{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:16Z","timestamp":1750220656690,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea","award":["NRF-2020R1A2B5B03001960"],"award-info":[{"award-number":["NRF-2020R1A2B5B03001960"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412107","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T07:01:44Z","timestamp":1603090904000},"page":"2113-2116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Are Negative Links Really Beneficial to Network Embedding?"],"prefix":"10.1145","author":[{"given":"Yeon-Chang","family":"Lee","sequence":"first","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]},{"given":"Nayoun","family":"Seo","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]},{"given":"Sang-Wook","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00113"},{"volume-title":"Proc. of AAAI. 2508--2515","author":"Hongwei","key":"e_1_3_2_2_2_1","unstructured":"Hongwei Wang et al. 2018a. GraphGAN: Graph Representation Learning With Generative Adversarial Nets . In Proc. of AAAI. 2508--2515 . Hongwei Wang et al. 2018a. GraphGAN: Graph Representation Learning With Generative Adversarial Nets. In Proc. of AAAI. 2508--2515."},{"volume-title":"Proc. of WWW. 509--518","author":"Junghwan","key":"e_1_3_2_2_3_1","unstructured":"Junghwan Kim et al. 2018b. SIDE: Representation Learning in Signed Directed Networks . In Proc. of WWW. 509--518 . Junghwan Kim et al. 2018b. SIDE: Representation Learning in Signed Directed Networks. In Proc. of WWW. 509--518."},{"volume-title":"Proc. of WWW. 1067--1077","author":"Jian","key":"e_1_3_2_2_4_1","unstructured":"Jian Tang et al. 2015. LINE: Large-scale Information Network Embedding . In Proc. of WWW. 1067--1077 . Jian Tang et al. 2015. LINE: Large-scale Information Network Embedding. In Proc. of WWW. 1067--1077."},{"volume-title":"Proc. of ACM KDD. 1046--1054","author":"Pinghua","key":"e_1_3_2_2_5_1","unstructured":"Pinghua Xu et al. 2019. Link Prediction with Signed Latent Factors in Signed Social Networks . In Proc. of ACM KDD. 1046--1054 . Pinghua Xu et al. 2019. Link Prediction with Signed Latent Factors in Signed Social Networks. In Proc. of ACM KDD. 1046--1054."},{"volume-title":"Proc. of SDM. 327--335","author":"Suhang","key":"e_1_3_2_2_6_1","unstructured":"Suhang Wang et al. 2017. Signed Network Embedding in Social Media . In Proc. of SDM. 327--335 . Suhang Wang et al. 2017. Signed Network Embedding in Social Media. In Proc. of SDM. 327--335."},{"volume-title":"Proc. of ACM CIKM. 773--782","author":"Yiqi","key":"e_1_3_2_2_7_1","unstructured":"Yiqi Chen et al. 2018c. \"Bridge\": Enhanced Signed Directed Network Embedding . In Proc. of ACM CIKM. 773--782 . Yiqi Chen et al. 2018c. \"Bridge\": Enhanced Signed Directed Network Embedding. In Proc. of ACM CIKM. 773--782."},{"volume-title":"Proc. of ACM SIGIR. 609--618","author":"Yeon-Chang","key":"e_1_3_2_2_8_1","unstructured":"Yeon-Chang Lee et al. 2020. ASiNE: Adversarial Signed Network Embedding . In Proc. of ACM SIGIR. 609--618 . Yeon-Chang Lee et al. 2020. ASiNE: Adversarial Signed Network Embedding. In Proc. of ACM SIGIR. 609--618."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57529-2_15"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Ireland","acronym":"CIKM '20"},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:30Z","timestamp":1750197750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412107"}},"subtitle":["In-Depth Analysis and Interesting Results"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":10,"alternative-id":["10.1145\/3340531.3412107","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412107","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}