Pieter Abbeel and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In ICML."},{"key":"e_1_3_2_1_12_1","unstructured":"Hongyang Gao Zhengyang Wang and Shuiwang Ji. 2018. Large-scale learnable graph convolutional networks. In KDD. Hongyang Gao Zhengyang Wang and Shuiwang Ji. 2018. Large-scale learnable graph convolutional networks. In KDD."},{"key":"e_1_3_2_1_13_1","unstructured":"Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014). Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_14_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS. Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS."},{"key":"e_1_3_2_1_15_1","unstructured":"Mikael Henaff Joan Bruna and Yann LeCun. 2015. Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163 (2015). Mikael Henaff Joan Bruna and Yann LeCun. 2015. Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163 (2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Sepp Hochreiter A Steven Younger and Peter R Conwell. 2001. Learning to learn using gradient descent. In ICANN. Springer 87--94. Sepp Hochreiter A Steven Younger and Peter R Conwell. 2001. Learning to learn using gradient descent. In ICANN. Springer 87--94.","DOI":"10.1007\/3-540-44668-0_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Chao Huang Xian Wu Xuchao Zhang Chuxu Zhang Jiashu Zhao Dawei Yin and Nitesh V Chawla. 2019. Online Purchase Prediction via Multi-Scale Modeling of Behavior Dynamics. In KDD. ACM 2613--2622. Chao Huang Xian Wu Xuchao Zhang Chuxu Zhang Jiashu Zhao Dawei Yin and Nitesh V Chawla. 2019. Online Purchase Prediction via Multi-Scale Modeling of Behavior Dynamics. In KDD. ACM 2613--2622.","DOI":"10.1145\/3292500.3330790"},{"key":"e_1_3_2_1_18_1","unstructured":"Ming Jin Heng Chang Wenwu Zhu and Somayeh Sojoudi. 2019. Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering. arXiv preprint arXiv:1905.10029 (2019). Ming Jin Heng Chang Wenwu Zhu and Somayeh Sojoudi. 2019. Power up! Robust Graph Convolutional Network against Evasion Attacks based on Graph Powering. arXiv preprint arXiv:1905.10029 (2019)."},{"key":"e_1_3_2_1_19_1","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907 (2016). Thomas N Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_20_1","unstructured":"Jaekoo Lee Hyunjae Kim Jongsun Lee and Sungroh Yoon. 2017. Transfer learning for deep learning on graph-structured data. In AAAI. Jaekoo Lee Hyunjae Kim Jongsun Lee and Sungroh Yoon. 2017. Transfer learning for deep learning on graph-structured data. In AAAI."},{"key":"e_1_3_2_1_21_1","volume-title":"Click Feedback-Aware Query Recommendation Using Adversarial Examples. In The World Wide Web Conference. ACM, 2978--2984","author":"Li Ruirui","year":"2019"},{"key":"e_1_3_2_1_22_1","unstructured":"Ruoyu Li Sheng Wang Feiyun Zhu and Junzhou Huang. 2018b. Adaptive graph convolutional neural networks. In AAAI. Ruoyu Li Sheng Wang Feiyun Zhu and Junzhou Huang. 2018b. Adaptive graph convolutional neural networks. In AAAI."},{"key":"e_1_3_2_1_23_1","unstructured":"Yingwei Li Song Bai Cihang Xie Zhenyu Liao Xiaohui Shen and Alan L Yuille. 2019 a. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv preprint arXiv:1904.00979 (2019). Yingwei Li Song Bai Cihang Xie Zhenyu Liao Xiaohui Shen and Alan L Yuille. 2019 a. Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses. arXiv preprint arXiv:1904.00979 (2019)."},{"key":"e_1_3_2_1_24_1","unstructured":"Yingwei Li Song Bai Yuyin Zhou Cihang Xie Zhishuai Zhang and Alan Yuille. 2018a. Learning Transferable Adversarial Examples via Ghost Networks. arXiv preprint arXiv:1812.03413 (2018). Yingwei Li Song Bai Yuyin Zhou Cihang Xie Zhishuai Zhang and Alan Yuille. 2018a. Learning Transferable Adversarial Examples via Ghost Networks. arXiv preprint arXiv:1812.03413 (2018)."},{"key":"e_1_3_2_1_25_1","unstructured":"Yandong Li Lijun Li Liqiang Wang Tong Zhang and Boqing Gong. 2019 b. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. ICML (2019). Yandong Li Lijun Li Liqiang Wang Tong Zhang and Boqing Gong. 2019 b. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. ICML (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Yao Ma Suhang Wang Charu C. Aggarwal and Jiliang Tang. 2019 a. Graph Convolutional Networks with EigenPooling. In KDD. Yao Ma Suhang Wang Charu C. Aggarwal and Jiliang Tang. 2019 a. Graph Convolutional Networks with EigenPooling. In KDD.","DOI":"10.1145\/3292500.3330982"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yao Ma Suhang Wang Charu C. Aggarwal Dawei Yin and Jiliang Tang. 2019 b. Multi-dimensional Graph Convolutional Networks. In SDM. Yao Ma Suhang Wang Charu C. Aggarwal Dawei Yin and Jiliang Tang. 2019 b. Multi-dimensional Graph Convolutional Networks. In SDM.","DOI":"10.1137\/1.9781611975673.74"},{"key":"e_1_3_2_1_28_1","unstructured":"Yao Ma Suhang Wang Lingfei Wu and Jiliang Tang. 2019 c. Attacking Graph Convolutional Networks via Rewiring. arXiv preprint:1906.03750 (2019). Yao Ma Suhang Wang Lingfei Wu and Jiliang Tang. 2019 c. Attacking Graph Convolutional Networks via Rewiring. arXiv preprint:1906.03750 (2019)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Federico Monti Davide Boscaini Jonathan Masci Emanuele Rodola Jan Svoboda and Michael M Bronstein. 2017. Geometric deep learning on graphs and manifolds using mixture model cnns. In CVPR. Federico Monti Davide Boscaini Jonathan Masci Emanuele Rodola Jan Svoboda and Michael M Bronstein. 2017. Geometric deep learning on graphs and manifolds using mixture model cnns. In CVPR.","DOI":"10.1109\/CVPR.2017.576"},{"key":"e_1_3_2_1_30_1","unstructured":"Mathias Niepert Mohamed Ahmed and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In ICML. Mathias Niepert Mohamed Ahmed and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In ICML."},{"key":"e_1_3_2_1_31_1","volume-title":"Glove: Global vectors for word representation. In EMNLP.","author":"Pennington Jeffrey","year":"2014"},{"key":"e_1_3_2_1_32_1","unstructured":"Adam Santoro Sergey Bartunov Matthew Botvinick Daan Wierstra and Timothy Lillicrap. 2016. Meta-learning with memory-augmented neural networks. In ICML. Adam Santoro Sergey Bartunov Matthew Botvinick Daan Wierstra and Timothy Lillicrap. 2016. Meta-learning with memory-augmented neural networks. In ICML."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Prithviraj Sen Galileo Namata Mustafa Bilgic Lise Getoor Brian Galligher and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine Vol. 29 3 (2008) 93--93. Prithviraj Sen Galileo Namata Mustafa Bilgic Lise Getoor Brian Galligher and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine Vol. 29 3 (2008) 93--93.","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159692"},{"key":"e_1_3_2_1_35_1","unstructured":"Yiwei Sun Suhang Wang Xianfeng Tang Tsung-Yu Hsieh and Vasant Honavar. 2019. Node Injection Attacks on Graphs via Reinforcement Learning. arXiv preprint arXiv:1909.06543 (2019). Yiwei Sun Suhang Wang Xianfeng Tang Tsung-Yu Hsieh and Vasant Honavar. 2019. Node Injection Attacks on Graphs via Reinforcement Learning. arXiv preprint arXiv:1909.06543 (2019)."},{"key":"e_1_3_2_1_36_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008. Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_37_1","unstructured":"Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017). Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_38_1","unstructured":"Oriol Vinyals Charles Blundell Timothy Lillicrap Daan Wierstra et almbox. 2016. Matching networks for one shot learning. In Advances in neural information processing systems. 3630--3638. Oriol Vinyals Charles Blundell Timothy Lillicrap Daan Wierstra et almbox. 2016. Matching networks for one shot learning. In Advances in neural information processing systems. 3630--3638."},{"key":"e_1_3_2_1_39_1","unstructured":"Felix Wu Tianyi Zhang Amauri Holanda de Souza Jr Christopher Fifty Tao Yu and Kilian Q Weinberger. 2019 c. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019). Felix Wu Tianyi Zhang Amauri Holanda de Souza Jr Christopher Fifty Tao Yu and Kilian Q Weinberger. 2019 c. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019)."},{"key":"e_1_3_2_1_40_1","unstructured":"Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019 b. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI. Huijun Wu Chen Wang Yuriy Tyshetskiy Andrew Docherty Kai Lu and Liming Zhu. 2019 b. Adversarial Examples on Graph Data: Deep Insights into Attack and Defense. In IJCAI."},{"key":"e_1_3_2_1_41_1","unstructured":"Zonghan Wu Shirui Pan Fengwen Chen Guodong Long Chengqi Zhang and Philip S Yu. 2019 a. A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596 (2019). Zonghan Wu Shirui Pan Fengwen Chen Guodong Long Chengqi Zhang and Philip S Yu. 2019 a. A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596 (2019)."},{"key":"e_1_3_2_1_42_1","unstructured":"Han Xu Yao Ma Haochen Liu Debayan Deb Hui Liu Jiliang Tang and Anil Jain. 2019 b. Adversarial attacks and defenses in images graphs and text: A review. arXiv preprint arXiv:1909.08072 (2019). Han Xu Yao Ma Haochen Liu Debayan Deb Hui Liu Jiliang Tang and Anil Jain. 2019 b. Adversarial attacks and defenses in images graphs and text: A review. arXiv preprint arXiv:1909.08072 (2019)."},{"key":"e_1_3_2_1_43_1","unstructured":"Kaidi Xu Hongge Chen Sijia Liu Pin-Yu Chen Tsui-Wei Weng Mingyi Hong and Xue Lin. 2019 a. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. arXiv preprint arXiv:1906.04214 (2019). Kaidi Xu Hongge Chen Sijia Liu Pin-Yu Chen Tsui-Wei Weng Mingyi Hong and Xue Lin. 2019 a. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. arXiv preprint arXiv:1906.04214 (2019)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313577"},{"key":"e_1_3_2_1_45_1","unstructured":"Huaxiu Yao Ying Wei Junzhou Huang and Zhenhui Li. 2019 b. Hierarchically Structured Meta-learning. In ICML. 7045--7054. Huaxiu Yao Ying Wei Junzhou Huang and Zhenhui Li. 2019 b. Hierarchically Structured Meta-learning. In ICML. 7045--7054."},{"key":"e_1_3_2_1_46_1","unstructured":"Huaxiu Yao Chuxu Zhang Ying Wei Meng Jiang Suhang Wang Junzhou Huang Nitesh V Chawla and Zhenhui Li. 2019 c. Graph Few-shot Learning via Knowledge Transfer. arXiv preprint arXiv:1910.03053 (2019). Huaxiu Yao Chuxu Zhang Ying Wei Meng Jiang Suhang Wang Junzhou Huang Nitesh V Chawla and Zhenhui Li. 2019 c. Graph Few-shot Learning via Knowledge Transfer. arXiv preprint arXiv:1910.03053 (2019)."},{"key":"e_1_3_2_1_47_1","volume-title":"Gaan: Gated attention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294","author":"Zhang Jiani","year":"2018"},{"key":"e_1_3_2_1_48_1","unstructured":"Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD. Dingyuan Zhu Ziwei Zhang Peng Cui and Wenwu Zhu. 2019. Robust Graph Convolutional Networks Against Adversarial Attacks. In KDD."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD. Daniel Z\u00fcgner Amir Akbarnejad and Stephan G\u00fcnnemann. 2018. Adversarial attacks on neural networks for graph data. In KDD.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable robustness and robust training for graph convolutional networks. In KDD. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Certifiable robustness and robust training for graph convolutional networks. In KDD.","DOI":"10.1145\/3292500.3330905"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR. Daniel Z\u00fcgner and Stephan G\u00fcnnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. In ICLR.","DOI":"10.24963\/ijcai.2019\/872"}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","location":"Houston TX USA","acronym":"WSDM '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371851","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T02:04:07Z","timestamp":1607479447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":51,"alternative-id":["10.1145\/3336191.3371851","10.1145\/3336191"],"URL":"http:\/\/dx.doi.org\/10.1145\/3336191.3371851","relation":{},"published":{"date-parts":[[2020,1,20]]}}}