{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T08:32:33Z","timestamp":1776501153328,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Air Force Research Laboratory (AFRL), the Office of Naval Research (ONR) and the Army Research Office (ARO)","award":["FA9550-21-F-0003"],"award-info":[{"award-number":["FA9550-21-F-0003"]}]},{"name":"Portuguese Foundation for Science and Technology - FCT under CMU Portugal"},{"name":"Sao Paulo Research Foundation - FAPESP","award":["2021\/11403-5, 2020\/11258-2, 2016\/17078-0, 2020\/07200-9"],"award-info":[{"award-number":["2021\/11403-5, 2020\/11258-2, 2016\/17078-0, 2020\/07200-9"]}]},{"name":"Coordenacao de Aperfeicoamento de Pessoal de Nivel Superior - Brasil (CAPES)","award":["001"],"award-info":[{"award-number":["001"]}]},{"name":"AIDA project - Adaptive, Intelligent and Distributed Assurance Platform","award":["POCI-01-0247-FEDER-045907"],"award-info":[{"award-number":["POCI-01-0247-FEDER-045907"]}]},{"name":"National Science Foundation Graduate Research","award":["DGE1745016, DGE2140739"],"award-info":[{"award-number":["DGE1745016, DGE2140739"]}]},{"name":"Pennsylvania Infrastructure Technology Alliance - PITA award"},{"name":"European Regional Development Fund - ERDF through the Operational Program for Competitiveness and Internationalisation - COMPETE 2020"},{"name":"National Council for Scientific and Technological Development (CNPq)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3614662","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:42Z","timestamp":1697874342000},"page":"4509-4515","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["CallMine: Fraud Detection and Visualization of Million-Scale Call Graphs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4364-010X","authenticated-orcid":false,"given":"Mirela","family":"Cazzolato","sequence":"first","affiliation":[{"name":"Carnegie Mellon University &amp; University of Sao Paulo, Sao Carlos, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9377-2548","authenticated-orcid":false,"given":"Saranya","family":"Vijayakumar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4364-010X","authenticated-orcid":false,"given":"Meng-Chieh","family":"Lee","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9646-9190","authenticated-orcid":false,"given":"Catalina","family":"Vajiac","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3344-2361","authenticated-orcid":false,"given":"Namyong","family":"Park","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8366-3269","authenticated-orcid":false,"given":"Pedro","family":"Fidalgo","sequence":"additional","affiliation":[{"name":"Mobileum and ISCTE-IUL, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-7258","authenticated-orcid":false,"given":"Agma J.M.","family":"Traina","sequence":"additional","affiliation":[{"name":"University of Sao Paulo, Sao Carlos, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2996-9790","authenticated-orcid":false,"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PAKDD (2) (Lecture Notes in Computer Science","author":"Akoglu Leman","unstructured":"Leman Akoglu , Pedro O. S. Vaz de Melo , and Christos Faloutsos . 2012. Quantifying Reciprocity in Large Weighted Communication Networks . In PAKDD (2) (Lecture Notes in Computer Science , Vol. 7302). Springer, 85-- 96 . Leman Akoglu, Pedro O. S. Vaz de Melo, and Christos Faloutsos. 2012. Quantifying Reciprocity in Large Weighted Communication Networks. In PAKDD (2) (Lecture Notes in Computer Science, Vol. 7302). Springer, 85--96."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_3_1","volume-title":"OPTICS: Ordering Points To Identify the Clustering Structure. In SIGMOD Conference. ACM Press, 49--60","author":"Ankerst Mihael","year":"1999","unstructured":"Mihael Ankerst , Markus M. Breunig , Hans-Peter Kriegel , and J\u00f6rg Sander . 1999 . OPTICS: Ordering Points To Identify the Clustering Structure. In SIGMOD Conference. ACM Press, 49--60 . Mihael Ankerst, Markus M. Breunig, Hans-Peter Kriegel, and J\u00f6rg Sander. 1999. OPTICS: Ordering Points To Identify the Clustering Structure. In SIGMOD Conference. ACM Press, 49--60."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Duen Horng Chau Aniket Kittur Jason I. Hong and Christos Faloutsos. 2011. Apolo: making sense of large network data by combining rich user interaction and machine learning. In CHI. ACM 167--176. Duen Horng Chau Aniket Kittur Jason I. Hong and Christos Faloutsos. 2011. Apolo: making sense of large network data by combining rich user interaction and machine learning. In CHI. ACM 167--176.","DOI":"10.1145\/1978942.1978967"},{"key":"e_1_3_2_1_5_1","unstructured":"Communications Fraud Control Association (CFCA). 2019. Fraud Loss Survey. https:\/\/cfca.org\/wp-content\/uploads\/2021\/02\/CFCA-2019-Fraud-Loss-Survey.pdf Version 1.0. Communications Fraud Control Association (CFCA). 2019. Fraud Loss Survey. https:\/\/cfca.org\/wp-content\/uploads\/2021\/02\/CFCA-2019-Fraud-Loss-Survey.pdf Version 1.0."},{"key":"e_1_3_2_1_6_1","unstructured":"Communications Fraud Control Association (CFCA). 2021. Fraud Loss Survey. https:\/\/cfca.org\/wp-content\/uploads\/2021\/12\/CFCA-Fraud-Loss-Survey-2021--2.pdf Version 1.0. Communications Fraud Control Association (CFCA). 2021. Fraud Loss Survey. https:\/\/cfca.org\/wp-content\/uploads\/2021\/12\/CFCA-Fraud-Loss-Survey-2021--2.pdf Version 1.0."},{"key":"e_1_3_2_1_7_1","volume-title":"Caetano Traina Jr., and Christos Faloutsos.","author":"Costa Alceu Ferraz","year":"2015","unstructured":"Alceu Ferraz Costa , Yuto Yamaguchi , Agma Juci Machado Traina , Caetano Traina Jr., and Christos Faloutsos. 2015 . RSC : Mining and Modeling Temporal Activity in Social Media. In KDD. ACM , 269--278. Alceu Ferraz Costa, Yuto Yamaguchi, Agma Juci Machado Traina, Caetano Traina Jr., and Christos Faloutsos. 2015. RSC: Mining and Modeling Temporal Activity in Social Media. In KDD. ACM, 269--278."},{"key":"e_1_3_2_1_8_1","volume-title":"ECML\/PKDD (3) (Lecture Notes in Computer Science","author":"Vaz de Melo Pedro O. S.","unstructured":"Pedro O. S. Vaz de Melo , Leman Akoglu , Christos Faloutsos , and Antonio Alfredo Ferreira Loureiro . 2010. Surprising Patterns for the Call Duration Distribution of Mobile Phone Users . In ECML\/PKDD (3) (Lecture Notes in Computer Science , Vol. 6323). Springer, 354-- 369 . Pedro O. S. Vaz de Melo, Leman Akoglu, Christos Faloutsos, and Antonio Alfredo Ferreira Loureiro. 2010. Surprising Patterns for the Call Duration Distribution of Mobile Phone Users. In ECML\/PKDD (3) (Lecture Notes in Computer Science, Vol. 6323). Springer, 354--369."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055554"},{"key":"e_1_3_2_1_11_1","volume-title":"PAKDD (2) (Lecture Notes in Computer Science","author":"Giatsoglou Maria","unstructured":"Maria Giatsoglou , Despoina Chatzakou , Neil Shah , Alex Beutel , Christos Faloutsos , and Athena Vakali . 2015. ND-Sync: Detecting Synchronized Fraud Activities . In PAKDD (2) (Lecture Notes in Computer Science , Vol. 9078). Springer, 201-- 214 . Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Alex Beutel, Christos Faloutsos, and Athena Vakali. 2015. ND-Sync: Detecting Synchronized Fraud Activities. In PAKDD (2) (Lecture Notes in Computer Science, Vol. 9078). Springer, 201--214."},{"key":"e_1_3_2_1_12_1","volume-title":"PAKDD (1) (Lecture Notes in Computer Science","author":"Giatsoglou Maria","unstructured":"Maria Giatsoglou , Despoina Chatzakou , Neil Shah , Christos Faloutsos , and Athena Vakali . 2015. Retweeting Activity on Twitter: Signs of Deception . In PAKDD (1) (Lecture Notes in Computer Science , Vol. 9077). Springer, 122-- 134 . Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Retweeting Activity on Twitter: Signs of Deception. In PAKDD (1) (Lecture Notes in Computer Science, Vol. 9077). Springer, 122--134."},{"key":"e_1_3_2_1_13_1","volume-title":"Sujit Rokka Chhetri, and Arquimedes Canedo","author":"Goyal Palash","year":"2020","unstructured":"Palash Goyal , Sujit Rokka Chhetri, and Arquimedes Canedo . 2020 . dyngraph2vec: Capturing network dynamics using dynamic graph representation learning. Knowl. Based Syst . 187 (2020). Palash Goyal, Sujit Rokka Chhetri, and Arquimedes Canedo. 2020. dyngraph2vec: Capturing network dynamics using dynamic graph representation learning. Knowl. Based Syst. 187 (2020)."},{"key":"e_1_3_2_1_14_1","volume-title":"ECML\/PKDD (Lecture Notes in Computer Science","volume":"138","author":"Gupta Nikhil","year":"2018","unstructured":"Nikhil Gupta , Dhivya Eswaran , Neil Shah , Leman Akoglu , and Christos Faloutsos . 2018 . Beyond Outlier Detection: LookOut for Pictorial Explanation . In ECML\/PKDD (Lecture Notes in Computer Science , Vol. 11051). Springer, 122-- 138 . Nikhil Gupta, Dhivya Eswaran, Neil Shah, Leman Akoglu, and Christos Faloutsos. 2018. Beyond Outlier Detection: LookOut for Pictorial Explanation. In ECML\/PKDD (Lecture Notes in Computer Science, Vol. 11051). Springer, 122--138."},{"key":"e_1_3_2_1_15_1","volume-title":"Learning the k in k-means","author":"Hamerly Greg","unstructured":"Greg Hamerly and Charles Elkan . 2003. Learning the k in k-means . In NIPS. MIT Press , 281--288. Greg Hamerly and Charles Elkan. 2003. Learning the k in k-means. In NIPS. MIT Press, 281--288."},{"key":"e_1_3_2_1_16_1","unstructured":"William L. Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS. 1024--1034. William L. Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS. 1024--1034."},{"key":"e_1_3_2_1_17_1","volume-title":"Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos.","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi , Hyun Ah Song , Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016 . FRAUDAR : Bounding Graph Fraud in the Face of Camouflage. In KDD. ACM , 895--904. Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. In KDD. ACM, 895--904."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yajun Huang Jingbin Zhang Yiyang Yang Zhiguo Gong and Zhifeng Hao. 2020. GNNVis: Visualize Large-Scale Data by Learning a Graph Neural Network Representation. In CIKM. ACM 545--554. Yajun Huang Jingbin Zhang Yiyang Yang Zhiguo Gong and Zhifeng Hao. 2020. GNNVis: Visualize Large-Scale Data by Learning a Graph Neural Network Representation. In CIKM. ACM 545--554.","DOI":"10.1145\/3340531.3411987"},{"key":"e_1_3_2_1_19_1","volume-title":"Parallel Coordinates: A Tool for Visualizing Multi-dimensional Geometry","author":"Inselberg Alfred","year":"1990","unstructured":"Alfred Inselberg and Bernard Dimsdale . 1990 . Parallel Coordinates: A Tool for Visualizing Multi-dimensional Geometry . In IEEE Visualization. IEEE Computer Society Press , 361--378. Alfred Inselberg and Bernard Dimsdale. 1990. Parallel Coordinates: A Tool for Visualizing Multi-dimensional Geometry. In IEEE Visualization. IEEE Computer Society Press, 361--378."},{"key":"e_1_3_2_1_20_1","first-page":"22","article-title":"PERSEUS-HUB","volume":"4","author":"Jin Di","year":"2017","unstructured":"Di Jin , Aristotelis Leventidis , Haoming Shen , Ruowang Zhang , Junyue Wu , and Danai Koutra . 2017 . PERSEUS-HUB : Interactive and Collective Exploration of Large-Scale Graphs. Informatics 4 , 3 (2017), 22 . Di Jin, Aristotelis Leventidis, Haoming Shen, Ruowang Zhang, Junyue Wu, and Danai Koutra. 2017. PERSEUS-HUB: Interactive and Collective Exploration of Large-Scale Graphs. Informatics 4, 3 (2017), 22.","journal-title":"Interactive and Collective Exploration of Large-Scale Graphs. Informatics"},{"key":"e_1_3_2_1_21_1","article-title":"Representation Learning for Dynamic Graphs: A Survey","volume":"21","author":"Kazemi Seyed Mehran","year":"2020","unstructured":"Seyed Mehran Kazemi , Rishab Goel , Kshitij Jain , Ivan Kobyzev , Akshay Sethi , Peter Forsyth , and Pascal Poupart . 2020 . Representation Learning for Dynamic Graphs: A Survey . J. Mach. Learn. Res. 21 (2020), 70:1--70:73. Seyed Mehran Kazemi, Rishab Goel, Kshitij Jain, Ivan Kobyzev, Akshay Sethi, Peter Forsyth, and Pascal Poupart. 2020. Representation Learning for Dynamic Graphs: A Survey. J. Mach. Learn. Res. 21 (2020), 70:1--70:73.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_22_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling . 2017 . Semi-Supervised Classification with Graph Convolutional Networks. In ICLR (Poster). OpenReview .net. Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR (Poster). OpenReview.net."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Srijan Kumar Xikun Zhang and Jure Leskovec. 2019. Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks. In KDD. ACM 1269--1278. Srijan Kumar Xikun Zhang and Jure Leskovec. 2019. Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks. In KDD. ACM 1269--1278.","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_1_24_1","volume-title":"Timothy Noah Hutson, and Leon D. Iasemidis","author":"Lee Meng-Chieh","year":"2021","unstructured":"Meng-Chieh Lee , Shubhranshu Shekhar , Christos Faloutsos , Timothy Noah Hutson, and Leon D. Iasemidis . 2021 . Gen2Out: Detecting and Ranking Generalized Anomalies. In IEEE BigData. IEEE , 801--811. Meng-Chieh Lee, Shubhranshu Shekhar, Christos Faloutsos, Timothy Noah Hutson, and Leon D. Iasemidis. 2021. Gen2Out: Detecting and Ranking Generalized Anomalies. In IEEE BigData. IEEE, 801--811."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412877"},{"key":"e_1_3_2_1_26_1","volume-title":"Isolation Forest. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu , Kai Ming Ting , and Zhi-Hua Zhou . 2008 . Isolation Forest. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008 ), December 15 --19 , 2008, Pisa, Italy. IEEE Computer Society, 413--422. https:\/\/doi.org\/10.1109\/ICDM.2008.17 10.1109\/ICDM.2008.17 Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation Forest. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15--19, 2008, Pisa, Italy. IEEE Computer Society, 413--422. https:\/\/doi.org\/10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_27_1","volume-title":"Ryan A. Rossi, Nesreen K. Ahmed, Eunyee Koh, and Sungchul Kim.","author":"Nguyen Giang Hoang","year":"2018","unstructured":"Giang Hoang Nguyen , John Boaz Lee , Ryan A. Rossi, Nesreen K. Ahmed, Eunyee Koh, and Sungchul Kim. 2018 . Continuous-Time Dynamic Network Embeddings. In WWW (Companion Volume). ACM , 969--976. Giang Hoang Nguyen, John Boaz Lee, Ryan A. Rossi, Nesreen K. Ahmed, Eunyee Koh, and Sungchul Kim. 2018. Continuous-Time Dynamic Network Embeddings. In WWW (Companion Volume). ACM, 969--976."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Namyong Park Fuchen Liu Purvanshi Mehta Dana Cristofor Christos Faloutsos and Yuxiao Dong. 2022. EvoKG: Jointly Modeling Event Time and Network Structure for Reasoning over Temporal Knowledge Graphs. In WSDM. ACM 794--803. Namyong Park Fuchen Liu Purvanshi Mehta Dana Cristofor Christos Faloutsos and Yuxiao Dong. 2022. EvoKG: Jointly Modeling Event Time and Network Structure for Reasoning over Temporal Knowledge Graphs. In WSDM. ACM 794--803.","DOI":"10.1145\/3488560.3498451"},{"key":"e_1_3_2_1_29_1","volume-title":"FACETS: Adaptive Local Exploration of Large Graphs. In Proceedings of the 2017 SIAM International Conference on Data Mining","author":"Pienta Robert S.","year":"2017","unstructured":"Robert S. Pienta , Minsuk Kahng , Zhiyuan Lin , Jilles Vreeken , Partha P. Talukdar , James Abello , Ganesh Parameswaran , and Duen Horng Chau . 2017 . FACETS: Adaptive Local Exploration of Large Graphs. In Proceedings of the 2017 SIAM International Conference on Data Mining , Houston, Texas, USA , April 27--29, 2017, Nitesh V. Chawla and Wei Wang (Eds.). SIAM , 597--605. https:\/\/doi.org\/10.1137\/1.9781611974973.67 10.1137\/1.9781611974973.67 Robert S. Pienta, Minsuk Kahng, Zhiyuan Lin, Jilles Vreeken, Partha P. Talukdar, James Abello, Ganesh Parameswaran, and Duen Horng Chau. 2017. FACETS: Adaptive Local Exploration of Large Graphs. In Proceedings of the 2017 SIAM International Conference on Data Mining, Houston, Texas, USA, April 27--29, 2017, Nitesh V. Chawla and Wei Wang (Eds.). SIAM, 597--605. https:\/\/doi.org\/10.1137\/1.9781611974973.67"},{"key":"e_1_3_2_1_30_1","volume-title":"CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms","author":"Shin Kijung","unstructured":"Kijung Shin , Tina Eliassi-Rad , and Christos Faloutsos . 2016. CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms . In ICDM. IEEE Computer Society , 469--478. Kijung Shin, Tina Eliassi-Rad, and Christos Faloutsos. 2016. CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms. In ICDM. IEEE Computer Society, 469--478."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346444"},{"key":"e_1_3_2_1_32_1","volume-title":"Weinberger","author":"Wu Felix","year":"2019","unstructured":"Felix Wu , Amauri H. Souza Jr ., Tianyi Zhang , Christopher Fifty , Tao Yu , and Kilian Q . Weinberger . 2019 . Simplifying Graph Convolutional Networks. In ICML (Proceedings of Machine Learning Research , Vol. 97). PMLR, 6861-- 6871 . Felix Wu, Amauri H. Souza Jr., Tianyi Zhang, Christopher Fifty, Tao Yu, and Kilian Q.Weinberger. 2019. Simplifying Graph Convolutional Networks. In ICML (Proceedings of Machine Learning Research, Vol. 97). PMLR, 6861--6871."},{"key":"e_1_3_2_1_33_1","unstructured":"Da Xu Chuanwei Ruan Evren K\u00f6rpeoglu Sushant Kumar and Kannan Achan. 2020. Inductive representation learning on temporal graphs. In ICLR. OpenReview. net. Da Xu Chuanwei Ruan Evren K\u00f6rpeoglu Sushant Kumar and Kannan Achan. 2020. Inductive representation learning on temporal graphs. In ICLR. OpenReview. net."},{"key":"e_1_3_2_1_34_1","volume-title":"Generalized Belief Propagation","author":"Yedidia Jonathan S.","unstructured":"Jonathan S. Yedidia , William T. Freeman , and YairWeiss. 2000. Generalized Belief Propagation . In NIPS. MIT Press , 689--695. Jonathan S. Yedidia, William T. Freeman, and YairWeiss. 2000. Generalized Belief Propagation. In NIPS. MIT Press, 689--695."},{"key":"e_1_3_2_1_35_1","volume-title":"Dynamic Network Embedding by Modeling Triadic Closure Process","author":"Yang Yang","unstructured":"Le-kui Zhou, Yang Yang , Xiang Ren , FeiWu, and Yueting Zhuang . 2018. Dynamic Network Embedding by Modeling Triadic Closure Process . In AAAI. AAAI Press , 571--578. Le-kui Zhou, Yang Yang, Xiang Ren, FeiWu, and Yueting Zhuang. 2018. Dynamic Network Embedding by Modeling Triadic Closure Process. In AAAI. AAAI Press, 571--578."},{"key":"e_1_3_2_1_36_1","volume-title":"Lafferty","author":"Zhu Xiaojin","year":"2003","unstructured":"Xiaojin Zhu , Zoubin Ghahramani , and John D . Lafferty . 2003 . Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions. In ICML. AAAI Press , 912--919. Xiaojin Zhu, Zoubin Ghahramani, and John D. Lafferty. 2003. Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions. In ICML. AAAI Press, 912--919."}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","location":"Birmingham United Kingdom","acronym":"CIKM '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3614662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:30Z","timestamp":1750178790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":36,"alternative-id":["10.1145\/3583780.3614662","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3614662","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}