{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:39Z","timestamp":1775815479493,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Nature Science Foundation of China","award":["61971283"],"award-info":[{"award-number":["61971283"]}]},{"name":"Ministry of Education Singapore under its Academic Research Fund Tier 2","award":["MOE2019-T2-2-065"],"award-info":[{"award-number":["MOE2019-T2-2-065"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,8]]},"DOI":"10.1145\/3437963.3441829","type":"proceedings-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T04:34:28Z","timestamp":1615005268000},"page":"761-769","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["DeepIS: Susceptibility Estimation on Social Networks"],"prefix":"10.1145","author":[{"given":"Wenwen","family":"Xia","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yuchen","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shenghong","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Christian Borgs Michael Brautbar Jennifer Chayes and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In SODA. 946--957.  Christian Borgs Michael Brautbar Jennifer Chayes and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In SODA. 946--957.","DOI":"10.1137\/1.9781611973402.70"},{"key":"e_1_3_2_1_2_1","volume-title":"Numerical Analysis","author":"Burden Richard L","year":"2001","unstructured":"Richard L Burden and J Douglas Faires . [n.d.]. Numerical Analysis 7 th edition, 2001 . Thomson Learning ISBN 0--534--38216--9 ( [n.,d.]). Richard L Burden and J Douglas Faires. [n.d.]. Numerical Analysis 7th edition, 2001. Thomson Learning ISBN 0--534--38216--9 ( [n.,d.]).","edition":"7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132973"},{"key":"e_1_3_2_1_4_1","first-page":"666","article-title":"Online topic-aware influence maximization","volume":"8","author":"Chen Shuo","year":"2015","unstructured":"Shuo Chen , Ju Fan , Guoliang Li , Jianhua Feng , Kian-lee Tan, and Jinhui Tang . 2015 . Online topic-aware influence maximization . VLDB , Vol. 8 , 6 (2015), 666 -- 677 . Shuo Chen, Ju Fan, Guoliang Li, Jianhua Feng, Kian-lee Tan, and Jinhui Tang. 2015. Online topic-aware influence maximization. VLDB, Vol. 8, 6 (2015), 666--677.","journal-title":"VLDB"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Wei Chen Chi Wang and Yajun Wang. 2010a. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In SIGKDD. 1029--1038.  Wei Chen Chi Wang and Yajun Wang. 2010a. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In SIGKDD. 1029--1038.","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Wei Chen Yajun Wang and Siyu Yang. 2009. Efficient influence maximization in social networks. In SIGKDD. 199--207.  Wei Chen Yajun Wang and Siyu Yang. 2009. Efficient influence maximization in social networks. In SIGKDD. 199--207.","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Wei Chen Yifei Yuan and Li Zhang. 2010b. Scalable influence maximization in social networks under the linear threshold model. In ICDM. 88--97.  Wei Chen Yifei Yuan and Li Zhang. 2010b. Scalable influence maximization in social networks under the linear threshold model. In ICDM. 88--97.","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_3_2_1_8_1","volume-title":"Octopus: An online topic-aware influence analysis system for social networks. In ICDE. 1569--1572.","author":"Fan Ju","year":"2018","unstructured":"Ju Fan , Jiarong Qiu , Yuchen Li , Qingfei Meng , Dongxiang Zhang , Guoliang Li , Kian-Lee Tan , and Xiaoyong Du . 2018 . Octopus: An online topic-aware influence analysis system for social networks. In ICDE. 1569--1572. Ju Fan, Jiarong Qiu, Yuchen Li, Qingfei Meng, Dongxiang Zhang, Guoliang Li, Kian-Lee Tan, and Xiaoyong Du. 2018. Octopus: An online topic-aware influence analysis system for social networks. In ICDE. 1569--1572."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_2_1_10_1","volume-title":"Lakshmanan","author":"Goyal Amit","year":"2011","unstructured":"Amit Goyal , Wei Lu , and Laks V.S . Lakshmanan . 2011 . CELF+: Optimizing the greedy algorithm for influence maximization in social networks. In WWW. 47--48. Amit Goyal, Wei Lu, and Laks V.S. Lakshmanan. 2011. CELF+: Optimizing the greedy algorithm for influence maximization in social networks. In WWW. 47--48."},{"key":"e_1_3_2_1_11_1","volume-title":"Threshold models of collective behavior. American journal of sociology","author":"Granovetter Mark","year":"1978","unstructured":"Mark Granovetter . 1978. Threshold models of collective behavior. American journal of sociology , Vol. 83 , 6 ( 1978 ), 1420--1443. Mark Granovetter. 1978. Threshold models of collective behavior. American journal of sociology, Vol. 83, 6 (1978), 1420--1443."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2018.1548530"},{"key":"e_1_3_2_1_13_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NIPS. 1024--1034."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Wentao Huang Yuchen Li Yuan Fang Ju Fan and Hongxia Yang. 2020. BiANE: Bipartite Attributed Network Embedding. In SIGIR. 149--158.  Wentao Huang Yuchen Li Yuan Fang Ju Fan and Hongxia Yang. 2020. BiANE: Bipartite Attributed Network Embedding. In SIGIR. 149--158.","DOI":"10.1145\/3397271.3401068"},{"key":"e_1_3_2_1_15_1","volume-title":"Irie: Scalable and robust influence maximization in social networks. In ICDM. 918--923.","author":"Jung Kyomin","year":"2012","unstructured":"Kyomin Jung , Wooram Heo , and Wei Chen . 2012 . Irie: Scalable and robust influence maximization in social networks. In ICDM. 918--923. Kyomin Jung, Wooram Heo, and Wei Chen. 2012. Irie: Scalable and robust influence maximization in social networks. In ICDM. 918--923."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0212419"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"David Kempe Jon Kleinberg and \u00c9 va Tardos. 2003. Maximizing the spread of influence through a social network. In SIGKDD. 137--146.  David Kempe Jon Kleinberg and \u00c9 va Tardos. 2003. Maximizing the spread of influence through a social network. In SIGKDD. 137--146.","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_18_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2016","unstructured":"Thomas N. Kipf and Max Welling . 2016 . Semi-supervised classification with graph convolutional networks. In ICLR. 1--14. Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. In ICLR. 1--14."},{"key":"e_1_3_2_1_19_1","unstructured":"Johannes Klicpera Aleksandar Bojchevski and Stephan G\u00a8unnemann. 2019. Predict then propagate: Graph neural networks meet personalized pagerank. In ICLR. 1--14.  Johannes Klicpera Aleksandar Bojchevski and Stephan G\u00a8unnemann. 2019. Predict then propagate: Graph neural networks meet personalized pagerank. In ICLR. 1--14."},{"key":"e_1_3_2_1_20_1","volume-title":"MONSTOR: An Inductive Approach for Estimating and Maximizing Influence over Unseen Social Networks. arXiv preprint arXiv:2001.08853","author":"Ko Jihoon","year":"2020","unstructured":"Jihoon Ko , Kyuhan Lee , Kijung Shin , and Noseong Park . 2020 . MONSTOR: An Inductive Approach for Estimating and Maximizing Influence over Unseen Social Networks. arXiv preprint arXiv:2001.08853 (2020). Jihoon Ko, Kyuhan Lee, Kijung Shin, and Noseong Park. 2020. MONSTOR: An Inductive Approach for Estimating and Maximizing Influence over Unseen Social Networks. arXiv preprint arXiv:2001.08853 (2020)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jure Leskovec Andreas Krause Carlos Guestrin Christos Faloutsos Jeanne Vanbriesen and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In SIGKDD. 420--429.  Jure Leskovec Andreas Krause Carlos Guestrin Christos Faloutsos Jeanne Vanbriesen and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In SIGKDD. 420--429.","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_3_2_1_22_1","volume-title":"Deyu Deng, and Fan Jiang.","author":"Leung Carson K","year":"2019","unstructured":"Carson K Leung , Alfredo Cuzzocrea , Jiaxing Jason Mai , Deyu Deng, and Fan Jiang. 2019 . Personalized DeepInf: enhanced social influence prediction with deep learning and transfer learning. In ICBD. 2871--2880. Carson K Leung, Alfredo Cuzzocrea, Jiaxing Jason Mai, Deyu Deng, and Fan Jiang. 2019. Personalized DeepInf: enhanced social influence prediction with deep learning and transfer learning. In ICBD. 2871--2880."},{"key":"e_1_3_2_1_23_1","unstructured":"Cheng Li Jiaqi Ma Xiaoxiao Guo and Qiaozhu Mei. 2017b. DeepCas: An end-to-end predictor of information cascades. In WWW. 577--586.  Cheng Li Jiaqi Ma Xiaoxiao Guo and Qiaozhu Mei. 2017b. DeepCas: An end-to-end predictor of information cascades. In WWW. 577--586."},{"key":"e_1_3_2_1_24_1","unstructured":"Qimai Li Zhichao Han and Xiao-Ming Wu. 2018b. Deeper Insights into Graph Convolutional Networks for Semi-Supervised Learning. In AAAI. 3538--3545.  Qimai Li Zhichao Han and Xiao-Ming Wu. 2018b. Deeper Insights into Graph Convolutional Networks for Semi-Supervised Learning. In AAAI. 3538--3545."},{"key":"e_1_3_2_1_25_1","volume-title":"Maximizing multifaceted network influence","author":"Li Yuchen","unstructured":"Yuchen Li , Ju Fan , George Ovchinnikov , and Panagiotis Karras . 2019. Maximizing multifaceted network influence . In ICDE. IEEE , 446--457. Yuchen Li, Ju Fan, George Ovchinnikov, and Panagiotis Karras. 2019. Maximizing multifaceted network influence. In ICDE. IEEE, 446--457."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"key":"e_1_3_2_1_27_1","unstructured":"Yuchen Li Ju Fan Dongxiang Zhang and Kian-Lee Tan. 2017a. Discovering your selling points: Personalized social influential tags exploration. In SIGMOD. 619--634.  Yuchen Li Ju Fan Dongxiang Zhang and Kian-Lee Tan. 2017a. Discovering your selling points: Personalized social influential tags exploration. In SIGMOD. 619--634."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yuchen Li Dongxiang Zhang and Kian-Lee Tan. 2015. Real-time Targeted Influence Maximization for Online Advertisements. In VLDB. 1070--1081.  Yuchen Li Dongxiang Zhang and Kian-Lee Tan. 2015. Real-time Targeted Influence Maximization for Online Advertisements. In VLDB. 1070--1081.","DOI":"10.14778\/2794367.2794376"},{"key":"e_1_3_2_1_29_1","first-page":"2813","article-title":"G3: when graph neural networks meet parallel graph processing systems on GPUs","volume":"13","author":"Liu Husong","year":"2020","unstructured":"Husong Liu , Shengliang Lu , Xinyu Chen , and Bingsheng He . 2020 . G3: when graph neural networks meet parallel graph processing systems on GPUs . VLDB , Vol. 13 , 12 (2020), 2813 -- 2816 . Husong Liu, Shengliang Lu, Xinyu Chen, and Bingsheng He. 2020. G3: when graph neural networks meet parallel graph processing systems on GPUs. VLDB, Vol. 13, 12 (2020), 2813--2816.","journal-title":"VLDB"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Alvis Logins Yuchen Li and Panagiotis Karras. 2020. On the Robustness of Cascade Diffusion under Node Attacks. In WWW. 2711--2717.  Alvis Logins Yuchen Li and Panagiotis Karras. 2020. On the Robustness of Cascade Diffusion under Node Attacks. In WWW. 2711--2717.","DOI":"10.1145\/3366423.3380028"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"e_1_3_2_1_32_1","unstructured":"Galileo Namata Ben London Lise Getoor Bert Huang and UMD EDU. 2012. Query-driven active surveying for collective classification. In IWMLG .  Galileo Namata Ben London Lise Getoor Bert Huang and UMD EDU. 2012. Query-driven active surveying for collective classification. In IWMLG ."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Naoto Ohsaka Takuya Akiba Yuichi Yoshida and Ken-ichi Kawarabayashi. 2014. Fast and accurate influence maximization on large networks with pruned monte-carlo simulations. In AAAI .  Naoto Ohsaka Takuya Akiba Yuichi Yoshida and Ken-ichi Kawarabayashi. 2014. Fast and accurate influence maximization on large networks with pruned monte-carlo simulations. In AAAI .","DOI":"10.1609\/aaai.v28i1.8726"},{"key":"e_1_3_2_1_35_1","volume-title":"Hao Ma, Yuxiao Dong, Kuansan Wang, and Jie Jian Tang.","author":"Qiu Jiezhong","year":"2018","unstructured":"Jiezhong Qiu , Jie Jian Tang , Hao Ma, Yuxiao Dong, Kuansan Wang, and Jie Jian Tang. 2018 . DeepInf: Social influence prediction with deep learning. In SIGKDD. 2110--2119. Jiezhong Qiu, Jie Jian Tang, Hao Ma, Yuxiao Dong, Kuansan Wang, and Jie Jian Tang. 2018. DeepInf: Social influence prediction with deep learning. In SIGKDD. 2110--2119."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Matthew Richardson and Pedro Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In SIGKDD. 61--70.  Matthew Richardson and Pedro Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In SIGKDD. 61--70.","DOI":"10.1145\/775047.775057"},{"key":"e_1_3_2_1_37_1","unstructured":"Yu Rong Wenbing Huang Tingyang Xu and Junzhou Huang. 2020. DropEdge: towards deep graph convolutional network on node classification. In ICLR .  Yu Rong Wenbing Huang Tingyang Xu and Junzhou Huang. 2020. DropEdge: towards deep graph convolutional network on node classification. In ICLR ."},{"key":"e_1_3_2_1_38_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen , Galileo Namata , Mustafa Bilgic , Lise Getoor , Brian Galligher , and Tina Eliassi-Rad . 2008. Collective classification in network data. AI magazine , Vol. 29 , 3 ( 2008 ), 93. Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine, Vol. 29, 3 (2008), 93."},{"key":"e_1_3_2_1_39_1","volume-title":"River: A real-time influence monitoring system on social media streams. In ICDMW. 1429--1434.","author":"Sha Mo","year":"2018","unstructured":"Mo Sha , Yuchen Li , Yanhao Wang , Wentian Guo , and Kian-Lee Tan . 2018 . River: A real-time influence monitoring system on social media streams. In ICDMW. 1429--1434. Mo Sha, Yuchen Li, Yanhao Wang, Wentian Guo, and Kian-Lee Tan. 2018. River: A real-time influence monitoring system on social media streams. In ICDMW. 1429--1434."},{"key":"e_1_3_2_1_40_1","volume-title":"Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868","author":"Shchur Oleksandr","year":"2018","unstructured":"Oleksandr Shchur , Maximilian Mumme , Aleksandar Bojchevski , and Stephan G\u00fc nnemann. 2018. Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868 ( 2018 ). Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan G\u00fc nnemann. 2018. Pitfalls of graph neural network evaluation. arXiv preprint arXiv:1811.05868 (2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Youze Tang Yanchen Shi and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In SIGMOD. 1539--1554.  Youze Tang Yanchen Shi and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In SIGMOD. 1539--1554.","DOI":"10.1145\/2723372.2723734"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Youze Tang Xiaokui Xiao and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD. 75--86.  Youze Tang Xiaokui Xiao and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD. 75--86.","DOI":"10.1145\/2588555.2593670"},{"key":"e_1_3_2_1_43_1","unstructured":"Petar Velivc kovi\u0107 Arantxa Casanova Pietro Li\u00f2 Guillem Cucurull Adriana Romero and Yoshua Bengio. 2018. Graph attention networks. In ICLR. 1--12.  Petar Velivc kovi\u0107 Arantxa Casanova Pietro Li\u00f2 Guillem Cucurull Adriana Romero and Yoshua Bengio. 2018. Graph attention networks. In ICLR. 1--12."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5357"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052774"},{"key":"e_1_3_2_1_46_1","unstructured":"Zheng Wen Branislav Kveton Michal Valko and Sharan Vaswani. 2017. Online influence maximization under independent cascade model with semi-bandit feedback. In NIPS. 3023--3033.  Zheng Wen Branislav Kveton Michal Valko and Sharan Vaswani. 2017. Online influence maximization under independent cascade model with semi-bandit feedback. In NIPS. 3023--3033."},{"key":"e_1_3_2_1_47_1","volume-title":"Christopher Fifty, Tao Yu, and Kilian Q. Weinberger.","author":"Wu Felix","year":"2019","unstructured":"Felix Wu , Tianyi Zhang , Amauri Holanda de Souza , Christopher Fifty, Tao Yu, and Kilian Q. Weinberger. 2019 . Simplifying graph convolutional networks. In ICML. 11884--11894. Felix Wu, Tianyi Zhang, Amauri Holanda de Souza, Christopher Fifty, Tao Yu, and Kilian Q. Weinberger. 2019. Simplifying graph convolutional networks. In ICML. 11884--11894."},{"key":"e_1_3_2_1_48_1","volume-title":"Ken Ichi Kawarabayashi, and Stefanie Jegelka","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu , Chengtao Li , Yonglong Tian , Tomohiro Sonobe , Ken Ichi Kawarabayashi, and Stefanie Jegelka . 2018 . Representation learning on graphs with jumping knowledge networks. In ICML. 8676--8685. Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken Ichi Kawarabayashi, and Stefanie Jegelka. 2018. Representation learning on graphs with jumping knowledge networks. In ICML. 8676--8685."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Vincent W Zheng Mo Sha Yuchen Li Hongxia Yang Yuan Fang Zhenjie Zhang Kian-Lee Tan and Kevin Chen-Chuan Chang. 2018. Heterogeneous embedding propagation for large-scale e-commerce user alignment. In ICDM. 1434--1439.  Vincent W Zheng Mo Sha Yuchen Li Hongxia Yang Yuan Fang Zhenjie Zhang Kian-Lee Tan and Kevin Chen-Chuan Chang. 2018. Heterogeneous embedding propagation for large-scale e-commerce user alignment. In ICDM. 1434--1439.","DOI":"10.1109\/ICDM.2018.00198"},{"key":"e_1_3_2_1_51_1","volume-title":"UBLF: An upper bound based approach to discover influential nodes in social networks. In ICDM. 907--916.","author":"Zhou Chuan","year":"2013","unstructured":"Chuan Zhou , Peng Zhang , Jing Guo , Xingquan Zhu , and Li Guo . 2013 . UBLF: An upper bound based approach to discover influential nodes in social networks. In ICDM. 907--916. Chuan Zhou, Peng Zhang, Jing Guo, Xingquan Zhu, and Li Guo. 2013. UBLF: An upper bound based approach to discover influential nodes in social networks. In ICDM. 907--916."}],"event":{"name":"WSDM '21: The Fourteenth ACM International Conference on Web Search and Data Mining","location":"Virtual Event Israel","acronym":"WSDM '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 14th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437963.3441829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:36Z","timestamp":1750193256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437963.3441829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":50,"alternative-id":["10.1145\/3437963.3441829","10.1145\/3437963"],"URL":"https:\/\/doi.org\/10.1145\/3437963.3441829","relation":{},"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"2021-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}