{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T16:08:37Z","timestamp":1762445317958,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Guangdong Provincial Key Laboratory","award":["2020B121201001"],"award-info":[{"award-number":["2020B121201001"]}]},{"name":"Proxima Beta","award":["A-8000177-00-00"],"award-info":[{"award-number":["A-8000177-00-00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557076","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:29:57Z","timestamp":1665883797000},"page":"3664-3673","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Measuring Friendship Closeness: A Perspective of Social Identity Theory"],"prefix":"10.1145","author":[{"given":"Shiqi","family":"Zhang","sequence":"first","affiliation":[{"name":"National University of Singapore &amp; Southern University of Science and Technology, Singapore, Singapore"}]},{"given":"Jiachen","family":"Sun","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"given":"Wenqing","family":"Lin","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"given":"Xiaokui","family":"Xiao","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Bo","family":"Tang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Friends and neighbors on the web. Social networks","author":"Adamic Lada A","year":"2003","unstructured":"Lada A Adamic and Eytan Adar . 2003. Friends and neighbors on the web. Social networks , Vol. 25 , 3 ( 2003 ), 211--230. Lada A Adamic and Eytan Adar. 2003. Friends and neighbors on the web. Social networks, Vol. 25, 3 (2003), 211--230."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Nicola Barbieri Francesco Bonchi and Giuseppe Manco. 2014. Who to follow and why: link prediction with explanations. In SIGKDD. 1266--1275. Nicola Barbieri Francesco Bonchi and Giuseppe Manco. 2014. Who to follow and why: link prediction with explanations. In SIGKDD. 1266--1275.","DOI":"10.1145\/2623330.2623733"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.1.83"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1086\/228667"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"e_1_3_2_1_6_1","volume-title":"A three-factor model of social identity. Self and identity","author":"Cameron James E","year":"2004","unstructured":"James E Cameron . 2004. A three-factor model of social identity. Self and identity , Vol. 3 , 3 ( 2004 ), 239--262. James E Cameron. 2004. A three-factor model of social identity. Self and identity, Vol. 3, 3 (2004), 239--262."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2553665"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.75.4.872"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"David Easley Jon Kleinberg etal 2010. Networks crowds and markets. Vol. 8. Cambridge university press Cambridge. David Easley Jon Kleinberg et al. 2010. Networks crowds and markets. Vol. 8. Cambridge university press Cambridge.","DOI":"10.1017\/CBO9780511761942"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/2856318.2856327"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1999.9990219"},{"key":"e_1_3_2_1_13_1","volume-title":"Longjun Sun, Ying Ding, Ling Zhou, and Jarder Luo.","author":"Fang Zhanpeng","year":"2014","unstructured":"Zhanpeng Fang , Xinyu Zhou , Jie Tang , Wei Shao , Alvis Cheuk M Fong , Longjun Sun, Ying Ding, Ling Zhou, and Jarder Luo. 2014 . Modeling paying behavior in game social networks. In CIKM. 411--420. Zhanpeng Fang, Xinyu Zhou, Jie Tang, Wei Shao, Alvis Cheuk M Fong, Longjun Sun, Ying Ding, Ling Zhou, and Jarder Luo. 2014. Modeling paying behavior in game social networks. In CIKM. 411--420."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"volume-title":"Reducing intergroup bias: The common ingroup identity model","author":"Gaertner Samuel L","key":"e_1_3_2_1_15_1","unstructured":"Samuel L Gaertner and John F Dovidio . 2014. Reducing intergroup bias: The common ingroup identity model . Psychology Press . Samuel L Gaertner and John F Dovidio. 2014. Reducing intergroup bias: The common ingroup identity model. Psychology Press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Emden R Gansner Yehuda Koren and Stephen North. 2004. Graph drawing by stress majorization. In GD. 239--250. Emden R Gansner Yehuda Koren and Stephen North. 2004. Graph drawing by stress majorization. In GD. 239--250.","DOI":"10.1007\/978-3-540-31843-9_25"},{"key":"e_1_3_2_1_17_1","unstructured":"Manuel Gomez-Rodriguez David Balduzzi and Bernhard Sch\u00f6lkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In ICML. Manuel Gomez-Rodriguez David Balduzzi and Bernhard Sch\u00f6lkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In ICML."},{"key":"e_1_3_2_1_18_1","volume-title":"Threshold models of collective behavior. American journal of sociology","author":"Granovetter Mark","year":"1978","unstructured":"Mark Granovetter . 1978. Threshold models of collective behavior. American journal of sociology ( 1978 ). Mark Granovetter. 1978. Threshold models of collective behavior. American journal of sociology (1978)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In SIGKDD. 855--864. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In SIGKDD. 855--864.","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Glen Jeh and Jennifer Widom. 2002. Simrank: a measure of structural-context similarity. In SIGKDD. 538--543. Glen Jeh and Jennifer Widom. 2002. Simrank: a measure of structural-context similarity. In SIGKDD. 538--543.","DOI":"10.1145\/775047.775126"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.95.1.144"},{"key":"e_1_3_2_1_22_1","volume-title":"Chassis: Conformity meets online information diffusion. In SIGMOD. 1829--1840.","author":"Li Hui","year":"2020","unstructured":"Hui Li , Hui Li , and Sourav S Bhowmick . 2020 . Chassis: Conformity meets online information diffusion. In SIGMOD. 1829--1840. Hui Li, Hui Li, and Sourav S Bhowmick. 2020. Chassis: Conformity meets online information diffusion. In SIGMOD. 1829--1840."},{"key":"e_1_3_2_1_23_1","unstructured":"Wenqing Lin. 2019. Distributed algorithms for fully personalized pagerank on large graphs. In TheWebConf. 1084--1094. Wenqing Lin. 2019. Distributed algorithms for fully personalized pagerank on large graphs. In TheWebConf. 1084--1094."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Wenqing Lin. 2021. Large-Scale Network Embedding in Apache Spark. In SIGKDD. 3271--3279. Wenqing Lin. 2021. Large-Scale Network Embedding in Apache Spark. In SIGKDD. 3271--3279.","DOI":"10.1145\/3447548.3467136"},{"key":"e_1_3_2_1_25_1","unstructured":"Wenqing Lin Feng He Faqiang Zhang Xu Cheng and Hongyun Cai. 2020. Initialization for Network Embedding: A Graph Partition Approach. In WSDM. 367--374. Wenqing Lin Feng He Faqiang Zhang Xu Cheng and Hongyun Cai. 2020. Initialization for Network Embedding: A Graph Partition Approach. In WSDM. 367--374."},{"key":"e_1_3_2_1_26_1","unstructured":"Siqiang Luo Xiaokui Xiao Wenqing Lin and Ben Kao. 2019. Efficient batch one-hop personalized pageranks. In ICDE. 1562--1565. Siqiang Luo Xiaokui Xiao Wenqing Lin and Ben Kao. 2019. Efficient batch one-hop personalized pageranks. In ICDE. 1562--1565."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2912606"},{"key":"e_1_3_2_1_28_1","volume-title":"Multiple roles and role strain: Some notes on human energy, time and commitment. American sociological review","author":"Marks Stephen R","year":"1977","unstructured":"Stephen R Marks . 1977. Multiple roles and role strain: Some notes on human energy, time and commitment. American sociological review ( 1977 ), 921--936. Stephen R Marks. 1977. Multiple roles and role strain: Some notes on human energy, time and commitment. American sociological review (1977), 921--936."},{"volume-title":"Stereotyping and social reality","author":"Oakes Penelope J","key":"e_1_3_2_1_29_1","unstructured":"Penelope J Oakes , S Alexander Haslam , and John C Turner . 1994. Stereotyping and social reality . Blackwell Publishing . Penelope J Oakes, S Alexander Haslam, and John C Turner. 1994. Stereotyping and social reality. Blackwell Publishing."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14557"},{"key":"e_1_3_2_1_33_1","unstructured":"Jiezhong Qiu Yuxiao Dong Hao Ma Jian Li Kuansan Wang and Jie Tang. 2018. Network embedding as matrix factorization: Unifying deepwalk line pte and node2vec. In WSDM. 459--467. Jiezhong Qiu Yuxiao Dong Hao Ma Jian Li Kuansan Wang and Jie Tang. 2018. Network embedding as matrix factorization: Unifying deepwalk line pte and node2vec. In WSDM. 459--467."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Jiezhong Qiu Yixuan Li Jie Tang Zheng Lu Hao Ye Bo Chen Qiang Yang and John E Hopcroft. 2016. The lifecycle and cascade of wechat social messaging groups. In TheWebConf. 311--320. Jiezhong Qiu Yixuan Li Jie Tang Zheng Lu Hao Ye Bo Chen Qiang Yang and John E Hopcroft. 2016. The lifecycle and cascade of wechat social messaging groups. In TheWebConf. 311--320.","DOI":"10.1145\/2872427.2882979"},{"key":"e_1_3_2_1_35_1","volume-title":"A social identity approach to sport psychology: Principles, practice, and prospects. Sports medicine","author":"Rees Tim","year":"2015","unstructured":"Tim Rees , S Alexander Haslam , Pete Coffee , and David Lavallee . 2015. A social identity approach to sport psychology: Principles, practice, and prospects. Sports medicine , Vol. 45 , 8 ( 2015 ), 1083--1096. Tim Rees, S Alexander Haslam, Pete Coffee, and David Lavallee. 2015. A social identity approach to sport psychology: Principles, practice, and prospects. Sports medicine, Vol. 45, 8 (2015), 1083--1096."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2323"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371811"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Daan Scheepers and Naomi Ellemers. 2019. Social identity theory. In Social psychology in action. 129--143. Daan Scheepers and Naomi Ellemers. 2019. Social identity theory. In Social psychology in action. 129--143.","DOI":"10.1007\/978-3-030-13788-5_9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274771"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_2_1_41_1","volume-title":"Toward a theory of role accumulation. American sociological review","author":"Sieber Sam D","year":"1974","unstructured":"Sam D Sieber . 1974. Toward a theory of role accumulation. American sociological review ( 1974 ), 567--578. Sam D Sieber. 1974. Toward a theory of role accumulation. American sociological review (1974), 567--578."},{"key":"e_1_3_2_1_42_1","volume-title":"The perception of ingroup and outgroup homogeneity: Reintroducing the intergroup context. European review of social psychology","author":"Simon Bernd","year":"1992","unstructured":"Bernd Simon . 1992. The perception of ingroup and outgroup homogeneity: Reintroducing the intergroup context. European review of social psychology , Vol. 3 , 1 ( 1992 ), 1--30. Bernd Simon. 1992. The perception of ingroup and outgroup homogeneity: Reintroducing the intergroup context. European review of social psychology, Vol. 3, 1 (1992), 1--30."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Junho Song Hyekyoung Park Kyungsik Han and Sang-Wook Kim. 2020. Do You Really Like Her Post?: Network-Based Analysis for Understanding Like Activities in SNS. In CIKM. 2221--2224. Junho Song Hyekyoung Park Kyungsik Han and Sang-Wook Kim. 2020. Do You Really Like Her Post?: Network-Based Analysis for Understanding Like Activities in SNS. In CIKM. 2221--2224.","DOI":"10.1145\/3340531.3412166"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Xiaodan Song Yun Chi Koji Hino and Belle Tseng. 2007. Identifying opinion leaders in the blogosphere. In CIKM. 971--974. Xiaodan Song Yun Chi Koji Hino and Belle Tseng. 2007. Identifying opinion leaders in the blogosphere. In CIKM. 971--974.","DOI":"10.1145\/1321440.1321588"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Sucheta Soundarajan and John Hopcroft. 2012. Using community information to improve the precision of link prediction methods. In WWW. 607--608. Sucheta Soundarajan and John Hopcroft. 2012. Using community information to improve the precision of link prediction methods. In WWW. 607--608.","DOI":"10.1145\/2187980.2188150"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7332"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Henri Tajfel and John C Turner. 2004. The social identity theory of intergroup behavior. In Political psychology. 276--293. Henri Tajfel and John C Turner. 2004. The social identity theory of intergroup behavior. In Political psychology. 276--293.","DOI":"10.4324\/9780203505984-16"},{"key":"e_1_3_2_1_48_1","volume-title":"Line: Large-scale information network embedding. In TheWebConf. 1067--1077.","author":"Tang Jian","year":"2015","unstructured":"Jian Tang , Meng Qu , Mingzhe Wang , Ming Zhang , Jun Yan , and Qiaozhu Mei . 2015 . Line: Large-scale information network embedding. In TheWebConf. 1067--1077. Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. In TheWebConf. 1067--1077."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Hanghang Tong Christos Faloutsos and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In ICDM. 613--622. Hanghang Tong Christos Faloutsos and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In ICDM. 613--622.","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1116502109"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Daixin Wang Peng Cui and Wenwu Zhu. 2016. Structural deep network embedding. In SIGKDD. 1225--1234. Daixin Wang Peng Cui and Wenwu Zhu. 2016. Structural deep network embedding. In SIGKDD. 1225--1234.","DOI":"10.1145\/2939672.2939753"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Liang Wu Xia Hu and Huan Liu. 2016. Relational learning with social status analysis. In WSDM. 513--522. Liang Wu Xia Hu and Huan Liu. 2016. Relational learning with social status analysis. In WSDM. 513--522.","DOI":"10.1145\/2835776.2835782"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0693-z"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/3377369.3377376"},{"key":"e_1_3_2_1_55_1","first-page":"1","article-title":"Understanding WeChat User Preferences and ?Wow","volume":"1","author":"Zhang Fanjin","year":"2021","unstructured":"Fanjin Zhang , Jie Tang , Xueyi Liu , Zhenyu Hou , Yuxiao Dong , Jing Zhang , Xiao Liu , Ruobing Xie , Kai Zhuang , Xu Zhang , 2021 . Understanding WeChat User Preferences and ?Wow \" Diffusion. TKDE 1 (2021), 1 -- 1 . Fanjin Zhang, Jie Tang, Xueyi Liu, Zhenyu Hou, Yuxiao Dong, Jing Zhang, Xiao Liu, Ruobing Xie, Kai Zhuang, Xu Zhang, et al. 2021. Understanding WeChat User Preferences and ?Wow\" Diffusion. TKDE 1 (2021), 1--1.","journal-title":"Diffusion. TKDE"},{"key":"e_1_3_2_1_56_1","volume-title":"Mobile social big data: Wechat moments dataset, network applications, and opportunities","author":"Zhang Yuanxing","year":"2018","unstructured":"Yuanxing Zhang , Zhuqi Li , Chengliang Gao , Kaigui Bian , Lingyang Song , Shaoling Dong , and Xiaoming Li. 2018. Mobile social big data: Wechat moments dataset, network applications, and opportunities . IEEE network, Vol. 32 , 3 ( 2018 ), 146--153. Yuanxing Zhang, Zhuqi Li, Chengliang Gao, Kaigui Bian, Lingyang Song, Shaoling Dong, and Xiaoming Li. 2018. Mobile social big data: Wechat moments dataset, network applications, and opportunities. IEEE network, Vol. 32, 3 (2018), 146--153."}],"event":{"name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Atlanta GA USA","acronym":"CIKM '22"},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:55Z","timestamp":1750188655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":55,"alternative-id":["10.1145\/3511808.3557076","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557076","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}