skip to main content
Bibliometrics
Skip Table Of Content Section
research-article
EffCause: Discover Dynamic Causal Relationships Efficiently from Time-Series
Article No.: 105, Pages 1–21https://doi.org/10.1145/3640818

Since the proposal of Granger causality, many researchers have followed the idea and developed extensions to the original algorithm. The classic Granger causality test aims to detect the existence of the static causal relationship. Notably, a fundamental ...

research-article
Asymmetric Learning for Graph Neural Network based Link Prediction
Article No.: 106, Pages 1–18https://doi.org/10.1145/3640347

Link prediction is a fundamental problem in many graph-based applications, such as protein-protein interaction prediction. Recently, graph neural network (GNN) has been widely used for link prediction. However, existing GNN-based link prediction (GNN-LP) ...

research-article
Multi-Task Learning with Sequential Dependence Toward Industrial Applications: A Systematic Formulation
Article No.: 107, Pages 1–29https://doi.org/10.1145/3640468

Multi-task learning (MTL) is widely used in the online recommendation and financial services for multi-step conversion estimation, but current works often overlook the sequential dependence among tasks. In particular, sequential dependence multi-task ...

research-article
Package Arrival Time Prediction via Knowledge Distillation Graph Neural Network
Article No.: 108, Pages 1–19https://doi.org/10.1145/3643033

Accurately estimating packages’ arrival time in e-commerce can enhance users’ shopping experience and improve the placement rate of products. This problem is often formalized as an Origin-Destination (OD)-based ETA (i.e., estimated time of arrival) ...

research-article
Correlation-aware Graph Data Augmentation with Implicit and Explicit Neighbors
Article No.: 109, Pages 1–23https://doi.org/10.1145/3638057

In recent years, there has been a significant surge in commercial demand for citation graph-based tasks, such as patent analysis, social network analysis, and recommendation systems. Graph Neural Networks (GNNs) are widely used for these tasks due to ...

research-article
Attacking Click-through Rate Predictors via Generating Realistic Fake Samples
Article No.: 110, Pages 1–24https://doi.org/10.1145/3643685

How to construct imperceptible (realistic) fake samples is critical in adversarial attacks. Due to the sample feature diversity of a recommender system (containing both discrete and continuous features), traditional gradient-based adversarial attack ...

research-article
FiFrauD: Unsupervised Financial Fraud Detection in Dynamic Graph Streams
Article No.: 111, Pages 1–29https://doi.org/10.1145/3641857

Given a stream of financial transactions between traders in an e-market, how can we accurately detect fraudulent traders and suspicious behaviors in real time? Despite the efforts made in detecting these fraudsters, this field still faces serious ...

research-article
Prerequisite-Enhanced Category-Aware Graph Neural Networks for Course Recommendation
Article No.: 112, Pages 1–21https://doi.org/10.1145/3643644

The rapid development of Massive Open Online Courses (MOOCs) platforms has created an urgent need for an efficient personalized course recommender system that can assist learners of all backgrounds and levels of knowledge in selecting appropriate courses. ...

research-article
Open Access
Domain Generalization in Time Series Forecasting
Article No.: 113, Pages 1–24https://doi.org/10.1145/3643035

Domain generalization aims to design models that can effectively generalize to unseen target domains by learning from observed source domains. Domain generalization poses a significant challenge for time series data, due to varying data distributions and ...

research-article
TaSPM: Targeted Sequential Pattern Mining
Article No.: 114, Pages 1–18https://doi.org/10.1145/3639827

Sequential pattern mining (SPM) is an important technique in the field of pattern mining, which has many applications in reality. Although many efficient SPM algorithms have been proposed, there are few studies that can focus on targeted tasks. Targeted ...

research-article
Networked Time-series Prediction with Incomplete Data via Generative Adversarial Network
Article No.: 115, Pages 1–25https://doi.org/10.1145/3643822

A networked time series (NETS) is a family of time series on a given graph, one for each node. It has a wide range of applications from intelligent transportation to environment monitoring to smart grid management. An important task in such applications ...

research-article
CoBjeason: Reasoning Covered Object in Image by Multi-Agent Collaboration Based on Informed Knowledge Graph
Article No.: 116, Pages 1–56https://doi.org/10.1145/3643565

Object detection is a widely studied problem in existing works. However, in this paper, we turn to a more challenging problem of “Covered Object Reasoning”, aimed at reasoning the category label of target object in the given image particularly when it has ...

note
Open Access
X-distribution: Retraceable Power-law Exponent of Complex Networks
Article No.: 117, Pages 1–12https://doi.org/10.1145/3639413

Network modeling has been explored extensively by means of theoretical analysis as well as numerical simulations for Network Reconstruction (NR). The network reconstruction problem requires the estimation of the power-law exponent (γ) of a given input ...

note
Supervised Clustering of Persian Handwritten Images Using Regularization and Dimension Reduction Methods
Article No.: 118, Pages 1–19https://doi.org/10.1145/3638060

Clustering, as a fundamental exploratory data technique, not only is used to discover patterns and structures in complex datasets but also is utilized to group variables in high-dimensional data analysis. Dimension reduction through clustering helps ...

tutorial
Open Access
Graph Time-series Modeling in Deep Learning: A Survey
Article No.: 119, Pages 1–35https://doi.org/10.1145/3638534

Time-series and graphs have been extensively studied for their ubiquitous existence in numerous domains. Both topics have been separately explored in the field of deep learning. For time-series modeling, recurrent neural networks or convolutional neural ...

tutorial
Open Access
A Survey on AutoML Methods and Systems for Clustering
Article No.: 120, Pages 1–30https://doi.org/10.1145/3643564

Automated Machine Learning (AutoML) aims to identify the best-performing machine learning algorithm along with its input parameters for a given dataset and a specific machine learning task. This is a challenging problem, as the process of finding the best ...

research-article
X-FSPMiner: A Novel Algorithm for Frequent Similar Pattern Mining
Article No.: 121, Pages 1–26https://doi.org/10.1145/3643820

Frequent similar pattern mining (FSP mining) allows for finding frequent patterns hidden from the classical approach. However, the use of similarity functions implies more computational effort, necessitating the development of more efficient algorithms ...

research-article
Multi-Instance Learning with One Side Label Noise
Article No.: 122, Pages 1–24https://doi.org/10.1145/3644076

Multi-instance Learning (MIL) is a popular learning paradigm arising from many real applications. It assigns a label to a set of instances, which is called a bag, and the bag’s label is determined by the instances within it. A bag is positive if and only ...

research-article
Math Word Problem Generation via Disentangled Memory Retrieval
Article No.: 123, Pages 1–21https://doi.org/10.1145/3639569

The task of math word problem (MWP) generation, which generates an MWP given an equation and relevant topic words, has increasingly attracted researchers’ attention. In this work, we introduce a simple memory retrieval module to search related training ...

research-article
On the Value of Head Labels in Multi-Label Text Classification
Article No.: 124, Pages 1–21https://doi.org/10.1145/3643853

A formidable challenge in the multi-label text classification (MLTC) context is that the labels often exhibit a long-tailed distribution, which typically prevents deep MLTC models from obtaining satisfactory performance. To alleviate this problem, most ...

research-article
Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network Approach
Article No.: 125, Pages 1–21https://doi.org/10.1145/3643821

With increasing frequency of high-profile privacy breaches in various online platforms, users are becoming more concerned about their privacy. And recommender system is the core component of online platforms for providing personalized service, ...

research-article
Local Community Detection in Multiple Private Networks
Article No.: 126, Pages 1–21https://doi.org/10.1145/3644078

Individuals are often involved in multiple online social networks. Considering that owners of these networks are unwilling to share their networks, some global algorithms combine information from multiple networks to detect all communities in multiple ...

research-article
Enhancing Out-of-distribution Generalization on Graphs via Causal Attention Learning
Article No.: 127, Pages 1–24https://doi.org/10.1145/3644392

In graph classification, attention- and pooling-based graph neural networks (GNNs) predominate to extract salient features from the input graph and support the prediction. They mostly follow the paradigm of “learning to attend,” which maximizes the mutual ...

research-article
Incorporating Multi-Level Sampling with Adaptive Aggregation for Inductive Knowledge Graph Completion
Article No.: 128, Pages 1–16https://doi.org/10.1145/3644822

In recent years, Graph Neural Networks (GNNs) have achieved unprecedented success in handling graph-structured data, thereby driving the development of numerous GNN-oriented techniques for inductive knowledge graph completion (KGC). A key limitation of ...

research-article
A Taxonomy for Learning with Perturbation and Algorithms
Article No.: 129, Pages 1–38https://doi.org/10.1145/3644391

Weighting strategy prevails in machine learning. For example, a common approach in robust machine learning is to exert low weights on samples which are likely to be noisy or quite hard. This study summarizes another less-explored strategy, namely, ...

research-article
Generation-based Multi-view Contrast for Self-supervised Graph Representation Learning
Article No.: 130, Pages 1–17https://doi.org/10.1145/3645095

Graph contrastive learning has made remarkable achievements in the self-supervised representation learning of graph-structured data. By employing perturbation function (i.e., perturbation on the nodes or edges of graph), most graph contrastive learning ...

research-article
Mining Top-k High On-shelf Utility Itemsets Using Novel Threshold Raising Strategies
Article No.: 131, Pages 1–23https://doi.org/10.1145/3645115

High utility itemsets (HUIs) mining is an emerging area of data mining which discovers sets of items generating a high profit from transactional datasets. In recent years, several algorithms have been proposed for this task. However, most of them do not ...

research-article
Conditional Generative Adversarial Network for Early Classification of Longitudinal Datasets Using an Imputation Approach
Article No.: 132, Pages 1–25https://doi.org/10.1145/3644821

Early classification of longitudinal data remains an active area of research today. The complexity of these datasets and the high rates of missing data caused by irregular sampling present data-level challenges for the Early Longitudinal Data ...

note
Scalable and Inductive Semi-supervised Classifier with Sample Weighting Based on Graph Topology
Article No.: 133, Pages 1–18https://doi.org/10.1145/3643645

Recently, graph-based semi-supervised learning (GSSL) has garnered significant interest in the realms of machine learning and pattern recognition. Although some of the proposed methods have made some progress, there are still some shortcomings that need ...

Subjects

Comments