{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:29:16Z","timestamp":1768350556803,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF 20232551"},{"name":"NSF 2119643"},{"name":"NASA"},{"name":"SRC JUMP 2.0 Center"},{"name":"NSF 2303037"},{"name":"NSF 1937599"},{"name":"Cisco research grant"},{"name":"Snapchat Gifts"},{"name":"NSF 2211557"},{"name":"Picsart Gifts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645389","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"422-433","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Fast Inference of Removal-Based Node Influence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5801-9500","authenticated-orcid":false,"given":"Weikai","family":"Li","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8583-4789","authenticated-orcid":false,"given":"Zhiping","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7987-3714","authenticated-orcid":false,"given":"Xiao","family":"Luo","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1812-6843","authenticated-orcid":false,"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Jian Pei, Lanjun Wang, Peter Cho-Ho Lam, and Yong Zhang.","author":"Bajaj Mohit","year":"2021","unstructured":"Mohit Bajaj, Lingyang Chu, Zi Yu Xue, Jian Pei, Lanjun Wang, Peter Cho-Ho Lam, and Yong Zhang. 2021. Robust Counterfactual Explanations on Graph Neural Networks. CoRR , Vol. abs\/2107.04086 (2021). showeprint[arXiv]2107.04086 https:\/\/arxiv.org\/abs\/2107.04086"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.00228"},{"key":"e_1_3_2_2_3_1","volume-title":"Time and space complexity of graph convolutional networks. Accessed on: Dec","author":"Blakely Derrick","year":"2021","unstructured":"Derrick Blakely, Jack Lanchantin, and Yanjun Qi. 2021. Time and space complexity of graph convolutional networks. Accessed on: Dec , Vol. 31 (2021)."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research","author":"Chen Ming","year":"2020","unstructured":"Ming Chen, Zhewei Wei, Zengfeng Huang, Bolin Ding, and Yaliang Li. 2020. Simple and Deep Graph Convolutional Networks. In Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 119), Hal Daum\u00e9 III and Aarti Singh (Eds.). PMLR, 1725--1735. https:\/\/proceedings.mlr.press\/v119\/chen20v.html"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","unstructured":"Yongqiang Chen Han Yang Yonggang Zhang Kaili Ma Tongliang Liu Bo Han and James Cheng. 2022. Understanding and Improving Graph Injection Attack by Promoting Unnoticeability. https:\/\/doi.org\/10.48550\/ARXIV.2202.08057","DOI":"10.48550\/ARXIV.2202.08057"},{"key":"e_1_3_2_2_6_1","volume-title":"A topological analysis of the Italian electric power grid. Physica A: Statistical mechanics and its applications","author":"Crucitti Paolo","year":"2004","unstructured":"Paolo Crucitti, Vito Latora, and Massimo Marchiori. 2004. A topological analysis of the Italian electric power grid. Physica A: Statistical mechanics and its applications, Vol. 338, 1--2 (2004), 92--97."},{"key":"e_1_3_2_2_7_1","volume-title":"A Targeted Universal Attack on Graph Convolutional Network. CoRR","author":"Dai Jiazhu","year":"2020","unstructured":"Jiazhu Dai, Weifeng Zhu, and Xiangfeng Luo. 2020. A Targeted Universal Attack on Graph Convolutional Network. CoRR , Vol. abs\/2011.14365 (2020). showeprint[arXiv]2011.14365 https:\/\/arxiv.org\/abs\/2011.14365"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_2_9_1","volume-title":"Dahl","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. 2017. Neural Message Passing for Quantum Chemistry. CoRR , Vol. abs\/1704.01212 (2017). showeprint[arXiv]1704.01212 http:\/\/arxiv.org\/abs\/1704.01212"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"e_1_3_2_2_11_1","volume-title":"Inductive Representation Learning on Large Graphs. CoRR","author":"Hamilton William L.","year":"2017","unstructured":"William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. CoRR , Vol. abs\/1706.02216 (2017). showeprint[arXiv]1706.02216 http:\/\/arxiv.org\/abs\/1706.02216"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2004--10286--2"},{"key":"e_1_3_2_2_14_1","volume-title":"Open Graph Benchmark: Datasets for Machine Learning on Graphs. CoRR","author":"Hu Weihua","year":"2020","unstructured":"Weihua Hu, Matthias Fey, Marinka Zitnik, Yuxiao Dong, Hongyu Ren, Bowen Liu, Michele Catasta, and Jure Leskovec. 2020. Open Graph Benchmark: Datasets for Machine Learning on Graphs. CoRR , Vol. abs\/2005.00687 (2020). showeprint[arXiv]2005.00687 https:\/\/arxiv.org\/abs\/2005.00687"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1387-8"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570376"},{"key":"e_1_3_2_2_17_1","volume-title":"International conference on machine learning. pmlr, 448--456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. pmlr, 448--456."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2018.04.049"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Mingxuan Ju Yujie Fan Yanfang Ye and Liang Zhao. 2022a. Black-box Node Injection Attack for Graph Neural Networks. https:\/\/doi.org\/10.48550\/ARXIV.2202.09389","DOI":"10.48550\/ARXIV.2202.09389"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","unstructured":"Mingxuan Ju Yujie Fan Chuxu Zhang and Yanfang Ye. 2022b. Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinforcement Learning. https:\/\/doi.org\/10.48550\/ARXIV.2211.10782","DOI":"10.48550\/ARXIV.2211.10782"},{"key":"e_1_3_2_2_22_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_2_23_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2016","unstructured":"Thomas N. Kipf and Max Welling. 2016. Semi-Supervised Classification with Graph Convolutional Networks. CoRR , Vol. abs\/1609.02907 (2016). showeprint[arXiv]1609.02907 http:\/\/arxiv.org\/abs\/1609.02907"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.60"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102818"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371833"},{"key":"e_1_3_2_2_29_1","volume-title":"International Conference on Machine Learning. PMLR, 21350--21361","author":"Ling Chen","year":"2023","unstructured":"Chen Ling, Junji Jiang, Junxiang Wang, My T Thai, Renhao Xue, James Song, Meikang Qiu, and Liang Zhao. 2023. Deep graph representation learning and optimization for influence maximization. In International Conference on Machine Learning. PMLR, 21350--21361."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2022.3207878"},{"key":"e_1_3_2_2_31_1","volume-title":"Gabriele Tolomei, Maarten de Rijke, and Fabrizio Silvestri.","author":"Lucic Ana","year":"2021","unstructured":"Ana Lucic, Maartje ter Hoeve, Gabriele Tolomei, Maarten de Rijke, and Fabrizio Silvestri. 2021. CF-GNNExplainer: Counterfactual Explanations for Graph Neural Networks. CoRR , Vol. abs\/2102.03322 (2021). showeprint[arXiv]2102.03322 https:\/\/arxiv.org\/abs\/2102.03322"},{"key":"e_1_3_2_2_32_1","volume-title":"Parameterized Explainer for Graph Neural Network. CoRR","author":"Luo Dongsheng","year":"2020","unstructured":"Dongsheng Luo, Wei Cheng, Dongkuan Xu, Wenchao Yu, Bo Zong, Haifeng Chen, and Xiang Zhang. 2020. Parameterized Explainer for Graph Neural Network. CoRR , Vol. abs\/2011.04573 (2020). showeprint[arXiv]2011.04573 https:\/\/arxiv.org\/abs\/2011.04573"},{"key":"e_1_3_2_2_33_1","volume-title":"Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem. CoRR","author":"Ma Jiaqi","year":"2021","unstructured":"Jiaqi Ma, Junwei Deng, and Qiaozhu Mei. 2021. Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem. CoRR , Vol. abs\/2106.10785 (2021). showeprint[arXiv]2106.10785 https:\/\/arxiv.org\/abs\/2106.10785"},{"key":"e_1_3_2_2_34_1","first-page":"25895","article-title":"Clear: Generative counterfactual explanations on graphs","volume":"35","author":"Ma Jing","year":"2022","unstructured":"Jing Ma, Ruocheng Guo, Saumitra Mishra, Aidong Zhang, and Jundong Li. 2022. Clear: Generative counterfactual explanations on graphs. Advances in Neural Information Processing Systems , Vol. 35 (2022), 25895--25907.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","unstructured":"Balume Mburano Weisheng Si Qing Cao and Wei Xing Zheng. 2022. More Effective Centrality-Based Attacks on Weighted Networks. https:\/\/doi.org\/10.48550\/ARXIV.2211.09345","DOI":"10.48550\/ARXIV.2211.09345"},{"key":"e_1_3_2_2_36_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013a. Efficient Estimation of Word Representations in Vector Space. arxiv: 1301.3781 [cs.CL]"},{"key":"e_1_3_2_2_37_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeffrey Dean. 2013b. Distributed Representations of Words and Phrases and their Compositionality. arxiv: 1310.4546 [cs.CL]"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2691544"},{"key":"e_1_3_2_2_39_1","volume-title":"Conditional attack strategy for real-world complex networks. Physica A: Statistical Mechanics and its Applications","author":"Nguyen Quang","year":"2019","unstructured":"Quang Nguyen, Hi-Duc Pham, David Cassi, and Michele Bellingeri. 2019. Conditional attack strategy for real-world complex networks. Physica A: Statistical Mechanics and its Applications , Vol. 530 (2019), 121561."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2208.01087"},{"key":"e_1_3_2_2_41_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems , Vol. 28 (2015)."},{"key":"e_1_3_2_2_42_1","unstructured":"Yao Rong Guanchu Wang Qizhang Feng Ninghao Liu Zirui Liu Enkelejda Kasneci and Xia Hu. 2023. Efficient GNN Explanation via Learning Removal-based Attribution. arxiv: 2306.05760 [cs.LG]"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Olga Russakovsky Jia Deng Hao Su Jonathan Krause Sanjeev Satheesh Sean Ma Zhiheng Huang Andrej Karpathy Aditya Khosla Michael Bernstein Alexander C. Berg and Li Fei-Fei. 2015. ImageNet Large Scale Visual Recognition Challenge. arxiv: 1409.0575 [cs.CV]","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v29i3.2157"},{"key":"e_1_3_2_2_45_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051315"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-022-01605-8"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511948"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482393"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-020-00117-1"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Li\u00f2 and Yoshua Bengio. 2017. Graph Attention Networks. https:\/\/doi.org\/10.48550\/ARXIV.1710.10903","DOI":"10.48550\/ARXIV.1710.10903"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Haoran Wang Yingtong Dou Canyu Chen Lichao Sun Philip S. Yu and Kai Shu. 2023. Attacking Fake News Detectors via Manipulating News Social Engagement. arxiv: 2302.07363 [cs.SI]","DOI":"10.1145\/3543507.3583868"},{"key":"e_1_3_2_2_55_1","volume-title":"Scalable Attack on Graph Data by Injecting Vicious Nodes. CoRR","author":"Wang Jihong","year":"2020","unstructured":"Jihong Wang, Minnan Luo, Fnu Suya, Jundong Li, Zijiang Yang, and Qinghua Zheng. 2020. Scalable Attack on Graph Data by Injecting Vicious Nodes. CoRR , Vol. abs\/2004.13825 (2020). showeprint[arXiv]2004.13825 https:\/\/arxiv.org\/abs\/2004.13825"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/112\/48002"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.156"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403275"},{"key":"e_1_3_2_2_59_1","volume-title":"Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR","author":"Xu Kaidi","year":"2019","unstructured":"Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, and Xue Lin. 2019. Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR , Vol. abs\/1906.04214 (2019). showeprint[arXiv]1906.04214 http:\/\/arxiv.org\/abs\/1906.04214"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","unstructured":"Dengcheng Yan Wenxin Xie and Yiwen Zhang. 2022. Betweenness Approximation for Hypernetwork Dismantling with Hypergraph Neural Network. https:\/\/doi.org\/10.48550\/ARXIV.2203.03958","DOI":"10.48550\/ARXIV.2203.03958"},{"key":"e_1_3_2_2_61_1","volume-title":"GNNExplainer: Generating Explanations for Graph Neural Networks. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Ying Zhitao","year":"2019","unstructured":"Zhitao Ying, Dylan Bourgeois, Jiaxuan You, Marinka Zitnik, and Jure Leskovec. 2019. GNNExplainer: Generating Explanations for Graph Neural Networks. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8--14, 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9 -Buc, Emily B. Fox, and Roman Garnett (Eds.). 9240--9251. https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/d80b7040b773199015de6d3b4293c8ff-Abstract.html"},{"key":"e_1_3_2_2_62_1","volume-title":"XGNN: Towards Model-Level Explanations of Graph Neural Networks. CoRR","author":"Yuan Hao","year":"2020","unstructured":"Hao Yuan, Jiliang Tang, Xia Hu, and Shuiwang Ji. 2020. XGNN: Towards Model-Level Explanations of Graph Neural Networks. CoRR , Vol. abs\/2006.02587 (2020). showeprint[arXiv]2006.02587 https:\/\/arxiv.org\/abs\/2006.02587"},{"key":"e_1_3_2_2_63_1","volume-title":"On Explainability of Graph Neural Networks via Subgraph Explorations. CoRR","author":"Yuan Hao","year":"2021","unstructured":"Hao Yuan, Haiyang Yu, Jie Wang, Kang Li, and Shuiwang Ji. 2021. On Explainability of Graph Neural Networks via Subgraph Explorations. CoRR , Vol. abs\/2102.05152 (2021). showeprint[arXiv]2102.05152 https:\/\/arxiv.org\/abs\/2102.05152"},{"key":"e_1_3_2_2_64_1","volume-title":"Network dynamic GCN influence maximization algorithm with leader fake labeling mechanism","author":"Zhang Cai","year":"2022","unstructured":"Cai Zhang, Weimin Li, Dingmei Wei, Yanxia Liu, and Zheng Li. 2022b. Network dynamic GCN influence maximization algorithm with leader fake labeling mechanism. IEEE Transactions on Computational Social Systems (2022)."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557290"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512179"},{"key":"e_1_3_2_2_67_1","volume-title":"Dimensional reweighting graph convolutional networks. arXiv preprint arXiv:1907.02237","author":"Zou Xu","year":"2019","unstructured":"Xu Zou, Qiuye Jia, Jianwei Zhang, Chang Zhou, Hongxia Yang, and Jie Tang. 2019. Dimensional reweighting graph convolutional networks. arXiv preprint arXiv:1907.02237 (2019)."},{"key":"e_1_3_2_2_68_1","volume-title":"TDGIA: Effective Injection Attacks on Graph Neural Networks. CoRR","author":"Zou Xu","year":"2021","unstructured":"Xu Zou, Qinkai Zheng, Yuxiao Dong, Xinyu Guan, Evgeny Kharlamov, Jialiang Lu, and Jie Tang. 2021. TDGIA: Effective Injection Attacks on Graph Neural Networks. CoRR , Vol. abs\/2106.06663 (2021). showeprint[arXiv]2106.06663 https:\/\/arxiv.org\/abs\/2106.06663"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394520"},{"key":"e_1_3_2_2_70_1","volume-title":"Adversarial Attacks on Graph Neural Networks via Meta Learning. CoRR","author":"Daniel Z\u00fc","year":"2019","unstructured":"Daniel Z\u00fc gner and Stephan G\u00fc nnemann. 2019. Adversarial Attacks on Graph Neural Networks via Meta Learning. CoRR , Vol. abs\/1902.08412 (2019). showeprint[arXiv]1902.08412 http:\/\/arxiv.org\/abs\/1902.08412"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3589334.3645389","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645389","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:29:34Z","timestamp":1755822574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":71,"alternative-id":["10.1145\/3589334.3645389","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645389","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}