{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T23:49:57Z","timestamp":1720396197520},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472161","61572226","61373053","61571444, 61876069"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Guangdong Natural Science Foundation","doi-asserted-by":"publisher","award":["2018A030313339","2016A030310072"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1016\/j.neucom.2018.08.072","type":"journal-article","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T15:58:17Z","timestamp":1536076697000},"page":"42-54","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":24,"special_numbering":"C","title":["Learning node and edge embeddings for signed networks"],"prefix":"10.1016","volume":"319","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1607-3402","authenticated-orcid":false,"given":"Wenzhuo","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8503-8061","authenticated-orcid":false,"given":"Shengsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"You","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xuehua","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xueyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2018.08.072_bib0001","series-title":"Networks: An Introduction","author":"Newman","year":"2010"},{"key":"10.1016\/j.neucom.2018.08.072_bib0002","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","article-title":"Graph embedding techniques, applications, and performance: a survey","volume":"151","author":"Goyal","year":"2018","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.neucom.2018.08.072_bib0003","first-page":"115","article-title":"Node classification in social networks","author":"Bhagat","year":"2011"},{"issue":"7","key":"10.1016\/j.neucom.2018.08.072_bib0004","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1002\/asi.20591","article-title":"The link-prediction problem for social networks","volume":"58","author":"Liben-Nowell","year":"2007","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"10.1016\/j.neucom.2018.08.072_bib0005","series-title":"Proceedings of the IEEE International Conference on Data Mining","first-page":"107","article-title":"A min-max cut algorithm for graph partitioning and data clustering","author":"Ding","year":"2001"},{"key":"10.1016\/j.neucom.2018.08.072_bib0006","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.neucom.2018.08.072_bib0007","series-title":"Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence","first-page":"3894","article-title":"Fast network embedding enhancement via high order proximity approximation.","author":"Yang","year":"2017"},{"key":"10.1016\/j.neucom.2018.08.072_bib0008","series-title":"Proceedings of the 24th International Conference on Artificial Intelligence","first-page":"2111","article-title":"Network representation learning with rich text information","author":"Yang","year":"2015"},{"key":"10.1016\/j.neucom.2018.08.072_bib0009","series-title":"Proceedings of the 17th SIAM International Conference on Data Mining, SDM","first-page":"327","article-title":"Signed network embedding in social media.","author":"Wang","year":"2017"},{"issue":"3","key":"10.1016\/j.neucom.2018.08.072_bib0010","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/2956185","article-title":"A survey of signed network mining in social media","volume":"49","author":"Tang","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.neucom.2018.08.072_bib0011","series-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"1361","article-title":"Signed networks in social media","author":"Leskovec","year":"2010"},{"key":"10.1016\/j.neucom.2018.08.072_bib0012","series-title":"Proceedings of the 25th ACM Conference on Hypertext and Social Media","first-page":"148","article-title":"Is distrust the negation of trust? The value of distrust in social media","author":"Tang","year":"2014"},{"key":"10.1016\/j.neucom.2018.08.072_bib0013","series-title":"Proceedings of the 19th International Conference on World wide web","first-page":"641","article-title":"Predicting positive and negative links in online social networks","author":"Leskovec","year":"2010"},{"issue":"1","key":"10.1016\/j.neucom.2018.08.072_bib0014","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MIS.2011.22","article-title":"Trust and distrust-based recommendations for controversial reviews","volume":"26","author":"Victor","year":"2011","journal-title":"IEEE Intell. Syst."},{"key":"10.1016\/j.neucom.2018.08.072_bib0015","series-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"183","article-title":"SNE: Signed network embedding","author":"Yuan","year":"2017"},{"issue":"2","key":"10.1016\/j.neucom.2018.08.072_bib0016","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/s00224-014-9558-4","article-title":"Sitting closer to friends than enemies, revisited","volume":"56","author":"Cygan","year":"2015","journal-title":"Theory Comput. Syst. Math. Syst. Theory"},{"key":"10.1016\/j.neucom.2018.08.072_bib0017","series-title":"Proceedings of the Advances in Neural Information Processing Systems 21","first-page":"1081","article-title":"A scalable hierarchical distributed language model","author":"Mnih","year":"2009"},{"key":"10.1016\/j.neucom.2018.08.072_bib0018","series-title":"Proceedings of the ACM on Conference on Information and Knowledge Management","first-page":"137","article-title":"Attributed signed network embedding","author":"Wang","year":"2017"},{"key":"10.1016\/j.neucom.2018.08.072_bib0019","series-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"777","article-title":"Unsupervised feature selection in signed social networks","author":"Cheng","year":"2017"},{"issue":"5","key":"10.1016\/j.neucom.2018.08.072_bib0020","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1007\/s10796-014-9483-8","article-title":"Social balance in signed networks","volume":"17","author":"Zheng","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"10.1016\/j.neucom.2018.08.072_bib0021","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"855","article-title":"node2vec: scalable feature learning for networks","author":"Grover","year":"2016"},{"key":"10.1016\/j.neucom.2018.08.072_bib0022","series-title":"Proceedings of the 24th International Conference on World Wide Web","first-page":"1067","article-title":"Line: Large-scale information network embedding","author":"Tang","year":"2015"},{"issue":"1","key":"10.1016\/j.neucom.2018.08.072_bib0023","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TASL.2011.2134090","article-title":"Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition","volume":"20","author":"Dahl","year":"2012","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"10.1016\/j.neucom.2018.08.072_bib0024","series-title":"Proceedings of the International Conference on Neural Information Processing Systems","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"Krizhevsky","year":"2012"},{"issue":"2","key":"10.1016\/j.neucom.2018.08.072_bib0025","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TII.2016.2605629","article-title":"Object-level video advertising: an optimization framework","volume":"13","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.neucom.2018.08.072_bib0026","series-title":"Proceedings of the International Conference on Neural Information Processing Systems","first-page":"2222","article-title":"Multimodal learning with deep Boltzmann machines","author":"Srivastava","year":"2012"},{"issue":"2","key":"10.1016\/j.neucom.2018.08.072_bib0027","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/TII.2016.2601521","article-title":"Understanding subtitles by character-level sequence-to-sequence learning","volume":"13","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.neucom.2018.08.072_bib0028","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1225","article-title":"Structural deep network embedding","author":"Wang","year":"2016"},{"key":"10.1016\/j.neucom.2018.08.072_bib0029","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11872","article-title":"GraphGAN: graph representation learning with generative adversarial nets","author":"Wang","year":"2018"},{"key":"10.1016\/j.neucom.2018.08.072_bib0030","series-title":"Proceedings of the Advances in Neural Information Processing Systems","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014"},{"key":"10.1016\/j.neucom.2018.08.072_bib0031","series-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"701","article-title":"Deepwalk: online learning of social representations","author":"Perozzi","year":"2014"},{"key":"10.1016\/j.neucom.2018.08.072_bib0032","unstructured":"Q. Wang, Z. Wang, X. Ye, Equivalence between LINE and Matrix Factorization, arXiv preprint (2017) 1\u20135. arXiv:1707.05926v1."},{"key":"10.1016\/j.neucom.2018.08.072_bib0033","series-title":"Proceedings of the Advances in Neural Information Processing Systems 27","first-page":"2177","article-title":"Neural word embedding as implicit matrix factorization","author":"Levy","year":"2014"},{"key":"10.1016\/j.neucom.2018.08.072_bib0034","first-page":"1","article-title":"Exploring strategies for training deep neural networks","volume":"10","author":"Larochelle","year":"2009","journal-title":"J. Mach. Learn. Res."},{"issue":"0","key":"10.1016\/j.neucom.2018.08.072_bib0035","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1162\/tacl_a_00184","article-title":"Exploiting social network structure for person-to-person sentiment analysis","volume":"2","author":"West","year":"2014","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"10.1016\/j.neucom.2018.08.072_bib0036","series-title":"Proceedings of the SIAM International Conference on Data Mining","first-page":"559","article-title":"Spectral analysis of signed graphs for clustering, prediction and visualization.","author":"Kunegis","year":"2010"},{"issue":"7","key":"10.1016\/j.neucom.2018.08.072_bib0037","first-page":"257","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"10.1016\/j.neucom.2018.08.072_bib0038","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TSMCB.2011.2167751","article-title":"Characterizing and extracting multiplex patterns in complex networks","volume":"42","author":"Yang","year":"2012","journal-title":"Syst. Man Cybern."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S092523121831035X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S092523121831035X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T16:41:52Z","timestamp":1656866512000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S092523121831035X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":38,"alternative-id":["S092523121831035X"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2018.08.072","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Learning node and edge embeddings for signed networks","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2018.08.072","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}