{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:34:47Z","timestamp":1778603687398,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Basic Research Program of China","award":["2015CB856004"],"award-info":[{"award-number":["2015CB856004"]}]},{"name":"China Postdoctoral Science Foundation"},{"name":"the Key Basic Research Program of Shanghai Science and Technology Commission, China","award":["15JC1400103, 16JC1402800"],"award-info":[{"award-number":["15JC1400103, 16JC1402800"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3357804","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"2547-2555","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A Dynamic Default Prediction Framework for Networked-guarantee Loans"],"prefix":"10.1145","author":[{"given":"Dawei","family":"Cheng","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Fangzhou","family":"Yang","sequence":"additional","affiliation":[{"name":"Seek Data Inc., Shanghai, China"}]},{"given":"Yi","family":"Tu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhibin","family":"Niu","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"given":"Liqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Franklin Allen and Ana Babus. 2008. Networks in finance. (2008).  Franklin Allen and Ana Babus. 2008. Networks in finance. (2008).","DOI":"10.2139\/ssrn.1094883"},{"key":"e_1_3_2_1_3_1","volume-title":"2003 a. Using neural network rule extraction and decision tables for credit-risk evaluation. Management science","author":"Baesens Bart","year":"2003","unstructured":"Bart Baesens , Rudy Setiono , Christophe Mues , and Jan Vanthienen . 2003 a. Using neural network rule extraction and decision tables for credit-risk evaluation. Management science , Vol. 49 , 3 ( 2003 ), 312--329. Bart Baesens, Rudy Setiono, Christophe Mues, and Jan Vanthienen. 2003 a. Using neural network rule extraction and decision tables for credit-risk evaluation. Management science, Vol. 49, 3 (2003), 312--329."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601545"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2014.50"},{"key":"e_1_3_2_1_7_1","unstructured":"Dean Caire. 2004. Building credit scorecards for small business lending in developing markets. Bannock Consulting http:\/\/www. microfinance. com\/English\/Papers\/Scoring_SMEs_Hybrid. pdf (2004).  Dean Caire. 2004. Building credit scorecards for small business lending in developing markets. Bannock Consulting http:\/\/www. microfinance. com\/English\/Papers\/Scoring_SMEs_Hybrid. pdf (2004)."},{"key":"e_1_3_2_1_8_1","volume-title":"et almbox","author":"Carroll William K","year":"2010","unstructured":"William K Carroll , Colin Carson , M Fennema , E Heemskerk , JP Sapinski , et almbox . 2010 . The Making of a Transnational Capitalist Class: Corporate power in the twenty-first century.Zed books. William K Carroll, Colin Carson, M Fennema, E Heemskerk, JP Sapinski, et almbox. 2010. The Making of a Transnational Capitalist Class: Corporate power in the twenty-first century.Zed books."},{"key":"e_1_3_2_1_9_1","volume-title":"Prediction Defaults for Networked-guarantee Loans. 2018 24th International Conference on Pattern Recognition (ICPR). IEEE, 361--366","author":"Cheng Dawei","year":"2018","unstructured":"Dawei Cheng , Zhibin Niu , Yi Tu , and Liqing Zhang . 2018 . Prediction Defaults for Networked-guarantee Loans. 2018 24th International Conference on Pattern Recognition (ICPR). IEEE, 361--366 . Dawei Cheng, Zhibin Niu, Yi Tu, and Liqing Zhang. 2018. Prediction Defaults for Networked-guarantee Loans. 2018 24th International Conference on Pattern Recognition (ICPR). IEEE, 361--366."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-019-1934-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_12_1","unstructured":"Elena Dumitrescu Sullivan Hue Christophe Hurlin and Sessi Tokpavi. 2018. Machine Learning for Credit Scoring: Improving Logistic Regression with Non Linear Decision Tree Effects. (2018).  Elena Dumitrescu Sullivan Hue Christophe Hurlin and Sessi Tokpavi. 2018. Machine Learning for Credit Scoring: Improving Logistic Regression with Non Linear Decision Tree Effects. (2018)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-06-2014-0079"},{"key":"e_1_3_2_1_14_1","volume-title":"Rasch models: Foundations, recent developments, and applications","author":"Fischer Gerhard H","unstructured":"Gerhard H Fischer and Ivo W Molenaar . 2012. Rasch models: Foundations, recent developments, and applications . Springer Science & Business Media . Gerhard H Fischer and Ivo W Molenaar. 2012. Rasch models: Foundations, recent developments, and applications. Springer Science & Business Media."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.09.014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_17_1","volume-title":"A k-nearest-neighbour classifier for assessing consumer credit risk. The Statistician","author":"Henley WE","year":"1996","unstructured":"WE Henley and David J Hand . 1996. A k-nearest-neighbour classifier for assessing consumer credit risk. The Statistician ( 1996 ), 77--95. WE Henley and David J Hand. 1996. A k-nearest-neighbour classifier for assessing consumer credit risk. The Statistician (1996), 77--95."},{"key":"e_1_3_2_1_18_1","volume-title":"Credit scoring with a data mining approach based on support vector machines. Expert systems with applications","author":"Huang Cheng-Lung","year":"2007","unstructured":"Cheng-Lung Huang , Mu-Chen Chen , and Chieh-Jen Wang . 2007. Credit scoring with a data mining approach based on support vector machines. Expert systems with applications , Vol. 33 , 4 ( 2007 ), 847--856. Cheng-Lung Huang, Mu-Chen Chen, and Chieh-Jen Wang. 2007. Credit scoring with a data mining approach based on support vector machines. Expert systems with applications, Vol. 33, 4 (2007), 847--856."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pacfin.2011.07.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2010.06.001"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. 3rd Int. Conf. Learn. Representations.","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Lei Ba . 2014 . Adam: Amethod for stochastic optimization . In Proc. 3rd Int. Conf. Learn. Representations. Diederik P Kingma and Jimmy Lei Ba. 2014. Adam: Amethod for stochastic optimization. In Proc. 3rd Int. Conf. Learn. Representations."},{"key":"e_1_3_2_1_22_1","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research , Vol. 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, Nov (2008), 2579--2605.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02296272"},{"key":"e_1_3_2_1_24_1","unstructured":"H Brendan McMahan. 2011. Follow-the-regularized-leader and mirror descent: Equivalence theorems and l1 regularization. (2011).  H Brendan McMahan. 2011. Follow-the-regularized-leader and mirror descent: Equivalence theorems and l1 regularization. (2011)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57463-9_7"},{"key":"e_1_3_2_1_26_1","unstructured":"Xinhai Liu Xiangfeng Meng. 2015. Credit risk evaluation for loan guarantee chain in China.(2015).  Xinhai Liu Xiangfeng Meng. 2015. Credit risk evaluation for loan guarantee chain in China.(2015)."},{"key":"e_1_3_2_1_27_1","volume-title":"Perceive Your Users in Depth: Learning Universal User Representations from Multiple E-commerce Tasks. arXiv preprint arXiv:1805.10727","author":"Ni Yabo","year":"2018","unstructured":"Yabo Ni , Dan Ou , Shichen Liu , Xiang Li , Wenwu Ou , Anxiang Zeng , and Luo Si. 2018. Perceive Your Users in Depth: Learning Universal User Representations from Multiple E-commerce Tasks. arXiv preprint arXiv:1805.10727 ( 2018 ). Yabo Ni, Dan Ou, Shichen Liu, Xiang Li, Wenwu Ou, Anxiang Zeng, and Luo Si. 2018. Perceive Your Users in Depth: Learning Universal User Representations from Multiple E-commerce Tasks. arXiv preprint arXiv:1805.10727 (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis.2018.00028"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2304536.2304541"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 3rd. annual workshop on Librarians and Computers (LAC'10)","volume":"3","author":"Smith Stan W","year":"2010","unstructured":"Stan W Smith . 2010 . An experiment in bibliographic mark-up: Parsing metadata for XML export . In Proceedings of the 3rd. annual workshop on Librarians and Computers (LAC'10) , Reginald N. Smythe and Alexander Noble (Eds.) , Vol. 3 . 422--431. Stan W Smith. 2010. An experiment in bibliographic mark-up: Parsing metadata for XML export. In Proceedings of the 3rd. annual workshop on Librarians and Computers (LAC'10), Reginald N. Smythe and Alexander Noble (Eds.), Vol. 3. 422--431."},{"key":"e_1_3_2_1_32_1","volume-title":"A deep learning approach to competing risks representation in peer-to-peer lending","author":"Tan Fei","year":"2018","unstructured":"Fei Tan , Xiurui Hou , Jie Zhang , Zhi Wei , and Zhenyu Yan . 2018. A deep learning approach to competing risks representation in peer-to-peer lending . IEEE transactions on neural networks and learning systems ( 2018 ). Fei Tan, Xiurui Hou, Jie Zhang, Zhi Wei, and Zhenyu Yan. 2018. A deep learning approach to competing risks representation in peer-to-peer lending. IEEE transactions on neural networks and learning systems (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500292"},{"key":"e_1_3_2_1_34_1","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR .  Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR ."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298239.3298471"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018665"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2822283"}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","location":"Beijing China","acronym":"CIKM '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:43Z","timestamp":1750203883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":35,"alternative-id":["10.1145\/3357384.3357804","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3357804","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}