{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:10:34Z","timestamp":1776885034468,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA865018C7880"],"award-info":[{"award-number":["FA865018C7880"]}]},{"name":"ARO","award":["W911NF-16-1-0342"],"award-info":[{"award-number":["W911NF-16-1-0342"]}]},{"name":"NSF","award":["OAC-1835598"],"award-info":[{"award-number":["OAC-1835598"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,8]]},"DOI":"10.1145\/3437963.3441806","type":"proceedings-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T04:34:28Z","timestamp":1615005268000},"page":"589-597","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["F-FADE: Frequency Factorization for Anomaly Detection in Edge Streams"],"prefix":"10.1145","author":[{"given":"Yen-Yu","family":"Chang","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Rok","family":"Sosic","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"M. H.","family":"Afifi","sequence":"additional","affiliation":[{"name":"Barracuda Networks, Campbell, CA, USA"}]},{"given":"Marco","family":"Schweighauser","sequence":"additional","affiliation":[{"name":"Barracuda Networks, Campbell, CA, USA"}]},{"given":"Jure","family":"Leskovec","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Charu C Aggarwal and Karthik Subbian. 2012. Event detection in social streams. In ICDM. 624--635.  Charu C Aggarwal and Karthik Subbian. 2012. Event detection in social streams. In ICDM. 624--635.","DOI":"10.1137\/1.9781611972825.54"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Charu C Aggarwal Yuchen Zhao and S Yu Philip. 2011. Outlier detection in graph streams. In ICDE. 399--409.  Charu C Aggarwal Yuchen Zhao and S Yu Philip. 2011. Outlier detection in graph streams. In ICDE. 399--409.","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"e_1_3_2_1_3_1","volume-title":"RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs. In ICDM. 701--706.","author":"Akoglu L.","year":"2008","unstructured":"L. Akoglu , M. McGlohon , and C. Faloutsos . 2008 . RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs. In ICDM. 701--706. L. Akoglu, M. McGlohon, and C. Faloutsos. 2008. RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs. In ICDM. 701--706."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Caleb Belth Xinyi Zheng and Danai Koutra. 2020. Mining Persistent Activity in Continually Evolving Networks. In KDD. 934--944.  Caleb Belth Xinyi Zheng and Danai Koutra. 2020. Mining Persistent Activity in Continually Evolving Networks. In KDD. 934--944.","DOI":"10.1145\/3394486.3403136"},{"key":"e_1_3_2_1_6_1","volume-title":"MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams. AAAI, 3242--3249.","author":"Bhatia Siddharth","year":"2020","unstructured":"Siddharth Bhatia , Bryan Hooi , Minji Yoon , Kijung Shin , and Christos Faloutsos . 2020 . MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams. AAAI, 3242--3249. Siddharth Bhatia, Bryan Hooi, Minji Yoon, Kijung Shin, and Christos Faloutsos. 2020. MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams. AAAI, 3242--3249."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2813311"},{"key":"e_1_3_2_1_8_1","volume-title":"Dynamic network analysis","author":"Carley Kathleen M","unstructured":"Kathleen M Carley . 2003. Dynamic network analysis . Carnegie Mellon University . Kathleen M Carley. 2003. Dynamic network analysis .Carnegie Mellon University."},{"key":"e_1_3_2_1_9_1","unstructured":"Yen-Yu Chang and Pan Li. 2020. F-FADE Code and Supplement. http:\/\/snap.stanford.edu\/f-fade\/.  Yen-Yu Chang and Pan Li. 2020. F-FADE Code and Supplement. http:\/\/snap.stanford.edu\/f-fade\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Feng Chen and Daniel B Neill. 2014. Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs. In KDD. 1166--1175.  Feng Chen and Daniel B Neill. 2014. Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs. In KDD. 1166--1175.","DOI":"10.1145\/2623330.2623619"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019. Deep anomaly detection on attributed networks. In ICDM. 594--602.  Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019. Deep anomaly detection on attributed networks. In ICDM. 594--602.","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Daniel M Dunlavy Tamara G Kolda and Evrim Acar. 2011. Temporal link prediction using matrix and tensor factorizations. TKDD 1--27.  Daniel M Dunlavy Tamara G Kolda and Evrim Acar. 2011. Temporal link prediction using matrix and tensor factorizations. TKDD 1--27.","DOI":"10.1145\/1921632.1921636"},{"key":"e_1_3_2_1_13_1","volume-title":"Sedanspot: Detecting anomalies in edge streams. In ICDM. 953--958.","author":"Eswaran Dhivya","year":"2018","unstructured":"Dhivya Eswaran and Christos Faloutsos . 2018 . Sedanspot: Detecting anomalies in edge streams. In ICDM. 953--958. Dhivya Eswaran and Christos Faloutsos. 2018. Sedanspot: Detecting anomalies in edge streams. In ICDM. 953--958."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_1_15_1","volume-title":"Community detection in graphs. Physics reports","author":"Fortunato Santo","year":"2010","unstructured":"Santo Fortunato . 2010. Community detection in graphs. Physics reports , Vol. 486 , 3--5 ( 2010 ), 75--174. Santo Fortunato. 2010. Community detection in graphs. Physics reports, Vol. 486, 3--5 (2010), 75--174."},{"key":"e_1_3_2_1_16_1","volume-title":"Lecture 5: Poisson combining and splitting. Discrete Stochastic Processes","author":"Gallager Robert","year":"2011","unstructured":"Robert Gallager . 2011. Lecture 5: Poisson combining and splitting. Discrete Stochastic Processes ( 2011 ). Robert Gallager. 2011. Lecture 5: Poisson combining and splitting. Discrete Stochastic Processes (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1214\/10-AOAS329"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Keith Henderson Tina Eliassi-Rad Christos Faloutsos Leman Akoglu Lei Li Koji Maruhashi B Aditya Prakash and Hanghang Tong. 2010. Metric forensics: a multi-level approach for mining volatile graphs. In KDD. 163--172.  Keith Henderson Tina Eliassi-Rad Christos Faloutsos Leman Akoglu Lei Li Koji Maruhashi B Aditya Prakash and Hanghang Tong. 2010. Metric forensics: a multi-level approach for mining volatile graphs. In KDD. 163--172.","DOI":"10.2172\/1114747"},{"key":"e_1_3_2_1_19_1","unstructured":"Grant Ho Asaf Cidon Lior Gavish Marco Schweighauser Vern Paxson Stefan Savage Geoffrey M Voelker and David Wagner. 2019. Detecting and characterizing lateral phishing at scale. In USENIX Security. 1273--1290.  Grant Ho Asaf Cidon Lior Gavish Marco Schweighauser Vern Paxson Stefan Savage Geoffrey M Voelker and David Wagner. 2019. Detecting and characterizing lateral phishing at scale. In USENIX Security. 1273--1290."},{"key":"e_1_3_2_1_20_1","unstructured":"Renjun Hu Charu C Aggarwal Shuai Ma and Jinpeng Huai. 2016a. An embedding approach to anomaly detection. In ICDE. 385--396.  Renjun Hu Charu C Aggarwal Shuai Ma and Jinpeng Huai. 2016a. An embedding approach to anomaly detection. In ICDE. 385--396."},{"key":"e_1_3_2_1_21_1","unstructured":"Xuan Hu Banghuai Li Yang Zhang Changling Zhou and Hao Ma. 2016b. Detecting compromised email accounts from the perspective of graph topology. In CFI. 76--82.  Xuan Hu Banghuai Li Yang Zhang Changling Zhou and Hao Ma. 2016b. Detecting compromised email accounts from the perspective of graph topology. In CFI. 76--82."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Glen Jeh and Jennifer Widom. 2003. Scaling personalized web search. In WWW. 271--279.  Glen Jeh and Jennifer Widom. 2003. Scaling personalized web search. In WWW. 271--279.","DOI":"10.1145\/775152.775191"},{"key":"e_1_3_2_1_24_1","volume-title":"Kronecker Graphs: An Approach to Modeling Networks. J. Mach. Learn. Res.","author":"Leskovec Jure","year":"2010","unstructured":"Jure Leskovec , Deepayan Chakrabarti , Jon Kleinberg , Christos Faloutsos , and Zoubin Ghahramani . 2010 . Kronecker Graphs: An Approach to Modeling Networks. J. Mach. Learn. Res. (2010), 985--1042. Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos, and Zoubin Ghahramani. 2010. Kronecker Graphs: An Approach to Modeling Networks. J. Mach. Learn. Res. (2010), 985--1042."},{"key":"e_1_3_2_1_25_1","volume-title":"Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI. 2152--2158.","author":"Li Jundong","year":"2017","unstructured":"Jundong Li , Harsh Dani , Xia Hu , and Huan Liu . 2017 . Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI. 2152--2158. Jundong Li, Harsh Dani, Xia Hu, and Huan Liu. 2017. Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI. 2152--2158."},{"key":"e_1_3_2_1_26_1","volume-title":"Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection","volume":"99","author":"Lippmann Richard","year":"1999","unstructured":"Richard Lippmann , Robert K Cunningham , David J Fried , Isaac Graf , Kris R Kendall , Seth E Webster , and Marc A Zissman . 1999 . Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection , Vol. 99 . 829--835. Richard Lippmann, Robert K Cunningham, David J Fried, Isaac Graf, Kris R Kendall, Seth E Webster, and Marc A Zissman. 1999. Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection, Vol. 99. 829--835."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Emaad Manzoor Sadegh M Milajerdi and Leman Akoglu. 2016. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In KDD. 1035--1044.  Emaad Manzoor Sadegh M Milajerdi and Leman Akoglu. 2016. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In KDD. 1035--1044.","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2233193"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2013.822830"},{"key":"e_1_3_2_1_30_1","volume-title":"Containing Papers of a Mathematical or Physical Character","author":"Neyman Jerzy","year":"1933","unstructured":"Jerzy Neyman and Egon Sharpe Pearson . 1933. IX. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series A , Containing Papers of a Mathematical or Physical Character , Vol. 231 , 694--706 ( 1933 ), 289--337. Jerzy Neyman and Egon Sharpe Pearson. 1933. IX. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London. Series A, Containing Papers of a Mathematical or Physical Character, Vol. 231, 694--706 (1933), 289--337."},{"key":"e_1_3_2_1_31_1","volume-title":"KDD cup and workshop","author":"Paterek Arkadiusz","unstructured":"Arkadiusz Paterek . 2007. Improving regularized singular value decomposition for collaborative filtering . In KDD cup and workshop , Vol. 2007 . 5--8. Arkadiusz Paterek. 2007. Improving regularized singular value decomposition for collaborative filtering. In KDD cup and workshop, Vol. 2007. 5--8."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Leto Peel and Aaron Clauset. 2015. Detecting Change Points in the Large-Scale Structure of Evolving Networks. In AAAI. 2914--2920.  Leto Peel and Aaron Clauset. 2015. Detecting Change Points in the Large-Scale Structure of Evolving Networks. In AAAI. 2914--2920.","DOI":"10.1609\/aaai.v29i1.9574"},{"key":"e_1_3_2_1_33_1","first-page":"311","article-title":"Fraud protection for card transactions","volume":"5","author":"Penzias Arno A","year":"1994","unstructured":"Arno A Penzias . 1994 . Fraud protection for card transactions . US Patent 5 , 311 ,594. Arno A Penzias. 1994. Fraud protection for card transactions. US Patent 5,311,594.","journal-title":"US Patent"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-005-5378-z"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Stephen Ranshous Steve Harenberg Kshitij Sharma and Nagiza F Samatova. 2016. A scalable approach for outlier detection in edge streams using sketch-based approximations. In ICDM. 189--197.  Stephen Ranshous Steve Harenberg Kshitij Sharma and Nagiza F Samatova. 2016. A scalable approach for outlier detection in edge streams using sketch-based approximations. In ICDM. 189--197.","DOI":"10.1137\/1.9781611974348.22"},{"key":"e_1_3_2_1_36_1","volume-title":"Anomaly detection in dynamic networks: a survey","author":"Ranshous Stephen","year":"2015","unstructured":"Stephen Ranshous , Shitian Shen , Danai Koutra , Steve Harenberg , Christos Faloutsos , and Nagiza F Samatova . 2015. Anomaly detection in dynamic networks: a survey . Wiley Interdisciplinary Reviews : Computational Statistics ( 2015 ), 223--247. Stephen Ranshous, Shitian Shen, Danai Koutra, Steve Harenberg, Christos Faloutsos, and Nagiza F Samatova. 2015. Anomaly detection in dynamic networks: a survey. Wiley Interdisciplinary Reviews: Computational Statistics (2015), 223--247."},{"key":"e_1_3_2_1_37_1","volume-title":"Edgecentric: Anomaly detection in edge-attributed networks. In ICDMW. 327--334.","author":"Shah Neil","year":"2016","unstructured":"Neil Shah , Alex Beutel , Bryan Hooi , Leman Akoglu , Stephan Gunnemann , Disha Makhija , Mohit Kumar , and Christos Faloutsos . 2016 . Edgecentric: Anomaly detection in edge-attributed networks. In ICDMW. 327--334. Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Gunnemann, Disha Makhija, Mohit Kumar, and Christos Faloutsos. 2016. Edgecentric: Anomaly detection in edge-attributed networks. In ICDMW. 327--334."},{"key":"e_1_3_2_1_38_1","volume-title":"The Enron email dataset database schema and brief statistical report. Information sciences institute technical report","author":"Shetty Jitesh","unstructured":"Jitesh Shetty and Jafar Adibi . 2004. The Enron email dataset database schema and brief statistical report. Information sciences institute technical report , University of Southern California (2004) , 120--128. Jitesh Shetty and Jafar Adibi. 2004. The Enron email dataset database schema and brief statistical report. Information sciences institute technical report, University of Southern California (2004), 120--128."},{"key":"e_1_3_2_1_39_1","unstructured":"Jimeng Sun Dacheng Tao and Christos Faloutsos. 2006. Beyond streams and graphs: dynamic tensor analysis. In KDD. 374--383.  Jimeng Sun Dacheng Tao and Christos Faloutsos. 2006. Beyond streams and graphs: dynamic tensor analysis. In KDD. 374--383."},{"key":"e_1_3_2_1_40_1","unstructured":"Jimeng Sun Yinglian Xie Hui Zhang and Christos Faloutsos. 2007. Less is more: Compact matrix decomposition for large sparse graphs. In ICDM. 366--377.  Jimeng Sun Yinglian Xie Hui Zhang and Christos Faloutsos. 2007. Less is more: Compact matrix decomposition for large sparse graphs. In ICDM. 366--377."},{"key":"e_1_3_2_1_41_1","volume-title":"Topics in random matrix theory","author":"Tao Terence","unstructured":"Terence Tao . 2012. Topics in random matrix theory . Vol. 132 . American Mathematical Soc . Terence Tao. 2012. Topics in random matrix theory. Vol. 132. American Mathematical Soc."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Xian Teng Yu-Ru Lin and Xidao Wen. 2017. Anomaly detection in dynamic networks using multi-view time-series hypersphere learning. In CIKM. 827--836.  Xian Teng Yu-Ru Lin and Xidao Wen. 2017. Anomaly detection in dynamic networks using multi-view time-series hypersphere learning. In CIKM. 827--836.","DOI":"10.1145\/3132847.3132964"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2294594"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Teng Wang Chunsheng Fang Derek Lin and S Felix Wu. 2015. Localizing temporal anomalies in large evolving graphs. In ICDM. 927--935.  Teng Wang Chunsheng Fang Derek Lin and S Felix Wu. 2015. Localizing temporal anomalies in large evolving graphs. In ICDM. 927--935.","DOI":"10.1137\/1.9781611974010.104"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Jaewon Yang and Jure Leskovec. 2013. Overlapping community detection at scale: a nonnegative matrix factorization approach. In WSDM. 587--596.  Jaewon Yang and Jure Leskovec. 2013. Overlapping community detection at scale: a nonnegative matrix factorization approach. In WSDM. 587--596.","DOI":"10.1145\/2433396.2433471"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Minji Yoon Bryan Hooi Kijung Shin and Christos Faloutsos. 2019. Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In KDD. 647--657.  Minji Yoon Bryan Hooi Kijung Shin and Christos Faloutsos. 2019. Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In KDD. 647--657.","DOI":"10.1145\/3292500.3330946"},{"key":"e_1_3_2_1_47_1","unstructured":"Weiren Yu Charu C Aggarwal Shuai Ma and Haixun Wang. 2013. On anomalous hotspot discovery in graph streams. In ICDM. 1271--1276.  Weiren Yu Charu C Aggarwal Shuai Ma and Haixun Wang. 2013. On anomalous hotspot discovery in graph streams. In ICDM. 1271--1276."},{"key":"e_1_3_2_1_48_1","unstructured":"Wenchao Yu Charu C Aggarwal and Wei Wang. 2017. Temporally factorized network modeling for evolutionary network analysis. In WSDM. 455--464.  Wenchao Yu Charu C Aggarwal and Wei Wang. 2017. Temporally factorized network modeling for evolutionary network analysis. In WSDM. 455--464."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"}],"event":{"name":"WSDM '21: The Fourteenth ACM International Conference on Web Search and Data Mining","location":"Virtual Event Israel","acronym":"WSDM '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 14th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441806","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:36Z","timestamp":1750193256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":49,"alternative-id":["10.1145\/3437963.3441806","10.1145\/3437963"],"URL":"https:\/\/doi.org\/10.1145\/3437963.3441806","relation":{},"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"2021-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}