{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T19:12:10Z","timestamp":1762024330089,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T00:00:00Z","timestamp":1595635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["U1836206, U1811461, 61773361"],"award-info":[{"award-number":["U1836206, U1811461, 61773361"]}]},{"name":"Project of Youth Innovation Promotion Association CAS","award":["2017146"],"award-info":[{"award-number":["2017146"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1004300"],"award-info":[{"award-number":["2018YFB1004300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,25]]},"DOI":"10.1145\/3397271.3401307","type":"proceedings-article","created":{"date-parts":[[2020,7,25]],"date-time":"2020-07-25T07:50:08Z","timestamp":1595663408000},"page":"1893-1896","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Neural Hierarchical Factorization Machines for User's Event Sequence Analysis"],"prefix":"10.1145","author":[{"given":"Dongbo","family":"Xi","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fuzhen","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bowen","family":"Song","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongchun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuai","family":"Chen","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Hong","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xi","family":"Gu","sequence":"additional","affiliation":[{"name":"Alipay (Hangzhou) Information &amp; Technology Co., Ltd., Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qing","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"H Chi","author":"Beutel Alex","year":"2018","unstructured":"Alex Beutel , Paul Covington , Sagar Jain , Can Xu , Jia Li , Vince Gatto , and Ed H Chi . 2018 . Latent cross: Making use of context in recurrent recommender systems. In WSDM. Alex Beutel, Paul Covington, Sagar Jain, Can Xu, Jia Li, Vince Gatto, and Ed H Chi. 2018. Latent cross: Making use of context in recurrent recommender systems. In WSDM."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Heng-Tze Cheng Levent Koc Jeremiah Harmsen Tal Shaked Tushar Chandra Hrishi Aradhye Glen Anderson Greg Corrado Wei Chai Mustafa Ispir etal 2016. Wide & deep learning for recommender systems. In DLRS.  Heng-Tze Cheng Levent Koc Jeremiah Harmsen Tal Shaked Tushar Chandra Hrishi Aradhye Glen Anderson Greg Corrado Wei Chai Mustafa Ispir et al. 2016. Wide & deep learning for recommender systems. In DLRS.","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Alex Graves Abdel-rahman Mohamed and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In ICASSP.  Alex Graves Abdel-rahman Mohamed and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In ICASSP.","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_2_4_1","unstructured":"Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: a factorization-machine based neural network for CTR prediction. In IJCAI.  Huifeng Guo Ruiming Tang Yunming Ye Zhenguo Li and Xiuqiang He. 2017. DeepFM: a factorization-machine based neural network for CTR prediction. In IJCAI."},{"key":"e_1_3_2_2_5_1","unstructured":"Xiangnan He and Tat-Seng Chua. 2017. Neural factorization machines for sparse predictive analytics. In SIGIR.  Xiangnan He and Tat-Seng Chua. 2017. Neural factorization machines for sparse predictive analytics. In SIGIR."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Jianxun Lian Xiaohuan Zhou Fuzheng Zhang Zhongxia Chen Xing Xie and Guangzhong Sun. 2018. xdeepfm: Combining explicit and implicit feature interactions for recommender systems. In KDD.  Jianxun Lian Xiaohuan Zhou Fuzheng Zhang Zhongxia Chen Xing Xie and Guangzhong Sun. 2018. xdeepfm: Combining explicit and implicit feature interactions for recommender systems. In KDD.","DOI":"10.1145\/3219819.3220023"},{"key":"e_1_3_2_2_7_1","volume-title":"Analyzing a portion of the ROC curve. Medical Decision Making","author":"McClish Donna Katzman","year":"1989","unstructured":"Donna Katzman McClish . 1989. Analyzing a portion of the ROC curve. Medical Decision Making ( 1989 ). Donna Katzman McClish. 1989. Analyzing a portion of the ROC curve. Medical Decision Making (1989)."},{"key":"e_1_3_2_2_8_1","unstructured":"Feiyang Pan Shuokai Li Xiang Ao Pingzhong Tang and Qing He. 2019. Warm Up Cold-start Advertisements: Improving CTR Predictions via Learning to Learn ID Embeddings. In SIGIR.  Feiyang Pan Shuokai Li Xiang Ao Pingzhong Tang and Qing He. 2019. Warm Up Cold-start Advertisements: Improving CTR Predictions via Learning to Learn ID Embeddings. In SIGIR."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Steffen Rendle. 2010. Factorization machines. In ICDM.  Steffen Rendle. 2010. Factorization machines. In ICDM.","DOI":"10.1109\/ICDM.2010.127"},{"key":"e_1_3_2_2_10_1","volume-title":"H Chi","author":"Tang Jiaxi","year":"2019","unstructured":"Jiaxi Tang , Francois Belletti , Sagar Jain , Minmin Chen , Alex Beutel , Can Xu , and Ed H Chi . 2019 . Towards neural mixture recommender for long range dependent user sequences. In TheWebConf . Jiaxi Tang, Francois Belletti, Sagar Jain, Minmin Chen, Alex Beutel, Can Xu, and Ed H Chi. 2019. Towards neural mixture recommender for long range dependent user sequences. In TheWebConf."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Shuhao Wang Cancheng Liu Xiang Gao Hongtao Qu and Wei Xu. 2017. Session-Based Fraud Detection in Online E-Commerce Transactions Using Recurrent Neural Networks. In PKDD.  Shuhao Wang Cancheng Liu Xiang Gao Hongtao Qu and Wei Xu. 2017. Session-Based Fraud Detection in Online E-Commerce Transactions Using Recurrent Neural Networks. In PKDD.","DOI":"10.1007\/978-3-319-71273-4_20"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Jun Xiao Hao Ye Xiangnan He Hanwang Zhang Fei Wu and Tat-Seng Chua. 2017. Attentional factorization machines: Learning the weight of feature interactions via attention networks. In IJCAI.  Jun Xiao Hao Ye Xiangnan He Hanwang Zhang Fei Wu and Tat-Seng Chua. 2017. Attentional factorization machines: Learning the weight of feature interactions via attention networks. In IJCAI.","DOI":"10.24963\/ijcai.2017\/435"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Guorui Zhou Na Mou Ying Fan Qi Pi Weijie Bian Chang Zhou Xiaoqiang Zhu and Kun Gai. 2019. Deep interest evolution network for click-through rate prediction. In AAAI.  Guorui Zhou Na Mou Ying Fan Qi Pi Weijie Bian Chang Zhou Xiaoqiang Zhu and Kun Gai. 2019. Deep interest evolution network for click-through rate prediction. In AAAI.","DOI":"10.1609\/aaai.v33i01.33015941"},{"key":"e_1_3_2_2_14_1","unstructured":"Yongchun Zhu Dongbo Xi Bowen Song Fuzhen Zhuang Shuai Chen Xi Gu and Qing He. 2020. Modeling Users' Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection. In TheWebConf.  Yongchun Zhu Dongbo Xi Bowen Song Fuzhen Zhuang Shuai Chen Xi Gu and Qing He. 2020. Modeling Users' Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection. In TheWebConf."}],"event":{"name":"SIGIR '20: The 43rd International ACM SIGIR conference on research and development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event China","acronym":"SIGIR '20"},"container-title":["Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397271.3401307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:39Z","timestamp":1750200099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397271.3401307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":14,"alternative-id":["10.1145\/3397271.3401307","10.1145\/3397271"],"URL":"https:\/\/doi.org\/10.1145\/3397271.3401307","relation":{},"subject":[],"published":{"date-parts":[[2020,7,25]]},"assertion":[{"value":"2020-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}