{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:22:10Z","timestamp":1762953730996,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61876006,61572041"],"award-info":[{"award-number":["61876006,61572041"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,3]]},"DOI":"10.1145\/3357384.3357947","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"409-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Hierarchical Community Structure Preserving Network Embedding"],"prefix":"10.1145","author":[{"given":"Qingqing","family":"Long","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yiming","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Lun","family":"Du","sequence":"additional","affiliation":[{"name":"Microsoft Research &amp; Peking University, Beijing, China"}]},{"given":"Guojie","family":"Song","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yilun","family":"Jin","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(94)90493-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-009-9045-5"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Structural inference of hierarchies in networks. international conference on machine learning","author":"Clauset Aaron","year":"2006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06830"},{"key":"e_1_3_2_1_5_1","article-title":"A survey on network embedding","author":"Cui Peng","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering, pages 1--1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143880"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/287"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/288"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.46"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(88)90469-8"},{"volume-title":"Reducing the dimensionality of data with neural networks. science, 313(5786):504--507","year":"2006","author":"Hinton Geoffrey E","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"2177","volume-title":"Advances in neural information processing systems","author":"Levy Omer","year":"2014"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014261"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104407"},{"issue":"2605","key":"e_1_3_2_1_16_1","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Der Maaten Laurens Van","year":"2008","journal-title":"Journal of Machine Learning Research"},{"volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","year":"2013","author":"Mikolov Tomas","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-004-0552-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104"},{"key":"e_1_3_2_1_22_1","first-page":"6338","volume-title":"Advances in neural information processing systems","author":"Nickel Maximillian","year":"2017"},{"key":"e_1_3_2_1_23_1","first-page":"701","volume-title":"Deepwalk: online learning of social representations. Knowledge Discovery and Data mining","author":"Perozzi Bryan","year":"2014"},{"key":"e_1_3_2_1_24_1","first-page":"385","volume-title":"Pedro H P Saverese, and Daniel R Figueiredo. struc2vec : Learning node representations from structural identity. knowledge discovery and data mining","author":"Rodrigues Ribeiro Leonardo Filipe","year":"2017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2008.12.021"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2032324100"},{"volume-title":"Introduction to linear algebra","year":"1993","author":"Strang Gilbert","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0210-x"},{"key":"e_1_3_2_1_29_1","first-page":"1067","volume-title":"International Conference on World Wide Web","author":"Tang Jian","year":"2015"},{"issue":"16","key":"e_1_3_2_1_30_1","first-page":"4165","article-title":"Social structure of facebook networks","volume":"391","author":"Traud Amanda L.","year":"2012","journal-title":"Social Science Electronic Publishing"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.939739"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953039"},{"volume-title":"Association for the Advancement of Artificial Intelligence Conference","year":"2017","author":"Wang Xiao","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","first-page":"3314","volume-title":"The World Wide Web Conference","author":"Lu Zhicong","year":"2019"},{"volume-title":"Principal component analysis. Chemometrics and intelligent laboratory systems, 2(1--3):37--52","year":"1987","author":"Wold Svante","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","first-page":"895","volume-title":"On the dimensionality of word embedding. neural information processing systems","author":"Yin Zi","year":"2018"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/606"}],"event":{"name":"CIKM '19: The 28th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Beijing China","acronym":"CIKM '19"},"container-title":["Proceedings of the 28th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357384.3357947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:04Z","timestamp":1750202584000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357384.3357947"}},"subtitle":["A Subspace Approach"],"short-title":[],"issued":{"date-parts":[[2019,11,3]]},"references-count":37,"alternative-id":["10.1145\/3357384.3357947","10.1145\/3357384"],"URL":"https:\/\/doi.org\/10.1145\/3357384.3357947","relation":{},"subject":[],"published":{"date-parts":[[2019,11,3]]},"assertion":[{"value":"2019-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}