{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T07:50:30Z","timestamp":1773820230474,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["IIS-1838730"],"award-info":[{"award-number":["IIS-1838730"]}]},{"name":"US National Science Foundation","award":["IIS-1619028"],"award-info":[{"award-number":["IIS-1619028"]}]},{"name":"US National Science Foundation","award":["IIS-1707498"],"award-info":[{"award-number":["IIS-1707498"]}]},{"name":"Criteo","award":["Criteo Faculty Research Award"],"award-info":[{"award-number":["Criteo Faculty Research Award"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3357807","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"2803-2812","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Adversarial Factorization Autoencoder for Look-alike Modeling"],"prefix":"10.1145","author":[{"given":"Khoa D.","family":"Doan","sequence":"first","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"given":"Pranjul","family":"Yadav","sequence":"additional","affiliation":[{"name":"Criteo AI Labs, Palo Alto, CA, USA"}]},{"given":"Chandan K.","family":"Reddy","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Estimating or propagating gradients through stochastic neurons for conditional computation. arXiv preprint arXiv:1308.3432","author":"Bengio Yoshua","year":"2013","unstructured":"Yoshua Bengio , Nicholas L\u00e9onard , and Aaron Courville . 2013. Estimating or propagating gradients through stochastic neurons for conditional computation. arXiv preprint arXiv:1308.3432 ( 2013 ). Yoshua Bengio, Nicholas L\u00e9onard, and Aaron Courville. 2013. Estimating or propagating gradients through stochastic neurons for conditional computation. arXiv preprint arXiv:1308.3432 (2013)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_4_1","volume-title":"Stochastic gradient boosting. Computational statistics & data analysis 38, 4","author":"Friedman Jerome H","year":"2002","unstructured":"Jerome H Friedman . 2002. Stochastic gradient boosting. Computational statistics & data analysis 38, 4 ( 2002 ), 367--378. Jerome H Friedman. 2002. Stochastic gradient boosting. Computational statistics & data analysis 38, 4 (2002), 367--378."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.193"},{"key":"e_1_3_2_1_6_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep learning . MIT press . Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_1_7_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080777"},{"key":"e_1_3_2_1_9_1","unstructured":"Yoon Kim Kelly Zhang Alexander M Rush Yann LeCun etal 2017. Adversarially regularized autoencoders for generating discrete structures. arXiv preprint arXiv:1706.04223 (2017).  Yoon Kim Kelly Zhang Alexander M Rush Yann LeCun et al. 2017. Adversarially regularized autoencoders for generating discrete structures. arXiv preprint arXiv:1706.04223 (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Deep learning. Nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. Nature 521, 7553 ( 2015 ), 436--444. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_11_1","volume-title":"Mining of massive datasets","author":"Leskovec Jure","unstructured":"Jure Leskovec , Anand Rajaraman , and Jeffrey David Ullman . 2014. Mining of massive datasets . Cambridge university press . Jure Leskovec, Anand Rajaraman, and Jeffrey David Ullman. 2014. Mining of massive datasets. Cambridge university press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939680"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939680"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 5th InternationalWorkshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications.","author":"Ma M","year":"2016","unstructured":"M Ma , Z Wen , Datong Chen , 2016 . A sub-linear massive-scale look-alike audience extension system . In Proceedings of the 5th InternationalWorkshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications. M Ma, Z Wen, Datong Chen, et al. 2016. A sub-linear massive-scale look-alike audience extension system. In Proceedings of the 5th InternationalWorkshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications."},{"key":"e_1_3_2_1_15_1","volume-title":"Score Look-Alike Audiences. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW). IEEE, 647--654","author":"Ma Qiang","year":"2016","unstructured":"Qiang Ma , EeshanWagh, JiayiWen, Zhen Xia , Robert Ormandi , and Datong Chen . 2016 . Score Look-Alike Audiences. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW). IEEE, 647--654 . Qiang Ma, EeshanWagh, JiayiWen, Zhen Xia, Robert Ormandi, and Datong Chen. 2016. Score Look-Alike Audiences. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW). IEEE, 647--654."},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial autoencoders. arXiv preprint arXiv:1511.05644","author":"Makhzani Alireza","year":"2015","unstructured":"Alireza Makhzani , Jonathon Shlens , Navdeep Jaitly , Ian Goodfellow , and Brendan Frey . 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644 ( 2015 ). Alireza Makhzani, Jonathon Shlens, Navdeep Jaitly, Ian Goodfellow, and Brendan Frey. 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644 (2015)."},{"key":"e_1_3_2_1_17_1","first-page":"655","article-title":"Systems and methods for generating expanded user segments","volume":"8","author":"Qu Yan","year":"2014","unstructured":"Yan Qu , Jing Wang , Yang Sun , and Hans Marius Holtan . 2014 . Systems and methods for generating expanded user segments . US Patent 8 , 655 ,695. Yan Qu, Jing Wang, Yang Sun, and Hans Marius Holtan. 2014. Systems and methods for generating expanded user segments. US Patent 8, 655,695.","journal-title":"US Patent"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.127"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.11.006"},{"key":"e_1_3_2_1_20_1","unstructured":"Tim Salimans Ian Goodfellow Wojciech Zaremba Vicki Cheung Alec Radford and Xi Chen. 2016. Improved techniques for training gans. In Advances in Neural Information Processing Systems. 2234--2242.  Tim Salimans Ian Goodfellow Wojciech Zaremba Vicki Cheung Alec Radford and Xi Chen. 2016. Improved techniques for training gans. In Advances in Neural Information Processing Systems. 2234--2242."},{"key":"e_1_3_2_1_21_1","first-page":"53","article-title":"Setting goals and choosing metrics for recommender system evaluations. In UCERSTI2 Workshop at the 5th ACM Conference on Recommender Systems","volume":"23","author":"Schr\u00f6der Gunnar","year":"2011","unstructured":"Gunnar Schr\u00f6der , Maik Thiele , and Wolfgang Lehner . 2011 . Setting goals and choosing metrics for recommender system evaluations. In UCERSTI2 Workshop at the 5th ACM Conference on Recommender Systems , Chicago, USA , Vol. 23. 53 . Gunnar Schr\u00f6der, Maik Thiele, and Wolfgang Lehner. 2011. Setting goals and choosing metrics for recommender system evaluations. In UCERSTI2 Workshop at the 5th ACM Conference on Recommender Systems, Chicago, USA, Vol. 23. 53.","journal-title":"Chicago, USA"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788603"},{"key":"e_1_3_2_1_23_1","volume-title":"Heng Tao Shen, et al","author":"Wang Jingdong","year":"2017","unstructured":"Jingdong Wang , Ting Zhang , Nicu Sebe , Heng Tao Shen, et al . 2017 . A survey on learning to hash. IEEE transactions on pattern analysis and machine intelligence (2017). Jingdong Wang, Ting Zhang, Nicu Sebe, Heng Tao Shen, et al. 2017. A survey on learning to hash. IEEE transactions on pattern analysis and machine intelligence (2017)."}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","location":"Beijing China","acronym":"CIKM '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:43Z","timestamp":1750203883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":23,"alternative-id":["10.1145\/3357384.3357807","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3357807","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}