{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:08:39Z","timestamp":1772039319455,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["61773362, 61872338, 61832017, 61906180"],"award-info":[{"award-number":["61773362, 61872338, 61832017, 61906180"]}]},{"name":"National Key R&D Program of China","award":["2016QY02D0405"],"award-info":[{"award-number":["2016QY02D0405"]}]},{"name":"Tencent AI Lab Rhino-Bird Focused Research Program","award":["JR202033"],"award-info":[{"award-number":["JR202033"]}]},{"name":"Beijing Outstanding Young Scientist Program","award":["BJJWZYJH012019100020098"],"award-info":[{"award-number":["BJJWZYJH012019100020098"]}]},{"name":"Fundamental Research Funds for the Central Universities, and Research Funds of Renmin University of China","award":["2018030246"],"award-info":[{"award-number":["2018030246"]}]},{"name":"Beijing Academy of Artificial Intelligence (BAAI)","award":["BAAI2020ZJ0303, BAAI2019ZD0305"],"award-info":[{"award-number":["BAAI2020ZJ0303, BAAI2019ZD0305"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["2016102"],"award-info":[{"award-number":["2016102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401104","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"499-508","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["SetRank"],"prefix":"10.1145","author":[{"given":"Liang","family":"Pang","sequence":"first","affiliation":[{"name":"CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing, China"}]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"Renmin University of China &amp; Beijing Key Laboratory of Big Data Management and Analysis Methods, Beijing, China"}]},{"given":"Qingyao","family":"Ai","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Yanyan","family":"Lan","sequence":"additional","affiliation":[{"name":"CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing, China"}]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[{"name":"CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Beijing, China"}]},{"given":"Jirong","family":"Wen","sequence":"additional","affiliation":[{"name":"Renmin University of China &amp; Beijing Key Laboratory of Big Data Management and Analysis Methods, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3209985"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341981.3344218"},{"key":"e_1_3_2_2_3_1","volume-title":"Jamie Ryan Kiros, and Geoffrey E Hinton","author":"Ba Jimmy Lei","year":"2016","unstructured":"Jimmy Lei Ba , Jamie Ryan Kiros, and Geoffrey E Hinton . 2016 . Layer normalization. arXiv preprint arXiv:1607.06450 (2016). Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E Hinton. 2016. Layer normalization. arXiv preprint arXiv:1607.06450 (2016)."},{"key":"e_1_3_2_2_4_1","volume-title":"Xiyang Luo, Alan Mackey, and Ofer Meshi.","author":"Bello Irwan","year":"2018","unstructured":"Irwan Bello , Sayali Kulkarni , Sagar Jain , Craig Boutilier , Ed Chi, Elad Eban , Xiyang Luo, Alan Mackey, and Ofer Meshi. 2018 . Seq2slate: Re-ranking and slate optimization with rnns. arXiv preprint arXiv:1810.02019 (2018). Irwan Bello, Sayali Kulkarni, Sagar Jain, Craig Boutilier, Ed Chi, Elad Eban, Xiyang Luo, Alan Mackey, and Ofer Meshi. 2018. Seq2slate: Re-ranking and slate optimization with rnns. arXiv preprint arXiv:1810.02019 (2018)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371844"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331347"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"e_1_3_2_2_8_1","first-page":"23","article-title":"From ranknet to lambdarank to lambdamart: An overview","volume":"11","author":"Burges Christopher JC","year":"2010","unstructured":"Christopher JC Burges . 2010 . From ranknet to lambdarank to lambdamart: An overview . Learning , Vol. 11 (2010), 23 -- 581 . Christopher JC Burges. 2010. From ranknet to lambdarank to lambdamart: An overview. Learning, Vol. 11 (2010), 23--581.","journal-title":"Learning"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609503"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273513"},{"key":"e_1_3_2_2_11_1","unstructured":"Mostafa Dehghani Stephan Gouws Oriol Vinyals Jakob Uszkoreit and Lukasz Kaiser. 2018. Universal Transformers. arxiv: cs.CL\/1807.03819  Mostafa Dehghani Stephan Gouws Oriol Vinyals Jakob Uszkoreit and Lukasz Kaiser. 2018. Universal Transformers. arxiv: cs.CL\/1807.03819"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics. 4171--4186","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics. 4171--4186 . Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics. 4171--4186."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873781.1873815"},{"key":"e_1_3_2_2_14_1","volume-title":"5th International Conference on Learning Representations, ICLR","author":"Edwards Harrison","year":"2017","unstructured":"Harrison Edwards and Amos J. Storkey . 2017. Towards a Neural Statistician . In 5th International Conference on Learning Representations, ICLR 2017 . Harrison Edwards and Amos J. Storkey. 2017. Towards a Neural Statistician. In 5th International Conference on Learning Representations, ICLR 2017."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/945365.964285"},{"key":"e_1_3_2_2_16_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman Jerome H","year":"2001","unstructured":"Jerome H Friedman . 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics ( 2001 ), 1189--1232. Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-008-9045-0"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983769"},{"key":"e_1_3_2_2_19_1","unstructured":"Baotian Hu Zhengdong Lu Hang Li and Qingcai Chen. 2014. Convolutional neural network architectures for matching natural language sentences. In NIPS. 2042--2050.  Baotian Hu Zhengdong Lu Hang Li and Qingcai Chen. 2014. Convolutional neural network architectures for matching natural language sentences. In NIPS. 2042--2050."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505665"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_2_22_1","volume-title":"Beyond greedy ranking: Slate optimization via List-CVAE. arXiv preprint arXiv:1803.01682","author":"Jiang Ray","year":"2018","unstructured":"Ray Jiang , Sven Gowal , Timothy A Mann , and Danilo J Rezende . 2018. Beyond greedy ranking: Slate optimization via List-CVAE. arXiv preprint arXiv:1803.01682 ( 2018 ). Ray Jiang, Sven Gowal, Timothy A Mann, and Danilo J Rezende. 2018. Beyond greedy ranking: Slate optimization via List-CVAE. arXiv preprint arXiv:1803.01682 (2018)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150429"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/1076034.1076063","article-title":"Accurately interpreting clickthrough data as implicit feedback","volume":"5","author":"Joachims Thorsten","year":"2005","unstructured":"Thorsten Joachims , Laura A Granka , Bing Pan , Helene Hembrooke , and Geri Gay . 2005 . Accurately interpreting clickthrough data as implicit feedback . In SIGIR , Vol. 5. 154 -- 161 . Thorsten Joachims, Laura A Granka, Bing Pan, Helene Hembrooke, and Geri Gay. 2005. Accurately interpreting clickthrough data as implicit feedback. In SIGIR, Vol. 5. 154--161.","journal-title":"SIGIR"},{"key":"e_1_3_2_2_25_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130348.3130376"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the 36th ICML","author":"Lee Juho","year":"2019","unstructured":"Juho Lee , Yoonho Lee , Jungtaek Kim , Adam Kosiorek , Seungjin Choi , and Yee Whye Teh . 2019 . Set Transformer: A Framework for Attention-based Permutation-Invariant Neural Networks . In Proceedings of the 36th ICML . Long Beach, California, USA, 3744--3753. Juho Lee, Yoonho Lee, Jungtaek Kim, Adam Kosiorek, Seungjin Choi, and Yee Whye Teh. 2019. Set Transformer: A Framework for Attention-based Permutation-Invariant Neural Networks. In Proceedings of the 36th ICML. Long Beach, California, USA, 3744--3753."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016292"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132914"},{"key":"e_1_3_2_2_31_1","unstructured":"Rama Kumar Pasumarthi Xuanhui Wang Michael Bendersky and Marc Najork. 2019. Self-Attentive Document Interaction Networks for Permutation Equivariant Ranking. arxiv: cs.IR\/1910.09676  Rama Kumar Pasumarthi Xuanhui Wang Michael Bendersky and Marc Najork. 2019. Self-Attentive Document Interaction Networks for Permutation Equivariant Ranking. arxiv: cs.IR\/1910.09676"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347000"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/275537.275701"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010057"},{"key":"e_1_3_2_2_35_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In NIPS. 5998--6008."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 25th IJCAI. 2922--2928","author":"Wan Shengxian","year":"2016","unstructured":"Shengxian Wan , Yanyan Lan , Jun Xu , Jiafeng Guo , Liang Pang , and Xueqi Cheng . 2016 . Match-SRNN: modeling the recursive matching structure with spatial RNN . In Proceedings of the 25th IJCAI. 2922--2928 . Shengxian Wan, Yanyan Lan, Jun Xu, Jiafeng Guo, Liang Pang, and Xueqi Cheng. 2016. Match-SRNN: modeling the recursive matching structure with spatial RNN. In Proceedings of the 25th IJCAI. 2922--2928."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390306"},{"key":"e_1_3_2_2_38_1","volume-title":"Beyond Factoid QA: Effective Methods for Non-factoid Answer Sentence Retrieval. In Proceedings of the","author":"Yang Liu","year":"2016","unstructured":"Liu Yang , Qingyao Ai , Damiano Spina , Ruey-Cheng Chen , Liang Pang , W Bruce Croft , Jiafeng Guo , and Falk Scholer . 2016 . Beyond Factoid QA: Effective Methods for Non-factoid Answer Sentence Retrieval. In Proceedings of the ECIR. Springer , 115--128. Liu Yang, Qingyao Ai, Damiano Spina, Ruey-Cheng Chen, Liang Pang, W Bruce Croft, Jiafeng Guo, and Falk Scholer. 2016. Beyond Factoid QA: Effective Methods for Non-factoid Answer Sentence Retrieval. In Proceedings of the ECIR. Springer, 115--128."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3084154"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661953"},{"key":"e_1_3_2_2_41_1","unstructured":"Manzil Zaheer Satwik Kottur Siamak Ravanbakhsh Barnabas Poczos Ruslan R Salakhutdinov and Alexander J Smola. 2017. Deep sets. In NeulPS. 3391--3401.  Manzil Zaheer Satwik Kottur Siamak Ravanbakhsh Barnabas Poczos Ruslan R Salakhutdinov and Alexander J Smola. 2017. Deep sets. In NeulPS. 3391--3401."},{"key":"e_1_3_2_2_42_1","unstructured":"Han Zhang Ian Goodfellow Dimitris Metaxas and Augustus Odena. 2019. Self-Attention Generative Adversarial Networks. In ICML. 7354--7363.  Han Zhang Ian Goodfellow Dimitris Metaxas and Augustus Odena. 2019. Self-Attention Generative Adversarial Networks. In ICML. 7354--7363."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271776"}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","location":"Virtual Event China","acronym":"SIGIR '20","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:38Z","timestamp":1750195898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401104"}},"subtitle":["Learning a Permutation-Invariant Ranking Model for Information Retrieval"],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":43,"alternative-id":["10.1145\/3397271.3401104","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401104","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}