{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:48:25Z","timestamp":1773154105110,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR00112290102 (subcontract No. PO70745)"],"award-info":[{"award-number":["HR00112290102 (subcontract No. PO70745)"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2154118, IIS-2027689, ITE-2137724, ITE-2230692, CNS-2239879"],"award-info":[{"award-number":["CNS-2154118, IIS-2027689, ITE-2137724, ITE-2230692, CNS-2239879"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599517","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"2023-2035","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Temporal Dynamics-Aware Adversarial Attacks on Discrete-Time Dynamic Graph Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0747-9320","authenticated-orcid":false,"given":"Kartik","family":"Sharma","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8415-6055","authenticated-orcid":false,"given":"Rakshit","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Boston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5239-5698","authenticated-orcid":false,"given":"Rohit","family":"Sridhar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5796-3532","authenticated-orcid":false,"given":"Srijan","family":"Kumar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_2_2_1","volume-title":"International Conference on Machine Learning. PMLR, 695--704","author":"Bojchevski Aleksandar","year":"2019","unstructured":"Aleksandar Bojchevski and Stephan G\u00fcnnemann . 2019 . Adversarial attacks on node embeddings via graph poisoning . In International Conference on Machine Learning. PMLR, 695--704 . Aleksandar Bojchevski and Stephan G\u00fcnnemann. 2019. Adversarial attacks on node embeddings via graph poisoning. In International Conference on Machine Learning. PMLR, 695--704."},{"key":"e_1_3_2_2_3_1","volume-title":"Convex optimization","author":"Boyd Stephen","unstructured":"Stephen Boyd , Stephen P Boyd , and Lieven Vandenberghe . 2004. Convex optimization . Cambridge university press . Stephen Boyd, Stephen P Boyd, and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press."},{"key":"e_1_3_2_2_4_1","volume-title":"Foundations and Trends\u00ae in Machine Learning","volume":"8","author":"S\u00e9bastien","year":"2015","unstructured":"S\u00e9bastien Bubeck et al. 2015. Convex optimization: Algorithms and complexity . Foundations and Trends\u00ae in Machine Learning , Vol. 8 , 3--4 ( 2015 ), 231--357. S\u00e9bastien Bubeck et al. 2015. Convex optimization: Algorithms and complexity. Foundations and Trends\u00ae in Machine Learning, Vol. 8, 3--4 (2015), 231--357."},{"key":"e_1_3_2_2_5_1","volume-title":"A graph-theoretic approach to enterprise network dynamics","author":"Bunke Horst","unstructured":"Horst Bunke , Peter J Dickinson , Miro Kraetzl , and Walter D Wallis . 2007. A graph-theoretic approach to enterprise network dynamics . Vol. 24 . Springer Science & Business Media . Horst Bunke, Peter J Dickinson, Miro Kraetzl, and Walter D Wallis. 2007. A graph-theoretic approach to enterprise network dynamics. Vol. 24. Springer Science & Business Media."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481955"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441806"},{"key":"e_1_3_2_2_8_1","volume-title":"Gc-lstm: Graph convolution embedded lstm for dynamic link prediction. arXiv:1812.04206","author":"Chen Jinyin","year":"2018","unstructured":"Jinyin Chen , Xueke Wang , and Xuanheng Xu . 2018 . Gc-lstm: Graph convolution embedded lstm for dynamic link prediction. arXiv:1812.04206 (2018). Jinyin Chen, Xueke Wang, and Xuanheng Xu. 2018. Gc-lstm: Graph convolution embedded lstm for dynamic link prediction. arXiv:1812.04206 (2018)."},{"key":"e_1_3_2_2_9_1","volume-title":"Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. arxiv:2110.03875","author":"Chen Jinyin","year":"2021","unstructured":"Jinyin Chen , Haiyang Xiong , Haibin Zheng , Jian Zhang , Guodong Jiang , and Yi Liu . 2021a. Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. arxiv:2110.03875 ( 2021 ). Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Guodong Jiang, and Yi Liu. 2021a. Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction. arxiv:2110.03875 (2021)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3110580"},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=wkMG8cdvh7-","author":"Chen Yongqiang","year":"2022","unstructured":"Yongqiang Chen , Han Yang , Yonggang Zhang , MA KAILI , Tongliang Liu , Bo Han , and James Cheng . 2022 . Understanding and Improving Graph Injection Attack by Promoting Unnoticeability . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=wkMG8cdvh7- Yongqiang Chen, Han Yang, Yonggang Zhang, MA KAILI, Tongliang Liu, Bo Han, and James Cheng. 2022. Understanding and Improving Graph Injection Attack by Promoting Unnoticeability. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=wkMG8cdvh7-"},{"key":"e_1_3_2_2_12_1","volume-title":"International conference on machine learning. PMLR, 1115--1124","author":"Dai Hanjun","year":"2018","unstructured":"Hanjun Dai , Hui Li , Tian Tian , Xin Huang , Lin Wang , Jun Zhu , and Le Song . 2018 . Adversarial attack on graph structured data . In International conference on machine learning. PMLR, 1115--1124 . Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. In International conference on machine learning. PMLR, 1115--1124."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00117"},{"key":"e_1_3_2_2_14_1","volume-title":"Reinforcement learning-based black-box evasion attacks to link prediction in dynamic graphs. arxiv:2009.00163","author":"Fan Houxiang","year":"2020","unstructured":"Houxiang Fan , Binghui Wang , Pan Zhou , Ang Li , Meng Pang , Zichuan Xu , Cai Fu , Hai Li , and Yiran Chen . 2020. Reinforcement learning-based black-box evasion attacks to link prediction in dynamic graphs. arxiv:2009.00163 ( 2020 ). Houxiang Fan, Binghui Wang, Pan Zhou, Ang Li, Meng Pang, Zichuan Xu, Cai Fu, Hai Li, and Yiran Chen. 2020. Reinforcement learning-based black-box evasion attacks to link prediction in dynamic graphs. arxiv:2009.00163 (2020)."},{"key":"e_1_3_2_2_15_1","volume-title":"Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann.","author":"Geisler Simon","year":"2021","unstructured":"Simon Geisler , Tobias Schmidt , Hakan cS irin , Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2021 . Robustness of Graph Neural Networks at Scale. Advances in Neural Information Processing Systems , Vol. 34 (2021). Simon Geisler, Tobias Schmidt, Hakan cS irin, Daniel Z\u00fcgner, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2021. Robustness of Graph Neural Networks at Scale. Advances in Neural Information Processing Systems , Vol. 34 (2021)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422552"},{"key":"e_1_3_2_2_17_1","volume-title":"International Conference on Learning Representations.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and harnessing adversarial examples . In International Conference on Learning Representations. Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_18_1","volume-title":"Dyngem: Deep embedding method for dynamic graphs. arXiv:1805.11273","author":"Goyal Palash","year":"2018","unstructured":"Palash Goyal , Nitin Kamra , Xinran He , and Yan Liu . 2018 . Dyngem: Deep embedding method for dynamic graphs. arXiv:1805.11273 (2018). Palash Goyal, Nitin Kamra, Xinran He, and Yan Liu. 2018. Dyngem: Deep embedding method for dynamic graphs. arXiv:1805.11273 (2018)."},{"key":"e_1_3_2_2_19_1","volume-title":"Alex Beutel, Neil Shah, and Christos Faloutsos.","author":"Hooi Bryan","year":"2017","unstructured":"Bryan Hooi , Kijung Shin , Hyun Ah Song , Alex Beutel, Neil Shah, and Christos Faloutsos. 2017 . Graph-based fraud detection in the face of camouflage. ACM Transactions on Knowledge Discovery from Data (TKDD) , Vol. 11 , 4 (2017), 1--26. Bryan Hooi, Kijung Shin, Hyun Ah Song, Alex Beutel, Neil Shah, and Christos Faloutsos. 2017. Graph-based fraud detection in the face of camouflage. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 11, 4 (2017), 1--26."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1147"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482000"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447556.3447566"},{"key":"e_1_3_2_2_23_1","first-page":"1","article-title":"Representation Learning for Dynamic Graphs: A Survey","volume":"21","author":"Kazemi Seyed Mehran","year":"2020","unstructured":"Seyed Mehran Kazemi , Rishab Goel , Kshitij Jain , Ivan Kobyzev , Akshay Sethi , Peter Forsyth , and Pascal Poupart . 2020 . Representation Learning for Dynamic Graphs: A Survey . Journal of Machine Learning Research , Vol. 21 , 70 (2020), 1 -- 73 . Seyed Mehran Kazemi, Rishab Goel, Kshitij Jain, Ivan Kobyzev, Akshay Sethi, Peter Forsyth, and Pascal Poupart. 2020. Representation Learning for Dynamic Graphs: A Survey. Journal of Machine Learning Research, Vol. 21, 70 (2020), 1--73.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Learning Representations.","author":"Kingma Diederik P","year":"2015","unstructured":"Diederik P Kingma and Jimmy Ba . 2015 . Adam: A method for stochastic optimization . In International Conference on Learning Representations. Diederik P Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_25_1","volume-title":"Empirical analysis of an evolving social network. science","author":"Kossinets Gueorgi","year":"2006","unstructured":"Gueorgi Kossinets and Duncan J Watts . 2006. Empirical analysis of an evolving social network. science , Vol. 311 , 5757 ( 2006 ), 88--90. Gueorgi Kossinets and Duncan J Watts. 2006. Empirical analysis of an evolving social network. science, Vol. 311, 5757 (2006), 88--90."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186141"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_2_29_1","volume-title":"International Conference on Learning Representations.","author":"Li Yaguang","year":"2018","unstructured":"Yaguang Li , Rose Yu , Cyrus Shahabi , and Yan Liu . 2018 . Diffusion convolutional recurrent neural network: Data-driven traffic forecasting . In International Conference on Learning Representations. Yaguang Li, Rose Yu, Cyrus Shahabi, and Yan Liu. 2018. Diffusion convolutional recurrent neural network: Data-driven traffic forecasting. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_30_1","volume-title":"Towards more practical adversarial attacks on graph neural networks. Advances in neural information processing systems","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma , Shuangrui Ding , and Qiaozhu Mei . 2020a. Towards more practical adversarial attacks on graph neural networks. Advances in neural information processing systems , Vol. 33 ( 2020 ), 4756--4766. Jiaqi Ma, Shuangrui Ding, and Qiaozhu Mei. 2020a. Towards more practical adversarial attacks on graph neural networks. Advances in neural information processing systems , Vol. 33 (2020), 4756--4766."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401092"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107000"},{"key":"e_1_3_2_2_35_1","volume-title":"Hugo Berard, William L Hamilton, Simon Lacoste-Julien, Pascal Vincent, and Gauthier Gidel.","author":"Mladenovic Andjela","year":"2021","unstructured":"Andjela Mladenovic , Avishek Joey Bose , Hugo Berard, William L Hamilton, Simon Lacoste-Julien, Pascal Vincent, and Gauthier Gidel. 2021 . Online Adversarial Attacks . arxiv:2103.02014 (2021). Andjela Mladenovic, Avishek Joey Bose, Hugo Berard, William L Hamilton, Simon Lacoste-Julien, Pascal Vincent, and Gauthier Gidel. 2021. Online Adversarial Attacks. arxiv:2103.02014 (2021)."},{"key":"e_1_3_2_2_36_1","volume-title":"ICML 2021 Workshop on Uncertainty and Robustness in Deep Learning.","author":"Mu Norman","year":"2021","unstructured":"Norman Mu and David Wagner . 2021 . Defending against adversarial patches with robust self-attention . In ICML 2021 Workshop on Uncertainty and Robustness in Deep Learning. Norman Mu and David Wagner. 2021. Defending against adversarial patches with robust self-attention. In ICML 2021 Workshop on Uncertainty and Robustness in Deep Learning."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.03.074"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16616"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1347"},{"key":"e_1_3_2_2_41_1","volume-title":"Temporal Graph Networks for Deep Learning on Dynamic Graphs. In ICML 2020 Workshop on Graph Representation Learning.","author":"Rossi Emanuele","year":"2020","unstructured":"Emanuele Rossi , Ben Chamberlain , Fabrizio Frasca , Davide Eynard , Federico Monti , and Michael Bronstein . 2020 . Temporal Graph Networks for Deep Learning on Dynamic Graphs. In ICML 2020 Workshop on Graph Representation Learning. Emanuele Rossi, Ben Chamberlain, Fabrizio Frasca, Davide Eynard, Federico Monti, and Michael Bronstein. 2020. Temporal Graph Networks for Deep Learning on Dynamic Graphs. In ICML 2020 Workshop on Graph Representation Learning."},{"key":"e_1_3_2_2_42_1","volume-title":"Chickenpox cases in hungary: a benchmark dataset for spatiotemporal signal processing with graph neural networks. arXiv:2102.08100","author":"Rozemberczki Benedek","year":"2021","unstructured":"Benedek Rozemberczki , Paul Scherer , Oliver Kiss , Rik Sarkar , and Tamas Ferenci . 2021. Chickenpox cases in hungary: a benchmark dataset for spatiotemporal signal processing with graph neural networks. arXiv:2102.08100 ( 2021 ). Benedek Rozemberczki, Paul Scherer, Oliver Kiss, Rik Sarkar, and Tamas Ferenci. 2021. Chickenpox cases in hungary: a benchmark dataset for spatiotemporal signal processing with graph neural networks. arXiv:2102.08100 (2021)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450120"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371845"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219265902000562"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403276"},{"key":"e_1_3_2_2_47_1","volume-title":"international conference on machine learning. PMLR, 3462--3471","author":"Trivedi Rakshit","year":"2017","unstructured":"Rakshit Trivedi , Hanjun Dai , Yichen Wang , and Le Song . 2017 . Know-evolve: Deep temporal reasoning for dynamic knowledge graphs . In international conference on machine learning. PMLR, 3462--3471 . Rakshit Trivedi, Hanjun Dai, Yichen Wang, and Le Song. 2017. Know-evolve: Deep temporal reasoning for dynamic knowledge graphs. In international conference on machine learning. PMLR, 3462--3471."},{"key":"e_1_3_2_2_48_1","volume-title":"International Conference on Learning Representations.","author":"Trivedi Rakshit","year":"2019","unstructured":"Rakshit Trivedi , Mehrdad Farajtabar , Prasenjeet Biswal , and Hongyuan Zha . 2019 . Dyrep: Learning representations over dynamic graphs . In International Conference on Learning Representations. Rakshit Trivedi, Mehrdad Farajtabar, Prasenjeet Biswal, and Hongyuan Zha. 2019. Dyrep: Learning representations over dynamic graphs. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377789"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00181"},{"key":"e_1_3_2_2_52_1","volume-title":"International Conference on Learning Representations.","author":"Xu Da","year":"2020","unstructured":"Da Xu , Chuanwei Ruan , Evren Korpeoglu , Sushant Kumar , and Kannan Achan . 2020 . Inductive representation learning on temporal graphs . In International Conference on Learning Representations. Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan. 2020. Inductive representation learning on temporal graphs. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/550"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482313"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Li Zheng Zhenpeng Li Jian Li Zhao Li and Jun Gao. 2019. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI. 4419--4425.  Li Zheng Zhenpeng Li Jian Li Zhao Li and Jun Gao. 2019. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI. 4419--4425.","DOI":"10.24963\/ijcai.2019\/614"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00117"},{"key":"e_1_3_2_2_59_1","volume-title":"Proceedings of the 20th international conference on machine learning (icml-03)","author":"Zinkevich Martin","year":"2003","unstructured":"Martin Zinkevich . 2003 . Online convex programming and generalized infinitesimal gradient ascent . In Proceedings of the 20th international conference on machine learning (icml-03) . 928--936. Martin Zinkevich. 2003. Online convex programming and generalized infinitesimal gradient ascent. In Proceedings of the 20th international conference on machine learning (icml-03). 928--936."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599517","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:52Z","timestamp":1750178272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":60,"alternative-id":["10.1145\/3580305.3599517","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599517","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}