{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T21:12:35Z","timestamp":1772831555086,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the China Postdoctoral Science Foundation","award":["2019M651499"],"award-info":[{"award-number":["2019M651499"]}]},{"name":"the NSFC","award":["61802278"],"award-info":[{"award-number":["61802278"]}]},{"name":"the National Key R&D Program of China","award":["2018AAA0100704"],"award-info":[{"award-number":["2018AAA0100704"]}]},{"name":"the MOE Key Laboratory Foundation of AI","award":["AI2019004"],"award-info":[{"award-number":["AI2019004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,23]]},"DOI":"10.1145\/3394486.3403322","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:03:53Z","timestamp":1597964633000},"page":"2715-2723","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Contagious Chain Risk Rating for Networked-guarantee Loans"],"prefix":"10.1145","author":[{"given":"Dawei","family":"Cheng","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhibin","family":"Niu","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"given":"Yiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"A neural network approach for credit risk evaluation. The quarterly review of economics and finance","author":"Angelini Eliana","year":"2008","unstructured":"Eliana Angelini , Giacomo di Tollo , and Andrea Roli . 2008. A neural network approach for credit risk evaluation. The quarterly review of economics and finance , Vol. 48 , 4 ( 2008 ), 733--755. Eliana Angelini, Giacomo di Tollo, and Andrea Roli. 2008. A neural network approach for credit risk evaluation. The quarterly review of economics and finance , Vol. 48, 4 (2008), 733--755."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.4227"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330693"},{"key":"e_1_3_2_2_4_1","volume-title":"Using neural network rule extraction and decision tables for credit-risk evaluation. Management science","author":"Baesens Bart","year":"2003","unstructured":"Bart Baesens , Rudy Setiono , Christophe Mues , and Jan Vanthienen . 2003. Using neural network rule extraction and decision tables for credit-risk evaluation. Management science , Vol. 49 , 3 ( 2003 ), 312--329. Bart Baesens, Rudy Setiono, Christophe Mues, and Jan Vanthienen. 2003. Using neural network rule extraction and decision tables for credit-risk evaluation. Management science , Vol. 49, 3 (2003), 312--329."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-019-0211-y"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2008.08.006"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2014.50"},{"key":"e_1_3_2_2_9_1","volume-title":"Deeptrax: Embedding graphs of financial transactions. arXiv preprint arXiv:1907.07225","author":"Bruss C Bayan","year":"2019","unstructured":"C Bayan Bruss , Anish Khazane , Jonathan Rider , Richard Serpe , Antonia Gogoglou , and Keegan E Hines . 2019 . Deeptrax: Embedding graphs of financial transactions. arXiv preprint arXiv:1907.07225 (2019). C Bayan Bruss, Anish Khazane, Jonathan Rider, Richard Serpe, Antonia Gogoglou, and Keegan E Hines. 2019. Deeptrax: Embedding graphs of financial transactions. arXiv preprint arXiv:1907.07225 (2019)."},{"key":"e_1_3_2_2_10_1","volume-title":"Market Institutions and Financial Market Risk","author":"Carey Mark","unstructured":"Mark Carey , Anil Kashyap , Raghuram Rajan , and Ren\u00e9 Stulz . 2012. Market Institutions and Financial Market Risk . Elsevier , Journal of Financial Economics. http:\/\/www.nber.org\/books\/care10--1 Mark Carey, Anil Kashyap, Raghuram Rajan, and Ren\u00e9 Stulz. 2012. Market Institutions and Financial Market Risk .Elsevier, Journal of Financial Economics. http:\/\/www.nber.org\/books\/care10--1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/807"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5371"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357804"},{"key":"e_1_3_2_2_14_1","volume-title":"NIPS 2014 Workshop on Deep Learning","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung , Caglar Gulcehre , Kyunghyun Cho , and Yoshua Bengio . 2014 . Empirical evaluation of gated recurrent neural networks on sequence modeling . In NIPS 2014 Workshop on Deep Learning , December 2014 . Junyoung Chung, Caglar Gulcehre, Kyunghyun Cho, and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS 2014 Workshop on Deep Learning, December 2014 ."},{"key":"e_1_3_2_2_15_1","volume-title":"et almbox","author":"Cont Rama","year":"2010","unstructured":"Rama Cont , Amal Moussa , et almbox . 2010 . Network structure and systemic risk in banking systems. Edson Bastos e, Network Structure and Systemic Risk in Banking Systems (December 1, 2010) (2010). Rama Cont, Amal Moussa, et almbox. 2010. Network structure and systemic risk in banking systems. Edson Bastos e, Network Structure and Systemic Risk in Banking Systems (December 1, 2010) (2010)."},{"key":"e_1_3_2_2_16_1","volume-title":"May","author":"Cont Rama","year":"2009","unstructured":"Rama Cont , Amal Moussa , Andreea Minca , and Edson Basto . 2009. Too interconnected to fail: contagion and systemic risk in financial networks. Lecture presented at the IMF , May ( 2009 ). Rama Cont, Amal Moussa, Andreea Minca, and Edson Basto. 2009. Too interconnected to fail: contagion and systemic risk in financial networks. Lecture presented at the IMF, May (2009)."},{"key":"e_1_3_2_2_17_1","unstructured":"Elena Dumitrescu Sullivan Hue Christophe Hurlin and Sessi Tokpavi. 2018. Machine Learning for Credit Scoring: Improving Logistic Regression with Non Linear Decision Tree Effects. (2018).  Elena Dumitrescu Sullivan Hue Christophe Hurlin and Sessi Tokpavi. 2018. Machine Learning for Credit Scoring: Improving Logistic Regression with Non Linear Decision Tree Effects. (2018)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-06-2014-0079"},{"key":"e_1_3_2_2_19_1","volume-title":"Rasch models: Foundations, recent developments, and applications","author":"Fischer Gerhard H","unstructured":"Gerhard H Fischer and Ivo W Molenaar . 2012. Rasch models: Foundations, recent developments, and applications . Springer Science & Business Media . Gerhard H Fischer and Ivo W Molenaar. 2012. Rasch models: Foundations, recent developments, and applications .Springer Science & Business Media."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.09.014"},{"key":"e_1_3_2_2_21_1","volume-title":"Handbook on systemic risk","author":"Fouque Jean-Pierre","unstructured":"Jean-Pierre Fouque and Joseph A Langsam . 2013. Handbook on systemic risk . Cambridge University Press . Jean-Pierre Fouque and Joseph A Langsam. 2013. Handbook on systemic risk .Cambridge University Press."},{"key":"e_1_3_2_2_22_1","volume-title":"Credit scoring with a data mining approach based on support vector machines. Expert systems with applications","author":"Huang Cheng-Lung","year":"2007","unstructured":"Cheng-Lung Huang , Mu-Chen Chen , and Chieh-Jen Wang . 2007. Credit scoring with a data mining approach based on support vector machines. Expert systems with applications , Vol. 33 , 4 ( 2007 ), 847--856. Cheng-Lung Huang, Mu-Chen Chen, and Chieh-Jen Wang. 2007. Credit scoring with a data mining approach based on support vector machines. Expert systems with applications , Vol. 33, 4 (2007), 847--856."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Maximilian Jager Thomas Siemsen and Johannes Vilsmeier. 2020. Interbank Risk Assessment--A Simulation Approach. (2020).  Maximilian Jager Thomas Siemsen and Johannes Vilsmeier. 2020. Interbank Risk Assessment--A Simulation Approach. (2020).","DOI":"10.2139\/ssrn.3581219"},{"key":"e_1_3_2_2_24_1","volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. In NeurIPS . 3146--3154.","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A highly efficient gradient boosting decision tree. In NeurIPS . 3146--3154. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In NeurIPS . 3146--3154."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2010.06.001"},{"key":"e_1_3_2_2_26_1","volume-title":"Proc. 3rd Int. Conf. Learn. Representations .","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Lei Ba . 2014 . Adam: Amethod for stochastic optimization . In Proc. 3rd Int. Conf. Learn. Representations . Diederik P Kingma and Jimmy Lei Ba. 2014. Adam: Amethod for stochastic optimization. In Proc. 3rd Int. Conf. Learn. Representations ."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1057-5219(99)00012-5"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14459-3_11"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02296272"},{"key":"e_1_3_2_2_30_1","unstructured":"H Brendan McMahan. 2011. Follow-the-regularized-leader and mirror descent: Equivalence theorems and l1 regularization. (2011).  H Brendan McMahan. 2011. Follow-the-regularized-leader and mirror descent: Equivalence theorems and l1 regularization. (2011)."},{"key":"e_1_3_2_2_31_1","unstructured":"Xinhai Liu Xiangfeng Meng. 2015. Credit risk evaluation for loan guarantee chain in China. (2015).  Xinhai Liu Xiangfeng Meng. 2015. Credit risk evaluation for loan guarantee chain in China. (2015)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1162\/qjec.2009.124.4.1449"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219828"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis.2018.00028"},{"key":"e_1_3_2_2_35_1","volume-title":"A deep learning approach to competing risks representation in peer-to-peer lending","author":"Tan Fei","year":"2018","unstructured":"Fei Tan , Xiurui Hou , Jie Zhang , Zhi Wei , and Zhenyu Yan . 2018. A deep learning approach to competing risks representation in peer-to-peer lending . IEEE transactions on neural networks and learning systems ( 2018 ). Fei Tan, Xiurui Hou, Jie Zhang, Zhi Wei, and Zhenyu Yan. 2018. A deep learning approach to competing risks representation in peer-to-peer lending. IEEE transactions on neural networks and learning systems (2018)."},{"key":"e_1_3_2_2_36_1","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR .  Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR ."}],"event":{"name":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event CA USA","acronym":"KDD '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394486.3403322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:48Z","timestamp":1750197708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"references-count":35,"alternative-id":["10.1145\/3394486.3403322","10.1145\/3394486"],"URL":"https:\/\/doi.org\/10.1145\/3394486.3403322","relation":{},"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}