{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:57Z","timestamp":1750220097988,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Project of Teaching Reform in Hunan Province","award":["2018436"],"award-info":[{"award-number":["2018436"]}]},{"DOI":"10.13039\/501100018579","name":"Training Program for Excellent Young Innovators of Changsha","doi-asserted-by":"publisher","award":["KQ2009009"],"award-info":[{"award-number":["KQ2009009"]}],"id":[{"id":"10.13039\/501100018579","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487141","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:46Z","timestamp":1638909346000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MOOC Dropout Prediction Based on Dynamic Embedding Representation Learning"],"prefix":"10.1145","author":[{"given":"Lin","family":"Wang","sequence":"first","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense and Technology College of Systems Engineering, China"}]},{"given":"Zhengfei","family":"Yu","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense and Technology College of Systems Engineering, China"}]},{"given":"Mengru","family":"Wang","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense and Technology College of Systems Engineering, China"}]},{"given":"Xixi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense and Technology College of Systems Engineering, China"}]},{"given":"Yun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense and Technology College of Systems Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5334\/2012-18"},{"key":"e_1_3_2_1_2_1","volume-title":"Understanding dropouts in MOOCs[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 33(01): 517-524","author":"Feng W","year":"2019","unstructured":"Feng W , Tang J , Liu T X ( 2019 ). Understanding dropouts in MOOCs[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 33(01): 517-524 . Feng W, Tang J, Liu T X (2019). Understanding dropouts in MOOCs[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 33(01): 517-524."},{"key":"e_1_3_2_1_3_1","volume-title":"A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses[J]. ACM Computer Surveys, 53(3): Article 57","author":"Prenkaj B","year":"2020","unstructured":"Prenkaj B , Velardi P , Stilo G , ( 2020 ). A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses[J]. ACM Computer Surveys, 53(3): Article 57 . Prenkaj B, Velardi P, Stilo G, (2020). A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses[J]. ACM Computer Surveys, 53(3): Article 57."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-018-9203-z"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-10-2018-0104"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04749-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186236"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159727"},{"key":"e_1_3_2_1_9_1","volume-title":"Deep coevolutionary network: Embedding user and item features for recommendation[J]. arXiv preprint arXiv:1609.03675","author":"Dai H","year":"2016","unstructured":"Dai H , Wang Y , Trivedi R , ( 2016 ). Deep coevolutionary network: Embedding user and item features for recommendation[J]. arXiv preprint arXiv:1609.03675 . Dai H, Wang Y, Trivedi R, (2016). Deep coevolutionary network: Embedding user and item features for recommendation[J]. arXiv preprint arXiv:1609.03675."},{"key":"e_1_3_2_1_10_1","first-page":"4554","volume-title":"30th Annual Conference on Neural Information Processing Systems, NIPS 2016","author":"Wang Y","year":"2016","unstructured":"Wang Y , Du N , Trivedi R , ( 2016 ). Coevolutionary latent feature processes for continuous-time user-item interactions[C] . 30th Annual Conference on Neural Information Processing Systems, NIPS 2016 , December 5, 2016 - December 10, 2016: 4554 - 4562 . Wang Y, Du N, Trivedi R, (2016). Coevolutionary latent feature processes for continuous-time user-item interactions[C]. 30th Annual Conference on Neural Information Processing Systems, NIPS 2016, December 5, 2016 - December 10, 2016:4554-4562."},{"key":"e_1_3_2_1_11_1","volume-title":"Predicting dynamic embedding trajectory in temporal interaction networks[C]\/\/Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 1269-1278","author":"Kumar S","year":"2019","unstructured":"Kumar S , Zhang X , Leskovec J ( 2019 ). Predicting dynamic embedding trajectory in temporal interaction networks[C]\/\/Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 1269-1278 . Kumar S, Zhang X, Leskovec J (2019). Predicting dynamic embedding trajectory in temporal interaction networks[C]\/\/Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 1269-1278."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4111"},{"key":"e_1_3_2_1_13_1","volume-title":"Likely to stop? Predicting Stopout in Massive Open Online Courses[J]. ArXiv, abs\/1408.3382","author":"Taylor C","year":"2014","unstructured":"Taylor C , Veeramachaneni K, O Reilly U ( 2014 ). Likely to stop? Predicting Stopout in Massive Open Online Courses[J]. ArXiv, abs\/1408.3382 . Taylor C, Veeramachaneni K, O Reilly U (2014). Likely to stop? Predicting Stopout in Massive Open Online Courses[J]. ArXiv, abs\/1408.3382."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2008.139"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.174"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126973.3126990"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835842"},{"key":"e_1_3_2_1_19_1","volume-title":"Challenges and solutions to the student dropout prediction problem in online courses[C]\/\/Proceedings of the 29th ACM International Conference on Information & Knowledge Management. 3513-3514","author":"Prenkaj B","year":"2020","unstructured":"Prenkaj B , Stilo G , Madeddu L ( 2020 ). Challenges and solutions to the student dropout prediction problem in online courses[C]\/\/Proceedings of the 29th ACM International Conference on Information & Knowledge Management. 3513-3514 . Prenkaj B, Stilo G, Madeddu L (2020). Challenges and solutions to the student dropout prediction problem in online courses[C]\/\/Proceedings of the 29th ACM International Conference on Information & Knowledge Management. 3513-3514."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191526"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132918"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11257"},{"volume-title":"Deep Dynamic Network Embedding for Link Prediction","author":"Li T.","key":"e_1_3_2_1_23_1","unstructured":"Li , T. , ( 2018). Deep Dynamic Network Embedding for Link Prediction . IEEE Access ,. 6: p. 29219-29230. Li, T., ( 2018). Deep Dynamic Network Embedding for Link Prediction. IEEE Access,. 6: p. 29219-29230."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132919"},{"key":"e_1_3_2_1_25_1","volume-title":"DynGEM: Deep Embedding Method for Dynamic Graphs. ArXiv. abs\/1805.11273","author":"Goyal P.","year":"2018","unstructured":"Goyal , P. , ( 2018 ). DynGEM: Deep Embedding Method for Dynamic Graphs. ArXiv. abs\/1805.11273 . Goyal, P., (2018). DynGEM: Deep Embedding Method for Dynamic Graphs. ArXiv. abs\/1805.11273."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371845"},{"key":"e_1_3_2_1_27_1","volume-title":"DyLink2Vec: Effective Feature Representation for Link Prediction in Dynamic Networks. ArXiv. abs\/1804.05755","author":"Rahman M.","year":"2018","unstructured":"Rahman , M. , ( 2018 ). DyLink2Vec: Effective Feature Representation for Link Prediction in Dynamic Networks. ArXiv. abs\/1804.05755 . Rahman, M., (2018). DyLink2Vec: Effective Feature Representation for Link Prediction in Dynamic Networks. ArXiv. abs\/1804.05755."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16563"},{"key":"e_1_3_2_1_29_1","volume-title":"Continuous-time relationship prediction in dynamic heterogeneous information networks[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 13(4): 1-31","author":"Sajadmanesh S","year":"2019","unstructured":"Sajadmanesh S , Bazargani S , Zhang J , ( 2019 ). Continuous-time relationship prediction in dynamic heterogeneous information networks[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 13(4): 1-31 . Sajadmanesh S, Bazargani S, Zhang J, (2019). Continuous-time relationship prediction in dynamic heterogeneous information networks[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 13(4): 1-31."},{"key":"e_1_3_2_1_30_1","volume-title":"Dynamic Graph Neural Networks","author":"Ma Y.","year":"2018","unstructured":"Ma , Y. , , Dynamic Graph Neural Networks ( 2018 ). ArXiv . abs\/1810.10627. Ma, Y., , Dynamic Graph Neural Networks (2018). ArXiv. abs\/1810.10627."},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Temporal Network Embedding for Link Prediction via VAE Joint Attention Mechanism","author":"Jiao P.","year":"2021","unstructured":"Jiao , P. , ( 2021 ). Temporal Network Embedding for Link Prediction via VAE Joint Attention Mechanism . IEEE Transactions on Neural Networks and Learning Systems, p. 1 - 14 . Jiao, P., (2021). Temporal Network Embedding for Link Prediction via VAE Joint Attention Mechanism. IEEE Transactions on Neural Networks and Learning Systems, p. 1-14.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems, p."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2787930"},{"key":"e_1_3_2_1_33_1","volume-title":"\u00a0 A survey on adversarial machine learning for cyberspace defense.\u00a0 Acta Automatica Sinica,\u00a0 47(x): 1\u221225. doi:\u00a0 10.16383\/j.aas.c210089","author":"Yu Zheng-Fei","year":"2021","unstructured":"Yu Zheng-Fei ,\u00a0 Yan Qiao,\u00a0 Zhou Yun ( 2021 ). \u00a0 A survey on adversarial machine learning for cyberspace defense.\u00a0 Acta Automatica Sinica,\u00a0 47(x): 1\u221225. doi:\u00a0 10.16383\/j.aas.c210089 Yu Zheng-Fei,\u00a0 Yan Qiao,\u00a0 Zhou Yun (2021).\u00a0 A survey on adversarial machine learning for cyberspace defense.\u00a0 Acta Automatica Sinica,\u00a0 47(x): 1\u221225. doi:\u00a0 10.16383\/j.aas.c210089"}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2021","location":"Sanya China"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487141","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:10Z","timestamp":1750183810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":33,"alternative-id":["10.1145\/3487075.3487141","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487141","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}