{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T23:43:33Z","timestamp":1772667813022,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Science and Technology Program","award":["20240806132029001"],"award-info":[{"award-number":["20240806132029001"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100004052","name":"King Abdullah University of Science and Technology","doi-asserted-by":"publisher","award":["REI\/1\/4811-10-01"],"award-info":[{"award-number":["REI\/1\/4811-10-01"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100004052","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Department of Education","award":["2024KTSCX060"],"award-info":[{"award-number":["2024KTSCX060"]}]},{"name":"Tencent ?Rhinoceros Birds?-Scientific Research Foundation for Young Teachers of Shenzhen University, base line funding","award":["China BAS\/1\/1689-01-01"],"award-info":[{"award-number":["China BAS\/1\/1689-01-01"]}]},{"name":"the CRG grand from CBRC, China","award":["URF\/1\/4663-01-01, FCC\/1\/1976-49-01"],"award-info":[{"award-number":["URF\/1\/4663-01-01, FCC\/1\/1976-49-01"]}]},{"name":"Stable Support Project of Shenzhen","award":["20231120161634002"],"award-info":[{"award-number":["20231120161634002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714631","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:47:11Z","timestamp":1745362031000},"page":"2476-2487","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["LUSTER: Link Prediction Utilizing Shared-Latent Space Representation in Multi-Layer Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-8862-8664","authenticated-orcid":false,"given":"Ruohan","family":"Yang","sequence":"first","affiliation":[{"name":"Engineering Research Center of Intelligent Technology for Agriculture, Huazhong Agricultural University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9365-4817","authenticated-orcid":false,"given":"Muhammad Asif","family":"Ali","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3162-2350","authenticated-orcid":false,"given":"Huan","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong Agricultural University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1139-8654","authenticated-orcid":false,"given":"Junyang","family":"Chen","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-0243","authenticated-orcid":false,"given":"Di","family":"Wang","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Amirheckmat Taghizadeh, Naser Yazdani, Masoud Asadpour, and Maseud Rahgozar.","author":"Abdolhosseini-Qomi Amir Mahdi","year":"2020","unstructured":"Amir Mahdi Abdolhosseini-Qomi, Seyed Hossein Jafari, Amirheckmat Taghizadeh, Naser Yazdani, Masoud Asadpour, and Maseud Rahgozar. 2020. Link prediction in real-world multiplex networks via layer reconstruction method. Royal Society open science, Vol. 7, 7 (2020), 191928."},{"key":"e_1_3_2_1_2_1","volume-title":"Friends and neighbors on the web. Social networks","author":"Adamic Lada A","year":"2003","unstructured":"Lada A Adamic and Eytan Adar. 2003. Friends and neighbors on the web. Social networks, Vol. 25, 3 (2003), 211--230."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747759"},{"key":"e_1_3_2_1_4_1","volume-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6","author":"Akcay Samet","year":"2019","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6, 2018, Revised Selected Papers, Part III 14. Springer, 622--637."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.arabicnlp-1.16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.756"},{"key":"e_1_3_2_1_8_1","first-page":"1462","article-title":"Antonym vs Synonym Distinction using InterlaCed Encoder NETworks (ICE-NET)","volume":"2024","author":"Ali Muhammad","year":"2024","unstructured":"Muhammad Ali, Yan Hu, Jianbin Qin, and Di Wang. 2024. Antonym vs Synonym Distinction using InterlaCed Encoder NETworks (ICE-NET). In Findings of the Association for Computational Linguistics: EACL 2024. 1462--1473.","journal-title":"Findings of the Association for Computational Linguistics: EACL"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6234"},{"key":"e_1_3_2_1_10_1","volume-title":"FGNET-RH: Fine-Grained Named Entity Typing via Refinement in Hyperbolic Space. arXiv preprint arXiv:2101.11212","author":"Ali Muhammad Asif","year":"2021","unstructured":"Muhammad Asif Ali, Yifang Sun, Bing Li, and Wei Wang. 2021. FGNET-RH: Fine-Grained Named Entity Typing via Refinement in Hyperbolic Space. arXiv preprint arXiv:2101.11212 (2021)."},{"key":"e_1_3_2_1_11_1","volume-title":"Chee Keong Kwoh, and Xiaoli Li","author":"Ata Sezin Kircali","year":"2021","unstructured":"Sezin Kircali Ata, Yuan Fang, Min Wu, Jiaqi Shi, Chee Keong Kwoh, and Xiaoli Li. 2021. Multi-view collaborative network embedding. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 15, 3 (2021), 1--18."},{"key":"e_1_3_2_1_12_1","volume-title":"Learning on attribute-missing graphs","author":"Chen Xu","year":"2020","unstructured":"Xu Chen, Siheng Chen, Jiangchao Yao, Huangjie Zheng, Ya Zhang, and Ivor W Tsang. 2020. Learning on attribute-missing graphs. IEEE transactions on pattern analysis and machine intelligence, Vol. 44, 2 (2020), 740--757."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18047"},{"key":"e_1_3_2_1_14_1","volume-title":"Characterization of complex networks: A survey of measurements. Advances in physics","author":"Costa L","year":"2007","unstructured":"L da F Costa, Francisco A Rodrigues, Gonzalo Travieso, and Paulino Ribeiro Villas Boas. 2007. Characterization of complex networks: A survey of measurements. Advances in physics, Vol. 56, 1 (2007), 167--242."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-023-02132-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1318469111"},{"key":"e_1_3_2_1_17_1","volume-title":"Multilayer social networks","author":"Dickison Mark E","unstructured":"Mark E Dickison, Matteo Magnani, and Luca Rossi. 2016. Multilayer social networks. Cambridge University Press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01458"},{"key":"e_1_3_2_1_19_1","volume-title":"International conference on machine learning. PMLR, 1180--1189","author":"Ganin Yaroslav","year":"2015","unstructured":"Yaroslav Ganin and Victor Lempitsky. 2015. Unsupervised domain adaptation by backpropagation. In International conference on machine learning. PMLR, 1180--1189."},{"key":"e_1_3_2_1_20_1","volume-title":"Domain-adversarial training of neural networks. The journal of machine learning research","author":"Ganin Yaroslav","year":"2016","unstructured":"Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\u00e7ois Laviolette, Mario Marchand, and Victor Lempitsky. 2016. Domain-adversarial training of neural networks. The journal of machine learning research, Vol. 17, 1 (2016), 2096--2030."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00106"},{"key":"e_1_3_2_1_23_1","volume-title":"Faithful Interpretation for Graph Neural Networks. arXiv preprint arXiv:2410.06950","author":"Hu Lijie","year":"2024","unstructured":"Lijie Hu, Tianhao Huang, Lu Yu, Wanyu Lin, Tianhang Zheng, and Di Wang. 2024. Faithful Interpretation for Graph Neural Networks. arXiv preprint arXiv:2410.06950 (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-017-0525-y"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.160863"},{"key":"e_1_3_2_1_26_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_27_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_28_1","volume-title":"Kuldeep Singh, and Bhaskar Biswas.","author":"Kumar Ajay","year":"2020","unstructured":"Ajay Kumar, Shashank Sheshar Singh, Kuldeep Singh, and Bhaskar Biswas. 2020. Link prediction techniques, applications, and performance: A survey. Physica A: Statistical Mechanics and its Applications, Vol. 553 (2020), 124289."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186141"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3234553"},{"key":"e_1_3_2_1_31_1","volume-title":"Complex network topology of transportation systems. Transport reviews","author":"Lin Jingyi","year":"2013","unstructured":"Jingyi Lin and Yifang Ban. 2013. Complex network topology of transportation systems. Transport reviews, Vol. 33, 6 (2013), 658--685."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106904"},{"key":"e_1_3_2_1_33_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_34_1","volume-title":"Combinatorial analysis of multiple networks. arXiv preprint arXiv:1303.4986","author":"Magnani Matteo","year":"2013","unstructured":"Matteo Magnani, Barbora Micenkova, and Luca Rossi. 2013. Combinatorial analysis of multiple networks. arXiv preprint arXiv:1303.4986 (2013)."},{"key":"e_1_3_2_1_35_1","volume-title":"Multilayer link prediction in online social networks. In 2018 26th telecommunications forum (TELFOR)","author":"Mandal Haris","unstructured":"Haris Mandal, Miroslav Mirchev, Sasho Gramatikov, and Igor Mishkovski. 2018. Multilayer link prediction in online social networks. In 2018 26th telecommunications forum (TELFOR). IEEE, 1--4."},{"key":"e_1_3_2_1_36_1","volume-title":"A survey of link prediction in complex networks. ACM computing surveys (CSUR)","author":"Mart\u00ednez V\u00edctor","year":"2016","unstructured":"V\u00edctor Mart\u00ednez, Fernando Berzal, and Juan-Carlos Cubero. 2016. A survey of link prediction in complex networks. ACM computing surveys (CSUR), Vol. 49, 4 (2016), 1--33."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2022.101606"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03733-8"},{"key":"e_1_3_2_1_39_1","volume-title":"Link prediction in multiplex networks based on interlayer similarity. Physica A: Statistical Mechanics and its Applications","author":"Najari Shaghayegh","year":"2019","unstructured":"Shaghayegh Najari, Mostafa Salehi, Vahid Ranjbar, and Mahdi Jalili. 2019. Link prediction in multiplex networks based on interlayer similarity. Physica A: Statistical Mechanics and its Applications, Vol. 536 (2019), 120978."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955637"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646447"},{"key":"e_1_3_2_1_42_1","volume-title":"Early stopping-but when? In Neural Networks: Tricks of the trade","author":"Prechelt Lutz","unstructured":"Lutz Prechelt. 2002. Early stopping-but when? In Neural Networks: Tricks of the trade. Springer, 55--69."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.726"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5993"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.12.003"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106168"},{"key":"e_1_3_2_1_47_1","volume-title":"Exploring complex networks. nature","author":"Strogatz Steven H","year":"2001","unstructured":"Steven H Strogatz. 2001. Exploring complex networks. nature, Vol. 410, 6825 (2001), 268--276."},{"key":"e_1_3_2_1_48_1","unstructured":"Pang-Ning Tan Michael Steinbach and Vipin Kumar. 2016. Introduction to data mining. Pearson Education India."},{"key":"e_1_3_2_1_49_1","volume-title":"Construction and Characteristic Analysis of Two-Layer Complex Network Model. In International Conference on Image, Vision and Intelligent Systems. Springer, 619--634","author":"Tang Chunyang","year":"2023","unstructured":"Chunyang Tang, Zhonglin Ye, Haixing Zhao, Yuzhi Xiao, and Libing Bai. 2023. Construction and Characteristic Analysis of Two-Layer Complex Network Model. In International Conference on Image, Vision and Intelligent Systems. Springer, 619--634."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124382"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102405"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.2874-10.2010"},{"key":"e_1_3_2_1_53_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_54_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Cheng-Long","year":"2023","unstructured":"Cheng-Long Wang, Mengdi Huai, and Di Wang. 2023b. Inductive graph unlearning. In 32nd USENIX Security Symposium (USENIX Security 23). 3205--3222."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3233481"},{"key":"e_1_3_2_1_56_1","volume-title":"TDAN: transferable domain adversarial network for link prediction in heterogeneous social networks. ACM Transactions on Knowledge Discovery from Data","author":"Wang Huan","year":"2023","unstructured":"Huan Wang, Guoquan Liu, and Po Hu. 2023c. TDAN: transferable domain adversarial network for link prediction in heterogeneous social networks. ACM Transactions on Knowledge Discovery from Data, Vol. 18, 1 (2023), 1--22."},{"key":"e_1_3_2_1_57_1","volume-title":"2023 d. Resisting the edge-type disturbance for link prediction in heterogeneous networks. ACM Transactions on Knowledge Discovery from Data","author":"Wang Huan","year":"2023","unstructured":"Huan Wang, Ruigang Liu, Chuanqi Shi, Junyang Chen, Lei Fang, Shun Liu, and Zhiguo Gong. 2023 d. Resisting the edge-type disturbance for link prediction in heterogeneous networks. ACM Transactions on Knowledge Discovery from Data, Vol. 18, 2 (2023), 1--24."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103418"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5451"},{"key":"e_1_3_2_1_61_1","volume-title":"Link prediction on complex networks: an experimental survey. Data science and engineering","author":"Wu Haixia","year":"2022","unstructured":"Haixia Wu, Chunyao Song, Yao Ge, and Tingjian Ge. 2022. Link prediction on complex networks: an experimental survey. Data science and engineering, Vol. 7, 3 (2022), 253--278."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000537"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3379752"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183117501017"},{"key":"e_1_3_2_1_65_1","volume-title":"Link prediction based on graph neural networks. Advances in neural information processing systems","author":"Zhang Muhan","year":"2018","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. Advances in neural information processing systems, Vol. 31 (2018)."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:56Z","timestamp":1750295936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":65,"alternative-id":["10.1145\/3696410.3714631","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714631","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}