{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:24:23Z","timestamp":1760081063909,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Technology Project of SGCC","award":["5108-202218280A-2- 395-XG"],"award-info":[{"award-number":["5108-202218280A-2- 395-XG"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709433","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:44:43Z","timestamp":1743792283000},"page":"2204-2215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Powerformer: A Section-adaptive Transformer for Power Flow Adjustment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2492-5230","authenticated-orcid":false,"given":"Kaixuan","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2984-3112","authenticated-orcid":false,"given":"Wei","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0584-9129","authenticated-orcid":false,"given":"Shunyu","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6210-3919","authenticated-orcid":false,"given":"Yaoquan","family":"Wei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2595-6743","authenticated-orcid":false,"given":"Yihe","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7376-9847","authenticated-orcid":false,"given":"Yunpeng","family":"Qing","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2978-4474","authenticated-orcid":false,"given":"Quan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7469-5018","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electronic Power Company, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3671-6521","authenticated-orcid":false,"given":"Jie","family":"Song","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2621-6048","authenticated-orcid":false,"given":"Mingli","family":"Song","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Patrick Panciatici, Daniel Kirschen, A Marano Marcolini, et al.","author":"Capitanescu Florin","year":"2011","unstructured":"Florin Capitanescu, JL Martinez Ramos, Patrick Panciatici, Daniel Kirschen, A Marano Marcolini, et al. 2011. State-of-the-art, challenges, and future trends in security constrained optimal power flow. Electric power systems research 81, 8 (2011), 1731--1741."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599388"},{"key":"e_1_3_2_1_3_1","first-page":"7898","article-title":"Distribution knowledge embedding for graph pooling","volume":"35","author":"Chen Kaixuan","year":"2022","unstructured":"Kaixuan Chen, Jie Song, Shunyu Liu, Na Yu, Zunlei Feng, Gengshi Han, and Mingli Song. 2022. Distribution knowledge embedding for graph pooling. IEEE Transactions on Knowledge and Data Engineering 35, 8 (2022), 7898--7908.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107463"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25867"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2021.3113084"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00265"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00868"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"1866","DOI":"10.1109\/TPAS.1968.292150","article-title":"Optimal power flow solutions","volume":"10","author":"Tinney Dommel","year":"1968","unstructured":"HermannWDommel and William F Tinney. 1968. Optimal power flow solutions. IEEE Transactions on power apparatus and systems 10 (1968), 1866--1876.","journal-title":"IEEE Transactions on power apparatus and systems"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.922647"},{"key":"e_1_3_2_1_11_1","first-page":"100111","article-title":"RecGuard: An efficient privacy preservation blockchain-based system for online social network users. Blockchain","volume":"4","author":"Frimpong Samuel Akwasi","year":"2023","unstructured":"Samuel Akwasi Frimpong, Mu Han, Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Isaac Hanson, Otu Larbi-Siaw, and Isaac Baffour Senkyire. 2023. RecGuard: An efficient privacy preservation blockchain-based system for online social network users. Blockchain: Research and Applications 4, 1 (2023), 100111.","journal-title":"Research and Applications"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120564"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44210-0_16"},{"key":"e_1_3_2_1_14_1","volume-title":"KA2ER: Knowledge Adaptive Amalgamation of ExpeRts for Medical Images Segmentation. arXiv preprint arXiv:2410.21085","author":"Gao Shangde","year":"2024","unstructured":"Shangde Gao, Yichao Fu, Ke Liu, Hongxia Xu, and Jian Wu. 2024. KA2ER: Knowledge Adaptive Amalgamation of ExpeRts for Medical Images Segmentation. arXiv preprint arXiv:2410.21085 (2024)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2023.3288039"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.118007"},{"key":"e_1_3_2_1_18_1","volume-title":"RTE snapshots, and PEGASE. arXiv preprint arXiv:1603.01533","author":"Josz C\u00e9dric","year":"2016","unstructured":"C\u00e9dric Josz, St\u00e9phane Fliscounakis, Jean Maeght, and Patrick Panciatici. 2016. AC power flow data in MATPOWER and QCQP format: iTesla, RTE snapshots, and PEGASE. arXiv preprint arXiv:1603.01533 (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"Deep learning. nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2021.3070161"},{"key":"e_1_3_2_1_21_1","unstructured":"Wenda Li Kaixuan Chen Shunyu Liu Wenjie Huang Haofei Zhang et al. 2023. Message-passing selection: Towards interpretable GNNs for graph classification. In Tiny Track @ International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2388777"},{"key":"e_1_3_2_1_23_1","unstructured":"Shunyu Liu Wei Luo Yanzhen Zhou Kaixuan Chen Quan Zhang et al. 2023. Transmission Interface Power Flow Adjustment: A Deep Reinforcement Learning Approach Based on Multi-Task Attribution Map. IEEE Transactions on Power System (2023)."},{"key":"e_1_3_2_1_24_1","unstructured":"Erxue Min Runfa Chen Yatao Bian Tingyang Xu Kangfei Zhao et al. 2022. Transformer for graphs: An overview from architecture perspective. arXiv preprint arXiv:2202.08455 (2022)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.876690"},{"key":"e_1_3_2_1_26_1","volume-title":"Asynchronous Methods for Deep Reinforcement Learning. In International Conference on Machine Learning (ICML). 1928--1937","author":"Mnih Volodymyr","year":"2016","unstructured":"Volodymyr Mnih, Adri\u00e0 Puigdom\u00e8nech Badia, Mehdi Mirza, Alex Graves, Timothy P. Lillicrap, et al. 2016. Asynchronous Methods for Deep Reinforcement Learning. In International Conference on Machine Learning (ICML). 1928--1937."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A. Rusu Joel Veness et al. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 (2015) 529--533.","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3298807"},{"key":"e_1_3_2_1_29_1","volume-title":"The Thirty-eighth Annual Conference on Neural Information Processing Systems.","author":"Qing Yunpeng","year":"2024","unstructured":"Yunpeng Qing, Shunyu Liu, Jingyuan Cong, Kaixuan Chen, Yihe Zhou, and Mingli Song. 2024. A2PO: Towards Effective Offline Reinforcement Learning from an Advantage-aware Perspective. In The Thirty-eighth Annual Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_1_30_1","volume-title":"Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)."},{"key":"e_1_3_2_1_31_1","volume-title":"Sceneaware Foveated Neural Radiance Fields","author":"Shi Xuehuai","year":"2024","unstructured":"Xuehuai Shi, Lili Wang, Xinda Liu, Jian Wu, and Zhiwen Shao. 2024. Sceneaware Foveated Neural Radiance Fields. IEEE Transactions on Visualization and Computer Graphics (2024)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3106488"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3203089"},{"key":"e_1_3_2_1_34_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit and Llion aand others Jones. 2017. Attention is all you need. In Neural Information Processing Systems (NeurIPS). 6000--6010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539480"},{"key":"e_1_3_2_1_36_1","volume-title":"Dueling Network Architectures for Deep Reinforcement Learning. In International Conference on Machine Learning (ICML). 1995--2003","author":"Wang Ziyu","year":"2016","unstructured":"Ziyu Wang, Tom Schaul, Matteo Hessel, Hado Hasselt, Marc Lanctot, et al. 2016. Dueling Network Architectures for Deep Reinforcement Learning. In International Conference on Machine Learning (ICML). 1995--2003."},{"key":"e_1_3_2_1_37_1","unstructured":"Yaoquan Wei Shunyu Liu Jie Song Tongya Zheng Kaixuan Chen et al. 2023. Agent-Aware Training for Agent-Agnostic Action Advising in Deep Reinforcement Learning. arXiv preprint arXiv:2311.16807 (2023)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2023.3326121"},{"key":"e_1_3_2_1_39_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu,Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_40_1","first-page":"28798","article-title":"Graphformers: Gnn-nested transformers for representation learning on textual graph","volume":"34","author":"Yang Junhan","year":"2021","unstructured":"Junhan Yang, Zheng Liu, Shitao Xiao, Chaozhuo Li, Defu Lian, et al. 2021. Graphformers: Gnn-nested transformers for representation learning on textual graph. Advances in Neural Information Processing Systems 34 (2021), 28798--28810.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2951769"},{"key":"e_1_3_2_1_42_1","unstructured":"Chengxuan Ying Tianle Cai Shengjie Luo Shuxin Zheng Guolin Ke et al. 2021. Do transformers really perform badly for graph representation? Advances in neural information processing systems 34 (2021) 28877--28888."},{"key":"e_1_3_2_1_43_1","volume-title":"Multi-Channel Graph Fusion Representation for Tabular Data Imputation. In 2024 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8.","author":"Yu Na","year":"2024","unstructured":"Na Yu, Ke Xu, Kaixuan Chen, Shunyu Liu, Tongya Zheng, and Mingli Song. 2024. Multi-Channel Graph Fusion Representation for Tabular Data Imputation. In 2024 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8."},{"key":"e_1_3_2_1_44_1","volume-title":"Graph transformer networks. Advances in neural information processing systems 32","author":"Yun Seongjun","year":"2019","unstructured":"Seongjun Yun, Minbyul Jeong, Raehyun Kim, Jaewoo Kang, and Hyunwoo J Kim. 2019. Graph transformer networks. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwx105"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599261"},{"key":"e_1_3_2_1_47_1","volume-title":"International Conference on Machine Learning. PMLR, 43005--43036","author":"Zhu Tongtian","year":"2023","unstructured":"Tongtian Zhu, Fengxiang He, Kaixuan Chen, Mingli Song, and Dacheng Tao. 2023. Decentralized SGD and average-direction SAM are asymptotically equivalent. In International Conference on Machine Learning. PMLR, 43005--43036."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:44:32Z","timestamp":1755359072000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":47,"alternative-id":["10.1145\/3690624.3709433","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709433","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}