{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:04Z","timestamp":1750219744635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615147","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:42Z","timestamp":1697874342000},"page":"4405-4409","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Simplex2vec Backward: From Vectors Back to Simplicial Complex"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8926-1941","authenticated-orcid":false,"given":"Huixin","family":"Zhan","sequence":"first","affiliation":[{"name":"Texas Tech University, Lubbock, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1915-788X","authenticated-orcid":false,"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xavier University of Louisiana, New Orleans, LA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7483-9699","authenticated-orcid":false,"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[{"name":"Xavier University of Louisiana, New Orleans, LA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4960-174X","authenticated-orcid":false,"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3242034"},{"key":"e_1_3_2_1_2_1","volume-title":"Node classification in social networks. arXiv preprint arXiv:1101.3291","author":"Bhagat Smriti","year":"2011","unstructured":"Smriti Bhagat , Graham Cormode , and S Muthukrishnan . 2011. Node classification in social networks. arXiv preprint arXiv:1101.3291 ( 2011 ). Smriti Bhagat, Graham Cormode, and S Muthukrishnan. 2011. Node classification in social networks. arXiv preprint arXiv:1101.3291 (2011)."},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Machine Learning. PMLR, 1473--1483","author":"Chanpuriya Sudhanshu","year":"2021","unstructured":"Sudhanshu Chanpuriya , Cameron Musco , Konstantinos Sotiropoulos , and Charalampos Tsourakakis . 2021 . DeepWalking Backwards: From Embeddings Back to Graphs . In International Conference on Machine Learning. PMLR, 1473--1483 . Sudhanshu Chanpuriya, Cameron Musco, Konstantinos Sotiropoulos, and Charalampos Tsourakakis. 2021. DeepWalking Backwards: From Embeddings Back to Graphs. In International Conference on Machine Learning. PMLR, 1473--1483."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Vasisht Duddu Antoine Boutet and Virat Shejwalkar. 2020. Quantifying privacy leakage in graph embedding. In Mobiquitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services. 76--85.  Vasisht Duddu Antoine Boutet and Virat Shejwalkar. 2020. Quantifying privacy leakage in graph embedding. In Mobiquitous 2020--17th EAI International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services. 76--85.","DOI":"10.1145\/3448891.3448939"},{"key":"e_1_3_2_1_5_1","volume-title":"Simplicial neural networks. arXiv preprint arXiv:2010.03633","author":"Ebli Stefania","year":"2020","unstructured":"Stefania Ebli , Micha\u00ebl Defferrard , and Gard Spreemann . 2020. Simplicial neural networks. arXiv preprint arXiv:2010.03633 ( 2020 ). Stefania Ebli, Micha\u00ebl Defferrard, and Gard Spreemann. 2020. Simplicial neural networks. arXiv preprint arXiv:2010.03633 (2020)."},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy attacks on network embeddings. arXiv preprint arXiv:1912.10979","author":"Ellers Michael","year":"2019","unstructured":"Michael Ellers , Michael Cochez , Tobias Schumacher , Markus Strohmaier , and Florian Lemmerich . 2019. Privacy attacks on network embeddings. arXiv preprint arXiv:1912.10979 ( 2019 ). Michael Ellers, Michael Cochez, Tobias Schumacher, Markus Strohmaier, and Florian Lemmerich. 2019. Privacy attacks on network embeddings. arXiv preprint arXiv:1912.10979 (2019)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447704"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2813009"},{"key":"e_1_3_2_1_10_1","volume-title":"k-simplex2vec: a simplicial extension of node2vec. arXiv preprint arXiv:2010.05636","author":"Hacker Celia","year":"2020","unstructured":"Celia Hacker . 2020. k-simplex2vec: a simplicial extension of node2vec. arXiv preprint arXiv:2010.05636 ( 2020 ). Celia Hacker. 2020. k-simplex2vec: a simplicial extension of node2vec. arXiv preprint arXiv:2010.05636 (2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium. 2669--2686","author":"He Xinlei","year":"2021","unstructured":"Xinlei He , Jinyuan Jia , Michael Backes , Neil Zhenqiang Gong , and Yang Zhang . 2021 . Stealing Links from Graph Neural Networks .. In USENIX Security Symposium. 2669--2686 . Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2021. Stealing Links from Graph Neural Networks.. In USENIX Security Symposium. 2669--2686."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aim.2013.05.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20673"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2015.10.017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.040"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159706"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Birmingham United Kingdom","acronym":"CIKM '23"},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:42Z","timestamp":1750178202000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":17,"alternative-id":["10.1145\/3583780.3615147","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615147","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}