{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:08:15Z","timestamp":1765544895939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Commonwealth of Australia (represented by the Defence Science and Technology Group)","award":["ID10097"],"award-info":[{"award-number":["ID10097"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583481","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"1813-1821","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Interval-censored Transformer Hawkes: Detecting Information Operations using the Reaction of Social Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6669-9190","authenticated-orcid":false,"given":"Quyu","family":"Kong","sequence":"first","affiliation":[{"name":"Alibaba Group, China and University of Technology, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8747-8917","authenticated-orcid":false,"given":"Pio","family":"Calderon","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4080-6127","authenticated-orcid":false,"given":"Rohit","family":"Ram","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6547-2015","authenticated-orcid":false,"given":"Olga","family":"Boichak","sequence":"additional","affiliation":[{"name":"The University of Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0381-669X","authenticated-orcid":false,"given":"Marian-Andrei","family":"Rizoiu","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Twitter Moderation Research Consortium. https:\/\/transparency.twitter.com\/en\/reports\/moderation-research.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Aseel Addawood Adam Badawy Kristina Lerman and Emilio Ferrara. 2019. Linguistic cues to deception: Identifying political trolls on social media. In ICWSM.","DOI":"10.1609\/icwsm.v13i01.3205"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Communication","author":"Boichak Olga","year":"2021","unstructured":"Olga Boichak, Jeff Hemsley, Sam Jackson, Rebekah Tromble, and Sikana Tanupabrungsun. 2021. Not the Bots You Are Looking For: Patterns and Effects of Orchestrated Interventions in the U.S. and German Elections. International Journal of Communication (2021)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781473957909.n34"},{"key":"e_1_3_2_1_5_1","volume-title":"Making Audience Engagement Visible: Publics for Journalism on Social Media Platforms","author":"Bruns Axel","year":"2017","unstructured":"Axel Bruns. 2017. Making Audience Engagement Visible: Publics for Journalism on Social Media Platforms. The Routledge Companion to Digital Journalism Studies (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"Social Media & Society 2020 Conference.","author":"Bruns Axel","year":"2020","unstructured":"Axel Bruns and Tobias Keller. 2020. News diffusion on Twitter: Comparing the dissemination careers for mainstream and marginal news. In Social Media & Society 2020 Conference."},{"key":"e_1_3_2_1_7_1","unstructured":"Pio Calderon Alexander Soen and Marian-Andrei Rizoiu. 2021. Linking Across Data Granularity: Fitting Multivariate Hawkes Processes to Partially Interval-censored Data. (2021)."},{"key":"e_1_3_2_1_8_1","unstructured":"Ting Chen Simon Kornblith Mohammad Norouzi and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML."},{"volume-title":"An introduction to the theory of point processes. Vol.\u00a0I","author":"Daley J","key":"e_1_3_2_1_9_1","unstructured":"Daryl\u00a0J Daley and David Vere-Jones. 2008. Conditional Intensities and Likelihoods. In An introduction to the theory of point processes. Vol.\u00a0I. Springer, Chapter 7.2."},{"key":"e_1_3_2_1_10_1","volume-title":"Computational Propaganda and the Rise of the Fake Audience. The SAGE Handbook of Propaganda","author":"Delwiche Aaron","year":"2019","unstructured":"Aaron Delwiche. 2019. Computational Propaganda and the Rise of the Fake Audience. The SAGE Handbook of Propaganda (2019), 105."},{"key":"e_1_3_2_1_11_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Nan Du Hanjun Dai Rakshit Trivedi Utkarsh Upadhyay Manuel Gomez-Rodriguez and Le Song. 2016. Recurrent marked temporal point processes: Embedding event history to vector. In KDD.","DOI":"10.1145\/2939672.2939875"},{"key":"e_1_3_2_1_13_1","volume-title":"Spectra of some self-exciting and mutually exciting point processes. Biometrika","author":"Hawkes G","year":"1971","unstructured":"Alan\u00a0G Hawkes. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika (1971)."},{"key":"e_1_3_2_1_14_1","volume-title":"Stochastic Processes and their Applications","author":"Kirchner Matthias","year":"2016","unstructured":"Matthias Kirchner. 2016. Hawkes and INAR(\u221e) processes. Stochastic Processes and their Applications (2016)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Quyu Kong Marian-Andrei Rizoiu and Lexing Xie. 2020. Describing and predicting online items with reshare cascades via dual mixture self-exciting processes. In CIKM.","DOI":"10.1145\/3340531.3411861"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Quyu Kong Marian-Andrei Rizoiu and Lexing Xie. 2020. Modeling Information Cascades with Self-exciting Processes via Generalized Epidemic Models. In WSDM.","DOI":"10.1145\/3336191.3371821"},{"key":"e_1_3_2_1_17_1","volume-title":"ICLR Workshop track","author":"Li Yang","year":"2018","unstructured":"Yang Li, Nan Du, and Samy Bengio. 2018. Time-dependent representation for neural event sequence prediction. ICLR Workshop track (2018)."},{"key":"e_1_3_2_1_18_1","volume-title":"Visualizing data using t-SNE. JMLR","author":"van\u00a0der Maaten Laurens","year":"2008","unstructured":"Laurens van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. JMLR (2008)."},{"key":"e_1_3_2_1_19_1","unstructured":"Hongyuan Mei and Jason\u00a0M Eisner. 2017. The neural hawkes process: A neurally self-modulating multivariate point process. In NeurIPS."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Swapnil Mishra Marian-Andrei Rizoiu and Lexing Xie. 2016. Feature Driven and Point Process Approaches for Popularity Prediction. In CIKM.","DOI":"10.1145\/2983323.2983812"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Swapnil Mishra Marian-Andrei Rizoiu and Lexing Xie. 2018. Modeling Popularity in Asynchronous Social Media Streams with Recurrent Neural Networks. In ICWSM.","DOI":"10.1609\/icwsm.v12i1.15030"},{"volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","key":"e_1_3_2_1_22_1","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In NeurIPS, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.). Curran Associates, Inc."},{"key":"e_1_3_2_1_23_1","volume-title":"Defence Human Sciences Symposium","author":"Ram Rohit","year":"2022","unstructured":"Rohit Ram and Marian-Andrei Rizoiu. 2022. Data-driven ideology detection: a case study of far-right extremist. In Defence Human Sciences Symposium. Sydney, Australia, 1\u20132."},{"key":"e_1_3_2_1_24_1","unstructured":"Marian-Andrei Rizoiu Swapnil Mishra Quyu Kong Mark Carman and Lexing Xie. 2018. SIR-Hawkes: on the Relationship Between Epidemic Models and Hawkes Point Processes. In WWW."},{"key":"e_1_3_2_1_25_1","volume-title":"Interval-censored Hawkes processes. JMLR","author":"Rizoiu Marian-Andrei","year":"2022","unstructured":"Marian-Andrei Rizoiu, Alexander Soen, Shidi Li, Pio Calderon, Leanne Dong, Aditya\u00a0Krishna Menon, and Lexing Xie. 2022. Interval-censored Hawkes processes. JMLR (2022)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Karishma Sharma Yizhou Zhang Emilio Ferrara and Yan Liu. 2021. Identifying coordinated accounts on social media through hidden influence and group behaviours. In KDD.","DOI":"10.1145\/3447548.3467391"},{"key":"e_1_3_2_1_27_1","volume-title":"Attention is all you need. NeurIPS","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. NeurIPS (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"Linformer: Self-attention with linear complexity. arXiv","author":"Wang Sinong","year":"2020","unstructured":"Sinong Wang, Belinda\u00a0Z Li, Madian Khabsa, Han Fang, and Hao Ma. 2020. Linformer: Self-attention with linear complexity. arXiv (2020)."},{"key":"e_1_3_2_1_29_1","unstructured":"Claire Wardle and Hossein Derakhshan. 2017. Information disorder: Toward an interdisciplinary framework for research and policymaking."},{"key":"e_1_3_2_1_30_1","volume-title":"Introduction: Computational propaganda worldwide. Computational propaganda: Political parties, politicians, and political manipulation on social media","author":"Woolley C","year":"2018","unstructured":"Samuel\u00a0C Woolley and Philip\u00a0N Howard. 2018. Introduction: Computational propaganda worldwide. Computational propaganda: Political parties, politicians, and political manipulation on social media (2018), 3\u201318."},{"key":"e_1_3_2_1_31_1","unstructured":"Siqi Wu Marian-Andrei Rizoiu and Lexing Xie. 2018. Beyond views: Measuring and predicting engagement in online videos. In ICWSM."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359285"},{"key":"e_1_3_2_1_33_1","unstructured":"Siqi Wu Marian-Andrei Rizoiu and Lexing Xie. 2020. Variation across scales: Measurement fidelity under twitter data sampling. In ICWSM."},{"key":"e_1_3_2_1_34_1","volume-title":"CCGL: Contrastive Cascade Graph Learning. TKDE","author":"Xu Xovee","year":"2022","unstructured":"Xovee Xu, Fan Zhou, Kunpeng Zhang, and Siyuan Liu. 2022. CCGL: Contrastive Cascade Graph Learning. TKDE (2022)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Savvas Zannettou Tristan Caulfield Emiliano De\u00a0Cristofaro Michael Sirivianos Gianluca Stringhini and Jeremy Blackburn. 2019. Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the web. In WWW Companion.","DOI":"10.1145\/3308560.3316495"},{"key":"e_1_3_2_1_36_1","unstructured":"Qiang Zhang Aldo Lipani Omer Kirnap and Emine Yilmaz. 2020. Self-attentive Hawkes process. In ICML."},{"key":"e_1_3_2_1_37_1","volume-title":"Efficient non-parametric Bayesian Hawkes processes. IJCAI","author":"Zhang Rui","year":"2019","unstructured":"Rui Zhang, Christian Walder, Marian-Andrei Rizoiu, and Lexing Xie. 2019. Efficient non-parametric Bayesian Hawkes processes. IJCAI (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"},{"key":"e_1_3_2_1_39_1","volume-title":"Efficient Inference for Dynamic Flexible Interactions of Neural Populations. JMLR","author":"Zhou Feng","year":"2022","unstructured":"Feng Zhou, Quyu Kong, Zhijie Deng, Jichao Kan, Yixuan Zhang, Cheng Feng, and Jun Zhu. 2022. Efficient Inference for Dynamic Flexible Interactions of Neural Populations. JMLR (2022)."},{"key":"e_1_3_2_1_40_1","unstructured":"Ke Zhou Hongyuan Zha and Le Song. 2013. Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processes. In AISTATS."},{"key":"e_1_3_2_1_41_1","unstructured":"Simiao Zuo Haoming Jiang Zichong Li Tuo Zhao and Hongyuan Zha. 2020. Transformer hawkes process. In ICML."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583481","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:53Z","timestamp":1750178873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":41,"alternative-id":["10.1145\/3543507.3583481","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583481","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}