callback( { "result":{ "query":":facetid:toc:\"db/conf/kdd/kdd2020.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.03" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"422", "@dc":"422", "@oc":"422", "@id":"43399020", "text":":facetid:toc:db/conf/kdd/kdd2020.bht" } }, "hits":{ "@total":"422", "@computed":"422", "@sent":"422", "@first":"0", "hit":[{ "@score":"1", "@id":"1810563", "info":{"authors":{"author":[{"@pid":"75/4596-1","text":"Chetan Gupta 0001"},{"@pid":"76/7789","text":"Ahmed K. Farahat"}]},"title":"Deep Learning for Industrial AI: Challenges, New Methods and Best Practices.","venue":"KDD","pages":"3571-3572","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0001F20","doi":"10.1145/3394486.3406482","ee":"https://doi.org/10.1145/3394486.3406482","url":"https://dblp.org/rec/conf/kdd/0001F20"}, "url":"URL#1810563" }, { "@score":"1", "@id":"1810564", "info":{"authors":{"author":[{"@pid":"143/7228-1","text":"Aritra Ghosh 0001"},{"@pid":"97/6300","text":"Neil T. Heffernan"},{"@pid":"127/6503","text":"Andrew S. Lan"}]},"title":"Context-Aware Attentive Knowledge Tracing.","venue":"KDD","pages":"2330-2339","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0001HL20","doi":"10.1145/3394486.3403282","ee":"https://doi.org/10.1145/3394486.3403282","url":"https://dblp.org/rec/conf/kdd/0001HL20"}, "url":"URL#1810564" }, { "@score":"1", "@id":"1810566", "info":{"authors":{"author":[{"@pid":"69/339-1","text":"Meng Jiang 0001"},{"@pid":"151/3145","text":"Jingbo Shang"}]},"title":"Scientific Text Mining and Knowledge Graphs.","venue":"KDD","pages":"3537-3538","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0001S20","doi":"10.1145/3394486.3406465","ee":"https://doi.org/10.1145/3394486.3406465","url":"https://dblp.org/rec/conf/kdd/0001S20"}, "url":"URL#1810566" }, { "@score":"1", "@id":"1810567", "info":{"authors":{"author":[{"@pid":"176/5397-1","text":"Zhiping Xiao 0001"},{"@pid":"02/9110","text":"Weiping Song"},{"@pid":"188/9063","text":"Haoyan Xu"},{"@pid":"266/8175","text":"Zhicheng Ren"},{"@pid":"37/3868","text":"Yizhou Sun"}]},"title":"TIMME: Twitter Ideology-detection via Multi-task Multi-relational Embedding.","venue":"KDD","pages":"2258-2268","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0001SXRS20","doi":"10.1145/3394486.3403275","ee":"https://doi.org/10.1145/3394486.3403275","url":"https://dblp.org/rec/conf/kdd/0001SXRS20"}, "url":"URL#1810567" }, { "@score":"1", "@id":"1810568", "info":{"authors":{"author":[{"@pid":"08/9919-1","text":"Pan Peng 0001"},{"@pid":"36/4449","text":"Yuichi Yoshida"}]},"title":"Average Sensitivity of Spectral Clustering.","venue":"KDD","pages":"1132-1140","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0001Y20","doi":"10.1145/3394486.3403166","ee":"https://doi.org/10.1145/3394486.3403166","url":"https://dblp.org/rec/conf/kdd/0001Y20"}, "url":"URL#1810568" }, { "@score":"1", "@id":"1810569", "info":{"authors":{"author":[{"@pid":"63/3122-2","text":"Fan Zhou 0002"},{"@pid":"14/1395","text":"Liang Li"},{"@pid":"88/2172","text":"Kunpeng Zhang"},{"@pid":"66/974","text":"Goce Trajcevski"},{"@pid":"258/5512","text":"Fuming Yao"},{"@pid":"62/2964","text":"Ying Huang"},{"@pid":"73/9481","text":"Ting Zhong"},{"@pid":"34/5354","text":"Jiahao Wang"},{"@pid":"48/6001-3","text":"Qiao Liu 0003"}]},"title":"Forecasting the Evolution of Hydropower Generation.","venue":"KDD","pages":"2861-2870","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0002LZTYHZWL20","doi":"10.1145/3394486.3403337","ee":"https://doi.org/10.1145/3394486.3403337","url":"https://dblp.org/rec/conf/kdd/0002LZTYHZWL20"}, "url":"URL#1810569" }, { "@score":"1", "@id":"1810570", "info":{"authors":{"author":[{"@pid":"39/5544-2","text":"Hongwei Li 0002"},{"@pid":"20/9644","text":"Qingping Yang"},{"@pid":"217/4359","text":"Yixuan Cao"},{"@pid":"217/4548","text":"Jiaquan Yao"},{"@pid":"54/4989-1","text":"Ping Luo 0001"}]},"title":"Cracking Tabular Presentation Diversity for Automatic Cross-Checking over Numerical Facts.","venue":"KDD","pages":"2599-2607","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0002YCYL20","doi":"10.1145/3394486.3403310","ee":"https://doi.org/10.1145/3394486.3403310","url":"https://dblp.org/rec/conf/kdd/0002YCYL20"}, "url":"URL#1810570" }, { "@score":"1", "@id":"1810571", "info":{"authors":{"author":[{"@pid":"83/3714-6","text":"Shuo Zhang 0006"},{"@pid":"85/4125","text":"Krisztian Balog"}]},"title":"Evaluating Conversational Recommender Systems via User Simulation.","venue":"KDD","pages":"1512-1520","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0006B20","doi":"10.1145/3394486.3403202","ee":"https://doi.org/10.1145/3394486.3403202","url":"https://dblp.org/rec/conf/kdd/0006B20"}, "url":"URL#1810571" }, { "@score":"1", "@id":"1810572", "info":{"authors":{"author":[{"@pid":"49/67-17","text":"Xiao Wang 0017"},{"@pid":"139/3159","text":"Meiqi Zhu"},{"@pid":"258/0824","text":"Deyu Bo"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"64/3041","text":"Chuan Shi"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"AM-GCN: Adaptive Multi-channel Graph Convolutional Networks.","venue":"KDD","pages":"1243-1253","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/0017ZB0SP20","doi":"10.1145/3394486.3403177","ee":"https://doi.org/10.1145/3394486.3403177","url":"https://dblp.org/rec/conf/kdd/0017ZB0SP20"}, "url":"URL#1810572" }, { "@score":"1", "@id":"1810573", "info":{"authors":{"author":[{"@pid":"222/6959","text":"Alireza Abdoli"},{"@pid":"240/9249","text":"Sara Alaee"},{"@pid":"232/5616","text":"Shima Imani"},{"@pid":"230/3714","text":"Amy C. Murillo"},{"@pid":"230/3658","text":"Alec C. Gerry"},{"@pid":"273/0320","text":"Leslie Hickle"},{"@pid":"k/EamonnJKeogh","text":"Eamonn J. Keogh"}]},"title":"Fitbit for Chickens?: Time Series Data Mining Can Increase the Productivity of Poultry Farms.","venue":"KDD","pages":"3328-3336","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AbdoliAIMGHK20","doi":"10.1145/3394486.3403385","ee":"https://doi.org/10.1145/3394486.3403385","url":"https://dblp.org/rec/conf/kdd/AbdoliAIMGHK20"}, "url":"URL#1810573" }, { "@score":"1", "@id":"1810574", "info":{"authors":{"author":[{"@pid":"228/8502","text":"Mustafa Abdool"},{"@pid":"44/1326","text":"Malay Haldar"},{"@pid":"99/5813","text":"Prashant Ramanathan"},{"@pid":"258/5045","text":"Tyler Sax"},{"@pid":"49/8313","text":"Lanbo Zhang"},{"@pid":"258/4698","text":"Aamir Manaswala"},{"@pid":"47/5814","text":"Lynn Yang"},{"@pid":"138/6444","text":"Bradley C. Turnbull"},{"@pid":"68/1429","text":"Qing Zhang"},{"@pid":"68/6626","text":"Thomas Legrand"}]},"title":"Managing Diversity in Airbnb Search.","venue":"KDD","pages":"2952-2960","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AbdoolHRSZMYTZL20","doi":"10.1145/3394486.3403345","ee":"https://doi.org/10.1145/3394486.3403345","url":"https://dblp.org/rec/conf/kdd/AbdoolHRSZMYTZL20"}, "url":"URL#1810574" }, { "@score":"1", "@id":"1810576", "info":{"authors":{"author":[{"@pid":"16/7560","text":"Muhammad Aurangzeb Ahmad"},{"@pid":"273/0032","text":"Sener Özönder"}]},"title":"Physics Inspired Models in Artificial Intelligence.","venue":"KDD","pages":"3535-3536","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AhmadO20","doi":"10.1145/3394486.3406464","ee":"https://doi.org/10.1145/3394486.3406464","url":"https://dblp.org/rec/conf/kdd/AhmadO20"}, "url":"URL#1810576" }, { "@score":"1", "@id":"1810577", "info":{"authors":{"author":[{"@pid":"16/7560","text":"Muhammad Aurangzeb Ahmad"},{"@pid":"180/7193","text":"Arpit Patel"},{"@pid":"218/7108","text":"Carly Eckert"},{"@pid":"21/1587","text":"Vikas Kumar"},{"@pid":"t/AnkurTeredesai","text":"Ankur Teredesai"}]},"title":"Fairness in Machine Learning for Healthcare.","venue":"KDD","pages":"3529-3530","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AhmadPEKT20","doi":"10.1145/3394486.3406461","ee":"https://doi.org/10.1145/3394486.3406461","url":"https://dblp.org/rec/conf/kdd/AhmadPEKT20"}, "url":"URL#1810577" }, { "@score":"1", "@id":"1810578", "info":{"authors":{"author":[{"@pid":"272/9922","text":"Syeda Nahida Akter"},{"@pid":"90/5533","text":"Muhammad Abdullah Adnan"}]},"title":"WeightGrad: Geo-Distributed Data Analysis Using Quantization for Faster Convergence and Better Accuracy.","venue":"KDD","pages":"546-556","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AkterA20","doi":"10.1145/3394486.3403097","ee":"https://doi.org/10.1145/3394486.3403097","url":"https://dblp.org/rec/conf/kdd/AkterA20"}, "url":"URL#1810578" }, { "@score":"1", "@id":"1810580", "info":{"authors":{"author":{"@pid":"51/681","text":"Saleema Amershi"}},"title":"Toward Responsible AI by Planning to Fail.","venue":"KDD","pages":"3607","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Amershi20","doi":"10.1145/3394486.3409557","ee":"https://doi.org/10.1145/3394486.3409557","url":"https://dblp.org/rec/conf/kdd/Amershi20"}, "url":"URL#1810580" }, { "@score":"1", "@id":"1810581", "info":{"authors":{"author":{"@pid":"79/7749","text":"Eliana Valenzuela Andrade"}},"title":"Diversity and Inclusion, a Perspective from a Four Years MSI Faculty Member.","venue":"KDD","pages":"3582","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Andrade20","doi":"10.1145/3394486.3411064","ee":"https://doi.org/10.1145/3394486.3411064","url":"https://dblp.org/rec/conf/kdd/Andrade20"}, "url":"URL#1810581" }, { "@score":"1", "@id":"1810582", "info":{"authors":{"author":[{"@pid":"192/2057","text":"Olga Andreeva"},{"@pid":"64/6025-121","text":"Wei Li 0121"},{"@pid":"59/622-3","text":"Wei Ding 0003"},{"@pid":"188/6346","text":"Marieke L. Kuijjer"},{"@pid":"68/1152","text":"John Quackenbush"},{"@pid":"33/3675-1","text":"Ping Chen 0001"}]},"title":"Catalysis Clustering with GAN by Incorporating Domain Knowledge.","venue":"KDD","pages":"1344-1352","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AndreevaL0KQ020","doi":"10.1145/3394486.3403187","ee":"https://doi.org/10.1145/3394486.3403187","url":"https://dblp.org/rec/conf/kdd/AndreevaL0KQ020"}, "url":"URL#1810582" }, { "@score":"1", "@id":"1810584", "info":{"authors":{"author":[{"@pid":"267/0875","text":"Ata Akbari Asanjan"},{"@pid":"31/2815","text":"Kamalika Das"},{"@pid":"277/0575","text":"Alan S. Li"},{"@pid":"272/9939","text":"Ved Chirayath"},{"@pid":"273/0116","text":"Juan Torres-Perez"},{"@pid":"25/9922","text":"Soroosh Sorooshian"}]},"title":"Learning Instrument Invariant Characteristics for Generating High-resolution Global Coral Reef Maps.","venue":"KDD","pages":"2617-2624","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AsanjanDLCTS20","doi":"10.1145/3394486.3403312","ee":"https://doi.org/10.1145/3394486.3403312","url":"https://dblp.org/rec/conf/kdd/AsanjanDLCTS20"}, "url":"URL#1810584" }, { "@score":"1", "@id":"1810585", "info":{"authors":{"author":[{"@pid":"272/9912","text":"Julien Audibert"},{"@pid":"54/3028","text":"Pietro Michiardi"},{"@pid":"81/3905","text":"Frédéric Guyard"},{"@pid":"99/10736","text":"Sébastien Marti"},{"@pid":"69/9122","text":"Maria A. Zuluaga"}]},"title":"USAD: UnSupervised Anomaly Detection on Multivariate Time Series.","venue":"KDD","pages":"3395-3404","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AudibertMGMZ20","doi":"10.1145/3394486.3403392","ee":"https://doi.org/10.1145/3394486.3403392","url":"https://dblp.org/rec/conf/kdd/AudibertMGMZ20"}, "url":"URL#1810585" }, { "@score":"1", "@id":"1810586", "info":{"authors":{"author":[{"@pid":"270/0786","text":"Amel Awadelkarim"},{"@pid":"13/10542","text":"Johan Ugander"}]},"title":"Prioritized Restreaming Algorithms for Balanced Graph Partitioning.","venue":"KDD","pages":"1877-1887","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/AwadelkarimU20","doi":"10.1145/3394486.3403239","ee":"https://doi.org/10.1145/3394486.3403239","url":"https://dblp.org/rec/conf/kdd/AwadelkarimU20"}, "url":"URL#1810586" }, { "@score":"1", "@id":"1810587", "info":{"authors":{"author":[{"@pid":"137/0122","text":"Zilong Bai"},{"@pid":"64/1505","text":"Hoa Nguyen"},{"@pid":"81/2360","text":"Ian Davidson"}]},"title":"Block Model Guided Unsupervised Feature Selection.","venue":"KDD","pages":"1201-1211","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BaiND20","doi":"10.1145/3394486.3403173","ee":"https://doi.org/10.1145/3394486.3403173","url":"https://dblp.org/rec/conf/kdd/BaiND20"}, "url":"URL#1810587" }, { "@score":"1", "@id":"1810588", "info":{"authors":{"author":[{"@pid":"228/7959","text":"Yikun Ban"},{"@pid":"34/2685","text":"Jingrui He"}]},"title":"Generic Outlier Detection in Multi-Armed Bandit.","venue":"KDD","pages":"913-923","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BanH20","doi":"10.1145/3394486.3403134","ee":"https://doi.org/10.1145/3394486.3403134","url":"https://dblp.org/rec/conf/kdd/BanH20"}, "url":"URL#1810588" }, { "@score":"1", "@id":"1810589", "info":{"authors":{"author":[{"@pid":"41/10889","text":"Richard Barnes 0002"},{"@pid":"62/7947","text":"Senaka Buthpitiya"},{"@pid":"58/3899","text":"James Cook"},{"@pid":"94/2266","text":"Alex Fabrikant"},{"@pid":"t/ATomkins","text":"Andrew Tomkins"},{"@pid":"32/8371","text":"Fangzhou Xu"}]},"title":"BusTr: Predicting Bus Travel Times from Real-Time Traffic.","venue":"KDD","pages":"3243-3251","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BarnesBCFTX20","doi":"10.1145/3394486.3403376","ee":"https://doi.org/10.1145/3394486.3403376","url":"https://dblp.org/rec/conf/kdd/BarnesBCFTX20"}, "url":"URL#1810589" }, { "@score":"1", "@id":"1810590", "info":{"authors":{"author":[{"@pid":"69/3820","text":"Ron Bekkerman"},{"@pid":"67/3556","text":"Vanja Josifovski"},{"@pid":"p/FosterJProvost","text":"Foster J. Provost"}]},"title":"Data Science for the Real Estate Industry.","venue":"KDD","pages":"3559-3560","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BekkermanJP20","doi":"10.1145/3394486.3406476","ee":"https://doi.org/10.1145/3394486.3406476","url":"https://dblp.org/rec/conf/kdd/BekkermanJP20"}, "url":"URL#1810590" }, { "@score":"1", "@id":"1810591", "info":{"authors":{"author":[{"@pid":"132/3980","text":"Sean Bell"},{"@pid":"49/1579-6","text":"Yiqun Liu 0006"},{"@pid":"205/2474","text":"Sami Alsheikh"},{"@pid":"40/10613","text":"Yina Tang"},{"@pid":"80/1656","text":"Edward Pizzi"},{"@pid":"80/690","text":"M. Henning"},{"@pid":"272/9894","text":"Karun Singh"},{"@pid":"273/0264","text":"Omkar Parkhi"},{"@pid":"117/4333","text":"Fedor Borisyuk"}]},"title":"GrokNet: Unified Computer Vision Model Trunk and Embeddings For Commerce.","venue":"KDD","pages":"2608-2616","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BellLATPHSPB20","doi":"10.1145/3394486.3403311","ee":"https://doi.org/10.1145/3394486.3403311","url":"https://dblp.org/rec/conf/kdd/BellLATPHSPB20"}, "url":"URL#1810591" }, { "@score":"1", "@id":"1810592", "info":{"authors":{"author":[{"@pid":"256/6224","text":"Caleb Belth"},{"@pid":"59/9378","text":"Xinyi Zheng"},{"@pid":"91/9987","text":"Danai Koutra"}]},"title":"Mining Persistent Activity in Continually Evolving Networks.","venue":"KDD","pages":"934-944","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BelthZK20","doi":"10.1145/3394486.3403136","ee":"https://doi.org/10.1145/3394486.3403136","url":"https://dblp.org/rec/conf/kdd/BelthZK20"}, "url":"URL#1810592" }, { "@score":"1", "@id":"1810593", "info":{"authors":{"author":[{"@pid":"68/10670","text":"Suman K. Bera 0001"},{"@pid":"60/4210","text":"C. Seshadhri 0001"}]},"title":"How to Count Triangles, without Seeing the Whole Graph.","venue":"KDD","pages":"306-316","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BeraS20","doi":"10.1145/3394486.3403073","ee":"https://doi.org/10.1145/3394486.3403073","url":"https://dblp.org/rec/conf/kdd/BeraS20"}, "url":"URL#1810593" }, { "@score":"1", "@id":"1810594", "info":{"authors":{"author":{"@pid":"159/0197","text":"Brianna Blaser"}},"title":"Accessible Online Meetings and Presentations.","venue":"KDD","pages":"3588","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Blaser20","doi":"10.1145/3394486.3411069","ee":"https://doi.org/10.1145/3394486.3411069","url":"https://dblp.org/rec/conf/kdd/Blaser20"}, "url":"URL#1810594" }, { "@score":"1", "@id":"1810595", "info":{"authors":{"author":[{"@pid":"203/8114","text":"Aleksandar Bojchevski"},{"@pid":"228/7897","text":"Johannes Klicpera"},{"@pid":"91/10813","text":"Bryan Perozzi"},{"@pid":"215/5014","text":"Amol Kapoor"},{"@pid":"225/4115","text":"Martin Blais"},{"@pid":"215/3742","text":"Benedek Rózemberczki"},{"@pid":"72/11338","text":"Michal Lukasik"},{"@pid":"43/3011","text":"Stephan Günnemann"}]},"title":"Scaling Graph Neural Networks with Approximate PageRank.","venue":"KDD","pages":"2464-2473","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BojchevskiKPKBR20","doi":"10.1145/3394486.3403296","ee":"https://doi.org/10.1145/3394486.3403296","url":"https://dblp.org/rec/conf/kdd/BojchevskiKPKBR20"}, "url":"URL#1810595" }, { "@score":"1", "@id":"1810597", "info":{"authors":{"author":[{"@pid":"266/8146","text":"Soorajnath Boominathan"},{"@pid":"241/5940","text":"Michael Oberst"},{"@pid":"55/11105","text":"Helen Zhou"},{"@pid":"266/8223","text":"Sanjat Kanjilal"},{"@pid":"12/673","text":"David A. Sontag"}]},"title":"Treatment Policy Learning in Multiobjective Settings with Fully Observed Outcomes.","venue":"KDD","pages":"1937-1947","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BoominathanOZKS20","doi":"10.1145/3394486.3403245","ee":"https://doi.org/10.1145/3394486.3403245","url":"https://dblp.org/rec/conf/kdd/BoominathanOZKS20"}, "url":"URL#1810597" }, { "@score":"1", "@id":"1810598", "info":{"authors":{"author":[{"@pid":"259/1020","text":"Bernardo Branco"},{"@pid":"245/9708","text":"Pedro Abreu"},{"@pid":"53/7728","text":"Ana Sofia Gomes"},{"@pid":"53/3320","text":"Mariana S. C. Almeida"},{"@pid":"259/1055","text":"João Tiago Ascensão"},{"@pid":"b/PedroBizarro","text":"Pedro Bizarro"}]},"title":"Interleaved Sequence RNNs for Fraud Detection.","venue":"KDD","pages":"3101-3109","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BrancoAGAAB20","doi":"10.1145/3394486.3403361","ee":"https://doi.org/10.1145/3394486.3403361","url":"https://dblp.org/rec/conf/kdd/BrancoAGAAB20"}, "url":"URL#1810598" }, { "@score":"1", "@id":"1810599", "info":{"authors":{"author":{"@pid":"89/4386","text":"Emery N. Brown"}},"title":"Keynote Speaker: Emery N. Brown.","venue":"KDD","pages":"3","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Brown20","doi":"10.1145/3394486.3407093","ee":"https://doi.org/10.1145/3394486.3407093","url":"https://dblp.org/rec/conf/kdd/Brown20"}, "url":"URL#1810599" }, { "@score":"1", "@id":"1810600", "info":{"authors":{"author":[{"@pid":"76/11519","text":"Chloë Brown"},{"@pid":"79/11198","text":"Jagmohan Chauhan"},{"@pid":"217/5536","text":"Andreas Grammenos"},{"@pid":"90/2562-10","text":"Jing Han 0010"},{"@pid":"240/9357","text":"Apinan Hasthanasombat"},{"@pid":"156/1045","text":"Dimitris Spathis"},{"@pid":"217/5581","text":"Tong Xia"},{"@pid":"07/9132","text":"Pietro Cicuta"},{"@pid":"21/6419","text":"Cecilia Mascolo"}]},"title":"Exploring Automatic Diagnosis of COVID-19 from Crowdsourced Respiratory Sound Data.","venue":"KDD","pages":"3474-3484","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BrownCGHHSXCM20","doi":"10.1145/3394486.3412865","ee":"https://doi.org/10.1145/3394486.3412865","url":"https://dblp.org/rec/conf/kdd/BrownCGHHSXCM20"}, "url":"URL#1810600" }, { "@score":"1", "@id":"1810603", "info":{"authors":{"author":[{"@pid":"315/0883-2","text":"Sebastian Buß 0002"},{"@pid":"117/7275","text":"Hendrik Molter"},{"@pid":"n/RolfNiedermeier","text":"Rolf Niedermeier"},{"@pid":"267/5391","text":"Maciej Rymar"}]},"title":"Algorithmic Aspects of Temporal Betweenness.","venue":"KDD","pages":"2084-2092","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/BussMNR20","doi":"10.1145/3394486.3403259","ee":"https://doi.org/10.1145/3394486.3403259","url":"https://dblp.org/rec/conf/kdd/BussMNR20"}, "url":"URL#1810603" }, { "@score":"1", "@id":"1810605", "info":{"authors":{"author":[{"@pid":"228/6732","text":"Aldo G. Carranza"},{"@pid":"17/5085","text":"Ryan A. Rossi"},{"@pid":"179/2509","text":"Anup Rao 0002"},{"@pid":"81/4388","text":"Eunyee Koh"}]},"title":"Higher-order Clustering in Complex Heterogeneous Networks.","venue":"KDD","pages":"25-35","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CarranzaRRK20","doi":"10.1145/3394486.3403045","ee":"https://doi.org/10.1145/3394486.3403045","url":"https://dblp.org/rec/conf/kdd/CarranzaRRK20"}, "url":"URL#1810605" }, { "@score":"1", "@id":"1810606", "info":{"authors":{"author":[{"@pid":"c/RichCaruana","text":"Rich Caruana"},{"@pid":"03/5955","text":"Scott M. Lundberg"},{"@pid":"21/10105","text":"Marco Túlio Ribeiro"},{"@pid":"217/2494","text":"Harsha Nori"},{"@pid":"249/2695","text":"Samuel Jenkins"}]},"title":"Intelligible and Explainable Machine Learning: Best Practices and Practical Challenges.","venue":"KDD","pages":"3511-3512","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CaruanaLRNJ20","doi":"10.1145/3394486.3406707","ee":"https://doi.org/10.1145/3394486.3406707","url":"https://dblp.org/rec/conf/kdd/CaruanaLRNJ20"}, "url":"URL#1810606" }, { "@score":"1", "@id":"1810607", "info":{"authors":{"author":[{"@pid":"241/4994","text":"Yukuo Cen"},{"@pid":"144/1628-12","text":"Jianwei Zhang 0012"},{"@pid":"220/4186","text":"Xu Zou"},{"@pid":"03/10205","text":"Chang Zhou"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"t/JieTang","text":"Jie Tang 0001"}]},"title":"Controllable Multi-Interest Framework for Recommendation.","venue":"KDD","pages":"2942-2951","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CenZZZYT20","doi":"10.1145/3394486.3403344","ee":"https://doi.org/10.1145/3394486.3403344","url":"https://dblp.org/rec/conf/kdd/CenZZZYT20"}, "url":"URL#1810607" }, { "@score":"1", "@id":"1810608", "info":{"authors":{"author":[{"@pid":"25/8076","text":"Prithwish Chakraborty"},{"@pid":"73/1969","text":"Bum Chul Kwon"},{"@pid":"95/6893","text":"Sanjoy Dey"},{"@pid":"66/3289","text":"Amit Dhurandhar"},{"@pid":"g/DanGruen","text":"Daniel M. Gruen"},{"@pid":"80/26","text":"Kenney Ng"},{"@pid":"90/4024","text":"Daby Sow"},{"@pid":"02/3069","text":"Kush R. Varshney"}]},"title":"Tutorial on Human-Centered Explainability for Healthcare.","venue":"KDD","pages":"3547-3548","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChakrabortyKDDG20","doi":"10.1145/3394486.3406470","ee":"https://doi.org/10.1145/3394486.3406470","url":"https://dblp.org/rec/conf/kdd/ChakrabortyKDDG20"}, "url":"URL#1810608" }, { "@score":"1", "@id":"1810609", "info":{"authors":{"author":[{"@pid":"186/8463","text":"Raghavendra Chalapathy"},{"@pid":"53/8172","text":"Nguyen Lu Dang Khoa"},{"@pid":"22/5463","text":"Sanjay Chawla"}]},"title":"Robust Deep Learning Methods for Anomaly Detection.","venue":"KDD","pages":"3507-3508","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChalapathyKC20","doi":"10.1145/3394486.3406704","ee":"https://doi.org/10.1145/3394486.3406704","url":"https://dblp.org/rec/conf/kdd/ChalapathyKC20"}, "url":"URL#1810609" }, { "@score":"1", "@id":"1810610", "info":{"authors":{"author":[{"@pid":"07/1972","text":"Wei-Cheng Chang"},{"@pid":"97/1729","text":"Hsiang-Fu Yu"},{"@pid":"26/11391","text":"Kai Zhong"},{"@pid":"25/1666","text":"Yiming Yang"},{"@pid":"d/InderjitSDhillon","text":"Inderjit S. Dhillon"}]},"title":"Taming Pretrained Transformers for Extreme Multi-label Text Classification.","venue":"KDD","pages":"3163-3171","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChangYZYD20","doi":"10.1145/3394486.3403368","ee":"https://doi.org/10.1145/3394486.3403368","url":"https://dblp.org/rec/conf/kdd/ChangYZYD20"}, "url":"URL#1810610" }, { "@score":"1", "@id":"1810611", "info":{"authors":{"author":[{"@pid":"266/7498","text":"Sudhanshu Chanpuriya"},{"@pid":"149/2327","text":"Cameron Musco"}]},"title":"InfiniteWalk: Deep Network Embeddings as Laplacian Embeddings with a Nonlinearity.","venue":"KDD","pages":"1325-1333","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChanpuriyaM20","doi":"10.1145/3394486.3403185","ee":"https://doi.org/10.1145/3394486.3403185","url":"https://dblp.org/rec/conf/kdd/ChanpuriyaM20"}, "url":"URL#1810611" }, { "@score":"1", "@id":"1810612", "info":{"authors":{"author":[{"@pid":"67/5633","text":"Jinghui Chen"},{"@pid":"50/4597","text":"Quanquan Gu"}]},"title":"RayS: A Ray Searching Method for Hard-label Adversarial Attack.","venue":"KDD","pages":"1739-1747","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenG20","doi":"10.1145/3394486.3403225","ee":"https://doi.org/10.1145/3394486.3403225","url":"https://dblp.org/rec/conf/kdd/ChenG20"}, "url":"URL#1810612" }, { "@score":"1", "@id":"1810613", "info":{"authors":{"author":[{"@pid":"69/157-8","text":"Lu Chen 0008"},{"@pid":"l/ChengfeiLiu","text":"Chengfei Liu"},{"@pid":"97/4357","text":"Rui Zhou 0001"},{"@pid":"20/1590","text":"Jiajie Xu 0001"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"},{"@pid":"l/JianxinLi","text":"Jianxin Li 0001"}]},"title":"Finding Effective Geo-social Group for Impromptu Activities with Diverse Demands.","venue":"KDD","pages":"698-708","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenL0XY020","doi":"10.1145/3394486.3403114","ee":"https://doi.org/10.1145/3394486.3403114","url":"https://dblp.org/rec/conf/kdd/ChenL0XY020"}, "url":"URL#1810613" }, { "@score":"1", "@id":"1810614", "info":{"authors":{"author":[{"@pid":"256/9242","text":"Suming J. Chen"},{"@pid":"06/864-1","text":"Zhen Qin 0001"},{"@pid":"272/9978","text":"Zac Wilson"},{"@pid":"273/0097","text":"Brian Calaci"},{"@pid":"05/5431","text":"Michael Rose"},{"@pid":"273/0345","text":"Ryan Evans"},{"@pid":"273/0098","text":"Sean Abraham"},{"@pid":"95/2272","text":"Donald Metzler"},{"@pid":"20/1055","text":"Sandeep Tata"},{"@pid":"204/3354","text":"Mike Colagrosso"}]},"title":"Improving Recommendation Quality in Google Drive.","venue":"KDD","pages":"2900-2908","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenQWCREAMTC20","doi":"10.1145/3394486.3403341","ee":"https://doi.org/10.1145/3394486.3403341","url":"https://dblp.org/rec/conf/kdd/ChenQWCREAMTC20"}, "url":"URL#1810614" }, { "@score":"1", "@id":"1810615", "info":{"authors":{"author":[{"@pid":"03/10742","text":"Tianwen Chen"},{"@pid":"w/RaymondChiWingWong","text":"Raymond Chi-Wing Wong"}]},"title":"Handling Information Loss of Graph Neural Networks for Session-based Recommendation.","venue":"KDD","pages":"1172-1180","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenW20","doi":"10.1145/3394486.3403170","ee":"https://doi.org/10.1145/3394486.3403170","url":"https://dblp.org/rec/conf/kdd/ChenW20"}, "url":"URL#1810615" }, { "@score":"1", "@id":"1810616", "info":{"authors":{"author":[{"@pid":"147/5824-2","text":"Hongxu Chen 0002"},{"@pid":"04/10606","text":"Hongzhi Yin"},{"@pid":"224/0873","text":"Xiangguo Sun"},{"@pid":"22/1512-5","text":"Tong Chen 0005"},{"@pid":"76/6187","text":"Bogdan Gabrys"},{"@pid":"11/5835","text":"Katarzyna Musial"}]},"title":"Multi-level Graph Convolutional Networks for Cross-platform Anchor Link Prediction.","venue":"KDD","pages":"1503-1511","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenYS0GM20","doi":"10.1145/3394486.3403201","ee":"https://doi.org/10.1145/3394486.3403201","url":"https://dblp.org/rec/conf/kdd/ChenYS0GM20"}, "url":"URL#1810616" }, { "@score":"1", "@id":"1810617", "info":{"authors":{"author":[{"@pid":"42/1159","text":"Jiayi Chen"},{"@pid":"z/AidongZhang","text":"Aidong Zhang"}]},"title":"HGMF: Heterogeneous Graph-based Fusion for Multimodal Data with Incompleteness.","venue":"KDD","pages":"1295-1305","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChenZ20","doi":"10.1145/3394486.3403182","ee":"https://doi.org/10.1145/3394486.3403182","url":"https://dblp.org/rec/conf/kdd/ChenZ20"}, "url":"URL#1810617" }, { "@score":"1", "@id":"1810618", "info":{"authors":{"author":[{"@pid":"135/6864","text":"Dawei Cheng"},{"@pid":"54/8066","text":"Zhibin Niu"},{"@pid":"140/8590","text":"Yiyi Zhang"}]},"title":"Contagious Chain Risk Rating for Networked-guarantee Loans.","venue":"KDD","pages":"2715-2723","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ChengNZ20","doi":"10.1145/3394486.3403322","ee":"https://doi.org/10.1145/3394486.3403322","url":"https://dblp.org/rec/conf/kdd/ChengNZ20"}, "url":"URL#1810618" }, { "@score":"1", "@id":"1810619", "info":{"authors":{"author":{"@pid":"13/1402","text":"Jaesik Choi"}},"title":"Interpreting and Explaining Deep Neural Networks: A Perspective on Time Series Data.","venue":"KDD","pages":"3563-3564","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Choi20","doi":"10.1145/3394486.3406478","ee":"https://doi.org/10.1145/3394486.3406478","url":"https://dblp.org/rec/conf/kdd/Choi20"}, "url":"URL#1810619" }, { "@score":"1", "@id":"1810620", "info":{"authors":{"author":{"@pid":"54/4552","text":"Dorin Comaniciu"}},"title":"Artificial Intelligence for Healthcare.","venue":"KDD","pages":"3603","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Comaniciu20","doi":"10.1145/3394486.3409551","ee":"https://doi.org/10.1145/3394486.3409551","url":"https://dblp.org/rec/conf/kdd/Comaniciu20"}, "url":"URL#1810620" }, { "@score":"1", "@id":"1810621", "info":{"authors":{"author":[{"@pid":"203/8227","text":"Weilin Cong"},{"@pid":"47/3471","text":"Rana Forsati"},{"@pid":"k/MahmutTKandemir","text":"Mahmut T. Kandemir"},{"@pid":"88/4321","text":"Mehrdad Mahdavi"}]},"title":"Minimal Variance Sampling with Provable Guarantees for Fast Training of Graph Neural Networks.","venue":"KDD","pages":"1393-1403","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CongFKM20","doi":"10.1145/3394486.3403192","ee":"https://doi.org/10.1145/3394486.3403192","url":"https://dblp.org/rec/conf/kdd/CongFKM20"}, "url":"URL#1810621" }, { "@score":"1", "@id":"1810622", "info":{"authors":{"author":[{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"205/2423","text":"Zheyan Shen"},{"@pid":"23/3439-1","text":"Sheng Li 0001"},{"@pid":"219/1767","text":"Liuyi Yao"},{"@pid":"127/6999","text":"Yaliang Li"},{"@pid":"258/1233","text":"Zhixuan Chu"},{"@pid":"67/4834-4","text":"Jing Gao 0004"}]},"title":"Causal Inference Meets Machine Learning.","venue":"KDD","pages":"3527-3528","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CuiS0YLCG20","doi":"10.1145/3394486.3406460","ee":"https://doi.org/10.1145/3394486.3406460","url":"https://dblp.org/rec/conf/kdd/CuiS0YLCG20"}, "url":"URL#1810622" }, { "@score":"1", "@id":"1810623", "info":{"authors":{"author":[{"@pid":"147/6826","text":"Limeng Cui"},{"@pid":"244/0106","text":"Haeseung Seo"},{"@pid":"273/0186","text":"Maryam Tabar"},{"@pid":"85/10856","text":"Fenglong Ma"},{"@pid":"136/9440","text":"Suhang Wang"},{"@pid":"l/DongwonLee","text":"Dongwon Lee 0001"}]},"title":"DETERRENT: Knowledge Guided Graph Attention Network for Detecting Healthcare Misinformation.","venue":"KDD","pages":"492-502","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CuiSTMWL20","doi":"10.1145/3394486.3403092","ee":"https://doi.org/10.1145/3394486.3403092","url":"https://dblp.org/rec/conf/kdd/CuiSTMWL20"}, "url":"URL#1810623" }, { "@score":"1", "@id":"1810624", "info":{"authors":{"author":[{"@pid":"232/3064","text":"Ganqu Cui"},{"@pid":"00/5012-24","text":"Jie Zhou 0024"},{"@pid":"49/1457-2","text":"Cheng Yang 0002"},{"@pid":"53/3245-1","text":"Zhiyuan Liu 0001"}]},"title":"Adaptive Graph Encoder for Attributed Graph Embedding.","venue":"KDD","pages":"976-985","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CuiZY020","doi":"10.1145/3394486.3403140","ee":"https://doi.org/10.1145/3394486.3403140","url":"https://dblp.org/rec/conf/kdd/CuiZY020"}, "url":"URL#1810624" }, { "@score":"1", "@id":"1810625", "info":{"authors":{"author":[{"@pid":"273/0081","text":"Natalia Culakova"},{"@pid":"12/1857","text":"Dan Murphy"},{"@pid":"155/5193","text":"Joao Gante"},{"@pid":"209/4128","text":"Carlos Ledezma"},{"@pid":"168/8611","text":"Vahan Hovhannisyan"},{"@pid":"168/8305","text":"Alan Mosca"}]},"title":"How to Calibrate your Neural Network Classifier: Getting True Probabilities from a Classification Model.","venue":"KDD","pages":"3499-3500","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/CulakovaMGLHM20","doi":"10.1145/3394486.3406700","ee":"https://doi.org/10.1145/3394486.3406700","url":"https://dblp.org/rec/conf/kdd/CulakovaMGLHM20"}, "url":"URL#1810625" }, { "@score":"1", "@id":"1810626", "info":{"authors":{"author":[{"@pid":"124/3214","text":"Hamid Dadkhahi"},{"@pid":"65/6274","text":"Karthikeyan Shanmugam"},{"@pid":"40/1406","text":"Jesus Rios"},{"@pid":"56/7926","text":"Payel Das"},{"@pid":"220/5755","text":"Samuel C. Hoffman"},{"@pid":"259/2791","text":"Troy David Loeffler"},{"@pid":"174/5825","text":"Subramanian Sankaranarayanan"}]},"title":"Combinatorial Black-Box Optimization with Expert Advice.","venue":"KDD","pages":"1918-1927","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DadkhahiSRDHLS20","doi":"10.1145/3394486.3403243","ee":"https://doi.org/10.1145/3394486.3403243","url":"https://dblp.org/rec/conf/kdd/DadkhahiSRDHLS20"}, "url":"URL#1810626" }, { "@score":"1", "@id":"1810627", "info":{"authors":{"author":[{"@pid":"98/2150","text":"Xin Dai"},{"@pid":"06/8315","text":"Xiangnan Kong"},{"@pid":"55/3523-1","text":"Tian Guo 0001"},{"@pid":"63/9993","text":"John Boaz Lee"},{"@pid":"45/2337","text":"Xinyue Liu"},{"@pid":"203/8890","text":"Constance M. Moore"}]},"title":"Recurrent Networks for Guided Multi-Attention Classification.","venue":"KDD","pages":"412-420","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DaiKGLLM20","doi":"10.1145/3394486.3403083","ee":"https://doi.org/10.1145/3394486.3403083","url":"https://dblp.org/rec/conf/kdd/DaiKGLLM20"}, "url":"URL#1810627" }, { "@score":"1", "@id":"1810628", "info":{"authors":{"author":[{"@pid":"83/566","text":"Rui Dai"},{"@pid":"40/3075","text":"Shenkun Xu"},{"@pid":"67/5363","text":"Qian Gu"},{"@pid":"268/5629","text":"Chenguang Ji"},{"@pid":"268/5368","text":"Kaikui Liu"}]},"title":"Hybrid Spatio-Temporal Graph Convolutional Network: Improving Traffic Prediction with Navigation Data.","venue":"KDD","pages":"3074-3082","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DaiXGJL20","doi":"10.1145/3394486.3403358","ee":"https://doi.org/10.1145/3394486.3403358","url":"https://dblp.org/rec/conf/kdd/DaiXGJL20"}, "url":"URL#1810628" }, { "@score":"1", "@id":"1810629", "info":{"authors":{"author":[{"@pid":"273/0014","text":"Le Dai"},{"@pid":"83/4081","text":"Yu Yin"},{"@pid":"24/2771-2","text":"Chuan Qin 0002"},{"@pid":"70/6770-1","text":"Tong Xu 0001"},{"@pid":"59/1007","text":"Xiangnan He 0001"},{"@pid":"07/258","text":"Enhong Chen"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"}]},"title":"Enterprise Cooperation and Competition Analysis with a Sign-Oriented Preference Network.","venue":"KDD","pages":"774-782","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DaiYQX0C020","doi":"10.1145/3394486.3403120","ee":"https://doi.org/10.1145/3394486.3403120","url":"https://dblp.org/rec/conf/kdd/DaiYQX0C020"}, "url":"URL#1810629" }, { "@score":"1", "@id":"1810630", "info":{"authors":{"author":[{"@pid":"213/8022","text":"Aman Dalmia"},{"@pid":"82/608","text":"Jerome White"},{"@pid":"273/0258","text":"Ankit Chaurasia"},{"@pid":"64/4527","text":"Vishal Agarwal"},{"@pid":"76/10864","text":"Rajesh Jain"},{"@pid":"273/0255","text":"Dhruvin Vora"},{"@pid":"273/0034","text":"Balasaheb Dhame"},{"@pid":"272/9993","text":"Raghu Dharmaraju"},{"@pid":"273/0275","text":"Rahul Panicker"}]},"title":"Pest Management In Cotton Farms: An AI-System Case Study from the Global South.","venue":"KDD","pages":"3119-3127","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DalmiaWCAJVDDP20","doi":"10.1145/3394486.3403363","ee":"https://doi.org/10.1145/3394486.3403363","url":"https://dblp.org/rec/conf/kdd/DalmiaWCAJVDDP20"}, "url":"URL#1810630" }, { "@score":"1", "@id":"1810633", "info":{"authors":{"author":[{"@pid":"167/0317","text":"Monidipa Das"},{"@pid":"55/9613","text":"Mahardhika Pratama"},{"@pid":"136/0490","text":"Tegoeh Tjahjowidodo"}]},"title":"A Self-Evolving Mutually-Operative Recurrent Network-based Model for Online Tool Condition Monitoring in Delay Scenario.","venue":"KDD","pages":"2775-2783","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DasPT20","doi":"10.1145/3394486.3403328","ee":"https://doi.org/10.1145/3394486.3403328","url":"https://dblp.org/rec/conf/kdd/DasPT20"}, "url":"URL#1810633" }, { "@score":"1", "@id":"1810634", "info":{"authors":{"author":[{"@pid":"241/4844","text":"Songgaojun Deng"},{"@pid":"30/444","text":"Huzefa Rangwala"},{"@pid":"74/9990-1","text":"Yue Ning 0001"}]},"title":"Dynamic Knowledge Graph based Multi-Event Forecasting.","venue":"KDD","pages":"1585-1595","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DengRN20","doi":"10.1145/3394486.3403209","ee":"https://doi.org/10.1145/3394486.3403209","url":"https://dblp.org/rec/conf/kdd/DengRN20"}, "url":"URL#1810634" }, { "@score":"1", "@id":"1810636", "info":{"authors":{"author":[{"@pid":"268/5864","text":"Cyrus DiCiccio"},{"@pid":"179/3177","text":"Sriram Vasudevan"},{"@pid":"88/11337-1","text":"Kinjal Basu 0001"},{"@pid":"29/4781","text":"Krishnaram Kenthapadi"},{"@pid":"11/5430","text":"Deepak Agarwal"}]},"title":"Evaluating Fairness Using Permutation Tests.","venue":"KDD","pages":"1467-1477","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DiCiccioV0KA20","doi":"10.1145/3394486.3403199","ee":"https://doi.org/10.1145/3394486.3403199","url":"https://dblp.org/rec/conf/kdd/DiCiccioV0KA20"}, "url":"URL#1810636" }, { "@score":"1", "@id":"1810637", "info":{"authors":{"author":{"@pid":"15/4305","text":"Mona T. Diab"}},"title":"Data Paucity and Low Resource Scenarios: Challenges and Opportunities.","venue":"KDD","pages":"3612","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Diab20","doi":"10.1145/3394486.3409565","ee":"https://doi.org/10.1145/3394486.3409565","url":"https://dblp.org/rec/conf/kdd/Diab20"}, "url":"URL#1810637" }, { "@score":"1", "@id":"1810638", "info":{"authors":{"author":[{"@pid":"133/1925","text":"Xuetao Ding"},{"@pid":"168/0233","text":"Runfeng Zhang"},{"@pid":"12/7249","text":"Zhen Mao"},{"@pid":"131/2632","text":"Ke Xing"},{"@pid":"273/0373","text":"Fangxiao Du"},{"@pid":"88/10181","text":"Xingyu Liu"},{"@pid":"74/9196","text":"Guoxing Wei"},{"@pid":"273/0011","text":"Feifan Yin"},{"@pid":"273/0035","text":"Renqing He"},{"@pid":"273/0090","text":"Zhizhao Sun"}]},"title":"Delivery Scope: A New Way of Restaurant Retrieval for On-demand Food Delivery Service.","venue":"KDD","pages":"3026-3034","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DingZMXDLWYHS20","doi":"10.1145/3394486.3403353","ee":"https://doi.org/10.1145/3394486.3403353","url":"https://dblp.org/rec/conf/kdd/DingZMXDLWYHS20"}, "url":"URL#1810638" }, { "@score":"1", "@id":"1810639", "info":{"authors":{"author":[{"@pid":"128/0287","text":"Manh Tuan Do"},{"@pid":"246/2967","text":"Se-eun Yoon"},{"@pid":"169/9975","text":"Bryan Hooi"},{"@pid":"153/2052","text":"Kijung Shin"}]},"title":"Structural Patterns and Generative Models of Real-world Hypergraphs.","venue":"KDD","pages":"176-186","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DoYHS20","doi":"10.1145/3394486.3403060","ee":"https://doi.org/10.1145/3394486.3403060","url":"https://dblp.org/rec/conf/kdd/DoYHS20"}, "url":"URL#1810639" }, { "@score":"1", "@id":"1810640", "info":{"authors":{"author":[{"@pid":"d/XinLunaDong","text":"Xin Luna Dong"},{"@pid":"30/5464","text":"Xiang He"},{"@pid":"49/10825","text":"Andrey Kan"},{"@pid":"82/1763","text":"Xian Li"},{"@pid":"08/2359-4","text":"Yan Liang 0004"},{"@pid":"91/4845-29","text":"Jun Ma 0029"},{"@pid":"245/7578","text":"Yifan Ethan Xu"},{"@pid":"133/3207","text":"Chenwei Zhang"},{"@pid":"94/6503-2","text":"Tong Zhao 0002"},{"@pid":"268/6046","text":"Gabriel Blanco Saldana"},{"@pid":"194/5561","text":"Saurabh Deshpande"},{"@pid":"148/4227","text":"Alexandre Michetti Manduca"},{"@pid":"268/5452","text":"Jay Ren"},{"@pid":"268/6065","text":"Surender Pal Singh"},{"@pid":"76/2584","text":"Fan Xiao"},{"@pid":"130/1022","text":"Haw-Shiuan Chang"},{"@pid":"192/1911","text":"Giannis Karamanolakis"},{"@pid":"178/3692","text":"Yuning Mao"},{"@pid":"147/1393","text":"Yaqing Wang"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"m/AndrewMcCallum","text":"Andrew McCallum"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"AutoKnow: Self-Driving Knowledge Collection for Products of Thousands of Types.","venue":"KDD","pages":"2724-2734","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DongHKLLMXZZSDM20","doi":"10.1145/3394486.3403323","ee":"https://doi.org/10.1145/3394486.3403323","url":"https://dblp.org/rec/conf/kdd/DongHKLLMXZZSDM20"}, "url":"URL#1810640" }, { "@score":"1", "@id":"1810641", "info":{"authors":{"author":[{"@pid":"d/XinLunaDong","text":"Xin Luna Dong"},{"@pid":"52/1296","text":"Hannaneh Hajishirzi"},{"@pid":"218/6280","text":"Colin Lockard"},{"@pid":"157/8398","text":"Prashant Shiralkar"}]},"title":"Multi-modal Information Extraction from Text, Semi-structured, and Tabular Data on the Web.","venue":"KDD","pages":"3543-3544","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DongHLS20","doi":"10.1145/3394486.3406468","ee":"https://doi.org/10.1145/3394486.3406468","url":"https://dblp.org/rec/conf/kdd/DongHLS20"}, "url":"URL#1810641" }, { "@score":"1", "@id":"1810642", "info":{"authors":{"author":[{"@pid":"220/3088","text":"Manqing Dong"},{"@pid":"19/772","text":"Feng Yuan"},{"@pid":"56/6651-1","text":"Lina Yao 0001"},{"@pid":"47/3196-1","text":"Xiwei Xu 0001"},{"@pid":"52/4318-1","text":"Liming Zhu 0001"}]},"title":"MAMO: Memory-Augmented Meta-Optimization for Cold-start Recommendation.","venue":"KDD","pages":"688-697","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DongYYXZ20","doi":"10.1145/3394486.3403113","ee":"https://doi.org/10.1145/3394486.3403113","url":"https://dblp.org/rec/conf/kdd/DongYYXZ20"}, "url":"URL#1810642" }, { "@score":"1", "@id":"1810643", "info":{"authors":{"author":[{"@pid":"193/5689","text":"Yingtong Dou"},{"@pid":"66/8585","text":"Guixiang Ma"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"67/1229","text":"Sihong Xie"}]},"title":"Robust Spammer Detection by Nash Reinforcement Learning.","venue":"KDD","pages":"924-933","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DouMYX20","doi":"10.1145/3394486.3403135","ee":"https://doi.org/10.1145/3394486.3403135","url":"https://dblp.org/rec/conf/kdd/DouMYX20"}, "url":"URL#1810643" }, { "@score":"1", "@id":"1810644", "info":{"authors":{"author":[{"@pid":"218/6306","text":"Lu Duan"},{"@pid":"205/3156","text":"Haoyuan Hu"},{"@pid":"03/236","text":"Zili Wu"},{"@pid":"130/0123","text":"Guozheng Li"},{"@pid":"232/1915","text":"Xinhang Zhang"},{"@pid":"76/3005","text":"Yu Gong"},{"@pid":"15/2775","text":"Yinghui Xu"}]},"title":"Balanced Order Batching with Task-Oriented Graph Clustering.","venue":"KDD","pages":"3044-3053","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DuanHWLZGX20","doi":"10.1145/3394486.3403355","ee":"https://doi.org/10.1145/3394486.3403355","url":"https://dblp.org/rec/conf/kdd/DuanHWLZGX20"}, "url":"URL#1810644" }, { "@score":"1", "@id":"1810645", "info":{"authors":{"author":[{"@pid":"218/6306","text":"Lu Duan"},{"@pid":"01/2142","text":"Yang Zhan"},{"@pid":"205/3156","text":"Haoyuan Hu"},{"@pid":"76/3005","text":"Yu Gong"},{"@pid":"218/6719","text":"Jiangwen Wei"},{"@pid":"37/4356","text":"Xiaodong Zhang"},{"@pid":"15/2775","text":"Yinghui Xu"}]},"title":"Efficiently Solving the Practical Vehicle Routing Problem: A Novel Joint Learning Approach.","venue":"KDD","pages":"3054-3063","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DuanZHGWZX20","doi":"10.1145/3394486.3403356","ee":"https://doi.org/10.1145/3394486.3403356","url":"https://dblp.org/rec/conf/kdd/DuanZHGWZX20"}, "url":"URL#1810645" }, { "@score":"1", "@id":"1810646", "info":{"authors":{"author":[{"@pid":"273/0140","text":"Francesco Ducci"},{"@pid":"199/2228","text":"Mathias Kraus"},{"@pid":"125/0630","text":"Stefan Feuerriegel"}]},"title":"Cascade-LSTM: A Tree-Structured Neural Classifier for Detecting Misinformation Cascades.","venue":"KDD","pages":"2666-2676","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DucciKF20","doi":"10.1145/3394486.3403317","ee":"https://doi.org/10.1145/3394486.3403317","url":"https://dblp.org/rec/conf/kdd/DucciKF20"}, "url":"URL#1810646" }, { "@score":"1", "@id":"1810647", "info":{"authors":{"author":[{"@pid":"204/6929","text":"Subhabrata Dutta"},{"@pid":"115/9011","text":"Sarah Masud"},{"@pid":"c/SChakrabarti","text":"Soumen Chakrabarti"},{"@pid":"65/2136-2","text":"Tanmoy Chakraborty 0002"}]},"title":"Deep Exogenous and Endogenous Influence Combination for Social Chatter Intensity Prediction.","venue":"KDD","pages":"1999-2008","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/DuttaMC020","doi":"10.1145/3394486.3403251","ee":"https://doi.org/10.1145/3394486.3403251","url":"https://dblp.org/rec/conf/kdd/DuttaMC020"}, "url":"URL#1810647" }, { "@score":"1", "@id":"1810648", "info":{"authors":{"author":[{"@pid":"135/1082","text":"Vijay Ekambaram"},{"@pid":"235/7239","text":"Kushagra Manglik"},{"@pid":"128/7827","text":"Sumanta Mukherjee"},{"@pid":"81/9186","text":"Surya Shravan Kumar Sajja"},{"@pid":"18/1958","text":"Satyam Dwivedi"},{"@pid":"23/816","text":"Vikas Raykar"}]},"title":"Attention based Multi-Modal New Product Sales Time-series Forecasting.","venue":"KDD","pages":"3110-3118","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/EkambaramMMSDR20","doi":"10.1145/3394486.3403362","ee":"https://doi.org/10.1145/3394486.3403362","url":"https://dblp.org/rec/conf/kdd/EkambaramMMSDR20"}, "url":"URL#1810648" }, { "@score":"1", "@id":"1810649", "info":{"authors":{"author":[{"@pid":"e/TinaEliassiRad","text":"Tina Eliassi-Rad"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"},{"@pid":"16/477","text":"Vittoria Colizza"},{"@pid":"127/9715","text":"Lauren Gardner"},{"@pid":"43/9672","text":"Marcel Salathé"},{"@pid":"52/11308","text":"Samuel V. Scarpino"},{"@pid":"94/7280","text":"Joseph T. Wu"}]},"title":"Fighting a Pandemic: Convergence of Expertise, Data Science and Policy.","venue":"KDD","pages":"3493-3494","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Eliassi-RadCCGS20","doi":"10.1145/3394486.3409586","ee":"https://doi.org/10.1145/3394486.3409586","url":"https://dblp.org/rec/conf/kdd/Eliassi-RadCCGS20"}, "url":"URL#1810649" }, { "@score":"1", "@id":"1810650", "info":{"authors":{"author":[{"@pid":"88/802","text":"Sharanya Eswaran"},{"@pid":"272/9966","text":"Mridul Sachdeva"},{"@pid":"264/6369","text":"Vikram Vimal"},{"@pid":"264/6362","text":"Deepanshi Seth"},{"@pid":"272/9953","text":"Suhaas Kalpam"},{"@pid":"24/2161","text":"Sanjay Agarwal"},{"@pid":"84/6388","text":"Tridib Mukherjee"},{"@pid":"273/0308","text":"Samrat Dattagupta"}]},"title":"Game Action Modeling for Fine Grained Analyses of Player Behavior in Multi-player Card Games (Rummy as Case Study).","venue":"KDD","pages":"2657-2665","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/EswaranSVSKAMD20","doi":"10.1145/3394486.3403316","ee":"https://doi.org/10.1145/3394486.3403316","url":"https://dblp.org/rec/conf/kdd/EswaranSVSKAMD20"}, "url":"URL#1810650" }, { "@score":"1", "@id":"1810651", "info":{"authors":{"author":[{"@pid":"23/9947","text":"Xiaomin Fang"},{"@pid":"84/1560","text":"Jizhou Huang"},{"@pid":"88/898","text":"Fan Wang"},{"@pid":"195/5599","text":"Lingke Zeng"},{"@pid":"06/7675","text":"Haijin Liang"},{"@pid":"10/5209-1","text":"Haifeng Wang 0001"}]},"title":"ConSTGAT: Contextual Spatial-Temporal Graph Attention Network for Travel Time Estimation at Baidu Maps.","venue":"KDD","pages":"2697-2705","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FangHWZLW20","doi":"10.1145/3394486.3403320","ee":"https://doi.org/10.1145/3394486.3403320","url":"https://dblp.org/rec/conf/kdd/FangHWZLW20"}, "url":"URL#1810651" }, { "@score":"1", "@id":"1810652", "info":{"authors":{"author":[{"@pid":"203/1575","text":"Ayat Fekry"},{"@pid":"128/5699","text":"Lucian Carata"},{"@pid":"144/4204","text":"Thomas F. J.-M. Pasquier"},{"@pid":"82/8305","text":"Andrew Rice"},{"@pid":"h/AndyHopper","text":"Andy Hopper"}]},"title":"To Tune or Not to Tune?: In Search of Optimal Configurations for Data Analytics.","venue":"KDD","pages":"2494-2504","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FekryCPRH20","doi":"10.1145/3394486.3403299","ee":"https://doi.org/10.1145/3394486.3403299","url":"https://dblp.org/rec/conf/kdd/FekryCPRH20"}, "url":"URL#1810652" }, { "@score":"1", "@id":"1810653", "info":{"authors":{"author":[{"@pid":"24/7003-2","text":"Jie Feng 0002"},{"@pid":"196/8203","text":"Zeyu Yang"},{"@pid":"169/8818","text":"Fengli Xu"},{"@pid":"204/9346","text":"Haisu Yu"},{"@pid":"273/0271","text":"Mudan Wang"},{"@pid":"93/2334-8","text":"Yong Li 0008"}]},"title":"Learning to Simulate Human Mobility.","venue":"KDD","pages":"3426-3433","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FengYXYWL20","doi":"10.1145/3394486.3412862","ee":"https://doi.org/10.1145/3394486.3412862","url":"https://dblp.org/rec/conf/kdd/FengYXYWL20"}, "url":"URL#1810653" }, { "@score":"1", "@id":"1810654", "info":{"authors":{"author":[{"@pid":"68/10701","text":"Jonas Fischer"},{"@pid":"94/6462","text":"Jilles Vreeken"}]},"title":"Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.","venue":"KDD","pages":"813-823","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FischerV20","doi":"10.1145/3394486.3403124","ee":"https://doi.org/10.1145/3394486.3403124","url":"https://dblp.org/rec/conf/kdd/FischerV20"}, "url":"URL#1810654" }, { "@score":"1", "@id":"1810655", "info":{"authors":{"author":{"@pid":"272/9898","text":"Keolu Fox"}},"title":"The Illusion of Inclusion: Large Scale Genomic Data Sovereignty and Indigenous Populations.","venue":"KDD","pages":"3591","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Fox20","doi":"10.1145/3394486.3411071","ee":"https://doi.org/10.1145/3394486.3411071","url":"https://dblp.org/rec/conf/kdd/Fox20"}, "url":"URL#1810655" }, { "@score":"1", "@id":"1810656", "info":{"authors":{"author":{"@pid":"169/6885","text":"Patricia Ordóñez Franco"}},"title":"Mutually Beneficial Collaborations to Broaden Participation of Hispanics in Data Science.","venue":"KDD","pages":"3594-3595","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Franco20","doi":"10.1145/3394486.3411075","ee":"https://doi.org/10.1145/3394486.3411075","url":"https://dblp.org/rec/conf/kdd/Franco20"}, "url":"URL#1810656" }, { "@score":"1", "@id":"1810658", "info":{"authors":{"author":[{"@pid":"209/8408","text":"Zhenxin Fu"},{"@pid":"209/4930-1","text":"Shaobo Cui 0001"},{"@pid":"220/3102","text":"Mingyue Shang"},{"@pid":"50/6349","text":"Feng Ji"},{"@pid":"63/1870","text":"Dongyan Zhao 0001"},{"@pid":"34/6243","text":"Haiqing Chen"},{"@pid":"19/2405-1","text":"Rui Yan 0001"}]},"title":"Context-to-Session Matching: Utilizing Whole Session for Response Selection in Information-Seeking Dialogue Systems.","venue":"KDD","pages":"1605-1613","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FuCSJ0C020","doi":"10.1145/3394486.3403211","ee":"https://doi.org/10.1145/3394486.3403211","url":"https://dblp.org/rec/conf/kdd/FuCSJ0C020"}, "url":"URL#1810658" }, { "@score":"1", "@id":"1810659", "info":{"authors":{"author":[{"@pid":"272/9989","text":"Zhoutong Fu"},{"@pid":"77/9023","text":"Huiji Gao"},{"@pid":"02/7667","text":"Weiwei Guo"},{"@pid":"99/10224","text":"Sandeep Kumar Jha"},{"@pid":"75/7384","text":"Jun Jia"},{"@pid":"04/2106","text":"Xiaowei Liu"},{"@pid":"96/6993","text":"Bo Long"},{"@pid":"31/626","text":"Jun Shi"},{"@pid":"34/10207-2","text":"Sida Wang 0002"},{"@pid":"127/9572","text":"Mingzhou Zhou"}]},"title":"Deep Learning for Search and Recommender Systems in Practice.","venue":"KDD","pages":"3515-3516","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FuGGJJLLSWZ20","doi":"10.1145/3394486.3406709","ee":"https://doi.org/10.1145/3394486.3406709","url":"https://dblp.org/rec/conf/kdd/FuGGJJLLSWZ20"}, "url":"URL#1810659" }, { "@score":"1", "@id":"1810660", "info":{"authors":{"author":[{"@pid":"86/2645-2","text":"Kun Fu 0002"},{"@pid":"135/5675","text":"Fanlin Meng"},{"@pid":"03/5454","text":"Jieping Ye"},{"@pid":"w/ZhengWang10","text":"Zheng Wang 0010"}]},"title":"CompactETA: A Fast Inference System for Travel Time Prediction.","venue":"KDD","pages":"3337-3345","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FuMYW20","doi":"10.1145/3394486.3403386","ee":"https://doi.org/10.1145/3394486.3403386","url":"https://dblp.org/rec/conf/kdd/FuMYW20"}, "url":"URL#1810660" }, { "@score":"1", "@id":"1810661", "info":{"authors":{"author":[{"@pid":"273/0228","text":"Dongqi Fu"},{"@pid":"39/3130-3","text":"Dawei Zhou 0003"},{"@pid":"34/2685","text":"Jingrui He"}]},"title":"Local Motif Clustering on Time-Evolving Graphs.","venue":"KDD","pages":"390-400","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FuZH20","doi":"10.1145/3394486.3403081","ee":"https://doi.org/10.1145/3394486.3403081","url":"https://dblp.org/rec/conf/kdd/FuZH20"}, "url":"URL#1810661" }, { "@score":"1", "@id":"1810662", "info":{"authors":{"author":[{"@pid":"02/2520","text":"Yasuhiro Fujiwara"},{"@pid":"178/8630","text":"Atsutoshi Kumagai"},{"@pid":"209/4874","text":"Sekitoshi Kanai"},{"@pid":"120/6855","text":"Yasutoshi Ida"},{"@pid":"87/2491","text":"Naonori Ueda"}]},"title":"Efficient Algorithm for the b-Matching Graph.","venue":"KDD","pages":"187-197","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/FujiwaraKKIU20","doi":"10.1145/3394486.3403061","ee":"https://doi.org/10.1145/3394486.3403061","url":"https://dblp.org/rec/conf/kdd/FujiwaraKKIU20"}, "url":"URL#1810662" }, { "@score":"1", "@id":"1810663", "info":{"authors":{"author":[{"@pid":"152/3858","text":"Krishna Karthik Gadiraju"},{"@pid":"182/0256","text":"Bharathkumar Ramachandra"},{"@pid":"194/7622","text":"Zexi Chen"},{"@pid":"48/6853","text":"Ranga Raju Vatsavai"}]},"title":"Multimodal Deep Learning Based Crop Classification Using Multispectral and Multitemporal Satellite Imagery.","venue":"KDD","pages":"3234-3242","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GadirajuRCV20","doi":"10.1145/3394486.3403375","ee":"https://doi.org/10.1145/3394486.3403375","url":"https://dblp.org/rec/conf/kdd/GadirajuRCV20"}, "url":"URL#1810663" }, { "@score":"1", "@id":"1810664", "info":{"authors":{"author":[{"@pid":"267/5384","text":"Nicholas Gao"},{"@pid":"181/2393","text":"Max Wilson 0001"},{"@pid":"165/8172","text":"Thomas Vandal"},{"@pid":"215/5323","text":"Walter Vinci"},{"@pid":"70/10416","text":"Ramakrishna R. Nemani"},{"@pid":"65/1345","text":"Eleanor Gilbert Rieffel"}]},"title":"High-Dimensional Similarity Search with Quantum-Assisted Variational Autoencoder.","venue":"KDD","pages":"956-964","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Gao0VVNR20","doi":"10.1145/3394486.3403138","ee":"https://doi.org/10.1145/3394486.3403138","url":"https://dblp.org/rec/conf/kdd/Gao0VVNR20"}, "url":"URL#1810664" }, { "@score":"1", "@id":"1810665", "info":{"authors":{"author":[{"@pid":"37/1969","text":"Dawei Gao"},{"@pid":"64/9992","text":"Xiaoxi He"},{"@pid":"133/3824","text":"Zimu Zhou"},{"@pid":"83/2548","text":"Yongxin Tong"},{"@pid":"x/KeXu","text":"Ke Xu 0001"},{"@pid":"t/LotharThiele","text":"Lothar Thiele"}]},"title":"Rethinking Pruning for Accelerating Deep Inference At the Edge.","venue":"KDD","pages":"155-164","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GaoHZT0T20","doi":"10.1145/3394486.3403058","ee":"https://doi.org/10.1145/3394486.3403058","url":"https://dblp.org/rec/conf/kdd/GaoHZT0T20"}, "url":"URL#1810665" }, { "@score":"1", "@id":"1810666", "info":{"authors":{"author":[{"@pid":"200/7985","text":"Hongyang Gao"},{"@pid":"09/10105","text":"Zhengyang Wang"},{"@pid":"84/6405","text":"Shuiwang Ji"}]},"title":"Kronecker Attention Networks.","venue":"KDD","pages":"229-237","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GaoWJ20","doi":"10.1145/3394486.3403065","ee":"https://doi.org/10.1145/3394486.3403065","url":"https://dblp.org/rec/conf/kdd/GaoWJ20"}, "url":"URL#1810666" }, { "@score":"1", "@id":"1810667", "info":{"authors":{"author":[{"@pid":"236/0032","text":"Junyi Gao"},{"@pid":"170/1833","text":"Cao Xiao"},{"@pid":"244/2314","text":"Lucas M. Glass"},{"@pid":"54/4948","text":"Jimeng Sun 0001"}]},"title":"COMPOSE: Cross-Modal Pseudo-Siamese Network for Patient Trial Matching.","venue":"KDD","pages":"803-812","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GaoXGS20","doi":"10.1145/3394486.3403123","ee":"https://doi.org/10.1145/3394486.3403123","url":"https://dblp.org/rec/conf/kdd/GaoXGS20"}, "url":"URL#1810667" }, { "@score":"1", "@id":"1810668", "info":{"authors":{"author":{"@pid":"155/3119","text":"Timnit Gebru"}},"title":"Lessons from Archives: Strategies for Collecting Sociocultural Data in Machine Learning.","venue":"KDD","pages":"3609","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Gebru20","doi":"10.1145/3394486.3409559","ee":"https://doi.org/10.1145/3394486.3409559","url":"https://dblp.org/rec/conf/kdd/Gebru20"}, "url":"URL#1810668" }, { "@score":"1", "@id":"1810670", "info":{"authors":{"author":[{"@pid":"165/4263","text":"Salah Ghamizi"},{"@pid":"241/3976","text":"Renaud Rwemalika"},{"@pid":"73/10839","text":"Maxime Cordy"},{"@pid":"267/5480","text":"Lisa Veiber"},{"@pid":"00/8006","text":"Tegawendé F. Bissyandé"},{"@pid":"00/7677","text":"Mike Papadakis"},{"@pid":"k/JacquesKlein","text":"Jacques Klein"},{"@pid":"95/5206","text":"Yves Le Traon"}]},"title":"Data-driven Simulation and Optimization for Covid-19 Exit Strategies.","venue":"KDD","pages":"3434-3442","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GhamiziRCVBPKT20","doi":"10.1145/3394486.3412863","ee":"https://doi.org/10.1145/3394486.3412863","url":"https://dblp.org/rec/conf/kdd/GhamiziRCVBPKT20"}, "url":"URL#1810670" }, { "@score":"1", "@id":"1810671", "info":{"authors":{"author":{"@pid":"45/4320","text":"Shalini Ghosh"}},"title":"Multimodal Machine Learning for Video and Image Analysis.","venue":"KDD","pages":"3608","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Ghosh20","doi":"10.1145/3394486.3409558","ee":"https://doi.org/10.1145/3394486.3409558","url":"https://dblp.org/rec/conf/kdd/Ghosh20"}, "url":"URL#1810671" }, { "@score":"1", "@id":"1810672", "info":{"authors":{"author":{"@pid":"88/2686","text":"Yolanda Gil"}},"title":"Keynote Speaker: Yolanda Gil.","venue":"KDD","pages":"4","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Gil20","doi":"10.1145/3394486.3407094","ee":"https://doi.org/10.1145/3394486.3407094","url":"https://dblp.org/rec/conf/kdd/Gil20"}, "url":"URL#1810672" }, { "@score":"1", "@id":"1810673", "info":{"authors":{"author":[{"@pid":"223/3141","text":"Linxia Gong"},{"@pid":"273/0210","text":"Xiaochuan Feng"},{"@pid":"251/9672","text":"Dezhi Ye"},{"@pid":"17/5705","text":"Hao Li"},{"@pid":"180/4550","text":"Runze Wu"},{"@pid":"185/4005","text":"Jianrong Tao"},{"@pid":"71/882","text":"Changjie Fan"},{"@pid":"31/891-1","text":"Peng Cui 0001"}]},"title":"OptMatch: Optimized Matchmaking via Modeling the High-Order Interactions on the Arena.","venue":"KDD","pages":"2300-2310","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GongFYLWTFC20","doi":"10.1145/3394486.3403279","ee":"https://doi.org/10.1145/3394486.3403279","url":"https://dblp.org/rec/conf/kdd/GongFYLWTFC20"}, "url":"URL#1810673" }, { "@score":"1", "@id":"1810674", "info":{"authors":{"author":[{"@pid":"25/9187","text":"Brian J. Goode"},{"@pid":"158/4376","text":"Debanjan Datta"}]},"title":"A Geometric Approach to Predicting Bounds of Downstream Model Performance.","venue":"KDD","pages":"1596-1604","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GoodeD20","doi":"10.1145/3394486.3403210","ee":"https://doi.org/10.1145/3394486.3403210","url":"https://dblp.org/rec/conf/kdd/GoodeD20"}, "url":"URL#1810674" }, { "@score":"1", "@id":"1810675", "info":{"authors":{"author":[{"@pid":"70/10949","text":"Arjun Gopalan"},{"@pid":"47/1564","text":"Da-Cheng Juan"},{"@pid":"273/0132","text":"Cesar Ilharco Magalhaes"},{"@pid":"63/7455","text":"Chun-Sung Ferng"},{"@pid":"48/3474","text":"Allan Heydon"},{"@pid":"96/9436","text":"Chun-Ta Lu"},{"@pid":"263/3069","text":"Philip Pham"},{"@pid":"48/11520","text":"George Yu"}]},"title":"Neural Structured Learning: Training Neural Networks with Structured Signals.","venue":"KDD","pages":"3501-3502","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GopalanJMFHLPY20","doi":"10.1145/3394486.3406701","ee":"https://doi.org/10.1145/3394486.3406701","url":"https://dblp.org/rec/conf/kdd/GopalanJMFHLPY20"}, "url":"URL#1810675" }, { "@score":"1", "@id":"1810676", "info":{"authors":{"author":[{"@pid":"220/8642","text":"Xiangyang Gou"},{"@pid":"08/6646","text":"Long He"},{"@pid":"135/4896-2","text":"Yinda Zhang 0002"},{"@pid":"181/2613","text":"Ke Wang"},{"@pid":"243/3118","text":"Xilai Liu"},{"@pid":"44/7710-3","text":"Tong Yang 0003"},{"@pid":"67/6649-4","text":"Yi Wang 0004"},{"@pid":"55/5031","text":"Bin Cui 0001"}]},"title":"Sliding Sketches: A Framework using Time Zones for Data Stream Processing in Sliding Windows.","venue":"KDD","pages":"1015-1025","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GouHZWLYW020","doi":"10.1145/3394486.3403144","ee":"https://doi.org/10.1145/3394486.3403144","url":"https://dblp.org/rec/conf/kdd/GouHZWLYW020"}, "url":"URL#1810676" }, { "@score":"1", "@id":"1810677", "info":{"authors":{"author":[{"@pid":"29/1758-1","text":"Bin Gu 0001"},{"@pid":"272/0738","text":"Zhiyuan Dang"},{"@pid":"40/1491-12","text":"Xiang Li 0012"},{"@pid":"03/281","text":"Heng Huang"}]},"title":"Federated Doubly Stochastic Kernel Learning for Vertically Partitioned Data.","venue":"KDD","pages":"2483-2493","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GuDLH20","doi":"10.1145/3394486.3403298","ee":"https://doi.org/10.1145/3394486.3403298","url":"https://dblp.org/rec/conf/kdd/GuDLH20"}, "url":"URL#1810677" }, { "@score":"1", "@id":"1810678", "info":{"authors":{"author":[{"@pid":"167/4378","text":"Ruocheng Guo"},{"@pid":"05/11350","text":"Xiaoting Zhao"},{"@pid":"234/6883","text":"Adam Henderson"},{"@pid":"00/7186","text":"Liangjie Hong"},{"@pid":"92/309-1","text":"Huan Liu 0001"}]},"title":"Debiasing Grid-based Product Search in E-commerce.","venue":"KDD","pages":"2852-2860","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GuoZHH020","doi":"10.1145/3394486.3403336","ee":"https://doi.org/10.1145/3394486.3403336","url":"https://dblp.org/rec/conf/kdd/GuoZHH020"}, "url":"URL#1810678" }, { "@score":"1", "@id":"1810679", "info":{"authors":{"author":[{"@pid":"216/4845","text":"Lan-Zhe Guo"},{"@pid":"04/2090-7","text":"Zhi Zhou 0007"},{"@pid":"57/413","text":"Yu-Feng Li"}]},"title":"RECORD: Resource Constrained Semi-Supervised Learning under Distribution Shift.","venue":"KDD","pages":"1636-1644","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GuoZL20","doi":"10.1145/3394486.3403214","ee":"https://doi.org/10.1145/3394486.3403214","url":"https://dblp.org/rec/conf/kdd/GuoZL20"}, "url":"URL#1810679" }, { "@score":"1", "@id":"1810680", "info":{"authors":{"author":[{"@pid":"43/8066-2","text":"Xiaojie Guo 0002"},{"@pid":"63/5422-2","text":"Liang Zhao 0002"},{"@pid":"13/8401","text":"Zhao Qin"},{"@pid":"27/9060","text":"Lingfei Wu"},{"@pid":"53/3810","text":"Amarda Shehu"},{"@pid":"07/4509","text":"Yanfang Ye 0001"}]},"title":"Interpretable Deep Graph Generation with Node-edge Co-disentanglement.","venue":"KDD","pages":"1697-1707","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GuoZQWSY20","doi":"10.1145/3394486.3403221","ee":"https://doi.org/10.1145/3394486.3403221","url":"https://dblp.org/rec/conf/kdd/GuoZQWSY20"}, "url":"URL#1810680" }, { "@score":"1", "@id":"1810681", "info":{"authors":{"author":[{"@pid":"77/9350","text":"Aman Gupta"},{"@pid":"273/0101","text":"Sirjan Kafle"},{"@pid":"78/3909-3","text":"Di Wen 0003"},{"@pid":"241/7923","text":"Dylan Wang"},{"@pid":"28/8107","text":"Sumit Srivastava"},{"@pid":"195/8166","text":"Suhit Sinha"},{"@pid":"23/11258","text":"Nikita Gupta"},{"@pid":"81/9960","text":"Bharat Jain"},{"@pid":"04/2298","text":"Ananth Sankar"},{"@pid":"50/6759-21","text":"Liang Zhang 0021"}]},"title":"Image and Video Understanding for Recommendation and Spam Detection Systems.","venue":"KDD","pages":"3577-3578","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/GuptaKWWSSGJSZ20","doi":"10.1145/3394486.3406485","ee":"https://doi.org/10.1145/3394486.3406485","url":"https://dblp.org/rec/conf/kdd/GuptaKWWSSGJSZ20"}, "url":"URL#1810681" }, { "@score":"1", "@id":"1810682", "info":{"authors":{"author":[{"@pid":"271/0769","text":"Jonathan Halcrow"},{"@pid":"271/1025","text":"Alexandru Mosoi"},{"@pid":"271/0637","text":"Sam Ruth"},{"@pid":"91/10813","text":"Bryan Perozzi"}]},"title":"Grale: Designing Networks for Graph Learning.","venue":"KDD","pages":"2523-2532","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HalcrowMRP20","doi":"10.1145/3394486.3403302","ee":"https://doi.org/10.1145/3394486.3403302","url":"https://dblp.org/rec/conf/kdd/HalcrowMRP20"}, "url":"URL#1810682" }, { "@score":"1", "@id":"1810683", "info":{"authors":{"author":[{"@pid":"44/1326","text":"Malay Haldar"},{"@pid":"99/5813","text":"Prashant Ramanathan"},{"@pid":"258/5045","text":"Tyler Sax"},{"@pid":"228/8502","text":"Mustafa Abdool"},{"@pid":"49/8313","text":"Lanbo Zhang"},{"@pid":"258/4698","text":"Aamir Mansawala"},{"@pid":"92/1682","text":"Shulin Yang"},{"@pid":"138/6444","text":"Bradley C. Turnbull"},{"@pid":"258/5022","text":"Junshuo Liao"}]},"title":"Improving Deep Learning for Airbnb Search.","venue":"KDD","pages":"2822-2830","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HaldarRSAZMYTL20","doi":"10.1145/3394486.3403333","ee":"https://doi.org/10.1145/3394486.3403333","url":"https://dblp.org/rec/conf/kdd/HaldarRSAZMYTL20"}, "url":"URL#1810683" }, { "@score":"1", "@id":"1810684", "info":{"authors":{"author":{"@pid":"h/AlonYHalevy","text":"Alon Y. Halevy"}},"title":"Preserving Integrity in Online Social Media.","venue":"KDD","pages":"3601","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Halevy20","doi":"10.1145/3394486.3409548","ee":"https://doi.org/10.1145/3394486.3409548","url":"https://dblp.org/rec/conf/kdd/Halevy20"}, "url":"URL#1810684" }, { "@score":"1", "@id":"1810685", "info":{"authors":{"author":[{"@pid":"72/5688-1","text":"Sungwon Han 0001"},{"@pid":"255/5602","text":"Donghyun Ahn"},{"@pid":"13/1835-1","text":"Sungwon Park 0001"},{"@pid":"255/5870","text":"Jeasurk Yang"},{"@pid":"273/0230","text":"Susang Lee"},{"@pid":"23/3330","text":"Jihee Kim"},{"@pid":"273/0261","text":"Hyunjoo Yang"},{"@pid":"75/4321","text":"Sangyoon Park"},{"@pid":"57/4924","text":"Meeyoung Cha"}]},"title":"Learning to Score Economic Development from Satellite Imagery.","venue":"KDD","pages":"2970-2979","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HanAPYLKYPC20","doi":"10.1145/3394486.3403347","ee":"https://doi.org/10.1145/3394486.3403347","url":"https://dblp.org/rec/conf/kdd/HanAPYLKYPC20"}, "url":"URL#1810685" }, { "@score":"1", "@id":"1810686", "info":{"authors":{"author":[{"@pid":"217/1848","text":"Fred X. Han"},{"@pid":"82/4953","text":"Di Niu"},{"@pid":"150/0564","text":"Haolan Chen"},{"@pid":"77/5502","text":"Weidong Guo"},{"@pid":"147/4504","text":"Shengli Yan"},{"@pid":"273/0276","text":"Bowei Long"}]},"title":"Meta-Learning for Query Conceptualization at Web Scale.","venue":"KDD","pages":"3064-3073","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HanNCGYL20","doi":"10.1145/3394486.3403357","ee":"https://doi.org/10.1145/3394486.3403357","url":"https://dblp.org/rec/conf/kdd/HanNCGYL20"}, "url":"URL#1810686" }, { "@score":"1", "@id":"1810688", "info":{"authors":{"author":[{"@pid":"272/9909","text":"Qianyue Hao"},{"@pid":"13/3479-2","text":"Lin Chen 0002"},{"@pid":"169/8818","text":"Fengli Xu"},{"@pid":"93/2334-8","text":"Yong Li 0008"}]},"title":"Understanding the Urban Pandemic Spreading of COVID-19 with Real World Mobility Data.","venue":"KDD","pages":"3485-3492","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Hao0XL20","doi":"10.1145/3394486.3412860","ee":"https://doi.org/10.1145/3394486.3412860","url":"https://dblp.org/rec/conf/kdd/Hao0XL20"}, "url":"URL#1810688" }, { "@score":"1", "@id":"1810689", "info":{"authors":{"author":[{"@pid":"270/0220","text":"Zhongkai Hao"},{"@pid":"243/6048","text":"Chengqiang Lu"},{"@pid":"178/8690","text":"Zhenya Huang"},{"@pid":"181/2812-76","text":"Hao Wang 0076"},{"@pid":"270/0713","text":"Zheyuan Hu"},{"@pid":"95/2446-3","text":"Qi Liu 0003"},{"@pid":"07/258","text":"Enhong Chen"},{"@pid":"243/5865","text":"Cheekong Lee"}]},"title":"ASGN: An Active Semi-supervised Graph Neural Network for Molecular Property Prediction.","venue":"KDD","pages":"731-752","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HaoLHWHLCL20","doi":"10.1145/3394486.3403117","ee":"https://doi.org/10.1145/3394486.3403117","url":"https://dblp.org/rec/conf/kdd/HaoLHWHLCL20"}, "url":"URL#1810689" }, { "@score":"1", "@id":"1810690", "info":{"authors":{"author":[{"@pid":"211/5752","text":"Thomas Hartvigsen"},{"@pid":"167/6611","text":"Cansu Sen"},{"@pid":"06/8315","text":"Xiangnan Kong"},{"@pid":"r/EARundensteiner","text":"Elke A. Rundensteiner"}]},"title":"Recurrent Halting Chain for Early Multi-label Classification.","venue":"KDD","pages":"1382-1392","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HartvigsenSKR20","doi":"10.1145/3394486.3403191","ee":"https://doi.org/10.1145/3394486.3403191","url":"https://dblp.org/rec/conf/kdd/HartvigsenSKR20"}, "url":"URL#1810690" }, { "@score":"1", "@id":"1810691", "info":{"authors":{"author":[{"@pid":"248/5381","text":"Johannes Haug"},{"@pid":"251/3229","text":"Martin Pawelczyk"},{"@pid":"00/7271","text":"Klaus Broelemann"},{"@pid":"69/3216","text":"Gjergji Kasneci"}]},"title":"Leveraging Model Inherent Variable Importance for Stable Online Feature Selection.","venue":"KDD","pages":"1478-1502","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HaugPBK20","doi":"10.1145/3394486.3403200","ee":"https://doi.org/10.1145/3394486.3403200","url":"https://dblp.org/rec/conf/kdd/HaugPBK20"}, "url":"URL#1810691" }, { "@score":"1", "@id":"1810692", "info":{"authors":{"author":[{"@pid":"266/5559","text":"Wenchong He"},{"@pid":"50/4629-1","text":"Zhe Jiang 0001"},{"@pid":"78/5836-6","text":"Chengming Zhang 0006"},{"@pid":"204/2388","text":"Arpan Man Sainju"}]},"title":"CurvaNet: Geometric Deep Learning based on Directional Curvature for 3D Shape Analysis.","venue":"KDD","pages":"2214-2224","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/He0ZS20","doi":"10.1145/3394486.3403272","ee":"https://doi.org/10.1145/3394486.3403272","url":"https://dblp.org/rec/conf/kdd/He0ZS20"}, "url":"URL#1810692" }, { "@score":"1", "@id":"1810693", "info":{"authors":{"author":[{"@pid":"51/6071-1","text":"Yue He 0001"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"117/8564","text":"Jianxin Ma"},{"@pid":"13/4741-1","text":"Hao Zou 0001"},{"@pid":"27/5665","text":"Xiaowei Wang"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"}]},"title":"Learning Stable Graphs from Multiple Environments with Selection Bias.","venue":"KDD","pages":"2194-2202","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HeCMZWYY20","doi":"10.1145/3394486.3403270","ee":"https://doi.org/10.1145/3394486.3403270","url":"https://dblp.org/rec/conf/kdd/HeCMZWYY20"}, "url":"URL#1810693" }, { "@score":"1", "@id":"1810694", "info":{"authors":{"author":[{"@pid":"15/2841-8","text":"Yong He 0008"},{"@pid":"54/2062","text":"Cheng Wang"},{"@pid":"84/3795","text":"Nan Li"},{"@pid":"273/0191","text":"Zhenyu Zeng"}]},"title":"Attention and Memory-Augmented Networks for Dual-View Sequential Learning.","venue":"KDD","pages":"125-134","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HeWLZ20","doi":"10.1145/3394486.3403055","ee":"https://doi.org/10.1145/3394486.3403055","url":"https://dblp.org/rec/conf/kdd/HeWLZ20"}, "url":"URL#1810694" }, { "@score":"1", "@id":"1810695", "info":{"authors":{"author":[{"@pid":"252/5510","text":"Yuval Heffetz"},{"@pid":"228/2573","text":"Roman Vainshtein"},{"@pid":"54/10321","text":"Gilad Katz"},{"@pid":"r/LiorRokach","text":"Lior Rokach"}]},"title":"DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering.","venue":"KDD","pages":"2103-2113","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HeffetzVKR20","doi":"10.1145/3394486.3403261","ee":"https://doi.org/10.1145/3394486.3403261","url":"https://dblp.org/rec/conf/kdd/HeffetzVKR20"}, "url":"URL#1810695" }, { "@score":"1", "@id":"1810696", "info":{"authors":{"author":{"@pid":"272/9948","text":"Nhung Ho"}},"title":"How AI Can Help Build Resiliency for Small Businesses in a Global Economic Crisis.","venue":"KDD","pages":"3606","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Ho20","doi":"10.1145/3394486.3409556","ee":"https://doi.org/10.1145/3394486.3409556","url":"https://dblp.org/rec/conf/kdd/Ho20"}, "url":"URL#1810696" }, { "@score":"1", "@id":"1810698", "info":{"authors":{"author":[{"@pid":"00/7186","text":"Liangjie Hong"},{"@pid":"l/MLalmas","text":"Mounia Lalmas"}]},"title":"Tutorial on Online User Engagement: Metrics and Optimization.","venue":"KDD","pages":"3551-3552","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HongL20","doi":"10.1145/3394486.3406472","ee":"https://doi.org/10.1145/3394486.3406472","url":"https://dblp.org/rec/conf/kdd/HongL20"}, "url":"URL#1810698" }, { "@score":"1", "@id":"1810699", "info":{"authors":{"author":[{"@pid":"205/1688","text":"Huiting Hong"},{"@pid":"221/7767","text":"Yucheng Lin"},{"@pid":"97/4171","text":"Xiaoqing Yang"},{"@pid":"06/6214","text":"Zang Li"},{"@pid":"86/2645-2","text":"Kun Fu 0002"},{"@pid":"w/ZhengWang10","text":"Zheng Wang 0010"},{"@pid":"62/1827","text":"Xiaohu Qie"},{"@pid":"03/5454","text":"Jieping Ye"}]},"title":"HetETA: Heterogeneous Information Network Embedding for Estimating Time of Arrival.","venue":"KDD","pages":"2444-2454","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HongLYLFWQY20","doi":"10.1145/3394486.3403294","ee":"https://doi.org/10.1145/3394486.3403294","url":"https://dblp.org/rec/conf/kdd/HongLYLFWQY20"}, "url":"URL#1810699" }, { "@score":"1", "@id":"1810700", "info":{"authors":{"author":[{"@pid":"146/8262","text":"Shenda Hong"},{"@pid":"25/6978","text":"Yanbo Xu"},{"@pid":"211/0360","text":"Alind Khare"},{"@pid":"237/7558","text":"Satria Priambada"},{"@pid":"223/3164","text":"Kevin O. Maher"},{"@pid":"272/4305","text":"Alaa Aljiffry"},{"@pid":"54/4948","text":"Jimeng Sun 0001"},{"@pid":"41/6224","text":"Alexey Tumanov"}]},"title":"HOLMES: Health OnLine Model Ensemble Serving for Deep Learning Models in Intensive Care Units.","venue":"KDD","pages":"1614-1624","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HongXKPMAST20","doi":"10.1145/3394486.3403212","ee":"https://doi.org/10.1145/3394486.3403212","url":"https://dblp.org/rec/conf/kdd/HongXKPMAST20"}, "url":"URL#1810700" }, { "@score":"1", "@id":"1810701", "info":{"authors":{"author":{"@pid":"294/1598","text":"Estevam R. Hruschka Jr."}},"title":"Data-Driven Never-Ending Learning Question Answering Systems.","venue":"KDD","pages":"3579-3580","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Hruschka20","doi":"10.1145/3394486.3406486","ee":"https://doi.org/10.1145/3394486.3406486","url":"https://dblp.org/rec/conf/kdd/Hruschka20"}, "url":"URL#1810701" }, { "@score":"1", "@id":"1810702", "info":{"authors":{"author":[{"@pid":"180/5436","text":"Ziniu Hu"},{"@pid":"17/9267","text":"Yuxiao Dong"},{"@pid":"79/1140","text":"Kuansan Wang"},{"@pid":"18/2428","text":"Kai-Wei Chang"},{"@pid":"37/3868","text":"Yizhou Sun"}]},"title":"GPT-GNN: Generative Pre-Training of Graph Neural Networks.","venue":"KDD","pages":"1857-1867","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuDWCS20","doi":"10.1145/3394486.3403237","ee":"https://doi.org/10.1145/3394486.3403237","url":"https://dblp.org/rec/conf/kdd/HuDWCS20"}, "url":"URL#1810702" }, { "@score":"1", "@id":"1810703", "info":{"authors":{"author":[{"@pid":"24/7536","text":"Xia Hu"},{"@pid":"127/2089","text":"Weiqing Liu"},{"@pid":"09/851-2","text":"Jiang Bian 0002"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Measuring Model Complexity of Neural Networks with Curve Activation Functions.","venue":"KDD","pages":"1521-1531","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuL0P20","doi":"10.1145/3394486.3403203","ee":"https://doi.org/10.1145/3394486.3403203","url":"https://dblp.org/rec/conf/kdd/HuL0P20"}, "url":"URL#1810703" }, { "@score":"1", "@id":"1810704", "info":{"authors":{"author":[{"@pid":"53/5104","text":"Chenhui Hu"},{"@pid":"95/11211","text":"Vanja Paunic"}]},"title":"Building Forecasting Solutions Using Open-Source and Azure Machine Learning.","venue":"KDD","pages":"3497-3498","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuP20","doi":"10.1145/3394486.3406699","ee":"https://doi.org/10.1145/3394486.3406699","url":"https://dblp.org/rec/conf/kdd/HuP20"}, "url":"URL#1810704" }, { "@score":"1", "@id":"1810705", "info":{"authors":{"author":[{"@pid":"134/4031","text":"Zhiting Hu"},{"@pid":"36/3855","text":"Eric P. Xing"}]},"title":"Learning from All Types of Experiences: A Unifying Machine Learning Perspective.","venue":"KDD","pages":"3531-3532","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuX20","doi":"10.1145/3394486.3406462","ee":"https://doi.org/10.1145/3394486.3406462","url":"https://dblp.org/rec/conf/kdd/HuX20"}, "url":"URL#1810705" }, { "@score":"1", "@id":"1810706", "info":{"authors":{"author":[{"@pid":"150/8482","text":"Mengdi Huai"},{"@pid":"207/9364","text":"Jianhui Sun"},{"@pid":"204/0158","text":"Renqin Cai"},{"@pid":"219/1767","text":"Liuyi Yao"},{"@pid":"z/AidongZhang","text":"Aidong Zhang"}]},"title":"Malicious Attacks against Deep Reinforcement Learning Interpretations.","venue":"KDD","pages":"472-482","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuaiSCYZ20","doi":"10.1145/3394486.3403089","ee":"https://doi.org/10.1145/3394486.3403089","url":"https://dblp.org/rec/conf/kdd/HuaiSCYZ20"}, "url":"URL#1810706" }, { "@score":"1", "@id":"1810707", "info":{"authors":{"author":[{"@pid":"249/2209","text":"Shenyang Huang"},{"@pid":"268/8100","text":"Yasmeen Hitti"},{"@pid":"143/7327","text":"Guillaume Rabusseau"},{"@pid":"94/9024","text":"Reihaneh Rabbany"}]},"title":"Laplacian Change Point Detection for Dynamic Graphs.","venue":"KDD","pages":"349-358","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangHRR20","doi":"10.1145/3394486.3403077","ee":"https://doi.org/10.1145/3394486.3403077","url":"https://dblp.org/rec/conf/kdd/HuangHRR20"}, "url":"URL#1810707" }, { "@score":"1", "@id":"1810708", "info":{"authors":{"author":[{"@pid":"98/5766","text":"Xin Huang"},{"@pid":"238/6261","text":"Jangsoo Lee"},{"@pid":"62/693","text":"Young-Woo Kwon 0001"},{"@pid":"70/1627","text":"Chul-Ho Lee"}]},"title":"CrowdQuake: A Networked System of Low-Cost Sensors for Earthquake Detection via Deep Learning.","venue":"KDD","pages":"3261-3271","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangLKL20","doi":"10.1145/3394486.3403378","ee":"https://doi.org/10.1145/3394486.3403378","url":"https://dblp.org/rec/conf/kdd/HuangLKL20"}, "url":"URL#1810708" }, { "@score":"1", "@id":"1810709", "info":{"authors":{"author":[{"@pid":"82/8762","text":"Jui-Ting Huang"},{"@pid":"02/99","text":"Ashish Sharma"},{"@pid":"40/5430","text":"Shuying Sun"},{"@pid":"22/6963","text":"Li Xia"},{"@pid":"205/8812","text":"David Zhang"},{"@pid":"135/4702","text":"Philip Pronin"},{"@pid":"267/9773","text":"Janani Padmanabhan"},{"@pid":"56/8171","text":"Giuseppe Ottaviano"},{"@pid":"65/5947","text":"Linjun Yang"}]},"title":"Embedding-based Retrieval in Facebook Search.","venue":"KDD","pages":"2553-2561","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangSSXZPPOY20","doi":"10.1145/3394486.3403305","ee":"https://doi.org/10.1145/3394486.3403305","url":"https://dblp.org/rec/conf/kdd/HuangSSXZPPOY20"}, "url":"URL#1810709" }, { "@score":"1", "@id":"1810710", "info":{"authors":{"author":[{"@pid":"84/1560","text":"Jizhou Huang"},{"@pid":"10/5209-1","text":"Haifeng Wang 0001"},{"@pid":"130/8157","text":"Miao Fan"},{"@pid":"251/9542","text":"An Zhuo"},{"@pid":"22/1805","text":"Ying Li"}]},"title":"Personalized Prefix Embedding for POI Auto-Completion in the Search Engine of Baidu Maps.","venue":"KDD","pages":"2677-2685","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangWFZL20","doi":"10.1145/3394486.3403318","ee":"https://doi.org/10.1145/3394486.3403318","url":"https://dblp.org/rec/conf/kdd/HuangWFZL20"}, "url":"URL#1810710" }, { "@score":"1", "@id":"1810711", "info":{"authors":{"author":[{"@pid":"84/1560","text":"Jizhou Huang"},{"@pid":"10/5209-1","text":"Haifeng Wang 0001"},{"@pid":"130/8157","text":"Miao Fan"},{"@pid":"251/9542","text":"An Zhuo"},{"@pid":"32/7981","text":"Yibo Sun"},{"@pid":"22/1805","text":"Ying Li"}]},"title":"Understanding the Impact of the COVID-19 Pandemic on Transportation-related Behaviors with Human Mobility Data.","venue":"KDD","pages":"3443-3450","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangWFZSL20","doi":"10.1145/3394486.3412856","ee":"https://doi.org/10.1145/3394486.3412856","url":"https://dblp.org/rec/conf/kdd/HuangWFZSL20"}, "url":"URL#1810711" }, { "@score":"1", "@id":"1810712", "info":{"authors":{"author":[{"@pid":"187/2874-1","text":"Jiaxin Huang 0001"},{"@pid":"147/6506","text":"Yiqing Xie"},{"@pid":"30/4233-1","text":"Yu Meng 0001"},{"@pid":"44/4491","text":"Yunyi Zhang"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"CoRel: Seed-Guided Topical Taxonomy Construction by Concept Learning and Relation Transferring.","venue":"KDD","pages":"1928-1936","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/HuangXMZ020","doi":"10.1145/3394486.3403244","ee":"https://doi.org/10.1145/3394486.3403244","url":"https://dblp.org/rec/conf/kdd/HuangXMZ020"}, "url":"URL#1810712" }, { "@score":"1", "@id":"1810713", "info":{"authors":{"author":[{"@pid":"48/4523","text":"Makoto Imamura"},{"@pid":"36/7646","text":"Takaaki Nakamura"},{"@pid":"k/EamonnJKeogh","text":"Eamonn J. Keogh"}]},"title":"Matrix Profile XXI: A Geometric Approach to Time Series Chains Improves Robustness.","venue":"KDD","pages":"1114-1122","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ImamuraNK20","doi":"10.1145/3394486.3403164","ee":"https://doi.org/10.1145/3394486.3403164","url":"https://dblp.org/rec/conf/kdd/ImamuraNK20"}, "url":"URL#1810713" }, { "@score":"1", "@id":"1810714", "info":{"authors":{"author":[{"@pid":"186/0970","text":"Alexander Immer"},{"@pid":"186/7793","text":"Victor Kristof"},{"@pid":"g/MGrossglauser","text":"Matthias Grossglauser"},{"@pid":"t/PThiran","text":"Patrick Thiran"}]},"title":"Sub-Matrix Factorization for Real-Time Vote Prediction.","venue":"KDD","pages":"2280-2290","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ImmerKGT20","doi":"10.1145/3394486.3403277","ee":"https://doi.org/10.1145/3394486.3403277","url":"https://dblp.org/rec/conf/kdd/ImmerKGT20"}, "url":"URL#1810714" }, { "@score":"1", "@id":"1810715", "info":{"authors":{"author":{"@pid":"197/3065","text":"Hasan Jackson"}},"title":"Perspectives on Broadening Participation in STEM Careers across Academia, Government, and Industry.","venue":"KDD","pages":"3589-3590","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Jackson20","doi":"10.1145/3394486.3411070","ee":"https://doi.org/10.1145/3394486.3411070","url":"https://dblp.org/rec/conf/kdd/Jackson20"}, "url":"URL#1810715" }, { "@score":"1", "@id":"1810716", "info":{"authors":{"author":[{"@pid":"259/2348","text":"Latifa Jackson"},{"@pid":"261/3757","text":"Heriberto Acosta Maestre"}]},"title":"The Data Science Mentoring Fire Next Time: Innovative Strategies for Mentoring in Data Science.","venue":"KDD","pages":"3597-3600","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JacksonM20","doi":"10.1145/3394486.3411077","ee":"https://doi.org/10.1145/3394486.3411077","url":"https://dblp.org/rec/conf/kdd/JacksonM20"}, "url":"URL#1810716" }, { "@score":"1", "@id":"1810718", "info":{"authors":{"author":[{"@pid":"167/2404-1","text":"Abhinav Jain 0001"},{"@pid":"149/2405","text":"Hima Patel"},{"@pid":"259/2681","text":"Lokesh Nagalapatti"},{"@pid":"12/1770-5","text":"Nitin Gupta 0005"},{"@pid":"91/877","text":"Sameep Mehta"},{"@pid":"230/8589","text":"Shanmukha C. Guttula"},{"@pid":"126/0992","text":"Shashank Mujumdar"},{"@pid":"22/7687","text":"Shazia Afzal"},{"@pid":"218/9188","text":"Ruhi Sharma Mittal"},{"@pid":"165/9499","text":"Vitobha Munigala"}]},"title":"Overview and Importance of Data Quality for Machine Learning Tasks.","venue":"KDD","pages":"3561-3562","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JainPNGMGMAMM20","doi":"10.1145/3394486.3406477","ee":"https://doi.org/10.1145/3394486.3406477","url":"https://dblp.org/rec/conf/kdd/JainPNGMGMAMM20"}, "url":"URL#1810718" }, { "@score":"1", "@id":"1810719", "info":{"authors":{"author":[{"@pid":"246/4915","text":"Surgan Jandial"},{"@pid":"195/5602","text":"Ayush Chopra"},{"@pid":"43/6264","text":"Mausoom Sarkar"},{"@pid":"57/6295","text":"Piyush Gupta"},{"@pid":"79/1076","text":"Balaji Krishnamurthy"},{"@pid":"88/4691","text":"Vineeth Balasubramanian"}]},"title":"Retrospective Loss: Looking Back to Improve Training of Deep Neural Networks.","venue":"KDD","pages":"1123-1131","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JandialCSGKB20","doi":"10.1145/3394486.3403165","ee":"https://doi.org/10.1145/3394486.3403165","url":"https://dblp.org/rec/conf/kdd/JandialCSGKB20"}, "url":"URL#1810719" }, { "@score":"1", "@id":"1810720", "info":{"authors":{"author":[{"@pid":"232/8079","text":"Olivier Jeunen"},{"@pid":"10/4983","text":"David Rohde"},{"@pid":"64/4087","text":"Flavian Vasile"},{"@pid":"222/2161","text":"Martin Bompaire"}]},"title":"Joint Policy-Value Learning for Recommendation.","venue":"KDD","pages":"1223-1233","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JeunenRVB20","doi":"10.1145/3394486.3403175","ee":"https://doi.org/10.1145/3394486.3403175","url":"https://dblp.org/rec/conf/kdd/JeunenRVB20"}, "url":"URL#1810720" }, { "@score":"1", "@id":"1810721", "info":{"authors":{"author":[{"@pid":"272/9950","text":"Shuyi Ji"},{"@pid":"225/5463","text":"Yifan Feng"},{"@pid":"86/5681","text":"Rongrong Ji"},{"@pid":"62/5754","text":"Xibin Zhao"},{"@pid":"83/7235","text":"Wanwan Tang"},{"@pid":"33/3099-2","text":"Yue Gao 0002"}]},"title":"Dual Channel Hypergraph Collaborative Filtering.","venue":"KDD","pages":"2020-2029","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JiFJZT020","doi":"10.1145/3394486.3403253","ee":"https://doi.org/10.1145/3394486.3403253","url":"https://dblp.org/rec/conf/kdd/JiFJZT020"}, "url":"URL#1810721" }, { "@score":"1", "@id":"1810722", "info":{"authors":{"author":[{"@pid":"225/5443","text":"Junteng Jia"},{"@pid":"125/2210","text":"Austin R. Benson"}]},"title":"Residual Correlation in Graph Neural Network Regression.","venue":"KDD","pages":"588-598","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JiaB20","doi":"10.1145/3394486.3403101","ee":"https://doi.org/10.1145/3394486.3403101","url":"https://dblp.org/rec/conf/kdd/JiaB20"}, "url":"URL#1810722" }, { "@score":"1", "@id":"1810723", "info":{"authors":{"author":[{"@pid":"129/3026","text":"Zhihao Jia"},{"@pid":"116/4935","text":"Sina Lin"},{"@pid":"173/5282","text":"Rex Ying"},{"@pid":"192/4727","text":"Jiaxuan You"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"},{"@pid":"a/AAiken","text":"Alex Aiken"}]},"title":"Redundancy-Free Computation for Graph Neural Networks.","venue":"KDD","pages":"997-1005","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JiaLYYLA20","doi":"10.1145/3394486.3403142","ee":"https://doi.org/10.1145/3394486.3403142","url":"https://dblp.org/rec/conf/kdd/JiaLYYLA20"}, "url":"URL#1810723" }, { "@score":"1", "@id":"1810724", "info":{"authors":{"author":[{"@pid":"118/5304","text":"Xiaowei Jia"},{"@pid":"79/8522","text":"Handong Zhao"},{"@pid":"42/1680-1","text":"Zhe Lin 0001"},{"@pid":"04/6453","text":"Ajinkya Kale"},{"@pid":"k/VipinKumar-1","text":"Vipin Kumar 0001"}]},"title":"Personalized Image Retrieval with Sparse Graph Representation Learning.","venue":"KDD","pages":"2735-2743","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JiaZLKK20","doi":"10.1145/3394486.3403324","ee":"https://doi.org/10.1145/3394486.3403324","url":"https://dblp.org/rec/conf/kdd/JiaZLKK20"}, "url":"URL#1810724" }, { "@score":"1", "@id":"1810725", "info":{"authors":{"author":{"@pid":"96/2151","text":"Daniel A. Jiménez"}},"title":"Support for Diverse Students.","venue":"KDD","pages":"3584","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Jimenez20","doi":"10.1145/3394486.3411066","ee":"https://doi.org/10.1145/3394486.3411066","url":"https://dblp.org/rec/conf/kdd/Jimenez20"}, "url":"URL#1810725" }, { "@score":"1", "@id":"1810726", "info":{"authors":{"author":[{"@pid":"66/2173-9","text":"Wei Jin 0009"},{"@pid":"212/7871","text":"Yao Ma 0001"},{"@pid":"172/0995","text":"Xiaorui Liu"},{"@pid":"33/7694","text":"Xianfeng Tang"},{"@pid":"136/9440","text":"Suhang Wang"},{"@pid":"64/10812","text":"Jiliang Tang"}]},"title":"Graph Structure Learning for Robust Graph Neural Networks.","venue":"KDD","pages":"66-74","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Jin0LTWT20","doi":"10.1145/3394486.3403049","ee":"https://doi.org/10.1145/3394486.3403049","url":"https://dblp.org/rec/conf/kdd/Jin0LTWT20"}, "url":"URL#1810726" }, { "@score":"1", "@id":"1810727", "info":{"authors":{"author":[{"@pid":"241/9563","text":"Jiarui Jin"},{"@pid":"227/2898","text":"Jiarui Qin"},{"@pid":"189/3599","text":"Yuchen Fang"},{"@pid":"268/8094","text":"Kounianhua Du"},{"@pid":"28/10261-1","text":"Weinan Zhang 0001"},{"@pid":"43/5685-1","text":"Yong Yu 0001"},{"@pid":"z/ZhengZhang","text":"Zheng Zhang 0001"},{"@pid":"s/AlexanderJSmola","text":"Alexander J. Smola"}]},"title":"An Efficient Neighborhood-based Interaction Model for Recommendation on Heterogeneous Graph.","venue":"KDD","pages":"75-84","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JinQFD00ZS20","doi":"10.1145/3394486.3403050","ee":"https://doi.org/10.1145/3394486.3403050","url":"https://dblp.org/rec/conf/kdd/JinQFD00ZS20"}, "url":"URL#1810727" }, { "@score":"1", "@id":"1810728", "info":{"authors":{"author":[{"@pid":"207/9954","text":"Shengmin Jin"},{"@pid":"93/909","text":"Reza Zafarani"}]},"title":"The Spectral Zoo of Networks: Embedding and Visualizing Networks with Spectral Moments.","venue":"KDD","pages":"1426-1434","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JinZ20","doi":"10.1145/3394486.3403195","ee":"https://doi.org/10.1145/3394486.3403195","url":"https://dblp.org/rec/conf/kdd/JinZ20"}, "url":"URL#1810728" }, { "@score":"1", "@id":"1810729", "info":{"authors":{"author":[{"@pid":"15/9508","text":"Manas R. Joglekar"},{"@pid":"74/3487","text":"Cong Li"},{"@pid":"70/729","text":"Mei Chen"},{"@pid":"264/2914","text":"Taibai Xu"},{"@pid":"60/2139","text":"Xiaoming Wang"},{"@pid":"11/6308","text":"Jay K. Adams"},{"@pid":"21/8973","text":"Pranav Khaitan"},{"@pid":"27/967","text":"Jiahui Liu"},{"@pid":"29/6166","text":"Quoc V. Le"}]},"title":"Neural Input Search for Large Scale Recommendation Models.","venue":"KDD","pages":"2387-2397","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/JoglekarLCXWAKL20","doi":"10.1145/3394486.3403288","ee":"https://doi.org/10.1145/3394486.3403288","url":"https://dblp.org/rec/conf/kdd/JoglekarLCXWAKL20"}, "url":"URL#1810729" }, { "@score":"1", "@id":"1810730", "info":{"authors":{"author":[{"@pid":"194/7523","text":"Mohammad Mahdi Kamani"},{"@pid":"151/8595","text":"Sadegh Farhang"},{"@pid":"88/4321","text":"Mehrdad Mahdavi"},{"@pid":"w/JamesZeWang","text":"James Z. Wang 0001"}]},"title":"Targeted Data-driven Regularization for Out-of-Distribution Generalization.","venue":"KDD","pages":"882-891","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KamaniFMW20","doi":"10.1145/3394486.3403131","ee":"https://doi.org/10.1145/3394486.3403131","url":"https://dblp.org/rec/conf/kdd/KamaniFMW20"}, "url":"URL#1810730" }, { "@score":"1", "@id":"1810732", "info":{"authors":{"author":[{"@pid":"158/3337","text":"Tianyu Kang"},{"@pid":"33/3675-1","text":"Ping Chen 0001"},{"@pid":"68/1152","text":"John Quackenbush"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"A Novel Deep Learning Model by Stacking Conditional Restricted Boltzmann Machine and Deep Neural Network.","venue":"KDD","pages":"1316-1324","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KangCQ020","doi":"10.1145/3394486.3403184","ee":"https://doi.org/10.1145/3394486.3403184","url":"https://dblp.org/rec/conf/kdd/KangCQ020"}, "url":"URL#1810732" }, { "@score":"1", "@id":"1810733", "info":{"authors":{"author":[{"@pid":"56/6072","text":"Jian Kang"},{"@pid":"34/2685","text":"Jingrui He"},{"@pid":"81/5349","text":"Ross Maciejewski"},{"@pid":"58/1757","text":"Hanghang Tong"}]},"title":"InFoRM: Individual Fairness on Graph Mining.","venue":"KDD","pages":"379-389","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KangHMT20","doi":"10.1145/3394486.3403080","ee":"https://doi.org/10.1145/3394486.3403080","url":"https://dblp.org/rec/conf/kdd/KangHMT20"}, "url":"URL#1810733" }, { "@score":"1", "@id":"1810734", "info":{"authors":{"author":[{"@pid":"185/0781","text":"Bojan Karlas"},{"@pid":"49/10034","text":"Matteo Interlandi"},{"@pid":"215/5117","text":"Cédric Renggli"},{"@pid":"29/85","text":"Wentao Wu 0001"},{"@pid":"97/919-1","text":"Ce Zhang 0001"},{"@pid":"273/0112","text":"Deepak Mukunthu Iyappan Babu"},{"@pid":"273/0250","text":"Jordan Edwards"},{"@pid":"273/0104","text":"Chris Lauren"},{"@pid":"273/0174","text":"Andy Xu"},{"@pid":"89/6502","text":"Markus Weimer"}]},"title":"Building Continuous Integration Services for Machine Learning.","venue":"KDD","pages":"2407-2415","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KarlasIR0ZBELXW20","doi":"10.1145/3394486.3403290","ee":"https://doi.org/10.1145/3394486.3403290","url":"https://dblp.org/rec/conf/kdd/KarlasIR0ZBELXW20"}, "url":"URL#1810734" }, { "@score":"1", "@id":"1810735", "info":{"authors":{"author":[{"@pid":"219/8132","text":"Koki Kawabata"},{"@pid":"52/6010","text":"Yasuko Matsubara"},{"@pid":"183/1668","text":"Takato Honda"},{"@pid":"s/YasushiSakurai","text":"Yasushi Sakurai"}]},"title":"Non-Linear Mining of Social Activities in Tensor Streams.","venue":"KDD","pages":"2093-2102","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KawabataMHS20","doi":"10.1145/3394486.3403260","ee":"https://doi.org/10.1145/3394486.3403260","url":"https://dblp.org/rec/conf/kdd/KawabataMHS20"}, "url":"URL#1810735" }, { "@score":"1", "@id":"1810737", "info":{"authors":{"author":[{"@pid":"65/2574","text":"Minseok Kim"},{"@pid":"273/0239","text":"Junhyeok Kang"},{"@pid":"42/3152","text":"Doyoung Kim"},{"@pid":"204/3381","text":"Hwanjun Song"},{"@pid":"273/0234","text":"Hyangsuk Min"},{"@pid":"273/0089","text":"Youngeun Nam"},{"@pid":"82/2651","text":"Dongmin Park"},{"@pid":"28/3904","text":"Jae-Gil Lee 0001"}]},"title":"Hi-COVIDNet: Deep Learning Approach to Predict Inbound COVID-19 Patients and Case Study in South Korea.","venue":"KDD","pages":"3466-3473","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KimKKSMNP020","doi":"10.1145/3394486.3412864","ee":"https://doi.org/10.1145/3394486.3412864","url":"https://dblp.org/rec/conf/kdd/KimKKSMNP020"}, "url":"URL#1810737" }, { "@score":"1", "@id":"1810738", "info":{"authors":{"author":[{"@pid":"164/1411","text":"Sundong Kim"},{"@pid":"65/2921","text":"Yu-Che Tsai"},{"@pid":"11/5722","text":"Karandeep Singh"},{"@pid":"272/9919","text":"Yeonsoo Choi"},{"@pid":"273/0005","text":"Etim Ibok"},{"@pid":"90/5961","text":"Cheng-Te Li"},{"@pid":"57/4924","text":"Meeyoung Cha"}]},"title":"DATE: Dual Attentive Tree-aware Embedding for Customs Fraud Detection.","venue":"KDD","pages":"2880-2890","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KimTSCILC20","doi":"10.1145/3394486.3403339","ee":"https://doi.org/10.1145/3394486.3403339","url":"https://dblp.org/rec/conf/kdd/KimTSCILC20"}, "url":"URL#1810738" }, { "@score":"1", "@id":"1810739", "info":{"authors":{"author":[{"@pid":"127/7344","text":"Jihoon Ko"},{"@pid":"267/9347","text":"Yunbum Kook"},{"@pid":"153/2052","text":"Kijung Shin"}]},"title":"Incremental Lossless Graph Summarization.","venue":"KDD","pages":"317-327","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KoKS20","doi":"10.1145/3394486.3403074","ee":"https://doi.org/10.1145/3394486.3403074","url":"https://dblp.org/rec/conf/kdd/KoKS20"}, "url":"URL#1810739" }, { "@score":"1", "@id":"1810740", "info":{"authors":{"author":[{"@pid":"154/7660","text":"Aritra Konar"},{"@pid":"s/NDSidiropoulos","text":"Nicholas D. Sidiropoulos"}]},"title":"Mining Large Quasi-cliques with Quality Guarantees from Vertex Neighborhoods.","venue":"KDD","pages":"577-587","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KonarS20","doi":"10.1145/3394486.3403100","ee":"https://doi.org/10.1145/3394486.3403100","url":"https://dblp.org/rec/conf/kdd/KonarS20"}, "url":"URL#1810740" }, { "@score":"1", "@id":"1810741", "info":{"authors":{"author":[{"@pid":"49/8024","text":"Weize Kong"},{"@pid":"80/4305","text":"Michael Bendersky"},{"@pid":"n/MarcNajork","text":"Marc Najork"},{"@pid":"193/2901","text":"Brandon Vargo"},{"@pid":"204/3354","text":"Mike Colagrosso"}]},"title":"Learning to Cluster Documents into Workspaces Using Large Scale Activity Logs.","venue":"KDD","pages":"2416-2424","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KongBNVC20","doi":"10.1145/3394486.3403291","ee":"https://doi.org/10.1145/3394486.3403291","url":"https://dblp.org/rec/conf/kdd/KongBNVC20"}, "url":"URL#1810741" }, { "@score":"1", "@id":"1810742", "info":{"authors":{"author":[{"@pid":"125/5369","text":"Walid Krichene"},{"@pid":"67/5601","text":"Steffen Rendle"}]},"title":"On Sampled Metrics for Item Recommendation.","venue":"KDD","pages":"1748-1757","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KricheneR20","doi":"10.1145/3394486.3403226","ee":"https://doi.org/10.1145/3394486.3403226","url":"https://dblp.org/rec/conf/kdd/KricheneR20"}, "url":"URL#1810742" }, { "@score":"1", "@id":"1810744", "info":{"authors":{"author":[{"@pid":"177/9095","text":"Caitlin Kuhlman"},{"@pid":"259/2348","text":"Latifa Jackson"},{"@pid":"130/0470","text":"Rumi Chunara"}]},"title":"No Computation without Representation: Avoiding Data and Algorithm Biases through Diversity.","venue":"KDD","pages":"3593","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/KuhlmanJC20","doi":"10.1145/3394486.3411074","ee":"https://doi.org/10.1145/3394486.3411074","url":"https://dblp.org/rec/conf/kdd/KuhlmanJC20"}, "url":"URL#1810744" }, { "@score":"1", "@id":"1810746", "info":{"authors":{"author":[{"@pid":"225/7856","text":"Kwei-Herng Lai"},{"@pid":"167/0903","text":"Daochen Zha"},{"@pid":"178/7315","text":"Kaixiong Zhou"},{"@pid":"24/7536","text":"Xia Hu"}]},"title":"Policy-GNN: Aggregation Optimization for Graph Neural Networks.","venue":"KDD","pages":"461-471","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LaiZZH20","doi":"10.1145/3394486.3403088","ee":"https://doi.org/10.1145/3394486.3403088","url":"https://dblp.org/rec/conf/kdd/LaiZZH20"}, "url":"URL#1810746" }, { "@score":"1", "@id":"1810748", "info":{"authors":{"author":[{"@pid":"232/3138","text":"Tommaso Lanciano"},{"@pid":"b/FBonchi","text":"Francesco Bonchi"},{"@pid":"g/AristidesGionis","text":"Aristides Gionis"}]},"title":"Explainable Classification of Brain Networks via Contrast Subgraphs.","venue":"KDD","pages":"3308-3318","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LancianoBG20","doi":"10.1145/3394486.3403383","ee":"https://doi.org/10.1145/3394486.3403383","url":"https://dblp.org/rec/conf/kdd/LancianoBG20"}, "url":"URL#1810748" }, { "@score":"1", "@id":"1810750", "info":{"authors":{"author":[{"@pid":"03/9889","text":"Thai Le"},{"@pid":"136/9440","text":"Suhang Wang"},{"@pid":"l/DongwonLee","text":"Dongwon Lee 0001"}]},"title":"GRACE: Generating Concise and Informative Contrastive Sample to Explain Neural Network Model's Prediction.","venue":"KDD","pages":"238-248","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeW020","doi":"10.1145/3394486.3403066","ee":"https://doi.org/10.1145/3394486.3403066","url":"https://dblp.org/rec/conf/kdd/LeW020"}, "url":"URL#1810750" }, { "@score":"1", "@id":"1810751", "info":{"authors":{"author":[{"@pid":"211/0871","text":"Kyuhan Lee"},{"@pid":"254/8496","text":"Hyeonsoo Jo"},{"@pid":"127/7344","text":"Jihoon Ko"},{"@pid":"34/10641","text":"Sungsu Lim"},{"@pid":"153/2052","text":"Kijung Shin"}]},"title":"SSumM: Sparse Summarization of Massive Graphs.","venue":"KDD","pages":"144-154","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeeJKLS20","doi":"10.1145/3394486.3403057","ee":"https://doi.org/10.1145/3394486.3403057","url":"https://dblp.org/rec/conf/kdd/LeeJKLS20"}, "url":"URL#1810751" }, { "@score":"1", "@id":"1810752", "info":{"authors":{"author":[{"@pid":"273/0114","text":"Zed Lee"},{"@pid":"36/3098","text":"Tony Lindgren"},{"@pid":"59/3814","text":"Panagiotis Papapetrou"}]},"title":"Z-Miner: An Efficient Method for Mining Frequent Arrangements of Event Intervals.","venue":"KDD","pages":"524-534","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeeLP20","doi":"10.1145/3394486.3403095","ee":"https://doi.org/10.1145/3394486.3403095","url":"https://dblp.org/rec/conf/kdd/LeeLP20"}, "url":"URL#1810752" }, { "@score":"1", "@id":"1810753", "info":{"authors":{"author":[{"@pid":"12/760","text":"Dongha Lee"},{"@pid":"269/4611","text":"Sehun Yu"},{"@pid":"80/6889","text":"Hwanjo Yu"}]},"title":"Multi-Class Data Description for Out-of-distribution Detection.","venue":"KDD","pages":"1362-1370","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeeYY20","doi":"10.1145/3394486.3403189","ee":"https://doi.org/10.1145/3394486.3403189","url":"https://dblp.org/rec/conf/kdd/LeeYY20"}, "url":"URL#1810753" }, { "@score":"1", "@id":"1810754", "info":{"authors":{"author":[{"@pid":"33/2568","text":"Jing Lei"},{"@pid":"38/8398","text":"Nasrin Akhter"},{"@pid":"204/5373","text":"Wanli Qiao"},{"@pid":"53/3810","text":"Amarda Shehu"}]},"title":"Reconstruction and Decomposition of High-Dimensional Landscapes via Unsupervised Learning.","venue":"KDD","pages":"2505-2513","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeiAQS20","doi":"10.1145/3394486.3403300","ee":"https://doi.org/10.1145/3394486.3403300","url":"https://dblp.org/rec/conf/kdd/LeiAQS20"}, "url":"URL#1810754" }, { "@score":"1", "@id":"1810755", "info":{"authors":{"author":[{"@pid":"167/9604","text":"Wenqiang Lei"},{"@pid":"268/8056","text":"Gangyi Zhang"},{"@pid":"59/1007","text":"Xiangnan He 0001"},{"@pid":"256/9192","text":"Yisong Miao"},{"@pid":"31/2864-10","text":"Xiang Wang 0010"},{"@pid":"01/5394-1","text":"Liang Chen 0001"},{"@pid":"24/6606","text":"Tat-Seng Chua"}]},"title":"Interactive Path Reasoning on Graph for Conversational Recommendation.","venue":"KDD","pages":"2073-2083","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeiZ0MWCC20","doi":"10.1145/3394486.3403258","ee":"https://doi.org/10.1145/3394486.3403258","url":"https://dblp.org/rec/conf/kdd/LeiZ0MWCC20"}, "url":"URL#1810755" }, { "@score":"1", "@id":"1810756", "info":{"authors":{"author":[{"@pid":"74/5792","text":"Hang Lei"},{"@pid":"19/8539","text":"Yin Zhao"},{"@pid":"06/425","text":"Longjun Cai"}]},"title":"Multi-objective Optimization for Guaranteed Delivery in Video Service Platform.","venue":"KDD","pages":"3017-3025","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LeiZC20","doi":"10.1145/3394486.3403352","ee":"https://doi.org/10.1145/3394486.3403352","url":"https://dblp.org/rec/conf/kdd/LeiZC20"}, "url":"URL#1810756" }, { "@score":"1", "@id":"1810757", "info":{"authors":{"author":[{"@pid":"150/2008-7","text":"Zekun Li 0007"},{"@pid":"39/2145","text":"Yao-Yi Chiang"},{"@pid":"198/7669","text":"Sasan Tavakkol"},{"@pid":"266/0414","text":"Basel Shbita"},{"@pid":"211/1905","text":"Johannes H. Uhl"},{"@pid":"48/5378","text":"Stefan Leyk"},{"@pid":"k/CAKnoblock","text":"Craig A. Knoblock"}]},"title":"An Automatic Approach for Generating Rich, Linked Geo-Metadata from Historical Map Images.","venue":"KDD","pages":"3290-3298","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiCTSULK20","doi":"10.1145/3394486.3403381","ee":"https://doi.org/10.1145/3394486.3403381","url":"https://dblp.org/rec/conf/kdd/LiCTSULK20"}, "url":"URL#1810757" }, { "@score":"1", "@id":"1810758", "info":{"authors":{"author":[{"@pid":"95/5287-1","text":"Zhihui Li 0001"},{"@pid":"116/8412","text":"Xiaojun Chang"},{"@pid":"56/6651-1","text":"Lina Yao 0001"},{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"147/2757","text":"Zongyuan Ge"},{"@pid":"13/6826-1","text":"Huaxiang Zhang 0001"}]},"title":"Grounding Visual Concepts for Zero-Shot Event Detection and Event Captioning.","venue":"KDD","pages":"297-305","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiCYPGZ20","doi":"10.1145/3394486.3403072","ee":"https://doi.org/10.1145/3394486.3403072","url":"https://dblp.org/rec/conf/kdd/LiCYPGZ20"}, "url":"URL#1810758" }, { "@score":"1", "@id":"1810759", "info":{"authors":{"author":[{"@pid":"33/2805-5","text":"Ang Li 0005"},{"@pid":"263/7004","text":"Yixiao Duan"},{"@pid":"221/2845","text":"Huanrui Yang"},{"@pid":"80/1641","text":"Yiran Chen 0001"},{"@pid":"99/9547-1","text":"Jianlei Yang 0001"}]},"title":"TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations.","venue":"KDD","pages":"824-832","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiDYC020","doi":"10.1145/3394486.3403125","ee":"https://doi.org/10.1145/3394486.3403125","url":"https://dblp.org/rec/conf/kdd/LiDYC020"}, "url":"URL#1810759" }, { "@score":"1", "@id":"1810760", "info":{"authors":{"author":[{"@pid":"28/6612","text":"Junyi Li"},{"@pid":"03/281","text":"Heng Huang"}]},"title":"Faster Secure Data Mining via Distributed Homomorphic Encryption.","venue":"KDD","pages":"2706-2714","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiH20","doi":"10.1145/3394486.3403321","ee":"https://doi.org/10.1145/3394486.3403321","url":"https://dblp.org/rec/conf/kdd/LiH20"}, "url":"URL#1810760" }, { "@score":"1", "@id":"1810761", "info":{"authors":{"author":[{"@pid":"47/4826","text":"Dong Li"},{"@pid":"72/4662","text":"Ruoming Jin"},{"@pid":"67/4834","text":"Jing Gao"},{"@pid":"40/6686","text":"Zhi Liu"}]},"title":"On Sampling Top-K Recommendation Evaluation.","venue":"KDD","pages":"2114-2124","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiJGL20","doi":"10.1145/3394486.3403262","ee":"https://doi.org/10.1145/3394486.3403262","url":"https://dblp.org/rec/conf/kdd/LiJGL20"}, "url":"URL#1810761" }, { "@score":"1", "@id":"1810763", "info":{"authors":{"author":[{"@pid":"40/1491-67","text":"Xiang Li 0067"},{"@pid":"k/BenKao","text":"Ben Kao"},{"@pid":"193/1652","text":"Caihua Shan"},{"@pid":"91/4572","text":"Dawei Yin"},{"@pid":"e/MartinEster","text":"Martin Ester"}]},"title":"CAST: A Correlation-based Adaptive Spectral Clustering Algorithm on Multi-scale Data.","venue":"KDD","pages":"439-449","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiKSYE20","doi":"10.1145/3394486.3403086","ee":"https://doi.org/10.1145/3394486.3403086","url":"https://dblp.org/rec/conf/kdd/LiKSYE20"}, "url":"URL#1810763" }, { "@score":"1", "@id":"1810764", "info":{"authors":{"author":[{"@pid":"264/2610","text":"Eileen Li"},{"@pid":"119/4775","text":"Eric Kim"},{"@pid":"141/1271","text":"Andrew Zhai"},{"@pid":"230/8062","text":"Josh Beal"},{"@pid":"169/4787","text":"Kunlong Gu"}]},"title":"Bootstrapping Complete The Look at Pinterest.","venue":"KDD","pages":"3299-3307","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiKZBG20","doi":"10.1145/3394486.3403382","ee":"https://doi.org/10.1145/3394486.3403382","url":"https://dblp.org/rec/conf/kdd/LiKZBG20"}, "url":"URL#1810764" }, { "@score":"1", "@id":"1810765", "info":{"authors":{"author":[{"@pid":"77/8638","text":"Jizhou Li"},{"@pid":"273/0029","text":"Zikun Li"},{"@pid":"11/504","text":"Yifei Xu"},{"@pid":"07/10820","text":"Shiqi Jiang"},{"@pid":"44/7710-3","text":"Tong Yang 0003"},{"@pid":"55/5031","text":"Bin Cui 0001"},{"@pid":"75/3743","text":"Yafei Dai"},{"@pid":"77/6324-1","text":"Gong Zhang 0001"}]},"title":"WavingSketch: An Unbiased and Generic Sketch for Finding Top-k Items in Data Streams.","venue":"KDD","pages":"1574-1584","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiLXJ00DZ20","doi":"10.1145/3394486.3403208","ee":"https://doi.org/10.1145/3394486.3403208","url":"https://dblp.org/rec/conf/kdd/LiLXJ00DZ20"}, "url":"URL#1810765" }, { "@score":"1", "@id":"1810766", "info":{"authors":{"author":[{"@pid":"254/1270","text":"Yuantong Li"},{"@pid":"34/5228","text":"Qi Ma"},{"@pid":"50/8019","text":"Sujit K. Ghosh"}]},"title":"A Non-Iterative Quantile Change Detection Method in Mixture Model with Heavy-Tailed Components.","venue":"KDD","pages":"1888-1898","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiMG20","doi":"10.1145/3394486.3403240","ee":"https://doi.org/10.1145/3394486.3403240","url":"https://dblp.org/rec/conf/kdd/LiMG20"}, "url":"URL#1810766" }, { "@score":"1", "@id":"1810767", "info":{"authors":{"author":[{"@pid":"22/1805","text":"Ying Li"},{"@pid":"272/9938","text":"Abraham Miller"},{"@pid":"133/6308","text":"Arthur Liu"},{"@pid":"273/0039","text":"Kyle Coburn"},{"@pid":"166/5182","text":"Luis J. Salazar"}]},"title":"Acoustic Measures for Real-Time Voice Coaching.","venue":"KDD","pages":"2755-2763","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiMLCS20","doi":"10.1145/3394486.3403326","ee":"https://doi.org/10.1145/3394486.3403326","url":"https://dblp.org/rec/conf/kdd/LiMLCS20"}, "url":"URL#1810767" }, { "@score":"1", "@id":"1810768", "info":{"authors":{"author":[{"@pid":"167/3092","text":"Yanying Li"},{"@pid":"174/9808","text":"Haipei Sun"},{"@pid":"52/4725","text":"Wendy Hui Wang"}]},"title":"Towards Fair Truth Discovery from Biased Crowdsourced Answers.","venue":"KDD","pages":"599-607","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiSW20","doi":"10.1145/3394486.3403102","ee":"https://doi.org/10.1145/3394486.3403102","url":"https://dblp.org/rec/conf/kdd/LiSW20"}, "url":"URL#1810768" }, { "@score":"1", "@id":"1810769", "info":{"authors":{"author":[{"@pid":"66/190-33","text":"Chao Li 0033"},{"@pid":"244/8016","text":"Haoteng Tang"},{"@pid":"20/4471","text":"Cheng Deng"},{"@pid":"33/7424","text":"Liang Zhan"},{"@pid":"49/3283-5","text":"Wei Liu 0005"}]},"title":"Vulnerability vs. Reliability: Disentangled Adversarial Examples for Cross-Modal Learning.","venue":"KDD","pages":"421-429","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiTDZ020","doi":"10.1145/3394486.3403084","ee":"https://doi.org/10.1145/3394486.3403084","url":"https://dblp.org/rec/conf/kdd/LiTDZ020"}, "url":"URL#1810769" }, { "@score":"1", "@id":"1810770", "info":{"authors":{"author":[{"@pid":"41/964","text":"Michael Li"},{"@pid":"31/7440","text":"Catalin Tiseanu"},{"@pid":"273/0304","text":"Burkay Gur"}]},"title":"Build the State-of-the-Art Machine Learning Technology for the Crypto Economy.","venue":"KDD","pages":"3605","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiTG20","doi":"10.1145/3394486.3409555","ee":"https://doi.org/10.1145/3394486.3409555","url":"https://dblp.org/rec/conf/kdd/LiTG20"}, "url":"URL#1810770" }, { "@score":"1", "@id":"1810771", "info":{"authors":{"author":[{"@pid":"239/2197","text":"Diya Li"},{"@pid":"z/MohammedJaveedZaki","text":"Mohammed J. Zaki"}]},"title":"RECIPTOR: An Effective Pretrained Model for Recipe Representation Learning.","venue":"KDD","pages":"1719-1727","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiZ20","doi":"10.1145/3394486.3403223","ee":"https://doi.org/10.1145/3394486.3403223","url":"https://dblp.org/rec/conf/kdd/LiZ20"}, "url":"URL#1810771" }, { "@score":"1", "@id":"1810772", "info":{"authors":{"author":[{"@pid":"63/1303","text":"Ting Li"},{"@pid":"75/8471","text":"Junbo Zhang"},{"@pid":"273/0135","text":"Kainan Bao"},{"@pid":"183/0977","text":"Yuxuan Liang"},{"@pid":"176/1477","text":"Yexin Li"},{"@pid":"87/1585-4","text":"Yu Zheng 0004"}]},"title":"AutoST: Efficient Neural Architecture Search for Spatio-Temporal Prediction.","venue":"KDD","pages":"794-802","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiZBLLZ20","doi":"10.1145/3394486.3403122","ee":"https://doi.org/10.1145/3394486.3403122","url":"https://dblp.org/rec/conf/kdd/LiZBLLZ20"}, "url":"URL#1810772" }, { "@score":"1", "@id":"1810773", "info":{"authors":{"author":[{"@pid":"257/1713","text":"Shuangli Li"},{"@pid":"82/8538","text":"Jingbo Zhou"},{"@pid":"70/6770-1","text":"Tong Xu 0001"},{"@pid":"09/3214-26","text":"Hao Liu 0026"},{"@pid":"82/10445","text":"Xinjiang Lu"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"}]},"title":"Competitive Analysis for Points of Interest.","venue":"KDD","pages":"1265-1274","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiZXLLX20","doi":"10.1145/3394486.3403179","ee":"https://doi.org/10.1145/3394486.3403179","url":"https://dblp.org/rec/conf/kdd/LiZXLLX20"}, "url":"URL#1810773" }, { "@score":"1", "@id":"1810774", "info":{"authors":{"author":[{"@pid":"22/1805","text":"Ying Li"},{"@pid":"273/0171","text":"Vitalii Zakhozhyi"},{"@pid":"264/8060","text":"Daniel Zhu"},{"@pid":"166/5182","text":"Luis J. Salazar"}]},"title":"Domain Specific Knowledge Graphs as a Service to the Public: Powering Social-Impact Funding in the US.","venue":"KDD","pages":"2793-2801","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiZZS20","doi":"10.1145/3394486.3403330","ee":"https://doi.org/10.1145/3394486.3403330","url":"https://dblp.org/rec/conf/kdd/LiZZS20"}, "url":"URL#1810774" }, { "@score":"1", "@id":"1810775", "info":{"authors":{"author":[{"@pid":"87/10734","text":"Defu Lian"},{"@pid":"179/3242","text":"Yongji Wu"},{"@pid":"39/844","text":"Yong Ge"},{"@pid":"08/6809-1","text":"Xing Xie 0001"},{"@pid":"07/258","text":"Enhong Chen"}]},"title":"Geography-Aware Sequential Location Recommendation.","venue":"KDD","pages":"2009-2019","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LianWG0C20","doi":"10.1145/3394486.3403252","ee":"https://doi.org/10.1145/3394486.3403252","url":"https://dblp.org/rec/conf/kdd/LianWG0C20"}, "url":"URL#1810775" }, { "@score":"1", "@id":"1810776", "info":{"authors":{"author":[{"@pid":"19/2208","text":"Jian Liang"},{"@pid":"54/5260","text":"Bing Bai"},{"@pid":"241/7221","text":"Yuren Cao"},{"@pid":"56/2984","text":"Kun Bai"},{"@pid":"52/3194-1","text":"Fei Wang 0001"}]},"title":"Adversarial Infidelity Learning for Model Interpretation.","venue":"KDD","pages":"286-296","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiangBCBW20","doi":"10.1145/3394486.3403071","ee":"https://doi.org/10.1145/3394486.3403071","url":"https://dblp.org/rec/conf/kdd/LiangBCBW20"}, "url":"URL#1810776" }, { "@score":"1", "@id":"1810777", "info":{"authors":{"author":[{"@pid":"35/3221-6","text":"Chen Liang 0006"},{"@pid":"55/2008","text":"Yue Yu"},{"@pid":"230/3684","text":"Haoming Jiang"},{"@pid":"258/5023","text":"Siawpeng Er"},{"@pid":"138/8168","text":"Ruijia Wang"},{"@pid":"82/199","text":"Tuo Zhao"},{"@pid":"94/3019-14","text":"Chao Zhang 0014"}]},"title":"BOND: BERT-Assisted Open-Domain Named Entity Recognition with Distant Supervision.","venue":"KDD","pages":"1054-1064","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiangYJEWZZ20","doi":"10.1145/3394486.3403149","ee":"https://doi.org/10.1145/3394486.3403149","url":"https://dblp.org/rec/conf/kdd/LiangYJEWZZ20"}, "url":"URL#1810777" }, { "@score":"1", "@id":"1810779", "info":{"authors":{"author":[{"@pid":"249/9301","text":"Alane M. de Lima"},{"@pid":"15/376","text":"Murilo V. G. da Silva"},{"@pid":"163/8277","text":"André Luís Vignatti"}]},"title":"Estimating the Percolation Centrality of Large Networks through Pseudo-dimension Theory.","venue":"KDD","pages":"1839-1847","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LimaSV20","doi":"10.1145/3394486.3403235","ee":"https://doi.org/10.1145/3394486.3403235","url":"https://dblp.org/rec/conf/kdd/LimaSV20"}, "url":"URL#1810779" }, { "@score":"1", "@id":"1810780", "info":{"authors":{"author":[{"@pid":"190/4518","text":"Bill Yuchen Lin"},{"@pid":"175/7589-2","text":"Ying Sheng 0002"},{"@pid":"167/0323","text":"Nguyen Vo"},{"@pid":"20/1055","text":"Sandeep Tata"}]},"title":"FreeDOM: A Transferable Neural Architecture for Structured Information Extraction on Web Documents.","venue":"KDD","pages":"1092-1102","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Lin0VT20","doi":"10.1145/3394486.3403153","ee":"https://doi.org/10.1145/3394486.3403153","url":"https://dblp.org/rec/conf/kdd/Lin0VT20"}, "url":"URL#1810780" }, { "@score":"1", "@id":"1810781", "info":{"authors":{"author":[{"@pid":"255/6264","text":"Haoxing Lin"},{"@pid":"188/7074","text":"Rufan Bai"},{"@pid":"57/1667-1","text":"Weijia Jia 0001"},{"@pid":"89/473","text":"Xinyu Yang"},{"@pid":"223/2624","text":"Yongjian You"}]},"title":"Preserving Dynamic Attention for Long-Term Spatial-Temporal Prediction.","venue":"KDD","pages":"36-46","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LinBJYY20","doi":"10.1145/3394486.3403046","ee":"https://doi.org/10.1145/3394486.3403046","url":"https://dblp.org/rec/conf/kdd/LinBJYY20"}, "url":"URL#1810781" }, { "@score":"1", "@id":"1810782", "info":{"authors":{"author":[{"@pid":"86/2209-1","text":"Lu Lin 0001"},{"@pid":"05/6545","text":"Hongning Wang"}]},"title":"Graph Attention Networks over Edge Content-Based Channels.","venue":"KDD","pages":"1819-1827","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LinW20","doi":"10.1145/3394486.3403233","ee":"https://doi.org/10.1145/3394486.3403233","url":"https://dblp.org/rec/conf/kdd/LinW20"}, "url":"URL#1810782" }, { "@score":"1", "@id":"1810784", "info":{"authors":{"author":[{"@pid":"273/0126","text":"Anna Lioznova"},{"@pid":"157/6372","text":"Alexey Drutsa"},{"@pid":"166/3226","text":"Vladimir Kukushkin"},{"@pid":"125/2910","text":"Anastasia A. Bezzubtseva"}]},"title":"Prediction of Hourly Earnings and Completion Time on a Crowdsourcing Platform.","venue":"KDD","pages":"3172-3182","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LioznovaDKB20","doi":"10.1145/3394486.3403369","ee":"https://doi.org/10.1145/3394486.3403369","url":"https://dblp.org/rec/conf/kdd/LioznovaDKB20"}, "url":"URL#1810784" }, { "@score":"1", "@id":"1810785", "info":{"authors":{"author":[{"@pid":"24/2029","text":"Yumin Liu"},{"@pid":"65/6458","text":"Auroop R. Ganguly"},{"@pid":"24/6000","text":"Jennifer G. Dy"}]},"title":"Climate Downscaling Using YNet: A Deep Convolutional Network with Skip Connections and Fusion.","venue":"KDD","pages":"3145-3153","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuGD20","doi":"10.1145/3394486.3403366","ee":"https://doi.org/10.1145/3394486.3403366","url":"https://dblp.org/rec/conf/kdd/LiuGD20"}, "url":"URL#1810785" }, { "@score":"1", "@id":"1810786", "info":{"authors":{"author":[{"@pid":"41/7841","text":"Meng Liu"},{"@pid":"200/7985","text":"Hongyang Gao"},{"@pid":"84/6405","text":"Shuiwang Ji"}]},"title":"Towards Deeper Graph Neural Networks.","venue":"KDD","pages":"338-348","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuGJ20","doi":"10.1145/3394486.3403076","ee":"https://doi.org/10.1145/3394486.3403076","url":"https://dblp.org/rec/conf/kdd/LiuGJ20"}, "url":"URL#1810786" }, { "@score":"1", "@id":"1810787", "info":{"authors":{"author":[{"@pid":"65/9299","text":"Che Liu"},{"@pid":"29/5803","text":"Junfeng Jiang"},{"@pid":"126/4460","text":"Chao Xiong"},{"@pid":"33/4854","text":"Yi Yang"},{"@pid":"03/5454","text":"Jieping Ye"}]},"title":"Towards Building an Intelligent Chatbot for Customer Service: Learning to Respond at the Appropriate Time.","venue":"KDD","pages":"3377-3385","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuJXYY20","doi":"10.1145/3394486.3403390","ee":"https://doi.org/10.1145/3394486.3403390","url":"https://dblp.org/rec/conf/kdd/LiuJXYY20"}, "url":"URL#1810787" }, { "@score":"1", "@id":"1810788", "info":{"authors":{"author":[{"@pid":"09/3214-26","text":"Hao Liu 0026"},{"@pid":"22/1805","text":"Ying Li"},{"@pid":"134/3987","text":"Yanjie Fu"},{"@pid":"84/10645","text":"Huaibo Mei"},{"@pid":"82/8538","text":"Jingbo Zhou"},{"@pid":"77/9370","text":"Xu Ma"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"}]},"title":"Polestar: An Intelligent, Efficient and National-Wide Public Transportation Routing Engine.","venue":"KDD","pages":"2321-2329","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuLFMZMX20","doi":"10.1145/3394486.3403281","ee":"https://doi.org/10.1145/3394486.3403281","url":"https://dblp.org/rec/conf/kdd/LiuLFMZMX20"}, "url":"URL#1810788" }, { "@score":"1", "@id":"1810789", "info":{"authors":{"author":[{"@pid":"56/6543","text":"Hu Liu"},{"@pid":"77/1751","text":"Jing Lu"},{"@pid":"54/4089-30","text":"Hao Yang 0030"},{"@pid":"60/5562","text":"Xiwei Zhao"},{"@pid":"267/9561","text":"Sulong Xu"},{"@pid":"69/7742","text":"Hao Peng"},{"@pid":"76/2625","text":"Zehua Zhang"},{"@pid":"126/6615","text":"Wenjie Niu"},{"@pid":"34/10344","text":"Xiaokun Zhu"},{"@pid":"52/5055","text":"Yongjun Bao"},{"@pid":"216/8297","text":"Weipeng Yan"}]},"title":"Category-Specific CNN for Visual-aware CTR Prediction at JD.com.","venue":"KDD","pages":"2686-2696","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuLYZXPZNZBY20","doi":"10.1145/3394486.3403319","ee":"https://doi.org/10.1145/3394486.3403319","url":"https://dblp.org/rec/conf/kdd/LiuLYZXPZNZBY20"}, "url":"URL#1810789" }, { "@score":"1", "@id":"1810790", "info":{"authors":{"author":[{"@pid":"76/1820-39","text":"Xin Liu 0039"},{"@pid":"230/3561","text":"Haojie Pan"},{"@pid":"222/7849-1","text":"Mutian He 0001"},{"@pid":"86/2159","text":"Yangqiu Song"},{"@pid":"42/4142-2","text":"Xin Jiang 0002"},{"@pid":"70/4288","text":"Lifeng Shang"}]},"title":"Neural Subgraph Isomorphism Counting.","venue":"KDD","pages":"1959-1969","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuPHSJS20","doi":"10.1145/3394486.3403247","ee":"https://doi.org/10.1145/3394486.3403247","url":"https://dblp.org/rec/conf/kdd/LiuPHSJS20"}, "url":"URL#1810790" }, { "@score":"1", "@id":"1810791", "info":{"authors":{"author":[{"@pid":"70/1220-23","text":"Zhe Liu 0023"},{"@pid":"56/6651-1","text":"Lina Yao 0001"},{"@pid":"119/1223-1","text":"Lei Bai 0001"},{"@pid":"51/8330","text":"Xianzhi Wang 0001"},{"@pid":"71/4716-4","text":"Can Wang 0004"}]},"title":"Spectrum-Guided Adversarial Disparity Learning.","venue":"KDD","pages":"114-124","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuYB0020","doi":"10.1145/3394486.3403054","ee":"https://doi.org/10.1145/3394486.3403054","url":"https://dblp.org/rec/conf/kdd/LiuYB0020"}, "url":"URL#1810791" }, { "@score":"1", "@id":"1810792", "info":{"authors":{"author":[{"@pid":"97/4626-59","text":"Yi Liu 0059"},{"@pid":"92/867","text":"Hao Yuan"},{"@pid":"60/7674","text":"Lei Cai"},{"@pid":"84/6405","text":"Shuiwang Ji"}]},"title":"Deep Learning of High-Order Interactions for Protein Interface Prediction.","venue":"KDD","pages":"679-687","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuYCJ20","doi":"10.1145/3394486.3403110","ee":"https://doi.org/10.1145/3394486.3403110","url":"https://dblp.org/rec/conf/kdd/LiuYCJ20"}, "url":"URL#1810792" }, { "@score":"1", "@id":"1810793", "info":{"authors":{"author":[{"@pid":"210/0898","text":"Zitao Liu 0001"},{"@pid":"94/9605","text":"Songfan Yang"},{"@pid":"64/10812","text":"Jiliang Tang"},{"@pid":"97/6300","text":"Neil T. Heffernan"},{"@pid":"63/774","text":"Rose Luckin"}]},"title":"Recent Advances in Multimodal Educational Data Mining in K-12 Education.","venue":"KDD","pages":"3549-3550","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuYTHL20","doi":"10.1145/3394486.3406471","ee":"https://doi.org/10.1145/3394486.3406471","url":"https://dblp.org/rec/conf/kdd/LiuYTHL20"}, "url":"URL#1810793" }, { "@score":"1", "@id":"1810794", "info":{"authors":{"author":[{"@pid":"18/5099","text":"Can Liu"},{"@pid":"257/5630","text":"Qiwei Zhong"},{"@pid":"71/1982-1","text":"Xiang Ao 0001"},{"@pid":"57/2405","text":"Li Sun"},{"@pid":"273/0222","text":"Wangli Lin"},{"@pid":"22/4976","text":"Jinghua Feng"},{"@pid":"14/3700-3","text":"Qing He 0003"},{"@pid":"14/533","text":"Jiayu Tang"}]},"title":"Fraud Transactions Detection via Behavior Tree with Local Intention Calibration.","venue":"KDD","pages":"3035-3043","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuZASLFHT20","doi":"10.1145/3394486.3403354","ee":"https://doi.org/10.1145/3394486.3403354","url":"https://dblp.org/rec/conf/kdd/LiuZASLFHT20"}, "url":"URL#1810794" }, { "@score":"1", "@id":"1810795", "info":{"authors":{"author":[{"@pid":"35/837","text":"Bin Liu"},{"@pid":"261/9242","text":"Chenxu Zhu"},{"@pid":"85/3156","text":"Guilin Li"},{"@pid":"28/10261-1","text":"Weinan Zhang 0001"},{"@pid":"261/9752","text":"Jincai Lai"},{"@pid":"24/10003","text":"Ruiming Tang"},{"@pid":"11/5357-1","text":"Xiuqiang He 0001"},{"@pid":"23/6479","text":"Zhenguo Li"},{"@pid":"43/5685-1","text":"Yong Yu 0001"}]},"title":"AutoFIS: Automatic Feature Interaction Selection in Factorization Models for Click-Through Rate Prediction.","venue":"KDD","pages":"2636-2645","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LiuZL0LTHL020","doi":"10.1145/3394486.3403314","ee":"https://doi.org/10.1145/3394486.3403314","url":"https://dblp.org/rec/conf/kdd/LiuZL0LTHL020"}, "url":"URL#1810795" }, { "@score":"1", "@id":"1810796", "info":{"authors":{"author":[{"@pid":"251/9514","text":"Qingqing Long"},{"@pid":"213/7371","text":"Yilun Jin"},{"@pid":"37/2900","text":"Guojie Song"},{"@pid":"59/871","text":"Yi Li"},{"@pid":"99/2649","text":"Wei Lin"}]},"title":"Graph Structural-topic Neural Network.","venue":"KDD","pages":"1065-1073","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LongJSLL20","doi":"10.1145/3394486.3403150","ee":"https://doi.org/10.1145/3394486.3403150","url":"https://dblp.org/rec/conf/kdd/LongJSLL20"}, "url":"URL#1810796" }, { "@score":"1", "@id":"1810797", "info":{"authors":{"author":{"@pid":"272/9908","text":"Wilson E. Lozano-Rolon"}},"title":"CoRE Lab - An Effort to Engage College Hispanic Students in STEM.","venue":"KDD","pages":"3583","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Lozano-Rolon20","doi":"10.1145/3394486.3411065","ee":"https://doi.org/10.1145/3394486.3411065","url":"https://dblp.org/rec/conf/kdd/Lozano-Rolon20"}, "url":"URL#1810797" }, { "@score":"1", "@id":"1810798", "info":{"authors":{"author":[{"@pid":"134/1754","text":"Yuanfu Lu"},{"@pid":"22/981-1","text":"Yuan Fang 0001"},{"@pid":"64/3041","text":"Chuan Shi"}]},"title":"Meta-learning on Heterogeneous Information Networks for Cold-start Recommendation.","venue":"KDD","pages":"1563-1573","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Lu0S20","doi":"10.1145/3394486.3403207","ee":"https://doi.org/10.1145/3394486.3403207","url":"https://dblp.org/rec/conf/kdd/Lu0S20"}, "url":"URL#1810798" }, { "@score":"1", "@id":"1810799", "info":{"authors":{"author":[{"@pid":"179/2444","text":"Dongsheng Luo"},{"@pid":"187/4068","text":"Yuchen Bian"},{"@pid":"67/8039","text":"Yaowei Yan"},{"@pid":"82/1364-39","text":"Xiao Liu 0039"},{"@pid":"58/2597","text":"Jun Huan"},{"@pid":"91/4353-1","text":"Xiang Zhang 0001"}]},"title":"Local Community Detection in Multiple Networks.","venue":"KDD","pages":"266-274","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LuoBYLHZ20","doi":"10.1145/3394486.3403069","ee":"https://doi.org/10.1145/3394486.3403069","url":"https://dblp.org/rec/conf/kdd/LuoBYLHZ20"}, "url":"URL#1810799" }, { "@score":"1", "@id":"1810800", "info":{"authors":{"author":[{"@pid":"198/0850","text":"Junyu Luo 0001"},{"@pid":"251/3433","text":"Muchao Ye"},{"@pid":"170/1833","text":"Cao Xiao"},{"@pid":"85/10856","text":"Fenglong Ma"}]},"title":"HiTANet: Hierarchical Time-Aware Attention Networks for Risk Prediction on Electronic Health Records.","venue":"KDD","pages":"647-656","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LuoYXM20","doi":"10.1145/3394486.3403107","ee":"https://doi.org/10.1145/3394486.3403107","url":"https://dblp.org/rec/conf/kdd/LuoYXM20"}, "url":"URL#1810800" }, { "@score":"1", "@id":"1810801", "info":{"authors":{"author":[{"@pid":"92/8175","text":"Wenjuan Luo"},{"@pid":"26/4189","text":"Han Zhang"},{"@pid":"161/5024","text":"Xiaodi Yang"},{"@pid":"157/2464","text":"Lin Bo"},{"@pid":"97/4171","text":"Xiaoqing Yang"},{"@pid":"06/6214","text":"Zang Li"},{"@pid":"62/1827","text":"Xiaohu Qie"},{"@pid":"03/5454","text":"Jieping Ye"}]},"title":"Dynamic Heterogeneous Graph Neural Network for Real-time Event Prediction.","venue":"KDD","pages":"3213-3223","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LuoZYBYLQY20","doi":"10.1145/3394486.3403373","ee":"https://doi.org/10.1145/3394486.3403373","url":"https://dblp.org/rec/conf/kdd/LuoZYBYLQY20"}, "url":"URL#1810801" }, { "@score":"1", "@id":"1810802", "info":{"authors":{"author":[{"@pid":"213/8090","text":"Jiancheng Lyu"},{"@pid":"71/208-9","text":"Shuai Zhang 0009"},{"@pid":"20/5794","text":"Yingyong Qi"},{"@pid":"54/454","text":"Jack Xin"}]},"title":"AutoShuffleNet: Learning Permutation Matrices via an Exact Lipschitz Continuous Penalty in Deep Convolutional Neural Networks.","venue":"KDD","pages":"608-616","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Lyu0QX20","doi":"10.1145/3394486.3403103","ee":"https://doi.org/10.1145/3394486.3403103","url":"https://dblp.org/rec/conf/kdd/Lyu0QX20"}, "url":"URL#1810802" }, { "@score":"1", "@id":"1810803", "info":{"authors":{"author":[{"@pid":"218/6818","text":"Gengyu Lyu"},{"@pid":"92/2415","text":"Songhe Feng"},{"@pid":"40/7652","text":"Yidong Li"}]},"title":"Partial Multi-Label Learning via Probabilistic Graph Matching Mechanism.","venue":"KDD","pages":"105-113","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/LyuFL20","doi":"10.1145/3394486.3403053","ee":"https://doi.org/10.1145/3394486.3403053","url":"https://dblp.org/rec/conf/kdd/LyuFL20"}, "url":"URL#1810803" }, { "@score":"1", "@id":"1810804", "info":{"authors":{"author":[{"@pid":"126/4567-1","text":"Chen Ma 0001"},{"@pid":"244/4404","text":"Liheng Ma"},{"@pid":"174/0010-1","text":"Yingxue Zhang 0001"},{"@pid":"24/10003","text":"Ruiming Tang"},{"@pid":"l/XueLiu","text":"Xue Liu 0001"},{"@pid":"c/MarkCoates","text":"Mark Coates"}]},"title":"Probabilistic Metric Learning with Adaptive Margin for Top-K Recommendation.","venue":"KDD","pages":"1036-1044","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MaMZTLC20","doi":"10.1145/3394486.3403147","ee":"https://doi.org/10.1145/3394486.3403147","url":"https://dblp.org/rec/conf/kdd/MaMZTLC20"}, "url":"URL#1810804" }, { "@score":"1", "@id":"1810805", "info":{"authors":{"author":[{"@pid":"74/3376","text":"Yifei Ma"},{"@pid":"273/0358","text":"Balakrishnan (Murali) Narayanaswamy"},{"@pid":"142/1829","text":"Haibin Lin"},{"@pid":"54/4139-3","text":"Hao Ding 0003"}]},"title":"Temporal-Contextual Recommendation in Real-Time.","venue":"KDD","pages":"2291-2299","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MaNLD20","doi":"10.1145/3394486.3403278","ee":"https://doi.org/10.1145/3394486.3403278","url":"https://dblp.org/rec/conf/kdd/MaNLD20"}, "url":"URL#1810805" }, { "@score":"1", "@id":"1810807", "info":{"authors":{"author":[{"@pid":"117/8564","text":"Jianxin Ma"},{"@pid":"03/10205","text":"Chang Zhou"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"10/5630-19","text":"Xin Wang 0019"},{"@pid":"97/6308-1","text":"Wenwu Zhu 0001"}]},"title":"Disentangled Self-Supervision in Sequential Recommenders.","venue":"KDD","pages":"483-491","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MaZYCW020","doi":"10.1145/3394486.3403091","ee":"https://doi.org/10.1145/3394486.3403091","url":"https://dblp.org/rec/conf/kdd/MaZYCW020"}, "url":"URL#1810807" }, { "@score":"1", "@id":"1810808", "info":{"authors":{"author":[{"@pid":"242/8928","text":"Alaa Maalouf"},{"@pid":"155/3580","text":"Adiel Statman"},{"@pid":"84/6696","text":"Dan Feldman"}]},"title":"Tight Sensitivity Bounds For Smaller Coresets.","venue":"KDD","pages":"2051-2061","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MaaloufSF20","doi":"10.1145/3394486.3403256","ee":"https://doi.org/10.1145/3394486.3403256","url":"https://dblp.org/rec/conf/kdd/MaaloufSF20"}, "url":"URL#1810808" }, { "@score":"1", "@id":"1810809", "info":{"authors":{"author":[{"@pid":"210/3471","text":"Meghana Madhyastha"},{"@pid":"272/9981","text":"Gongkai Li"},{"@pid":"134/3486","text":"Veronika Strnadová-Neeley"},{"@pid":"56/10367","text":"James Browne"},{"@pid":"04/700","text":"Joshua T. Vogelstein"},{"@pid":"b/RandalCBurns","text":"Randal C. Burns"},{"@pid":"32/2677","text":"Carey E. Priebe"}]},"title":"Geodesic Forests.","venue":"KDD","pages":"513-523","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MadhyasthaLSBVB20","doi":"10.1145/3394486.3403094","ee":"https://doi.org/10.1145/3394486.3403094","url":"https://dblp.org/rec/conf/kdd/MadhyasthaLSBVB20"}, "url":"URL#1810809" }, { "@score":"1", "@id":"1810810", "info":{"authors":{"author":{"@pid":"261/3757","text":"Heriberto Acosta Maestre"}},"title":"Bringing Inclusive Diversity to Data Science: Opportunities and Challenges.","venue":"KDD","pages":"3596","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Maestre20","doi":"10.1145/3394486.3411076","ee":"https://doi.org/10.1145/3394486.3411076","url":"https://dblp.org/rec/conf/kdd/Maestre20"}, "url":"URL#1810810" }, { "@score":"1", "@id":"1810811", "info":{"authors":{"author":[{"@pid":"218/6425","text":"Domenico Mandaglio"},{"@pid":"t/AndreaTagarelli","text":"Andrea Tagarelli"},{"@pid":"63/3664","text":"Francesco Gullo"}]},"title":"In and Out: Optimizing Overall Interaction in Probabilistic Graphs under Clustering Constraints.","venue":"KDD","pages":"1371-1381","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MandaglioTG20","doi":"10.1145/3394486.3403190","ee":"https://doi.org/10.1145/3394486.3403190","url":"https://dblp.org/rec/conf/kdd/MandaglioTG20"}, "url":"URL#1810811" }, { "@score":"1", "@id":"1810812", "info":{"authors":{"author":[{"@pid":"186/1481","text":"Panagiotis Mandros"},{"@pid":"234/7955","text":"David Kaltenpoth"},{"@pid":"41/5449","text":"Mario Boley"},{"@pid":"94/6462","text":"Jilles Vreeken"}]},"title":"Discovering Functional Dependencies from Mixed-Type Data.","venue":"KDD","pages":"1404-1414","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MandrosKBV20","doi":"10.1145/3394486.3403193","ee":"https://doi.org/10.1145/3394486.3403193","url":"https://dblp.org/rec/conf/kdd/MandrosKBV20"}, "url":"URL#1810812" }, { "@score":"1", "@id":"1810813", "info":{"authors":{"author":[{"@pid":"224/0218","text":"Mehrdad Mansouri"},{"@pid":"56/2402","text":"Ali Arab"},{"@pid":"17/10778","text":"Zahra Zohrevand"},{"@pid":"e/MartinEster","text":"Martin Ester"}]},"title":"Heidegger: Interpretable Temporal Causal Discovery.","venue":"KDD","pages":"1688-1696","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MansouriAZE20","doi":"10.1145/3394486.3403220","ee":"https://doi.org/10.1145/3394486.3403220","url":"https://dblp.org/rec/conf/kdd/MansouriAZE20"}, "url":"URL#1810813" }, { "@score":"1", "@id":"1810814", "info":{"authors":{"author":[{"@pid":"178/3692","text":"Yuning Mao"},{"@pid":"94/6503-2","text":"Tong Zhao 0002"},{"@pid":"49/10825","text":"Andrey Kan"},{"@pid":"133/3207","text":"Chenwei Zhang"},{"@pid":"d/XinLunaDong","text":"Xin Luna Dong"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"Octet: Online Catalog Taxonomy Enrichment with Self-Supervision.","venue":"KDD","pages":"2247-2257","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MaoZKZDF020","doi":"10.1145/3394486.3403274","ee":"https://doi.org/10.1145/3394486.3403274","url":"https://dblp.org/rec/conf/kdd/MaoZKZDF020"}, "url":"URL#1810814" }, { "@score":"1", "@id":"1810815", "info":{"authors":{"author":{"@pid":"05/5326","text":"Daniel Marcu"}},"title":"Straddling the Boundary between Contribution and Solution Driven Science.","venue":"KDD","pages":"3602","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Marcu20","doi":"10.1145/3394486.3409549","ee":"https://doi.org/10.1145/3394486.3409549","url":"https://dblp.org/rec/conf/kdd/Marcu20"}, "url":"URL#1810815" }, { "@score":"1", "@id":"1810816", "info":{"authors":{"author":[{"@pid":"88/3494","text":"Radu Marculescu"},{"@pid":"59/2715","text":"Diana Marculescu"},{"@pid":"63/628","text":"Ümit Y. Ogras"}]},"title":"Edge AI: Systems Design and ML for IoT Data Analytics.","venue":"KDD","pages":"3565-3566","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MarculescuMO20","doi":"10.1145/3394486.3406479","ee":"https://doi.org/10.1145/3394486.3406479","url":"https://dblp.org/rec/conf/kdd/MarculescuMO20"}, "url":"URL#1810816" }, { "@score":"1", "@id":"1810817", "info":{"authors":{"author":[{"@pid":"200/5699","text":"Tomas Martin"},{"@pid":"269/9617","text":"Guy Francoeur"},{"@pid":"v/PetkoValtchev","text":"Petko Valtchev"}]},"title":"CICLAD: A Fast and Memory-efficient Closed Itemset Miner for Streams.","venue":"KDD","pages":"1810-1818","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MartinFV20","doi":"10.1145/3394486.3403232","ee":"https://doi.org/10.1145/3394486.3403232","url":"https://dblp.org/rec/conf/kdd/MartinFV20"}, "url":"URL#1810817" }, { "@score":"1", "@id":"1810818", "info":{"authors":{"author":[{"@pid":"250/9516","text":"Clara H. McCreery"},{"@pid":"124/7169","text":"Namit Katariya"},{"@pid":"58/2858","text":"Anitha Kannan"},{"@pid":"230/3661","text":"Manish Chablani"},{"@pid":"99/6075","text":"Xavier Amatriain"}]},"title":"Effective Transfer Learning for Identifying Similar Questions: Matching User Questions to COVID-19 FAQs.","venue":"KDD","pages":"3458-3465","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/McCreeryKKCA20","doi":"10.1145/3394486.3412861","ee":"https://doi.org/10.1145/3394486.3412861","url":"https://dblp.org/rec/conf/kdd/McCreeryKKCA20"}, "url":"URL#1810818" }, { "@score":"1", "@id":"1810819", "info":{"authors":{"author":[{"@pid":"196/4704","text":"Reid McIlroy-Young"},{"@pid":"58/968","text":"Siddhartha Sen 0001"},{"@pid":"k/JonMKleinberg","text":"Jon M. Kleinberg"},{"@pid":"21/8524","text":"Ashton Anderson"}]},"title":"Aligning Superhuman AI with Human Behavior: Chess as a Model System.","venue":"KDD","pages":"1677-1687","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/McIlroy-Young0K20","doi":"10.1145/3394486.3403219","ee":"https://doi.org/10.1145/3394486.3403219","url":"https://dblp.org/rec/conf/kdd/McIlroy-Young0K20"}, "url":"URL#1810819" }, { "@score":"1", "@id":"1810820", "info":{"authors":{"author":[{"@pid":"128/4650","text":"James McInerney"},{"@pid":"183/0628","text":"Brian Brost"},{"@pid":"69/7536","text":"Praveen Chandar"},{"@pid":"121/4289","text":"Rishabh Mehrotra"},{"@pid":"61/5238","text":"Benjamin A. Carterette"}]},"title":"Counterfactual Evaluation of Slate Recommendations with Sequential Reward Interactions.","venue":"KDD","pages":"1779-1788","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/McInerneyBCMC20","doi":"10.1145/3394486.3403229","ee":"https://doi.org/10.1145/3394486.3403229","url":"https://dblp.org/rec/conf/kdd/McInerneyBCMC20"}, "url":"URL#1810820" }, { "@score":"1", "@id":"1810821", "info":{"authors":{"author":[{"@pid":"121/4289","text":"Rishabh Mehrotra"},{"@pid":"61/5238","text":"Ben Carterette"},{"@pid":"93/2334-8","text":"Yong Li 0008"},{"@pid":"158/1014","text":"Quanming Yao"},{"@pid":"76/5013","text":"Chen Gao"},{"@pid":"k/JamesTinYauKwok","text":"James T. Kwok"},{"@pid":"82/6362-1","text":"Qiang Yang 0001"},{"@pid":"31/6176","text":"Isabelle Guyon"}]},"title":"Advances in Recommender Systems: From Multi-stakeholder Marketplaces to Automated RecSys.","venue":"KDD","pages":"3533-3534","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MehrotraCLYGKYG20","doi":"10.1145/3394486.3406463","ee":"https://doi.org/10.1145/3394486.3406463","url":"https://dblp.org/rec/conf/kdd/MehrotraCLYGKYG20"}, "url":"URL#1810821" }, { "@score":"1", "@id":"1810822", "info":{"authors":{"author":[{"@pid":"121/4289","text":"Rishabh Mehrotra"},{"@pid":"27/4744","text":"Ashish Gupta"}]},"title":"Learning with Limited Labels via Momentum Damped & Differentially Weighted Optimization.","venue":"KDD","pages":"3416-3425","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MehrotraG20","doi":"10.1145/3394486.3403394","ee":"https://doi.org/10.1145/3394486.3403394","url":"https://dblp.org/rec/conf/kdd/MehrotraG20"}, "url":"URL#1810822" }, { "@score":"1", "@id":"1810823", "info":{"authors":{"author":[{"@pid":"205/8130","text":"Prakhar Mehrotra"},{"@pid":"12/10606","text":"Linsey Pang"},{"@pid":"212/5627","text":"Karthick Gopalswamy"},{"@pid":"174/0033","text":"Avinash Thangali"},{"@pid":"154/6324","text":"Timothy Winters"},{"@pid":"272/9896","text":"Ketki Gupte"},{"@pid":"273/0127","text":"Dnyanesh Kulkarni"},{"@pid":"272/9941","text":"Sunil Potnuru"},{"@pid":"273/0215","text":"Supreeth Shastry"},{"@pid":"272/9879","text":"Harshada Vuyyuri"}]},"title":"Price Investment using Prescriptive Analytics and Optimization in Retail.","venue":"KDD","pages":"3136-3144","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MehrotraPGTWGKP20","doi":"10.1145/3394486.3403365","ee":"https://doi.org/10.1145/3394486.3403365","url":"https://dblp.org/rec/conf/kdd/MehrotraPGTWGKP20"}, "url":"URL#1810823" }, { "@score":"1", "@id":"1810824", "info":{"authors":{"author":[{"@pid":"121/4289","text":"Rishabh Mehrotra"},{"@pid":"188/2437","text":"Niannan Xue"},{"@pid":"l/MLalmas","text":"Mounia Lalmas"}]},"title":"Bandit based Optimization of Multiple Objectives on a Music Streaming Platform.","venue":"KDD","pages":"3224-3233","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MehrotraXL20","doi":"10.1145/3394486.3403374","ee":"https://doi.org/10.1145/3394486.3403374","url":"https://dblp.org/rec/conf/kdd/MehrotraXL20"}, "url":"URL#1810824" }, { "@score":"1", "@id":"1810825", "info":{"authors":{"author":[{"@pid":"238/8479","text":"Yinan Mei"},{"@pid":"20/3883","text":"Shaoxu Song"},{"@pid":"128/1965","text":"Yunsu Lee"},{"@pid":"51/3697","text":"Jungho Park"},{"@pid":"15/5759","text":"Soo-Hyung Kim"},{"@pid":"143/6410","text":"Sungmin Yi"}]},"title":"Representing Temporal Attributes for Schema Matching.","venue":"KDD","pages":"709-719","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MeiSLPKY20","doi":"10.1145/3394486.3403115","ee":"https://doi.org/10.1145/3394486.3403115","url":"https://dblp.org/rec/conf/kdd/MeiSLPKY20"}, "url":"URL#1810825" }, { "@score":"1", "@id":"1810826", "info":{"authors":{"author":[{"@pid":"30/4233-1","text":"Yu Meng 0001"},{"@pid":"187/2874-1","text":"Jiaxin Huang 0001"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"Embedding-Driven Multi-Dimensional Topic Mining and Text Analysis.","venue":"KDD","pages":"3573-3574","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MengH020","doi":"10.1145/3394486.3406483","ee":"https://doi.org/10.1145/3394486.3406483","url":"https://dblp.org/rec/conf/kdd/MengH020"}, "url":"URL#1810826" }, { "@score":"1", "@id":"1810827", "info":{"authors":{"author":[{"@pid":"30/4233-1","text":"Yu Meng 0001"},{"@pid":"44/4491","text":"Yunyi Zhang"},{"@pid":"187/2874-1","text":"Jiaxin Huang 0001"},{"@pid":"50/671-44","text":"Yu Zhang 0044"},{"@pid":"94/3019-14","text":"Chao Zhang 0014"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"Hierarchical Topic Mining via Joint Spherical Tree and Text Embedding.","venue":"KDD","pages":"1908-1917","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MengZH0Z020","doi":"10.1145/3394486.3403242","ee":"https://doi.org/10.1145/3394486.3403242","url":"https://dblp.org/rec/conf/kdd/MengZH0Z020"}, "url":"URL#1810827" }, { "@score":"1", "@id":"1810828", "info":{"authors":{"author":[{"@pid":"125/2323","text":"Corrado Monti"},{"@pid":"53/7323","text":"Gianmarco De Francisci Morales"},{"@pid":"b/FBonchi","text":"Francesco Bonchi"}]},"title":"Learning Opinion Dynamics From Social Traces.","venue":"KDD","pages":"764-773","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MontiMB20","doi":"10.1145/3394486.3403119","ee":"https://doi.org/10.1145/3394486.3403119","url":"https://dblp.org/rec/conf/kdd/MontiMB20"}, "url":"URL#1810828" }, { "@score":"1", "@id":"1810829", "info":{"authors":{"author":[{"@pid":"220/9907","text":"Gordon Euhyun Moon"},{"@pid":"208/9127","text":"J. Austin Ellis"},{"@pid":"132/6965","text":"Aravind Sukumaran-Rajam"},{"@pid":"p/SParathasarathy","text":"Srinivasan Parthasarathy 0001"},{"@pid":"s/PSadayappan","text":"P. Sadayappan"}]},"title":"ALO-NMF: Accelerated Locality-Optimized Non-negative Matrix Factorization.","venue":"KDD","pages":"1758-1767","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MoonES0S20","doi":"10.1145/3394486.3403227","ee":"https://doi.org/10.1145/3394486.3403227","url":"https://dblp.org/rec/conf/kdd/MoonES0S20"}, "url":"URL#1810829" }, { "@score":"1", "@id":"1810830", "info":{"authors":{"author":[{"@pid":"87/8721","text":"Dheevatsa Mudigere"},{"@pid":"79/2042","text":"Maxim Naumov"},{"@pid":"238/2081","text":"Joe Spisak"},{"@pid":"272/9960","text":"Geeta Chauhan"},{"@pid":"136/9284","text":"Narine Kokhlikyan"},{"@pid":"38/8141","text":"Amanpreet Singh"},{"@pid":"156/5885","text":"Vedanuj Goswami"}]},"title":"Building Recommender Systems with PyTorch.","venue":"KDD","pages":"3525-3526","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MudigereNSCKSG20","doi":"10.1145/3394486.3406714","ee":"https://doi.org/10.1145/3394486.3406714","url":"https://dblp.org/rec/conf/kdd/MudigereNSCKSG20"}, "url":"URL#1810830" }, { "@score":"1", "@id":"1810831", "info":{"authors":{"author":[{"@pid":"178/3250","text":"Jonas Mueller 0001"},{"@pid":"145/9987","text":"Xingjian Shi"},{"@pid":"s/AlexanderJSmola","text":"Alexander J. Smola"}]},"title":"Faster, Simpler, More Accurate: Practical Automated Machine Learning with Tabular, Text, and Image Data.","venue":"KDD","pages":"3509-3510","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MuellerSS20","doi":"10.1145/3394486.3406706","ee":"https://doi.org/10.1145/3394486.3406706","url":"https://dblp.org/rec/conf/kdd/MuellerSS20"}, "url":"URL#1810831" }, { "@score":"1", "@id":"1810832", "info":{"authors":{"author":[{"@pid":"164/4793","text":"Khalil Muhammad"},{"@pid":"164/2124","text":"Qinqin Wang"},{"@pid":"273/0028","text":"Diarmuid O'Reilly-Morgan"},{"@pid":"02/3410","text":"Elias Z. Tragos"},{"@pid":"s/BarrySmyth","text":"Barry Smyth"},{"@pid":"86/2778","text":"Neil Hurley"},{"@pid":"248/8693","text":"James Geraci"},{"@pid":"94/6962","text":"Aonghus Lawlor"}]},"title":"FedFast: Going Beyond Average for Faster Training of Federated Recommender Systems.","venue":"KDD","pages":"1234-1242","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/MuhammadWOTSHGL20","doi":"10.1145/3394486.3403176","ee":"https://doi.org/10.1145/3394486.3403176","url":"https://dblp.org/rec/conf/kdd/MuhammadWOTSHGL20"}, "url":"URL#1810832" }, { "@score":"1", "@id":"1810833", "info":{"authors":{"author":[{"@pid":"241/3378","text":"David O. Nahmias"},{"@pid":"188/2821","text":"Kimberly L. Kontson"}]},"title":"Easy Perturbation EEG Algorithm for Spectral Importance (easyPEASI): A Simple Method to Identify Important Spectral Features of EEG in Deep Learning Models.","venue":"KDD","pages":"2398-2406","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NahmiasK20","doi":"10.1145/3394486.3403289","ee":"https://doi.org/10.1145/3394486.3403289","url":"https://dblp.org/rec/conf/kdd/NahmiasK20"}, "url":"URL#1810833" }, { "@score":"1", "@id":"1810834", "info":{"authors":{"author":[{"@pid":"129/4583","text":"Kazuki Nakajima"},{"@pid":"53/4994","text":"Kazuyuki Shudo"}]},"title":"Estimating Properties of Social Networks via Random Walk considering Private Nodes.","venue":"KDD","pages":"720-730","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NakajimaS20","doi":"10.1145/3394486.3403116","ee":"https://doi.org/10.1145/3394486.3403116","url":"https://dblp.org/rec/conf/kdd/NakajimaS20"}, "url":"URL#1810834" }, { "@score":"1", "@id":"1810835", "info":{"authors":{"author":[{"@pid":"137/8618","text":"Mohammad Hossein Namaki"},{"@pid":"08/7992","text":"Avrilia Floratou"},{"@pid":"135/5141","text":"Fotis Psallidas"},{"@pid":"159/6290","text":"Subru Krishnan"},{"@pid":"200/2342","text":"Ashvin Agrawal"},{"@pid":"32/6122","text":"Yinghui Wu"},{"@pid":"68/6811","text":"Yiwen Zhu"},{"@pid":"89/6502","text":"Markus Weimer"}]},"title":"Vamsa: Automated Provenance Tracking in Data Science Scripts.","venue":"KDD","pages":"1542-1551","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NamakiFPKAWZW20","doi":"10.1145/3394486.3403205","ee":"https://doi.org/10.1145/3394486.3403205","url":"https://dblp.org/rec/conf/kdd/NamakiFPKAWZW20"}, "url":"URL#1810835" }, { "@score":"1", "@id":"1810836", "info":{"authors":{"author":{"@pid":"157/8116","text":"Elias Chaibub Neto"}},"title":"A Causal Look at Statistical Definitions of Discrimination.","venue":"KDD","pages":"873-881","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Neto20","doi":"10.1145/3394486.3403130","ee":"https://doi.org/10.1145/3394486.3403130","url":"https://dblp.org/rec/conf/kdd/Neto20"}, "url":"URL#1810836" }, { "@score":"1", "@id":"1810837", "info":{"authors":{"author":[{"@pid":"57/2580","text":"Viet-An Nguyen"},{"@pid":"234/7801","text":"Peibei Shi"},{"@pid":"174/7051","text":"Jagdish Ramakrishnan"},{"@pid":"06/1322","text":"Udi Weinsberg"},{"@pid":"77/6036","text":"Henry C. Lin"},{"@pid":"272/9946","text":"Steve Metz"},{"@pid":"272/9901","text":"Neil Chandra"},{"@pid":"272/9940","text":"Jane Jing"},{"@pid":"172/4224","text":"Dimitris Kalimeris"}]},"title":"CLARA: Confidence of Labels and Raters.","venue":"KDD","pages":"2542-2552","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NguyenSRWLMCJK20","doi":"10.1145/3394486.3403304","ee":"https://doi.org/10.1145/3394486.3403304","url":"https://dblp.org/rec/conf/kdd/NguyenSRWLMCJK20"}, "url":"URL#1810837" }, { "@score":"1", "@id":"1810838", "info":{"authors":{"author":[{"@pid":"244/2046","text":"Xichuan Niu"},{"@pid":"173/4985","text":"Bofang Li"},{"@pid":"52/9457","text":"Chenliang Li"},{"@pid":"75/5560-5","text":"Rong Xiao 0005"},{"@pid":"265/5559","text":"Haochuan Sun"},{"@pid":"09/43","text":"Hongbo Deng"},{"@pid":"07/954","text":"Zhenzhong Chen"}]},"title":"A Dual Heterogeneous Graph Attention Network to Improve Long-Tail Performance for Shop Search in E-Commerce.","venue":"KDD","pages":"3405-3415","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NiuLLXSDC20","doi":"10.1145/3394486.3403393","ee":"https://doi.org/10.1145/3394486.3403393","url":"https://dblp.org/rec/conf/kdd/NiuLLXSDC20"}, "url":"URL#1810838" }, { "@score":"1", "@id":"1810839", "info":{"authors":{"author":[{"@pid":"64/1008","text":"Kenta Niwa"},{"@pid":"31/4910","text":"Noboru Harada"},{"@pid":"24/5631-3","text":"Guoqiang Zhang 0003"},{"@pid":"30/797","text":"W. Bastiaan Kleijn"}]},"title":"Edge-consensus Learning: Deep Learning on P2P Networks with Nonhomogeneous Data.","venue":"KDD","pages":"668-678","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NiwaH0K20","doi":"10.1145/3394486.3403109","ee":"https://doi.org/10.1145/3394486.3403109","url":"https://dblp.org/rec/conf/kdd/NiwaH0K20"}, "url":"URL#1810839" }, { "@score":"1", "@id":"1810840", "info":{"authors":{"author":[{"@pid":"26/3471","text":"Nima Noorshams"},{"@pid":"118/5298","text":"Saurabh Verma"},{"@pid":"76/11044","text":"Aude Hofleitner"}]},"title":"TIES: Temporal Interaction Embeddings for Enhancing Social Media Integrity at Facebook.","venue":"KDD","pages":"3128-3135","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/NoorshamsVH20","doi":"10.1145/3394486.3403364","ee":"https://doi.org/10.1145/3394486.3403364","url":"https://dblp.org/rec/conf/kdd/NoorshamsVH20"}, "url":"URL#1810840" }, { "@score":"1", "@id":"1810842", "info":{"authors":{"author":[{"@pid":"51/8672","text":"Jan Overgoor"},{"@pid":"267/9258","text":"George Pakapol Supaniratisai"},{"@pid":"13/10542","text":"Johan Ugander"}]},"title":"Scaling Choice Models of Relational Social Data.","venue":"KDD","pages":"1990-1998","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/OvergoorSU20","doi":"10.1145/3394486.3403250","ee":"https://doi.org/10.1145/3394486.3403250","url":"https://dblp.org/rec/conf/kdd/OvergoorSU20"}, "url":"URL#1810842" }, { "@score":"1", "@id":"1810843", "info":{"authors":{"author":[{"@pid":"70/7564","text":"Aditya Pal"},{"@pid":"130/0502","text":"Chantat Eksombatchai"},{"@pid":"166/5208","text":"Yitong Zhou"},{"@pid":"94/4810","text":"Bo Zhao"},{"@pid":"168/4979","text":"Charles Rosenberg"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"}]},"title":"PinnerSage: Multi-Modal User Embedding Framework for Recommendations at Pinterest.","venue":"KDD","pages":"2311-2320","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PalEZZRL20","doi":"10.1145/3394486.3403280","ee":"https://doi.org/10.1145/3394486.3403280","url":"https://dblp.org/rec/conf/kdd/PalEZZRL20"}, "url":"URL#1810843" }, { "@score":"1", "@id":"1810844", "info":{"authors":{"author":[{"@pid":"209/8751","text":"Menghai Pan"},{"@pid":"253/1238","text":"Weixiao Huang"},{"@pid":"66/580","text":"Yanhua Li"},{"@pid":"16/1951","text":"Xun Zhou"},{"@pid":"42/2501-7","text":"Jun Luo 0007"}]},"title":"xGAIL: Explainable Generative Adversarial Imitation Learning for Explainable Human Decision Analysis.","venue":"KDD","pages":"1334-1343","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PanHLZL20","doi":"10.1145/3394486.3403186","ee":"https://doi.org/10.1145/3394486.3403186","url":"https://dblp.org/rec/conf/kdd/PanHLZL20"}, "url":"URL#1810844" }, { "@score":"1", "@id":"1810845", "info":{"authors":{"author":[{"@pid":"252/5223","text":"Ren Pang"},{"@pid":"29/2669-1","text":"Xinyang Zhang 0001"},{"@pid":"07/8388","text":"Shouling Ji"},{"@pid":"53/1565","text":"Xiapu Luo"},{"@pid":"12/2633-6","text":"Ting Wang 0006"}]},"title":"AdvMind: Inferring Adversary Intent of Black-Box Attacks.","venue":"KDD","pages":"1899-1907","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PangZJLW20","doi":"10.1145/3394486.3403241","ee":"https://doi.org/10.1145/3394486.3403241","url":"https://dblp.org/rec/conf/kdd/PangZJLW20"}, "url":"URL#1810845" }, { "@score":"1", "@id":"1810846", "info":{"authors":{"author":[{"@pid":"116/9404","text":"Namyong Park"},{"@pid":"49/10825","text":"Andrey Kan"},{"@pid":"d/XinLunaDong","text":"Xin Luna Dong"},{"@pid":"94/6503-2","text":"Tong Zhao 0002"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"MultiImport: Inferring Node Importance in a Knowledge Graph from Multiple Input Signals.","venue":"KDD","pages":"503-512","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ParkKDZF20","doi":"10.1145/3394486.3403093","ee":"https://doi.org/10.1145/3394486.3403093","url":"https://dblp.org/rec/conf/kdd/ParkKDZF20"}, "url":"URL#1810846" }, { "@score":"1", "@id":"1810847", "info":{"authors":{"author":[{"@pid":"170/5430","text":"Chanyoung Park"},{"@pid":"305/0254","text":"Carl Yang 0001"},{"@pid":"66/5923-8","text":"Qi Zhu 0008"},{"@pid":"33/6749-7","text":"Donghyun Kim 0007"},{"@pid":"80/6889","text":"Hwanjo Yu"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"Unsupervised Differentiable Multi-aspect Network Embedding.","venue":"KDD","pages":"1435-1445","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ParkYZKY020","doi":"10.1145/3394486.3403196","ee":"https://doi.org/10.1145/3394486.3403196","url":"https://dblp.org/rec/conf/kdd/ParkYZKY020"}, "url":"URL#1810847" }, { "@score":"1", "@id":"1810848", "info":{"authors":{"author":[{"@pid":"206/0249","text":"Martin Pavlovski"},{"@pid":"217/3050","text":"Jelena Gligorijevic"},{"@pid":"151/5281","text":"Ivan Stojkovic"},{"@pid":"53/2784","text":"Shubham Agrawal"},{"@pid":"273/0221","text":"Shabhareesh Komirishetty"},{"@pid":"173/4600","text":"Djordje Gligorijevic"},{"@pid":"11/94","text":"Narayan Bhamidipati"},{"@pid":"92/1944","text":"Zoran Obradovic"}]},"title":"Time-Aware User Embeddings as a Service.","venue":"KDD","pages":"3194-3202","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PavlovskiGSAKGB20","doi":"10.1145/3394486.3403371","ee":"https://doi.org/10.1145/3394486.3403371","url":"https://dblp.org/rec/conf/kdd/PavlovskiGSAKGB20"}, "url":"URL#1810848" }, { "@score":"1", "@id":"1810849", "info":{"authors":{"author":[{"@pid":"168/9433","text":"Shichao Pei"},{"@pid":"04/1781-6","text":"Lu Yu 0006"},{"@pid":"41/8967","text":"Guoxian Yu"},{"@pid":"74/1890-1","text":"Xiangliang Zhang 0001"}]},"title":"REA: Robust Cross-lingual Entity Alignment Between Knowledge Graphs.","venue":"KDD","pages":"2175-2184","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Pei0Y020","doi":"10.1145/3394486.3403268","ee":"https://doi.org/10.1145/3394486.3403268","url":"https://dblp.org/rec/conf/kdd/Pei0Y020"}, "url":"URL#1810849" }, { "@score":"1", "@id":"1810850", "info":{"authors":{"author":{"@pid":"p/JianPei","text":"Jian Pei"}},"title":"Data Pricing - From Economics to Data Science.","venue":"KDD","pages":"3553-3554","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Pei20","doi":"10.1145/3394486.3406473","ee":"https://doi.org/10.1145/3394486.3406473","url":"https://dblp.org/rec/conf/kdd/Pei20"}, "url":"URL#1810850" }, { "@score":"1", "@id":"1810851", "info":{"authors":{"author":[{"@pid":"196/4899","text":"Leonardo Pellegrina"},{"@pid":"202/6684","text":"Cyrus Cousins"},{"@pid":"62/5172","text":"Fabio Vandin"},{"@pid":"86/8260","text":"Matteo Riondato"}]},"title":"MCRapper: Monte-Carlo Rademacher Averages for Poset Families and Approximate Pattern Mining.","venue":"KDD","pages":"2165-2174","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PellegrinaCVR20","doi":"10.1145/3394486.3403267","ee":"https://doi.org/10.1145/3394486.3403267","url":"https://dblp.org/rec/conf/kdd/PellegrinaCVR20"}, "url":"URL#1810851" }, { "@score":"1", "@id":"1810853", "info":{"authors":{"author":[{"@pid":"p/FPennerath","text":"Frédéric Pennerath"},{"@pid":"186/1481","text":"Panagiotis Mandros"},{"@pid":"94/6462","text":"Jilles Vreeken"}]},"title":"Discovering Approximate Functional Dependencies using Smoothed Mutual Information.","venue":"KDD","pages":"1254-1264","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PennerathMV20","doi":"10.1145/3394486.3403178","ee":"https://doi.org/10.1145/3394486.3403178","url":"https://dblp.org/rec/conf/kdd/PennerathMV20"}, "url":"URL#1810853" }, { "@score":"1", "@id":"1810854", "info":{"authors":{"author":{"@pid":"61/3558","text":"Manuel A. Pérez-Quiñones"}},"title":"How Can Computer Science Education Address Inequities.","venue":"KDD","pages":"3581","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Perez-Quinones20","doi":"10.1145/3394486.3411063","ee":"https://doi.org/10.1145/3394486.3411063","url":"https://dblp.org/rec/conf/kdd/Perez-Quinones20"}, "url":"URL#1810854" }, { "@score":"1", "@id":"1810855", "info":{"authors":{"author":[{"@pid":"213/1864","text":"Lukas Pfahler"},{"@pid":"m/KatharinaMorik","text":"Katharina Morik"}]},"title":"Semantic Search in Millions of Equations.","venue":"KDD","pages":"135-143","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PfahlerM20","doi":"10.1145/3394486.3403056","ee":"https://doi.org/10.1145/3394486.3403056","url":"https://dblp.org/rec/conf/kdd/PfahlerM20"}, "url":"URL#1810855" }, { "@score":"1", "@id":"1810856", "info":{"authors":{"author":[{"@pid":"01/8924","text":"Phuong Pham"},{"@pid":"29/4326","text":"Vivek Jain"},{"@pid":"273/0256","text":"Lukas Dauterman"},{"@pid":"66/6098","text":"Justin Ormont"},{"@pid":"94/4527","text":"Navendu Jain"}]},"title":"DeepTriage: Automated Transfer Assistance for Incidents in Cloud Services.","venue":"KDD","pages":"3281-3289","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PhamJDOJ20","doi":"10.1145/3394486.3403380","ee":"https://doi.org/10.1145/3394486.3403380","url":"https://dblp.org/rec/conf/kdd/PhamJDOJ20"}, "url":"URL#1810856" }, { "@score":"1", "@id":"1810857", "info":{"authors":{"author":[{"@pid":"65/3446","text":"Claudia Plant"},{"@pid":"215/4460","text":"Sonja Biedermann"},{"@pid":"323/2652-1","text":"Christian Böhm 0001"}]},"title":"Data Compression as a Comprehensive Framework for Graph Drawing and Representation Learning.","venue":"KDD","pages":"1212-1222","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PlantBB20","doi":"10.1145/3394486.3403174","ee":"https://doi.org/10.1145/3394486.3403174","url":"https://dblp.org/rec/conf/kdd/PlantBB20"}, "url":"URL#1810857" }, { "@score":"1", "@id":"1810858", "info":{"authors":{"author":[{"@pid":"242/3841","text":"Vladislav Polianskii"},{"@pid":"126/1777","text":"Florian T. Pokorny"}]},"title":"Voronoi Graph Traversal in High Dimensions with Applications to Topological Data Analysis and Piecewise Linear Interpolation.","venue":"KDD","pages":"2154-2164","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PolianskiiP20","doi":"10.1145/3394486.3403266","ee":"https://doi.org/10.1145/3394486.3403266","url":"https://dblp.org/rec/conf/kdd/PolianskiiP20"}, "url":"URL#1810858" }, { "@score":"1", "@id":"1810859", "info":{"authors":{"author":[{"@pid":"249/2892","text":"Jamie Pool"},{"@pid":"225/6438","text":"Ebrahim Beyrami"},{"@pid":"256/9400","text":"Vishak Gopal"},{"@pid":"a/AshkanAazami","text":"Ashkan Aazami"},{"@pid":"27/981","text":"Jayant Gupchup"},{"@pid":"268/5782","text":"Jeff Rowland"},{"@pid":"97/8049","text":"Binlong Li"},{"@pid":"268/5718","text":"Pritesh Kanani"},{"@pid":"94/6224","text":"Ross Cutler"},{"@pid":"g/JohannesGehrke","text":"Johannes Gehrke"}]},"title":"Lumos: A Library for Diagnosing Metric Regressions in Web-Scale Applications.","venue":"KDD","pages":"2562-2570","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/PoolBGAGRLKCG20","doi":"10.1145/3394486.3403306","ee":"https://doi.org/10.1145/3394486.3403306","url":"https://dblp.org/rec/conf/kdd/PoolBGAGRLKCG20"}, "url":"URL#1810859" }, { "@score":"1", "@id":"1810860", "info":{"authors":{"author":{"@pid":"207/1985","text":"Brianna B. Posadas"}},"title":"Broadening Participation in Technology Policy.","venue":"KDD","pages":"3585","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Posadas20","doi":"10.1145/3394486.3411067","ee":"https://doi.org/10.1145/3394486.3411067","url":"https://dblp.org/rec/conf/kdd/Posadas20"}, "url":"URL#1810860" }, { "@score":"1", "@id":"1810862", "info":{"authors":{"author":[{"@pid":"253/0403","text":"Zongyue Qin"},{"@pid":"225/5377","text":"Yunsheng Bai"},{"@pid":"37/3868","text":"Yizhou Sun"}]},"title":"GHashing: Semantic Graph Hashing for Approximate Similarity Search in Graph Databases.","venue":"KDD","pages":"2062-2072","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/QinBS20","doi":"10.1145/3394486.3403257","ee":"https://doi.org/10.1145/3394486.3403257","url":"https://dblp.org/rec/conf/kdd/QinBS20"}, "url":"URL#1810862" }, { "@score":"1", "@id":"1810863", "info":{"authors":{"author":[{"@pid":"06/864-1","text":"Zhen Qin 0001"},{"@pid":"256/9242","text":"Suming J. Chen"},{"@pid":"95/2272","text":"Donald Metzler"},{"@pid":"151/7446","text":"Yongwoo Noh"},{"@pid":"264/2860","text":"Jingzheng Qin"},{"@pid":"67/2661","text":"Xuanhui Wang"}]},"title":"Attribute-based Propensity for Unbiased Learning in Recommender Systems: Algorithm and Case Studies.","venue":"KDD","pages":"2359-2367","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/QinCMNQW20","doi":"10.1145/3394486.3403285","ee":"https://doi.org/10.1145/3394486.3403285","url":"https://dblp.org/rec/conf/kdd/QinCMNQW20"}, "url":"URL#1810863" }, { "@score":"1", "@id":"1810864", "info":{"authors":{"author":[{"@pid":"06/864-1","text":"Zhen Qin 0001"},{"@pid":"130/5387","text":"Yicheng Cheng"},{"@pid":"28/6429-1","text":"Zhe Zhao 0001"},{"@pid":"06/4240","text":"Zhe Chen"},{"@pid":"95/2272","text":"Donald Metzler"},{"@pid":"264/2860","text":"Jingzheng Qin"}]},"title":"Multitask Mixture of Sequential Experts for User Activity Streams.","venue":"KDD","pages":"3083-3091","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/QinCZCMQ20","doi":"10.1145/3394486.3403359","ee":"https://doi.org/10.1145/3394486.3403359","url":"https://dblp.org/rec/conf/kdd/QinCZCMQ20"}, "url":"URL#1810864" }, { "@score":"1", "@id":"1810865", "info":{"authors":{"author":[{"@pid":"152/1733","text":"Jiezhong Qiu"},{"@pid":"238/0932","text":"Qibin Chen"},{"@pid":"17/9267","text":"Yuxiao Dong"},{"@pid":"05/3499-1","text":"Jing Zhang 0001"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"48/3462-4","text":"Ming Ding 0004"},{"@pid":"79/1140","text":"Kuansan Wang"},{"@pid":"t/JieTang","text":"Jie Tang 0001"}]},"title":"GCC: Graph Contrastive Coding for Graph Neural Network Pre-Training.","venue":"KDD","pages":"1150-1160","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/QiuCDZYDWT20","doi":"10.1145/3394486.3403168","ee":"https://doi.org/10.1145/3394486.3403168","url":"https://dblp.org/rec/conf/kdd/QiuCDZYDWT20"}, "url":"URL#1810865" }, { "@score":"1", "@id":"1810866", "info":{"authors":{"author":{"@pid":"r/AshwinRam","text":"Ashwin Ram 0001"}},"title":"Innovating with Language AI.","venue":"KDD","pages":"3611","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Ram20","doi":"10.1145/3394486.3409562","ee":"https://doi.org/10.1145/3394486.3409562","url":"https://dblp.org/rec/conf/kdd/Ram20"}, "url":"URL#1810866" }, { "@score":"1", "@id":"1810867", "info":{"authors":{"author":[{"@pid":"90/8732","text":"Jeff Rasley"},{"@pid":"115/9021","text":"Samyam Rajbhandari"},{"@pid":"72/2838","text":"Olatunji Ruwase"},{"@pid":"50/174","text":"Yuxiong He"}]},"title":"DeepSpeed: System Optimizations Enable Training Deep Learning Models with Over 100 Billion Parameters.","venue":"KDD","pages":"3505-3506","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RasleyRRH20","doi":"10.1145/3394486.3406703","ee":"https://doi.org/10.1145/3394486.3406703","url":"https://dblp.org/rec/conf/kdd/RasleyRRH20"}, "url":"URL#1810867" }, { "@score":"1", "@id":"1810868", "info":{"authors":{"author":[{"@pid":"189/0567","text":"Huimin Ren"},{"@pid":"209/8751","text":"Menghai Pan"},{"@pid":"66/580","text":"Yanhua Li"},{"@pid":"16/1951","text":"Xun Zhou"},{"@pid":"42/2501-7","text":"Jun Luo 0007"}]},"title":"ST-SiameseNet: Spatio-Temporal Siamese Networks for Human Mobility Signature Identification.","venue":"KDD","pages":"1306-1315","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RenPLZL20","doi":"10.1145/3394486.3403183","ee":"https://doi.org/10.1145/3394486.3403183","url":"https://dblp.org/rec/conf/kdd/RenPLZL20"}, "url":"URL#1810868" }, { "@score":"1", "@id":"1810869", "info":{"authors":{"author":[{"@pid":"75/6568-6","text":"Yi Ren 0006"},{"@pid":"96/10484-3","text":"Xu Tan 0003"},{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"61/3233-1","text":"Jian Luan 0001"},{"@pid":"75/7785","text":"Zhou Zhao"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"DeepSinger: Singing Voice Synthesis with Data Mined From the Web.","venue":"KDD","pages":"1979-1989","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RenTQLZL20","doi":"10.1145/3394486.3403249","ee":"https://doi.org/10.1145/3394486.3403249","url":"https://dblp.org/rec/conf/kdd/RenTQLZL20"}, "url":"URL#1810869" }, { "@score":"1", "@id":"1810870", "info":{"authors":{"author":[{"@pid":"142/9469","text":"Bartley Richardson"},{"@pid":"134/4016","text":"Bradley Rees"},{"@pid":"273/0232","text":"Tom Drabas"},{"@pid":"227/0567","text":"Even Oldridge"},{"@pid":"41/3005","text":"David A. Bader"},{"@pid":"92/10722","text":"Rachel Allen"}]},"title":"Accelerating and Expanding End-to-End Data Science Workflows with DL/ML Interoperability Using RAPIDS.","venue":"KDD","pages":"3503-3504","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RichardsonRDOBA20","doi":"10.1145/3394486.3406702","ee":"https://doi.org/10.1145/3394486.3406702","url":"https://dblp.org/rec/conf/kdd/RichardsonRDOBA20"}, "url":"URL#1810870" }, { "@score":"1", "@id":"1810871", "info":{"authors":{"author":[{"@pid":"24/10036","text":"Yu Rong"},{"@pid":"157/0940","text":"Tingyang Xu"},{"@pid":"22/1170","text":"Junzhou Huang"},{"@pid":"155/3181-1","text":"Wenbing Huang 0001"},{"@pid":"85/5637-1","text":"Hong Cheng 0001"},{"@pid":"212/7871","text":"Yao Ma 0001"},{"@pid":"178/8638-1","text":"Yiqi Wang 0001"},{"@pid":"207/7927","text":"Tyler Derr"},{"@pid":"27/9060","text":"Lingfei Wu"},{"@pid":"94/9023-1","text":"Tengfei Ma 0001"}]},"title":"Deep Graph Learning: Foundations, Advances and Applications.","venue":"KDD","pages":"3555-3556","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RongXHHC0WDWM20","doi":"10.1145/3394486.3406474","ee":"https://doi.org/10.1145/3394486.3406474","url":"https://dblp.org/rec/conf/kdd/RongXHHC0WDWM20"}, "url":"URL#1810871" }, { "@score":"1", "@id":"1810873", "info":{"authors":{"author":[{"@pid":"204/3375","text":"Sijie Ruan"},{"@pid":"140/7398","text":"Zi Xiong"},{"@pid":"58/10813","text":"Cheng Long"},{"@pid":"53/9113","text":"Yiheng Chen"},{"@pid":"b/JieBao3","text":"Jie Bao 0003"},{"@pid":"204/3378","text":"Tianfu He"},{"@pid":"157/4235","text":"Ruiyuan Li"},{"@pid":"09/3641","text":"Shengnan Wu"},{"@pid":"178/3086","text":"Zhongyuan Jiang"},{"@pid":"87/1585-4","text":"Yu Zheng 0004"}]},"title":"Doing in One Go: Delivery Time Inference Based on Couriers' Trajectories.","venue":"KDD","pages":"2813-2821","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/RuanXLC0HLWJZ20","doi":"10.1145/3394486.3403332","ee":"https://doi.org/10.1145/3394486.3403332","url":"https://dblp.org/rec/conf/kdd/RuanXLC0HLWJZ20"}, "url":"URL#1810873" }, { "@score":"1", "@id":"1810874", "info":{"authors":{"author":[{"@pid":"216/7290","text":"Noveen Sachdeva"},{"@pid":"98/3417","text":"Yi Su"},{"@pid":"j/ThorstenJoachims","text":"Thorsten Joachims"}]},"title":"Off-policy Bandits with Deficient Support.","venue":"KDD","pages":"965-975","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SachdevaSJ20","doi":"10.1145/3394486.3403139","ee":"https://doi.org/10.1145/3394486.3403139","url":"https://dblp.org/rec/conf/kdd/SachdevaSJ20"}, "url":"URL#1810874" }, { "@score":"1", "@id":"1810875", "info":{"authors":{"author":[{"@pid":"249/9312","text":"Otmane Sakhi"},{"@pid":"173/9362","text":"Stephen Bonner"},{"@pid":"10/4983","text":"David Rohde"},{"@pid":"64/4087","text":"Flavian Vasile"}]},"title":"BLOB: A Probabilistic Model for Recommendation that Combines Organic and Bandit Signals.","venue":"KDD","pages":"783-793","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SakhiBRV20","doi":"10.1145/3394486.3403121","ee":"https://doi.org/10.1145/3394486.3403121","url":"https://dblp.org/rec/conf/kdd/SakhiBRV20"}, "url":"URL#1810875" }, { "@score":"1", "@id":"1810876", "info":{"authors":{"author":[{"@pid":"145/9871","text":"Pedro Saleiro"},{"@pid":"241/6234","text":"Kit T. Rodolfa"},{"@pid":"19/6687","text":"Rayid Ghani"}]},"title":"Dealing with Bias and Fairness in Data Science Systems: A Practical Hands-on Tutorial.","venue":"KDD","pages":"3513-3514","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SaleiroRG20","doi":"10.1145/3394486.3406708","ee":"https://doi.org/10.1145/3394486.3406708","url":"https://dblp.org/rec/conf/kdd/SaleiroRG20"}, "url":"URL#1810876" }, { "@score":"1", "@id":"1810877", "info":{"authors":{"author":[{"@pid":"94/1656","text":"Venu Satuluri"},{"@pid":"93/582","text":"Yao Wu"},{"@pid":"08/9895","text":"Xun Zheng"},{"@pid":"272/9916","text":"Yilei Qian"},{"@pid":"273/0153","text":"Brian Wichers"},{"@pid":"93/9989","text":"Qieyun Dai"},{"@pid":"273/0006","text":"Gui Ming Tang"},{"@pid":"185/4257","text":"Jerry Jiang"},{"@pid":"00/7739","text":"Jimmy Lin"}]},"title":"SimClusters: Community-Based Representations for Heterogeneous Recommendations at Twitter.","venue":"KDD","pages":"3183-3193","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SatuluriWZQWDTJ20","doi":"10.1145/3394486.3403370","ee":"https://doi.org/10.1145/3394486.3403370","url":"https://dblp.org/rec/conf/kdd/SatuluriWZQWDTJ20"}, "url":"URL#1810877" }, { "@score":"1", "@id":"1810879", "info":{"authors":{"author":{"@pid":"22/8254","text":"Jan Schellenberger"}},"title":"Using Machine Learning to Detect Cancer Early.","venue":"KDD","pages":"3604","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Schellenberger20","doi":"10.1145/3394486.3409553","ee":"https://doi.org/10.1145/3394486.3409553","url":"https://dblp.org/rec/conf/kdd/Schellenberger20"}, "url":"URL#1810879" }, { "@score":"1", "@id":"1810881", "info":{"authors":{"author":[{"@pid":"88/5622","text":"James G. Shanahan"},{"@pid":"71/5406-3","text":"Liang Dai 0003"}]},"title":"Introduction to Computer Vision and Real Time Deep Learning-based Object Detection.","venue":"KDD","pages":"3523-3524","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShanahanD20","doi":"10.1145/3394486.3406713","ee":"https://doi.org/10.1145/3394486.3406713","url":"https://dblp.org/rec/conf/kdd/ShanahanD20"}, "url":"URL#1810881" }, { "@score":"1", "@id":"1810882", "info":{"authors":{"author":[{"@pid":"45/5084-1","text":"Jin Shang 0001"},{"@pid":"57/988","text":"Mingxuan Sun"},{"@pid":"92/8609","text":"Nina Siu-Ngan Lam"}]},"title":"List-wise Fairness Criterion for Point Processes.","venue":"KDD","pages":"1948-1958","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShangSL20","doi":"10.1145/3394486.3403246","ee":"https://doi.org/10.1145/3394486.3403246","url":"https://dblp.org/rec/conf/kdd/ShangSL20"}, "url":"URL#1810882" }, { "@score":"1", "@id":"1810886", "info":{"authors":{"author":[{"@pid":"205/2423","text":"Zheyan Shen"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"180/2823","text":"Jiashuo Liu"},{"@pid":"07/4227-1","text":"Tong Zhang 0001"},{"@pid":"50/3402-64","text":"Bo Li 0064"},{"@pid":"06/10875","text":"Zhitang Chen"}]},"title":"Stable Learning via Differentiated Variable Decorrelation.","venue":"KDD","pages":"2185-2193","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Shen0LZ0C20","doi":"10.1145/3394486.3403269","ee":"https://doi.org/10.1145/3394486.3403269","url":"https://dblp.org/rec/conf/kdd/Shen0LZ0C20"}, "url":"URL#1810886" }, { "@score":"1", "@id":"1810887", "info":{"authors":{"author":[{"@pid":"273/0146","text":"Iris Shen"},{"@pid":"03/4043","text":"Le Zhang"},{"@pid":"161/0030","text":"Jianxun Lian"},{"@pid":"173/9237","text":"Chieh-Han Wu"},{"@pid":"39/11051","text":"Miguel González-Fierro"},{"@pid":"42/5125","text":"Andreas Argyriou"},{"@pid":"20/5998","text":"Tao Wu"}]},"title":"In Search for a Cure: Recommendation With Knowledge Graph on CORD-19.","venue":"KDD","pages":"3519-3520","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShenZLWGAW20","doi":"10.1145/3394486.3406711","ee":"https://doi.org/10.1145/3394486.3406711","url":"https://dblp.org/rec/conf/kdd/ShenZLWGAW20"}, "url":"URL#1810887" }, { "@score":"1", "@id":"1810888", "info":{"authors":{"author":[{"@pid":"173/5413","text":"Hao-Jun Michael Shi"},{"@pid":"87/8721","text":"Dheevatsa Mudigere"},{"@pid":"79/2042","text":"Maxim Naumov"},{"@pid":"130/3998","text":"Jiyan Yang"}]},"title":"Compositional Embeddings Using Complementary Partitions for Memory-Efficient Recommendation Systems.","venue":"KDD","pages":"165-175","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShiMNY20","doi":"10.1145/3394486.3403059","ee":"https://doi.org/10.1145/3394486.3403059","url":"https://dblp.org/rec/conf/kdd/ShiMNY20"}, "url":"URL#1810888" }, { "@score":"1", "@id":"1810889", "info":{"authors":{"author":[{"@pid":"245/9064","text":"Wanli Shi"},{"@pid":"36/4372","text":"Victor S. Sheng"},{"@pid":"40/1491-12","text":"Xiang Li 0012"},{"@pid":"29/1758-1","text":"Bin Gu 0001"}]},"title":"Semi-Supervised Multi-Label Learning from Crowds via Deep Sequential Generative Model.","venue":"KDD","pages":"1141-1149","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShiSLG20","doi":"10.1145/3394486.3403167","ee":"https://doi.org/10.1145/3394486.3403167","url":"https://dblp.org/rec/conf/kdd/ShiSLG20"}, "url":"URL#1810889" }, { "@score":"1", "@id":"1810890", "info":{"authors":{"author":[{"@pid":"132/6140","text":"Baoxu Shi"},{"@pid":"91/9023","text":"Jaewon Yang"},{"@pid":"03/5499","text":"Feng Guo"},{"@pid":"51/6972-2","text":"Qi He 0002"}]},"title":"Salience and Market-aware Skill Extraction for Job Targeting.","venue":"KDD","pages":"2871-2879","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShiYGH20","doi":"10.1145/3394486.3403338","ee":"https://doi.org/10.1145/3394486.3403338","url":"https://dblp.org/rec/conf/kdd/ShiYGH20"}, "url":"URL#1810890" }, { "@score":"1", "@id":"1810891", "info":{"authors":{"author":[{"@pid":"195/5893","text":"Raymond Shiau"},{"@pid":"117/6315","text":"Hao-Yu Wu"},{"@pid":"119/4775","text":"Eric Kim"},{"@pid":"195/5568","text":"Yue Li Du"},{"@pid":"241/9928","text":"Anqi Guo"},{"@pid":"72/1760","text":"Zhiyuan Zhang"},{"@pid":"264/2610","text":"Eileen Li"},{"@pid":"169/4787","text":"Kunlong Gu"},{"@pid":"168/4979","text":"Charles Rosenberg"},{"@pid":"141/1271","text":"Andrew Zhai"}]},"title":"Shop The Look: Building a Large Scale Visual Shopping System at Pinterest.","venue":"KDD","pages":"3203-3212","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShiauWKDGZLGRZ20","doi":"10.1145/3394486.3403372","ee":"https://doi.org/10.1145/3394486.3403372","url":"https://dblp.org/rec/conf/kdd/ShiauWKDGZLGRZ20"}, "url":"URL#1810891" }, { "@score":"1", "@id":"1810892", "info":{"authors":{"author":[{"@pid":"239/5572","text":"Linjun Shou"},{"@pid":"267/5386","text":"Shining Bo"},{"@pid":"254/9156","text":"Feixiang Cheng"},{"@pid":"34/4521","text":"Ming Gong"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"77/5094","text":"Daxin Jiang"}]},"title":"Mining Implicit Relevance Feedback from User Behavior for Web Question Answering.","venue":"KDD","pages":"2931-2941","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShouBCGPJ20","doi":"10.1145/3394486.3403343","ee":"https://doi.org/10.1145/3394486.3403343","url":"https://dblp.org/rec/conf/kdd/ShouBCGPJ20"}, "url":"URL#1810892" }, { "@score":"1", "@id":"1810893", "info":{"authors":{"author":[{"@pid":"240/6706","text":"Shaon Bhatta Shuvo"},{"@pid":"241/1785","text":"Bonaventure C. Molokwu"},{"@pid":"36/167","text":"Ziad Kobti"}]},"title":"Simulating the Impact of Hospital Capacity and Social Isolation to Minimize the Propagation of Infectious Diseases.","venue":"KDD","pages":"3451-3457","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ShuvoMK20","doi":"10.1145/3394486.3412859","ee":"https://doi.org/10.1145/3394486.3412859","url":"https://dblp.org/rec/conf/kdd/ShuvoMK20"}, "url":"URL#1810893" }, { "@score":"1", "@id":"1810894", "info":{"authors":{"author":[{"@pid":"117/5796","text":"A. B. Siddique 0001"},{"@pid":"89/8771","text":"Samet Oymak"},{"@pid":"42/5855","text":"Vagelis Hristidis"}]},"title":"Unsupervised Paraphrasing via Deep Reinforcement Learning.","venue":"KDD","pages":"1800-1809","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SiddiqueOH20","doi":"10.1145/3394486.3403231","ee":"https://doi.org/10.1145/3394486.3403231","url":"https://dblp.org/rec/conf/kdd/SiddiqueOH20"}, "url":"URL#1810894" }, { "@score":"1", "@id":"1810895", "info":{"authors":{"author":[{"@pid":"204/3393","text":"Qingquan Song"},{"@pid":"151/3146","text":"Dehua Cheng"},{"@pid":"26/253","text":"Hanning Zhou"},{"@pid":"130/3998","text":"Jiyan Yang"},{"@pid":"t/YuandongTian","text":"Yuandong Tian"},{"@pid":"24/7536","text":"Xia Hu"}]},"title":"Towards Automated Neural Interaction Discovery for Click-Through Rate Prediction.","venue":"KDD","pages":"945-955","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SongCZYTH20","doi":"10.1145/3394486.3403137","ee":"https://doi.org/10.1145/3394486.3403137","url":"https://dblp.org/rec/conf/kdd/SongCZYTH20"}, "url":"URL#1810895" }, { "@score":"1", "@id":"1810896", "info":{"authors":{"author":[{"@pid":"157/9216","text":"Liuyihan Song"},{"@pid":"44/2104","text":"Pan Pan"},{"@pid":"74/5365","text":"Kang Zhao"},{"@pid":"54/4089","text":"Hao Yang"},{"@pid":"51/5612-3","text":"Yiming Chen 0003"},{"@pid":"142/2510","text":"Yingya Zhang"},{"@pid":"15/2775","text":"Yinghui Xu"},{"@pid":"j/RongJin","text":"Rong Jin 0001"}]},"title":"Large-Scale Training System for 100-Million Classification at Alibaba.","venue":"KDD","pages":"2909-2930","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SongPZYCZXJ20","doi":"10.1145/3394486.3403342","ee":"https://doi.org/10.1145/3394486.3403342","url":"https://dblp.org/rec/conf/kdd/SongPZYCZXJ20"}, "url":"URL#1810896" }, { "@score":"1", "@id":"1810897", "info":{"authors":{"author":[{"@pid":"20/3883","text":"Shaoxu Song"},{"@pid":"62/3689-27","text":"Yu Sun 0027"}]},"title":"Imputing Various Incomplete Attributes via Distance Likelihood Maximization.","venue":"KDD","pages":"535-545","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SongS20","doi":"10.1145/3394486.3403096","ee":"https://doi.org/10.1145/3394486.3403096","url":"https://dblp.org/rec/conf/kdd/SongS20"}, "url":"URL#1810897" }, { "@score":"1", "@id":"1810899", "info":{"authors":{"author":[{"@pid":"222/3241","text":"Megha Srivastava"},{"@pid":"117/4927","text":"Besmira Nushi"},{"@pid":"36/3834","text":"Ece Kamar"},{"@pid":"188/5763","text":"Shital Shah"},{"@pid":"h/EricHorvitz","text":"Eric Horvitz"}]},"title":"An Empirical Analysis of Backward Compatibility in Machine Learning Systems.","venue":"KDD","pages":"3272-3280","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SrivastavaNKSH20","doi":"10.1145/3394486.3403379","ee":"https://doi.org/10.1145/3394486.3403379","url":"https://dblp.org/rec/conf/kdd/SrivastavaNKSH20"}, "url":"URL#1810899" }, { "@score":"1", "@id":"1810900", "info":{"authors":{"author":[{"@pid":"164/8060","text":"Du Su"},{"@pid":"273/0099","text":"Hieu Tri Huynh"},{"@pid":"273/0294","text":"Ziao Chen"},{"@pid":"y/YiLu1","text":"Yi Lu 0001"},{"@pid":"90/1563","text":"Wenmiao Lu"}]},"title":"Re-identification Attack to Privacy-Preserving Data Analysis with Noisy Sample-Mean.","venue":"KDD","pages":"1045-1053","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SuHCLL20","doi":"10.1145/3394486.3403148","ee":"https://doi.org/10.1145/3394486.3403148","url":"https://dblp.org/rec/conf/kdd/SuHCLL20"}, "url":"URL#1810900" }, { "@score":"1", "@id":"1810901", "info":{"authors":{"author":[{"@pid":"07/10301","text":"Xiangyu Sun"},{"@pid":"75/9400","text":"Jack Davis"},{"@pid":"s/OliverSchulte","text":"Oliver Schulte"},{"@pid":"220/5411","text":"Guiliang Liu"}]},"title":"Cracking the Black Box: Distilling Deep Sports Analytics.","venue":"KDD","pages":"3154-3162","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SunDSL20","doi":"10.1145/3394486.3403367","ee":"https://doi.org/10.1145/3394486.3403367","url":"https://dblp.org/rec/conf/kdd/SunDSL20"}, "url":"URL#1810901" }, { "@score":"1", "@id":"1810902", "info":{"authors":{"author":[{"@pid":"201/0630","text":"Jianing Sun"},{"@pid":"71/6601-6","text":"Wei Guo 0006"},{"@pid":"273/0326","text":"Dengcheng Zhang"},{"@pid":"174/0010-1","text":"Yingxue Zhang 0001"},{"@pid":"251/8836","text":"Florence Regol"},{"@pid":"143/4817-1","text":"Yaochen Hu 0001"},{"@pid":"152/3785","text":"Huifeng Guo"},{"@pid":"24/10003","text":"Ruiming Tang"},{"@pid":"39/10551","text":"Han Yuan"},{"@pid":"11/5357-1","text":"Xiuqiang He 0001"},{"@pid":"c/MarkCoates","text":"Mark Coates"}]},"title":"A Framework for Recommending Accurate and Diverse Items Using Bayesian Graph Convolutional Neural Networks.","venue":"KDD","pages":"2030-2039","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SunGZZRHGTYHC20","doi":"10.1145/3394486.3403254","ee":"https://doi.org/10.1145/3394486.3403254","url":"https://dblp.org/rec/conf/kdd/SunGZZRHGTYHC20"}, "url":"URL#1810902" }, { "@score":"1", "@id":"1810903", "info":{"authors":{"author":[{"@pid":"192/2607","text":"Qiuling Suo"},{"@pid":"227/2927","text":"Jingyuan Chou"},{"@pid":"23/11001","text":"Weida Zhong"},{"@pid":"z/AidongZhang","text":"Aidong Zhang"}]},"title":"TAdaNet: Task-Adaptive Network for Graph-Enriched Meta-Learning.","venue":"KDD","pages":"1789-1799","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/SuoCZZ20","doi":"10.1145/3394486.3403230","ee":"https://doi.org/10.1145/3394486.3403230","url":"https://dblp.org/rec/conf/kdd/SuoCZZ20"}, "url":"URL#1810903" }, { "@score":"1", "@id":"1810904", "info":{"authors":{"author":[{"@pid":"169/0927","text":"Puoya Tabaghi"},{"@pid":"52/8859","text":"Ivan Dokmanic"}]},"title":"Hyperbolic Distance Matrices.","venue":"KDD","pages":"1728-1738","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TabaghiD20","doi":"10.1145/3394486.3403224","ee":"https://doi.org/10.1145/3394486.3403224","url":"https://dblp.org/rec/conf/kdd/TabaghiD20"}, "url":"URL#1810904" }, { "@score":"1", "@id":"1810905", "info":{"authors":{"author":[{"@pid":"273/0186","text":"Maryam Tabar"},{"@pid":"262/0683","text":"Heesoo Park"},{"@pid":"170/8495","text":"Stephanie Winkler"},{"@pid":"l/DongwonLee","text":"Dongwon Lee 0001"},{"@pid":"142/9505","text":"Anamika Barman-Adhikari"},{"@pid":"121/3511","text":"Amulya Yadav"}]},"title":"Identifying Homeless Youth At-Risk of Substance Use Disorder: Data-Driven Insights for Policymakers.","venue":"KDD","pages":"3092-3100","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TabarPWLBY20","doi":"10.1145/3394486.3403360","ee":"https://doi.org/10.1145/3394486.3403360","url":"https://dblp.org/rec/conf/kdd/TabarPWLBY20"}, "url":"URL#1810905" }, { "@score":"1", "@id":"1810906", "info":{"authors":{"author":[{"@pid":"227/2435","text":"Yuuki Takai"},{"@pid":"136/5974-1","text":"Atsushi Miyauchi 0001"},{"@pid":"43/5572","text":"Masahiro Ikeda"},{"@pid":"36/4449","text":"Yuichi Yoshida"}]},"title":"Hypergraph Clustering Based on PageRank.","venue":"KDD","pages":"1970-1978","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Takai0IY20","doi":"10.1145/3394486.3403248","ee":"https://doi.org/10.1145/3394486.3403248","url":"https://dblp.org/rec/conf/kdd/Takai0IY20"}, "url":"URL#1810906" }, { "@score":"1", "@id":"1810907", "info":{"authors":{"author":[{"@pid":"54/10356","text":"Seiji Takeda"},{"@pid":"27/6758","text":"Toshiyuki Hama"},{"@pid":"257/3092","text":"Hsiang-Han Hsu"},{"@pid":"257/2988","text":"Victoria A. Piunova"},{"@pid":"213/1808","text":"Dmitry Zubarev"},{"@pid":"s/DanielPSanders","text":"Daniel P. Sanders"},{"@pid":"44/2672","text":"Jed W. Pitera"},{"@pid":"263/6762","text":"Makoto Kogoh"},{"@pid":"263/7391","text":"Takumi Hongo"},{"@pid":"263/7024","text":"Yenwei Cheng"},{"@pid":"263/7278","text":"Wolf Bocanett"},{"@pid":"263/7103","text":"Hideaki Nakashika"},{"@pid":"175/2121","text":"Akihiro Fujita"},{"@pid":"263/7006","text":"Yuta Tsuchiya"},{"@pid":"263/7034","text":"Katsuhiko Hino"},{"@pid":"72/9439","text":"Kentaro Yano"},{"@pid":"12/3482","text":"Shuichi Hirose"},{"@pid":"241/7069","text":"Hiroki Toda"},{"@pid":"09/1666","text":"Yasumitsu Orii"},{"@pid":"34/2430","text":"Daiju Nakano"}]},"title":"Molecular Inverse-Design Platform for Material Industries.","venue":"KDD","pages":"2961-2969","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TakedaHHPZSPKHC20","doi":"10.1145/3394486.3403346","ee":"https://doi.org/10.1145/3394486.3403346","url":"https://dblp.org/rec/conf/kdd/TakedaHHPZSPKHC20"}, "url":"URL#1810907" }, { "@score":"1", "@id":"1810908", "info":{"authors":{"author":{"@pid":"t/WangChiewTan","text":"Wang-Chiew Tan"}},"title":"Unleashing the Power of Subjective Data: Managing Experiences as First-Class Citizens.","venue":"KDD","pages":"3610","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Tan20","doi":"10.1145/3394486.3409560","ee":"https://doi.org/10.1145/3394486.3409560","url":"https://dblp.org/rec/conf/kdd/Tan20"}, "url":"URL#1810908" }, { "@score":"1", "@id":"1810909", "info":{"authors":{"author":[{"@pid":"239/1928","text":"Ruixiang Tang"},{"@pid":"183/5606","text":"Mengnan Du"},{"@pid":"145/4489","text":"Ninghao Liu"},{"@pid":"29/3081-23","text":"Fan Yang 0023"},{"@pid":"24/7536","text":"Xia Hu"}]},"title":"An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks.","venue":"KDD","pages":"218-228","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TangDLYH20","doi":"10.1145/3394486.3403064","ee":"https://doi.org/10.1145/3394486.3403064","url":"https://dblp.org/rec/conf/kdd/TangDLYH20"}, "url":"URL#1810909" }, { "@score":"1", "@id":"1810910", "info":{"authors":{"author":[{"@pid":"33/7694","text":"Xianfeng Tang"},{"@pid":"242/8056","text":"Yozen Liu"},{"@pid":"71/7771","text":"Neil Shah"},{"@pid":"64/546","text":"Xiaolin Shi"},{"@pid":"19/3308","text":"Prasenjit Mitra"},{"@pid":"136/9440","text":"Suhang Wang"}]},"title":"Knowing your FATE: Friendship, Action and Temporal Explanations for User Engagement Prediction on Social Apps.","venue":"KDD","pages":"2269-2279","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TangLSSMW20","doi":"10.1145/3394486.3403276","ee":"https://doi.org/10.1145/3394486.3403276","url":"https://dblp.org/rec/conf/kdd/TangLSSMW20"}, "url":"URL#1810910" }, { "@score":"1", "@id":"1810911", "info":{"authors":{"author":[{"@pid":"t/YufeiTao","text":"Yufei Tao 0001"},{"@pid":"272/9945","text":"Shangqi Lu"}]},"title":"From Online to Non-i.i.d. Batch Learning.","venue":"KDD","pages":"328-337","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TaoL20","doi":"10.1145/3394486.3403075","ee":"https://doi.org/10.1145/3394486.3403075","url":"https://dblp.org/rec/conf/kdd/TaoL20"}, "url":"URL#1810911" }, { "@score":"1", "@id":"1810914", "info":{"authors":{"author":[{"@pid":"08/8412","text":"Daniel Ting"},{"@pid":"44/3434","text":"Jonathan Malkin"},{"@pid":"98/8","text":"Lee Rhodes"}]},"title":"Data Sketching for Real Time Analytics: Theory and Practice.","venue":"KDD","pages":"3567-3568","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TingMR20","doi":"10.1145/3394486.3406480","ee":"https://doi.org/10.1145/3394486.3406480","url":"https://dblp.org/rec/conf/kdd/TingMR20"}, "url":"URL#1810914" }, { "@score":"1", "@id":"1810915", "info":{"authors":{"author":[{"@pid":"35/3074","text":"Kai Ming Ting"},{"@pid":"245/6037","text":"Bi-Cun Xu"},{"@pid":"w/TakashiWashio","text":"Takashi Washio"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"}]},"title":"Isolation Distributional Kernel: A New Tool for Kernel based Anomaly Detection.","venue":"KDD","pages":"198-206","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TingXWZ20","doi":"10.1145/3394486.3403062","ee":"https://doi.org/10.1145/3394486.3403062","url":"https://dblp.org/rec/conf/kdd/TingXWZ20"}, "url":"URL#1810915" }, { "@score":"1", "@id":"1810916", "info":{"authors":{"author":[{"@pid":"245/5958","text":"Thien Q. Tran"},{"@pid":"133/7753","text":"Kazuto Fukuchi"},{"@pid":"71/1035","text":"Youhei Akimoto"},{"@pid":"43/5716","text":"Jun Sakuma"}]},"title":"Statistically Significant Pattern Mining with Ordinal Utility.","venue":"KDD","pages":"1645-1655","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/TranFAS20","doi":"10.1145/3394486.3403215","ee":"https://doi.org/10.1145/3394486.3403215","url":"https://dblp.org/rec/conf/kdd/TranFAS20"}, "url":"URL#1810916" }, { "@score":"1", "@id":"1810917", "info":{"authors":{"author":{"@pid":"273/0302","text":"Krystal S. Tsosie"}},"title":"Models of Data Governance and Advancing Indigenous Genomic Data Sovereignty.","venue":"KDD","pages":"3592","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Tsosie20","doi":"10.1145/3394486.3411072","ee":"https://doi.org/10.1145/3394486.3411072","url":"https://dblp.org/rec/conf/kdd/Tsosie20"}, "url":"URL#1810917" }, { "@score":"1", "@id":"1810918", "info":{"authors":{"author":[{"@pid":"230/8108","text":"Yuichiro Ueno"},{"@pid":"206/0054","text":"Kazuki Osawa"},{"@pid":"228/8343","text":"Yohei Tsuji"},{"@pid":"73/3594","text":"Akira Naruse"},{"@pid":"61/7413","text":"Rio Yokota"}]},"title":"Rich Information is Affordable: A Systematic Performance Analysis of Second-order Optimization Using K-FAC.","venue":"KDD","pages":"2145-2153","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/UenoOTNY20","doi":"10.1145/3394486.3403265","ee":"https://doi.org/10.1145/3394486.3403265","url":"https://dblp.org/rec/conf/kdd/UenoOTNY20"}, "url":"URL#1810918" }, { "@score":"1", "@id":"1810919", "info":{"authors":{"author":[{"@pid":"272/9943","text":"Aniththa Umamahesan"},{"@pid":"273/0112","text":"Deepak Mukunthu Iyappan Babu"}]},"title":"From Zero to AI Hero with Automated Machine Learning.","venue":"KDD","pages":"3495","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/UmamahesanB20","doi":"10.1145/3394486.3406697","ee":"https://doi.org/10.1145/3394486.3406697","url":"https://dblp.org/rec/conf/kdd/UmamahesanB20"}, "url":"URL#1810919" }, { "@score":"1", "@id":"1810920", "info":{"authors":{"author":{"@pid":"217/2360","text":"Mariya I. Vasileva"}},"title":"The Dark Side of Machine Learning Algorithms: How and Why They Can Leverage Bias, and What Can Be Done to Pursue Algorithmic Fairness.","venue":"KDD","pages":"3586-3587","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Vasileva20","doi":"10.1145/3394486.3411068","ee":"https://doi.org/10.1145/3394486.3411068","url":"https://dblp.org/rec/conf/kdd/Vasileva20"}, "url":"URL#1810920" }, { "@score":"1", "@id":"1810921", "info":{"authors":{"author":[{"@pid":"180/5829","text":"Nate Veldt"},{"@pid":"125/2210","text":"Austin R. Benson"},{"@pid":"k/JonMKleinberg","text":"Jon M. Kleinberg"}]},"title":"Minimizing Localized Ratio Cut Objectives in Hypergraphs.","venue":"KDD","pages":"1708-1718","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/VeldtBK20","doi":"10.1145/3394486.3403222","ee":"https://doi.org/10.1145/3394486.3403222","url":"https://dblp.org/rec/conf/kdd/VeldtBK20"}, "url":"URL#1810921" }, { "@score":"1", "@id":"1810922", "info":{"authors":{"author":[{"@pid":"180/5829","text":"Nate Veldt"},{"@pid":"27/4913","text":"Anthony Wirth"},{"@pid":"40/4457","text":"David F. Gleich"}]},"title":"Parameterized Correlation Clustering in Hypergraphs and Bipartite Graphs.","venue":"KDD","pages":"1868-1876","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/VeldtWG20","doi":"10.1145/3394486.3403238","ee":"https://doi.org/10.1145/3394486.3403238","url":"https://dblp.org/rec/conf/kdd/VeldtWG20"}, "url":"URL#1810922" }, { "@score":"1", "@id":"1810923", "info":{"authors":{"author":{"@pid":"v/ManuelaMVeloso","text":"Manuela Veloso"}},"title":"AI for Intelligent Financial Services: Examples and Discussion.","venue":"KDD","pages":"1-2","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Veloso20","doi":"10.1145/3394486.3407096","ee":"https://doi.org/10.1145/3394486.3407096","url":"https://dblp.org/rec/conf/kdd/Veloso20"}, "url":"URL#1810923" }, { "@score":"1", "@id":"1810925", "info":{"authors":{"author":{"@pid":"65/1550","text":"Alessandro Vespignani"}},"title":"Keynote Speaker: Alessandro Vespignani.","venue":"KDD","pages":"5","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Vespignani20","doi":"10.1145/3394486.3407097","ee":"https://doi.org/10.1145/3394486.3407097","url":"https://dblp.org/rec/conf/kdd/Vespignani20"}, "url":"URL#1810925" }, { "@score":"1", "@id":"1810926", "info":{"authors":{"author":[{"@pid":"223/3148","text":"Daheng Wang"},{"@pid":"69/339-1","text":"Meng Jiang 0001"},{"@pid":"184/5270","text":"Munira Syed"},{"@pid":"267/5680","text":"Oliver Conway"},{"@pid":"119/1266","text":"Vishal Juneja"},{"@pid":"s/SriramSubramanian","text":"Sriram Subramanian"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Calendar Graph Neural Networks for Modeling Time Structures in Spatiotemporal User Behaviors.","venue":"KDD","pages":"2581-2589","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Wang0SCJSC20","doi":"10.1145/3394486.3403308","ee":"https://doi.org/10.1145/3394486.3403308","url":"https://dblp.org/rec/conf/kdd/Wang0SCJSC20"}, "url":"URL#1810926" }, { "@score":"1", "@id":"1810928", "info":{"authors":{"author":[{"@pid":"52/3194-1","text":"Fei Wang 0001"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"86/2159","text":"Yangqiu Song"},{"@pid":"184/0016","text":"Chengxi Zang"}]},"title":"Recent Advances on Graph Analytics and Its Applications in Healthcare.","venue":"KDD","pages":"3545-3546","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangCPSZ20","doi":"10.1145/3394486.3406469","ee":"https://doi.org/10.1145/3394486.3406469","url":"https://dblp.org/rec/conf/kdd/WangCPSZ20"}, "url":"URL#1810928" }, { "@score":"1", "@id":"1810929", "info":{"authors":{"author":[{"@pid":"263/2108","text":"Eason Wang"},{"@pid":"96/10608","text":"Henggang Cui"},{"@pid":"260/7173","text":"Sai Yalamanchi"},{"@pid":"263/2580","text":"Mohana Moorthy"},{"@pid":"35/9989","text":"Nemanja Djuric"}]},"title":"Improving Movement Predictions of Traffic Actors in Bird's-Eye View Models using GANs and Differentiable Trajectory Rasterization.","venue":"KDD","pages":"2340-2348","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangCYMD20","doi":"10.1145/3394486.3403283","ee":"https://doi.org/10.1145/3394486.3403283","url":"https://dblp.org/rec/conf/kdd/WangCYMD20"}, "url":"URL#1810929" }, { "@score":"1", "@id":"1810930", "info":{"authors":{"author":[{"@pid":"90/3631","text":"Yutong Wang"},{"@pid":"74/2507","text":"Yufei Han"},{"@pid":"234/6902","text":"Hongyan Bao"},{"@pid":"14/4412","text":"Yun Shen"},{"@pid":"85/10856","text":"Fenglong Ma"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"74/1890-1","text":"Xiangliang Zhang 0001"}]},"title":"Attackability Characterization of Adversarial Evasion Attack on Discrete Data.","venue":"KDD","pages":"1415-1425","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangHBSML020","doi":"10.1145/3394486.3403194","ee":"https://doi.org/10.1145/3394486.3403194","url":"https://dblp.org/rec/conf/kdd/WangHBSML020"}, "url":"URL#1810930" }, { "@score":"1", "@id":"1810931", "info":{"authors":{"author":[{"@pid":"06/2293-86","text":"Rui Wang 0086"},{"@pid":"180/8631","text":"Karthik Kashinath"},{"@pid":"202/2241","text":"Mustafa Mustafa"},{"@pid":"48/10957","text":"Adrian Albert"},{"@pid":"164/7314","text":"Rose Yu"}]},"title":"Towards Physics-informed Deep Learning for Turbulent Flow Prediction.","venue":"KDD","pages":"1457-1466","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangKMAY20","doi":"10.1145/3394486.3403198","ee":"https://doi.org/10.1145/3394486.3403198","url":"https://dblp.org/rec/conf/kdd/WangKMAY20"}, "url":"URL#1810931" }, { "@score":"1", "@id":"1810932", "info":{"authors":{"author":[{"@pid":"219/1752","text":"Pengyang Wang"},{"@pid":"80/10061-1","text":"Kunpeng Liu 0001"},{"@pid":"22/752-7","text":"Lu Jiang 0007"},{"@pid":"56/10261","text":"Xiaolin Li"},{"@pid":"134/3987","text":"Yanjie Fu"}]},"title":"Incremental Mobile User Profiling: Reinforcement Learning with Spatial Knowledge Graph for Modeling Event Streams.","venue":"KDD","pages":"853-861","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangLJLF20","doi":"10.1145/3394486.3403128","ee":"https://doi.org/10.1145/3394486.3403128","url":"https://dblp.org/rec/conf/kdd/WangLJLF20"}, "url":"URL#1810932" }, { "@score":"1", "@id":"1810933", "info":{"authors":{"author":[{"@pid":"27/10670","text":"Menghan Wang"},{"@pid":"126/0783","text":"Yujie Lin"},{"@pid":"265/5729","text":"Guli Lin"},{"@pid":"220/4108","text":"Keping Yang"},{"@pid":"98/2898-3","text":"Xiao-Ming Wu 0003"}]},"title":"M2GRL: A Multi-task Multi-view Graph Representation Learning Framework for Web-scale Recommender Systems.","venue":"KDD","pages":"2349-2358","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangLLYW20","doi":"10.1145/3394486.3403284","ee":"https://doi.org/10.1145/3394486.3403284","url":"https://dblp.org/rec/conf/kdd/WangLLYW20"}, "url":"URL#1810933" }, { "@score":"1", "@id":"1810934", "info":{"authors":{"author":[{"@pid":"231/8252","text":"Ruoying Wang"},{"@pid":"256/9188","text":"Kexin Nie"},{"@pid":"11/1088","text":"Yen-Jung Chang"},{"@pid":"15/11006","text":"Xinwei Gong"},{"@pid":"80/3726","text":"Tie Wang"},{"@pid":"48/450-95","text":"Yang Yang 0095"},{"@pid":"96/6993","text":"Bo Long"}]},"title":"Deep Learning for Anomaly Detection.","venue":"KDD","pages":"3569-3570","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangNCGW0L20","doi":"10.1145/3394486.3406481","ee":"https://doi.org/10.1145/3394486.3406481","url":"https://dblp.org/rec/conf/kdd/WangNCGW0L20"}, "url":"URL#1810934" }, { "@score":"1", "@id":"1810935", "info":{"authors":{"author":[{"@pid":"62/6823-1","text":"Yuanbo Wang 0001"},{"@pid":"273/0312","text":"Osama Sakhi"},{"@pid":"273/0341","text":"Ala Eddine Ayadi"},{"@pid":"15/8322","text":"Matthew S. Hagen"},{"@pid":"273/0049","text":"Estelle Afshar"}]},"title":"Computer Vision: Deep Dive into Object Segmentation Approaches.","venue":"KDD","pages":"3517-3518","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangSAHA20","doi":"10.1145/3394486.3406710","ee":"https://doi.org/10.1145/3394486.3406710","url":"https://dblp.org/rec/conf/kdd/WangSAHA20"}, "url":"URL#1810935" }, { "@score":"1", "@id":"1810936", "info":{"authors":{"author":[{"@pid":"84/864","text":"Nan Wang"},{"@pid":"05/6545","text":"Hongning Wang"}]},"title":"Directional Multivariate Ranking.","venue":"KDD","pages":"85-94","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangW20","doi":"10.1145/3394486.3403051","ee":"https://doi.org/10.1145/3394486.3403051","url":"https://dblp.org/rec/conf/kdd/WangW20"}, "url":"URL#1810936" }, { "@score":"1", "@id":"1810937", "info":{"authors":{"author":[{"@pid":"262/4005","text":"Hanzhi Wang"},{"@pid":"94/4260","text":"Zhewei Wei"},{"@pid":"06/11411","text":"Junhao Gan"},{"@pid":"131/6529-1","text":"Sibo Wang 0001"},{"@pid":"97/9726","text":"Zengfeng Huang"}]},"title":"Personalized PageRank to a Target Node, Revisited.","venue":"KDD","pages":"657-667","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangWG0H20","doi":"10.1145/3394486.3403108","ee":"https://doi.org/10.1145/3394486.3403108","url":"https://dblp.org/rec/conf/kdd/WangWG0H20"}, "url":"URL#1810937" }, { "@score":"1", "@id":"1810938", "info":{"authors":{"author":[{"@pid":"50/5889-1","text":"Yiwei Wang 0001"},{"@pid":"35/7092-59","text":"Wei Wang 0059"},{"@pid":"183/0977","text":"Yuxuan Liang"},{"@pid":"227/4399","text":"Yujun Cai"},{"@pid":"32/5712","text":"Juncheng Liu"},{"@pid":"169/9975","text":"Bryan Hooi"}]},"title":"NodeAug: Semi-Supervised Node Classification with Data Augmentation.","venue":"KDD","pages":"207-217","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangWLCLH20","doi":"10.1145/3394486.3403063","ee":"https://doi.org/10.1145/3394486.3403063","url":"https://dblp.org/rec/conf/kdd/WangWLCLH20"}, "url":"URL#1810938" }, { "@score":"1", "@id":"1810939", "info":{"authors":{"author":[{"@pid":"75/5135","text":"Jingyuan Wang"},{"@pid":"247/3449","text":"Yufan Wu"},{"@pid":"06/4211","text":"Mingxuan Li"},{"@pid":"50/3323","text":"Xin Lin"},{"@pid":"35/118-1","text":"Junjie Wu 0001"},{"@pid":"66/190-1","text":"Chao Li 0001"}]},"title":"Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense.","venue":"KDD","pages":"15-24","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangWLLWL20","doi":"10.1145/3394486.3403044","ee":"https://doi.org/10.1145/3394486.3403044","url":"https://dblp.org/rec/conf/kdd/WangWLLWL20"}, "url":"URL#1810939" }, { "@score":"1", "@id":"1810940", "info":{"authors":{"author":[{"@pid":"33/4822-65","text":"Yue Wang 0065"},{"@pid":"w/KeWang","text":"Ke Wang 0001"},{"@pid":"m/ChunyanMiao","text":"Chunyan Miao"}]},"title":"Truth Discovery against Strategic Sybil Attack in Crowdsourcing.","venue":"KDD","pages":"95-104","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangWM20","doi":"10.1145/3394486.3403052","ee":"https://doi.org/10.1145/3394486.3403052","url":"https://dblp.org/rec/conf/kdd/WangWM20"}, "url":"URL#1810940" }, { "@score":"1", "@id":"1810941", "info":{"authors":{"author":[{"@pid":"165/1374","text":"Guangrun Wang"},{"@pid":"211/7260","text":"Guangcong Wang"},{"@pid":"135/4889","text":"Keze Wang"},{"@pid":"136/0900","text":"Xiaodan Liang"},{"@pid":"84/7019","text":"Liang Lin"}]},"title":"Grammatically Recognizing Images with Tree Convolution.","venue":"KDD","pages":"903-912","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangWWLL20","doi":"10.1145/3394486.3403133","ee":"https://doi.org/10.1145/3394486.3403133","url":"https://dblp.org/rec/conf/kdd/WangWWLL20"}, "url":"URL#1810941" }, { "@score":"1", "@id":"1810942", "info":{"authors":{"author":[{"@pid":"147/1393","text":"Yaqing Wang"},{"@pid":"245/7578","text":"Yifan Ethan Xu"},{"@pid":"82/1763","text":"Xian Li"},{"@pid":"d/XinLunaDong","text":"Xin Luna Dong"},{"@pid":"67/4834-4","text":"Jing Gao 0004"}]},"title":"Automatic Validation of Textual Attribute Values in E-commerce Catalog by Learning with Limited Labeled Data.","venue":"KDD","pages":"2533-2541","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangXLDG20","doi":"10.1145/3394486.3403303","ee":"https://doi.org/10.1145/3394486.3403303","url":"https://dblp.org/rec/conf/kdd/WangXLDG20"}, "url":"URL#1810942" }, { "@score":"1", "@id":"1810943", "info":{"authors":{"author":[{"@pid":"33/8610","text":"Qifan Wang"},{"@pid":"09/3925","text":"Li Yang"},{"@pid":"80/1631","text":"Bhargav Kanagal"},{"@pid":"263/3559","text":"Sumit Sanghai"},{"@pid":"77/5746-1","text":"D. Sivakumar 0001"},{"@pid":"211/7431","text":"Bin Shu"},{"@pid":"221/3556","text":"Zac Yu"},{"@pid":"273/0291","text":"Jon Elsas"}]},"title":"Learning to Extract Attribute Value from Product via Question Answering: A Multi-task Approach.","venue":"KDD","pages":"47-55","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangYKSSSYE20","doi":"10.1145/3394486.3403047","ee":"https://doi.org/10.1145/3394486.3403047","url":"https://dblp.org/rec/conf/kdd/WangYKSSSYE20"}, "url":"URL#1810943" }, { "@score":"1", "@id":"1810944", "info":{"authors":{"author":[{"@pid":"143/0180","text":"Zenan Wang"},{"@pid":"245/5966","text":"Xuan Yin"},{"@pid":"153/7013","text":"Tianbo Li"},{"@pid":"00/7186","text":"Liangjie Hong"}]},"title":"Causal Meta-Mediation Analysis: Inferring Dose-Response Function From Summary Statistics of Many Randomized Experiments.","venue":"KDD","pages":"2625-2635","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangYLH20","doi":"10.1145/3394486.3403313","ee":"https://doi.org/10.1145/3394486.3403313","url":"https://dblp.org/rec/conf/kdd/WangYLH20"}, "url":"URL#1810944" }, { "@score":"1", "@id":"1810945", "info":{"authors":{"author":[{"@pid":"19/1924","text":"Qi Wang"},{"@pid":"33/7424","text":"Liang Zhan"},{"@pid":"t/PaulMThompson","text":"Paul M. Thompson"},{"@pid":"73/1353","text":"Jiayu Zhou"}]},"title":"Multimodal Learning with Incomplete Modalities by Knowledge Distillation.","venue":"KDD","pages":"1828-1838","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WangZTZ20","doi":"10.1145/3394486.3403234","ee":"https://doi.org/10.1145/3394486.3403234","url":"https://dblp.org/rec/conf/kdd/WangZTZ20"}, "url":"URL#1810945" }, { "@score":"1", "@id":"1810946", "info":{"authors":{"author":[{"@pid":"80/2983","text":"Yu Wei"},{"@pid":"273/0031","text":"Minjia Mao"},{"@pid":"95/6322-1","text":"Xi Zhao 0001"},{"@pid":"128/5225","text":"Jianhua Zou"},{"@pid":"94/4635","text":"Ping An"}]},"title":"City Metro Network Expansion with Reinforcement Learning.","venue":"KDD","pages":"2646-2656","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WeiMZZA20","doi":"10.1145/3394486.3403315","ee":"https://doi.org/10.1145/3394486.3403315","url":"https://dblp.org/rec/conf/kdd/WeiMZZA20"}, "url":"URL#1810946" }, { "@score":"1", "@id":"1810948", "info":{"authors":{"author":[{"@pid":"174/0119","text":"Pascal Welke"},{"@pid":"256/5399","text":"Florian Seiffarth"},{"@pid":"133/7744","text":"Michael Kamp"},{"@pid":"w/StefanWrobel","text":"Stefan Wrobel"}]},"title":"HOPS: Probabilistic Subtree Mining for Small and Large Graphs.","venue":"KDD","pages":"1275-1284","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WelkeSKW20","doi":"10.1145/3394486.3403180","ee":"https://doi.org/10.1145/3394486.3403180","url":"https://dblp.org/rec/conf/kdd/WelkeSKW20"}, "url":"URL#1810948" }, { "@score":"1", "@id":"1810949", "info":{"authors":{"author":[{"@pid":"21/6891","text":"Wei Wen"},{"@pid":"62/3960-1","text":"Feng Yan 0001"},{"@pid":"80/1641","text":"Yiran Chen 0001"},{"@pid":"30/5330-1","text":"Hai Li 0001"}]},"title":"AutoGrow: Automatic Layer Growing in Deep Convolutional Networks.","venue":"KDD","pages":"833-841","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Wen0CL20","doi":"10.1145/3394486.3403126","ee":"https://doi.org/10.1145/3394486.3403126","url":"https://dblp.org/rec/conf/kdd/Wen0CL20"}, "url":"URL#1810949" }, { "@score":"1", "@id":"1810950", "info":{"authors":{"author":[{"@pid":"27/561","text":"Qingsong Wen"},{"@pid":"87/5809","text":"Zhe Zhang"},{"@pid":"87/660-52","text":"Yan Li 0052"},{"@pid":"18/5837-1","text":"Liang Sun 0001"}]},"title":"Fast RobustSTL: Efficient and Robust Seasonal-Trend Decomposition for Time Series with Complex Patterns.","venue":"KDD","pages":"2203-2213","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WenZL020","doi":"10.1145/3394486.3403271","ee":"https://doi.org/10.1145/3394486.3403271","url":"https://dblp.org/rec/conf/kdd/WenZL020"}, "url":"URL#1810950" }, { "@score":"1", "@id":"1810951", "info":{"authors":{"author":[{"@pid":"232/1970","text":"Garrett Wilson"},{"@pid":"33/8355","text":"Janardhan Rao Doppa"},{"@pid":"c/DianeJCook","text":"Diane J. Cook"}]},"title":"Multi-Source Deep Domain Adaptation with Weak Supervision for Time-Series Sensor Data.","venue":"KDD","pages":"1768-1778","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WilsonDC20","doi":"10.1145/3394486.3403228","ee":"https://doi.org/10.1145/3394486.3403228","url":"https://dblp.org/rec/conf/kdd/WilsonDC20"}, "url":"URL#1810951" }, { "@score":"1", "@id":"1810952", "info":{"authors":{"author":[{"@pid":"72/4250-57","text":"Hao Wu 0057"},{"@pid":"06/11411","text":"Junhao Gan"},{"@pid":"03/505","text":"Rui Zhang 0003"}]},"title":"Learning Based Distributed Tracking.","venue":"KDD","pages":"2040-2050","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuGZ20","doi":"10.1145/3394486.3403255","ee":"https://doi.org/10.1145/3394486.3403255","url":"https://dblp.org/rec/conf/kdd/WuGZ20"}, "url":"URL#1810952" }, { "@score":"1", "@id":"1810953", "info":{"authors":{"author":[{"@pid":"174/1640","text":"Zonghan Wu"},{"@pid":"91/8171","text":"Shirui Pan"},{"@pid":"34/10089","text":"Guodong Long"},{"@pid":"68/1974-2","text":"Jing Jiang 0002"},{"@pid":"116/8412","text":"Xiaojun Chang"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Connecting the Dots: Multivariate Time Series Forecasting with Graph Neural Networks.","venue":"KDD","pages":"753-763","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuPL0CZ20","doi":"10.1145/3394486.3403118","ee":"https://doi.org/10.1145/3394486.3403118","url":"https://dblp.org/rec/conf/kdd/WuPL0CZ20"}, "url":"URL#1810953" }, { "@score":"1", "@id":"1810954", "info":{"authors":{"author":[{"@pid":"245/6001","text":"Jing-Han Wu"},{"@pid":"54/2088-3","text":"Xuan Wu 0003"},{"@pid":"246/3039","text":"Qing-Guo Chen"},{"@pid":"41/8206","text":"Yao Hu"},{"@pid":"84/271","text":"Min-Ling Zhang"}]},"title":"Feature-Induced Manifold Disambiguation for Multi-View Partial Multi-label Learning.","venue":"KDD","pages":"557-565","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuWCHZ20","doi":"10.1145/3394486.3403098","ee":"https://doi.org/10.1145/3394486.3403098","url":"https://dblp.org/rec/conf/kdd/WuWCHZ20"}, "url":"URL#1810954" }, { "@score":"1", "@id":"1810955", "info":{"authors":{"author":[{"@pid":"183/0579","text":"Qingyun Wu"},{"@pid":"163/2233","text":"Huazheng Wang"},{"@pid":"05/6545","text":"Hongning Wang"}]},"title":"Learning by Exploration: New Challenges in Real-World Environments.","venue":"KDD","pages":"3575-3576","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuWW20","doi":"10.1145/3394486.3406484","ee":"https://doi.org/10.1145/3394486.3406484","url":"https://dblp.org/rec/conf/kdd/WuWW20"}, "url":"URL#1810955" }, { "@score":"1", "@id":"1810956", "info":{"authors":{"author":[{"@pid":"60/467","text":"Ning Wu"},{"@pid":"52/8700","text":"Wayne Xin Zhao"},{"@pid":"75/5135","text":"Jingyuan Wang"},{"@pid":"273/0301","text":"Dayan Pan"}]},"title":"Learning Effective Road Network Representation with Hierarchical Graph Neural Networks.","venue":"KDD","pages":"6-14","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/WuZWP20","doi":"10.1145/3394486.3403043","ee":"https://doi.org/10.1145/3394486.3403043","url":"https://dblp.org/rec/conf/kdd/WuZWP20"}, "url":"URL#1810956" }, { "@score":"1", "@id":"1810957", "info":{"authors":{"author":[{"@pid":"245/5972","text":"Renzhe Xu"},{"@pid":"31/891-1","text":"Peng Cui 0001"},{"@pid":"194/4245","text":"Kun Kuang"},{"@pid":"50/3402-64","text":"Bo Li 0064"},{"@pid":"207/7466","text":"Linjun Zhou"},{"@pid":"205/2423","text":"Zheyan Shen"},{"@pid":"42/3805","text":"Wei Cui"}]},"title":"Algorithmic Decision Making with Conditional Fairness.","venue":"KDD","pages":"2125-2135","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Xu0K0ZSC20","doi":"10.1145/3394486.3403263","ee":"https://doi.org/10.1145/3394486.3403263","url":"https://dblp.org/rec/conf/kdd/Xu0K0ZSC20"}, "url":"URL#1810957" }, { "@score":"1", "@id":"1810958", "info":{"authors":{"author":[{"@pid":"169/8818","text":"Fengli Xu"},{"@pid":"93/2334-8","text":"Yong Li 0008"},{"@pid":"121/0926","text":"Shusheng Xu"}]},"title":"Attentional Multi-graph Convolutional Network for Regional Economy Prediction with Open Migration Data.","venue":"KDD","pages":"2225-2233","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Xu0X20","doi":"10.1145/3394486.3403273","ee":"https://doi.org/10.1145/3394486.3403273","url":"https://dblp.org/rec/conf/kdd/Xu0X20"}, "url":"URL#1810958" }, { "@score":"1", "@id":"1810959", "info":{"authors":{"author":[{"@pid":"29/4870","text":"Yiheng Xu"},{"@pid":"91/1271","text":"Minghao Li"},{"@pid":"47/5523-1","text":"Lei Cui 0001"},{"@pid":"176/0380","text":"Shaohan Huang"},{"@pid":"72/5870","text":"Furu Wei"},{"@pid":"16/1161-1","text":"Ming Zhou 0001"}]},"title":"LayoutLM: Pre-training of Text and Layout for Document Image Understanding.","venue":"KDD","pages":"1192-1200","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XuL0HW020","doi":"10.1145/3394486.3403172","ee":"https://doi.org/10.1145/3394486.3403172","url":"https://dblp.org/rec/conf/kdd/XuL0HW020"}, "url":"URL#1810959" }, { "@score":"1", "@id":"1810960", "info":{"authors":{"author":[{"@pid":"54/1474","text":"Chen Xu"},{"@pid":"18/701","text":"Quan Li"},{"@pid":"61/6726","text":"Junfeng Ge"},{"@pid":"131/4047","text":"Jinyang Gao"},{"@pid":"90/6498","text":"Xiaoyong Yang"},{"@pid":"183/6736","text":"Changhua Pei"},{"@pid":"51/394-1","text":"Fei Sun 0001"},{"@pid":"96/2744","text":"Jian Wu"},{"@pid":"137/7772","text":"Hanxiao Sun"},{"@pid":"198/5430","text":"Wenwu Ou"}]},"title":"Privileged Features Distillation at Taobao Recommendations.","venue":"KDD","pages":"2590-2598","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XuLGGYPSWSO20","doi":"10.1145/3394486.3403309","ee":"https://doi.org/10.1145/3394486.3403309","url":"https://dblp.org/rec/conf/kdd/XuLGGYPSWSO20"}, "url":"URL#1810960" }, { "@score":"1", "@id":"1810961", "info":{"authors":{"author":[{"@pid":"32/34-2","text":"Han Xu 0002"},{"@pid":"143/0251-1","text":"Yaxin Li 0001"},{"@pid":"66/2173-9","text":"Wei Jin 0009"},{"@pid":"64/10812","text":"Jiliang Tang"}]},"title":"Adversarial Attacks and Defenses: Frontiers, Advances and Practice.","venue":"KDD","pages":"3541-3542","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XuLJT20","doi":"10.1145/3394486.3406467","ee":"https://doi.org/10.1145/3394486.3406467","url":"https://dblp.org/rec/conf/kdd/XuLJT20"}, "url":"URL#1810961" }, { "@score":"1", "@id":"1810962", "info":{"authors":{"author":[{"@pid":"97/3265-10","text":"Jin Xu 0010"},{"@pid":"96/10484-3","text":"Xu Tan 0003"},{"@pid":"75/6568-6","text":"Yi Ren 0006"},{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"33/5448-15","text":"Jian Li 0015"},{"@pid":"93/991","text":"Sheng Zhao"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"LRSpeech: Extremely Low-Resource Speech Synthesis and Recognition.","venue":"KDD","pages":"2802-2812","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XuTRQLZL20","doi":"10.1145/3394486.3403331","ee":"https://doi.org/10.1145/3394486.3403331","url":"https://dblp.org/rec/conf/kdd/XuTRQLZL20"}, "url":"URL#1810962" }, { "@score":"1", "@id":"1810963", "info":{"authors":{"author":[{"@pid":"142/9148","text":"Jixing Xu"},{"@pid":"224/4375","text":"Zhenlong Zhu"},{"@pid":"35/1600","text":"Jianxin Zhao"},{"@pid":"273/0141","text":"Xuanye Liu"},{"@pid":"245/1815","text":"Minghui Shan"},{"@pid":"273/0088","text":"Jiecheng Guo"}]},"title":"Gemini: A Novel and Universal Heterogeneous Graph Information Fusing Framework for Online Recommendations.","venue":"KDD","pages":"3356-3365","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XuZZLSG20","doi":"10.1145/3394486.3403388","ee":"https://doi.org/10.1145/3394486.3403388","url":"https://dblp.org/rec/conf/kdd/XuZZLSG20"}, "url":"URL#1810963" }, { "@score":"1", "@id":"1810964", "info":{"authors":{"author":[{"@pid":"41/5526","text":"Yuan Xue"},{"@pid":"178/3277","text":"Denny Zhou"},{"@pid":"86/4539-2","text":"Nan Du 0002"},{"@pid":"59/9736","text":"Andrew M. Dai"},{"@pid":"02/6332-6","text":"Zhen Xu 0006"},{"@pid":"96/3115","text":"Kun Zhang"},{"@pid":"213/8282","text":"Claire Cui"}]},"title":"Deep State-Space Generative Model For Correlated Time-to-Event Predictions.","venue":"KDD","pages":"1552-1562","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XueZDDXZC20","doi":"10.1145/3394486.3403206","ee":"https://doi.org/10.1145/3394486.3403206","url":"https://dblp.org/rec/conf/kdd/XueZDDXZC20"}, "url":"URL#1810964" }, { "@score":"1", "@id":"1810965", "info":{"authors":{"author":[{"@pid":"127/0253","text":"Guangxu Xun"},{"@pid":"177/7445","text":"Kishlay Jha"},{"@pid":"207/9364","text":"Jianhui Sun"},{"@pid":"z/AidongZhang","text":"Aidong Zhang"}]},"title":"Correlation Networks for Extreme Multi-label Text Classification.","venue":"KDD","pages":"1074-1082","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/XunJSZ20","doi":"10.1145/3394486.3403151","ee":"https://doi.org/10.1145/3394486.3403151","url":"https://dblp.org/rec/conf/kdd/XunJSZ20"}, "url":"URL#1810965" }, { "@score":"1", "@id":"1810966", "info":{"authors":{"author":[{"@pid":"192/2217","text":"Takahiro Yabe"},{"@pid":"70/1077","text":"Kota Tsubouchi"},{"@pid":"98/4262","text":"Toru Shimizu"},{"@pid":"132/3830","text":"Yoshihide Sekimoto"},{"@pid":"44/6022","text":"Satish V. Ukkusuri"}]},"title":"Unsupervised Translation via Hierarchical Anchoring: Functional Mapping of Places across Cities.","venue":"KDD","pages":"2841-2851","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YabeTSSU20","doi":"10.1145/3394486.3403335","ee":"https://doi.org/10.1145/3394486.3403335","url":"https://dblp.org/rec/conf/kdd/YabeTSSU20"}, "url":"URL#1810966" }, { "@score":"1", "@id":"1810967", "info":{"authors":{"author":[{"@pid":"254/9279","text":"Bencheng Yan"},{"@pid":"13/1672","text":"Chaokun Wang"},{"@pid":"197/0781","text":"Gaoyang Guo"},{"@pid":"242/5171","text":"Yunkai Lou"}]},"title":"TinyGNN: Learning Efficient Graph Neural Networks.","venue":"KDD","pages":"1848-1856","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YanWGL20","doi":"10.1145/3394486.3403236","ee":"https://doi.org/10.1145/3394486.3403236","url":"https://dblp.org/rec/conf/kdd/YanWGL20"}, "url":"URL#1810967" }, { "@score":"1", "@id":"1810968", "info":{"authors":{"author":[{"@pid":"40/11207","text":"Jinyun Yan"},{"@pid":"42/2832","text":"Zhiyuan Xu"},{"@pid":"38/8210","text":"Birjodh Tiwana"},{"@pid":"27/4172","text":"Shaunak Chatterjee"}]},"title":"Ads Allocation in Feed via Constrained Optimization.","venue":"KDD","pages":"3386-3394","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YanXTC20","doi":"10.1145/3394486.3403391","ee":"https://doi.org/10.1145/3394486.3403391","url":"https://dblp.org/rec/conf/kdd/YanXTC20"}, "url":"URL#1810968" }, { "@score":"1", "@id":"1810969", "info":{"authors":{"author":[{"@pid":"272/9934","text":"Kevin P. Yancey"},{"@pid":"62/3903","text":"Burr Settles"}]},"title":"A Sleeping, Recovering Bandit Algorithm for Optimizing Recurring Notifications.","venue":"KDD","pages":"3008-3016","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YanceyS20","doi":"10.1145/3394486.3403351","ee":"https://doi.org/10.1145/3394486.3403351","url":"https://dblp.org/rec/conf/kdd/YanceyS20"}, "url":"URL#1810969" }, { "@score":"1", "@id":"1810970", "info":{"authors":{"author":[{"@pid":"70/2539","text":"Zhen Yang"},{"@pid":"48/3462-4","text":"Ming Ding 0004"},{"@pid":"03/10205","text":"Chang Zhou"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"84/2644","text":"Jingren Zhou"},{"@pid":"t/JieTang","text":"Jie Tang 0001"}]},"title":"Understanding Negative Sampling in Graph Representation Learning.","venue":"KDD","pages":"1666-1676","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YangDZYZT20","doi":"10.1145/3394486.3403218","ee":"https://doi.org/10.1145/3394486.3403218","url":"https://dblp.org/rec/conf/kdd/YangDZYZT20"}, "url":"URL#1810970" }, { "@score":"1", "@id":"1810971", "info":{"authors":{"author":[{"@pid":"225/4721","text":"Chengrun Yang"},{"@pid":"139/1570","text":"Jicong Fan"},{"@pid":"236/5238","text":"Ziyang Wu"},{"@pid":"153/2166","text":"Madeleine Udell"}]},"title":"AutoML Pipeline Selection: Efficiently Navigating the Combinatorial Space.","venue":"KDD","pages":"1446-1456","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YangFWU20","doi":"10.1145/3394486.3403197","ee":"https://doi.org/10.1145/3394486.3403197","url":"https://dblp.org/rec/conf/kdd/YangFWU20"}, "url":"URL#1810971" }, { "@score":"1", "@id":"1810972", "info":{"authors":{"author":[{"@pid":"305/0254","text":"Carl Yang 0001"},{"@pid":"70/7564","text":"Aditya Pal"},{"@pid":"141/1271","text":"Andrew Zhai"},{"@pid":"256/7353","text":"Nikil Pancha"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"},{"@pid":"168/4979","text":"Charles Rosenberg"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"}]},"title":"MultiSage: Empowering GCN with Contextualized Multi-Embeddings on Web-Scale Multipartite Networks.","venue":"KDD","pages":"2434-2443","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YangPZP0RL20","doi":"10.1145/3394486.3403293","ee":"https://doi.org/10.1145/3394486.3403293","url":"https://dblp.org/rec/conf/kdd/YangPZP0RL20"}, "url":"URL#1810972" }, { "@score":"1", "@id":"1810973", "info":{"authors":{"author":[{"@pid":"197/1635","text":"Huaxiu Yao"},{"@pid":"118/5304","text":"Xiaowei Jia"},{"@pid":"k/VipinKumar-1","text":"Vipin Kumar 0001"},{"@pid":"27/178","text":"Zhenhui Li"}]},"title":"Learning with Small Data.","venue":"KDD","pages":"3539-3540","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YaoJKL20","doi":"10.1145/3394486.3406466","ee":"https://doi.org/10.1145/3394486.3406466","url":"https://dblp.org/rec/conf/kdd/YaoJKL20"}, "url":"URL#1810973" }, { "@score":"1", "@id":"1810974", "info":{"authors":{"author":[{"@pid":"194/9654","text":"Teng Ye"},{"@pid":"40/9555-2","text":"Wei Ai 0002"},{"@pid":"35/10185-1","text":"Lingyu Zhang 0001"},{"@pid":"26/848","text":"Ning Luo"},{"@pid":"42/2451","text":"Lulu Zhang"},{"@pid":"03/5454","text":"Jieping Ye"},{"@pid":"30/5059","text":"Qiaozhu Mei"}]},"title":"Predicting Individual Treatment Effects of Large-scale Team Competitions in a Ride-sharing Economy.","venue":"KDD","pages":"2368-2377","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YeAZLZYM20","doi":"10.1145/3394486.3403286","ee":"https://doi.org/10.1145/3394486.3403286","url":"https://dblp.org/rec/conf/kdd/YeAZLZYM20"}, "url":"URL#1810974" }, { "@score":"1", "@id":"1810975", "info":{"authors":{"author":[{"@pid":"58/1192","text":"Wenming Ye"},{"@pid":"273/0371","text":"Rachel Hu"},{"@pid":"46/10299","text":"Miro Enev"}]},"title":"Put Deep Learning to Work: Accelerate Deep Learning through Amazon SageMaker and ML Services.","venue":"KDD","pages":"3496","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YeHE20","doi":"10.1145/3394486.3406698","ee":"https://doi.org/10.1145/3394486.3406698","url":"https://dblp.org/rec/conf/kdd/YeHE20"}, "url":"URL#1810975" }, { "@score":"1", "@id":"1810976", "info":{"authors":{"author":[{"@pid":"273/0181","text":"Jaehyuk Yi"},{"@pid":"156/7535","text":"Jinkyoo Park"}]},"title":"Hypergraph Convolutional Recurrent Neural Network.","venue":"KDD","pages":"3366-3376","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YiP20","doi":"10.1145/3394486.3403389","ee":"https://doi.org/10.1145/3394486.3403389","url":"https://dblp.org/rec/conf/kdd/YiP20"}, "url":"URL#1810976" }, { "@score":"1", "@id":"1810977", "info":{"authors":{"author":[{"@pid":"273/0278","text":"Ercan Yildiz"},{"@pid":"269/9419","text":"Joshua Safyan"},{"@pid":"62/7589","text":"Marc Harper"}]},"title":"User Sentiment as a Success Metric: Persistent Biases Under Full Randomization.","venue":"KDD","pages":"2891-2899","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YildizSH20","doi":"10.1145/3394486.3403340","ee":"https://doi.org/10.1145/3394486.3403340","url":"https://dblp.org/rec/conf/kdd/YildizSH20"}, "url":"URL#1810977" }, { "@score":"1", "@id":"1810978", "info":{"authors":{"author":[{"@pid":"222/7901","text":"Kejing Yin"},{"@pid":"174/3764","text":"Ardavan Afshar"},{"@pid":"144/4961","text":"Joyce C. Ho"},{"@pid":"w/WKWCheung","text":"William K. Cheung 0001"},{"@pid":"94/3019-14","text":"Chao Zhang 0014"},{"@pid":"54/4948","text":"Jimeng Sun 0001"}]},"title":"LogPar: Logistic PARAFAC2 Factorization for Temporal Binary Data with Missing Values.","venue":"KDD","pages":"1625-1635","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YinAHCZS20","doi":"10.1145/3394486.3403213","ee":"https://doi.org/10.1145/3394486.3403213","url":"https://dblp.org/rec/conf/kdd/YinAHCZS20"}, "url":"URL#1810978" }, { "@score":"1", "@id":"1810979", "info":{"authors":{"author":[{"@pid":"93/5063","text":"Jianwen Yin"},{"@pid":"65/6164","text":"Chenghao Liu"},{"@pid":"57/3195-1","text":"Weiqing Wang 0001"},{"@pid":"53/3693","text":"Jianling Sun"},{"@pid":"h/StevenCHHoi","text":"Steven C. H. Hoi"}]},"title":"Learning Transferrable Parameters for Long-tailed Sequential User Behavior Modeling.","venue":"KDD","pages":"359-367","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YinL0SH20","doi":"10.1145/3394486.3403078","ee":"https://doi.org/10.1145/3394486.3403078","url":"https://dblp.org/rec/conf/kdd/YinL0SH20"}, "url":"URL#1810979" }, { "@score":"1", "@id":"1810980", "info":{"authors":{"author":[{"@pid":"194/4219","text":"Changchang Yin"},{"@pid":"221/8168","text":"Ruoqi Liu"},{"@pid":"02/621","text":"Dongdong Zhang"},{"@pid":"13/4682-16","text":"Ping Zhang 0016"}]},"title":"Identifying Sepsis Subphenotypes via Time-Aware Multi-Modal Auto-Encoder.","venue":"KDD","pages":"862-872","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YinLZZ20","doi":"10.1145/3394486.3403129","ee":"https://doi.org/10.1145/3394486.3403129","url":"https://dblp.org/rec/conf/kdd/YinLZZ20"}, "url":"URL#1810980" }, { "@score":"1", "@id":"1810981", "info":{"authors":{"author":[{"@pid":"57/10206","text":"Di Yin"},{"@pid":"136/8684","text":"Jiwei Tan"},{"@pid":"87/5809","text":"Zhe Zhang"},{"@pid":"09/43","text":"Hongbo Deng"},{"@pid":"57/8451","text":"Shujian Huang"},{"@pid":"42/4315","text":"Jiajun Chen"}]},"title":"Learning to Generate Personalized Query Auto-Completions via a Multi-View Multi-Task Attentive Approach.","venue":"KDD","pages":"2998-3007","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YinTZDHC20","doi":"10.1145/3394486.3403350","ee":"https://doi.org/10.1145/3394486.3403350","url":"https://dblp.org/rec/conf/kdd/YinTZDHC20"}, "url":"URL#1810981" }, { "@score":"1", "@id":"1810982", "info":{"authors":{"author":[{"@pid":"179/5307","text":"Susik Yoon"},{"@pid":"28/3904","text":"Jae-Gil Lee 0001"},{"@pid":"l/ByungSukLee","text":"Byung Suk Lee 0001"}]},"title":"Ultrafast Local Outlier Detection from a Data Stream with Stationary Region Skipping.","venue":"KDD","pages":"1181-1191","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Yoon0L20","doi":"10.1145/3394486.3403171","ee":"https://doi.org/10.1145/3394486.3403171","url":"https://dblp.org/rec/conf/kdd/Yoon0L20"}, "url":"URL#1810982" }, { "@score":"1", "@id":"1810984", "info":{"authors":{"author":[{"@pid":"96/9822","text":"Wenhui Yu"},{"@pid":"09/1280","text":"Xiao Lin"},{"@pid":"61/6726","text":"Junfeng Ge"},{"@pid":"198/5430","text":"Wenwu Ou"},{"@pid":"95/6861-3","text":"Zheng Qin 0003"}]},"title":"Semi-supervised Collaborative Filtering by Text-enhanced Domain Adaptation.","venue":"KDD","pages":"2136-2144","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuLGOQ20","doi":"10.1145/3394486.3403264","ee":"https://doi.org/10.1145/3394486.3403264","url":"https://dblp.org/rec/conf/kdd/YuLGOQ20"}, "url":"URL#1810984" }, { "@score":"1", "@id":"1810985", "info":{"authors":{"author":[{"@pid":"55/2008","text":"Yue Yu"},{"@pid":"15/1534","text":"Yinghao Li"},{"@pid":"178/3627","text":"Jiaming Shen"},{"@pid":"46/4184","text":"Hao Feng"},{"@pid":"54/4948","text":"Jimeng Sun 0001"},{"@pid":"94/3019-14","text":"Chao Zhang 0014"}]},"title":"STEAM: Self-Supervised Taxonomy Expansion with Mini-Paths.","venue":"KDD","pages":"1026-1035","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuLSFSZ20","doi":"10.1145/3394486.3403145","ee":"https://doi.org/10.1145/3394486.3403145","url":"https://dblp.org/rec/conf/kdd/YuLSFSZ20"}, "url":"URL#1810985" }, { "@score":"1", "@id":"1810986", "info":{"authors":{"author":[{"@pid":"23/7122-4","text":"Le Yu 0004"},{"@pid":"152/1810","text":"Leilei Sun"},{"@pid":"94/4213-1","text":"Bowen Du 0001"},{"@pid":"04/7212","text":"Chuanren Liu"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"},{"@pid":"15/2736","text":"Weifeng Lv"}]},"title":"Predicting Temporal Sets with Deep Neural Networks.","venue":"KDD","pages":"1083-1091","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuSDL0L20","doi":"10.1145/3394486.3403152","ee":"https://doi.org/10.1145/3394486.3403152","url":"https://dblp.org/rec/conf/kdd/YuSDL0L20"}, "url":"URL#1810986" }, { "@score":"1", "@id":"1810987", "info":{"authors":{"author":[{"@pid":"08/7762","text":"Tan Yu"},{"@pid":"33/4854-31","text":"Yi Yang 0031"},{"@pid":"59/871","text":"Yi Li"},{"@pid":"70/4319","text":"Xiaodong Chen"},{"@pid":"87/8665","text":"Mingming Sun"},{"@pid":"62/5860-1","text":"Ping Li 0001"}]},"title":"Combo-Attention Network for Baidu Video Advertising.","venue":"KDD","pages":"2474-2482","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuYLCS020","doi":"10.1145/3394486.3403297","ee":"https://doi.org/10.1145/3394486.3403297","url":"https://dblp.org/rec/conf/kdd/YuYLCS020"}, "url":"URL#1810987" }, { "@score":"1", "@id":"1810988", "info":{"authors":{"author":[{"@pid":"117/4877","text":"Ganzhao Yuan"},{"@pid":"91/3680","text":"Li Shen"},{"@pid":"30/8399","text":"Wei-Shi Zheng 0001"}]},"title":"A Block Decomposition Algorithm for Sparse Optimization.","venue":"KDD","pages":"275-285","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuanSZ20","doi":"10.1145/3394486.3403070","ee":"https://doi.org/10.1145/3394486.3403070","url":"https://dblp.org/rec/conf/kdd/YuanSZ20"}, "url":"URL#1810988" }, { "@score":"1", "@id":"1810989", "info":{"authors":{"author":[{"@pid":"92/867","text":"Hao Yuan"},{"@pid":"64/10812","text":"Jiliang Tang"},{"@pid":"24/7536","text":"Xia Hu"},{"@pid":"84/6405","text":"Shuiwang Ji"}]},"title":"XGNN: Towards Model-Level Explanations of Graph Neural Networks.","venue":"KDD","pages":"430-438","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/YuanTHJ20","doi":"10.1145/3394486.3403085","ee":"https://doi.org/10.1145/3394486.3403085","url":"https://dblp.org/rec/conf/kdd/YuanTHJ20"}, "url":"URL#1810989" }, { "@score":"1", "@id":"1810990", "info":{"authors":{"author":[{"@pid":"184/0016","text":"Chengxi Zang"},{"@pid":"52/3194-1","text":"Fei Wang 0001"}]},"title":"MoFlow: An Invertible Flow Model for Generating Molecular Graphs.","venue":"KDD","pages":"617-626","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZangW20","doi":"10.1145/3394486.3403104","ee":"https://doi.org/10.1145/3394486.3403104","url":"https://dblp.org/rec/conf/kdd/ZangW20"}, "url":"URL#1810990" }, { "@score":"1", "@id":"1810991", "info":{"authors":{"author":[{"@pid":"184/0016","text":"Chengxi Zang"},{"@pid":"52/3194-1","text":"Fei Wang 0001"}]},"title":"Neural Dynamics on Complex Networks.","venue":"KDD","pages":"892-902","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZangW20a","doi":"10.1145/3394486.3403132","ee":"https://doi.org/10.1145/3394486.3403132","url":"https://dblp.org/rec/conf/kdd/ZangW20a"}, "url":"URL#1810991" }, { "@score":"1", "@id":"1810992", "info":{"authors":{"author":[{"@pid":"168/0332","text":"Haoyu Zhang"},{"@pid":"45/47-1","text":"Qin Zhang 0001"}]},"title":"MinSearch: An Efficient Algorithm for Similarity Search under Edit Distance.","venue":"KDD","pages":"566-576","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Zhang020","doi":"10.1145/3394486.3403099","ee":"https://doi.org/10.1145/3394486.3403099","url":"https://dblp.org/rec/conf/kdd/Zhang020"}, "url":"URL#1810992" }, { "@score":"1", "@id":"1810993", "info":{"authors":{"author":[{"@pid":"155/6855","text":"Yipeng Zhang"},{"@pid":"70/6443-1","text":"Bo Du 0001"},{"@pid":"28/10770","text":"Lefei Zhang"},{"@pid":"25/5536-1","text":"Jia Wu 0001"}]},"title":"Parallel DNN Inference Framework Leveraging a Compact RISC-V ISA-based Multi-core System.","venue":"KDD","pages":"627-635","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Zhang0Z020","doi":"10.1145/3394486.3403105","ee":"https://doi.org/10.1145/3394486.3403105","url":"https://dblp.org/rec/conf/kdd/Zhang0Z020"}, "url":"URL#1810993" }, { "@score":"1", "@id":"1810994", "info":{"authors":{"author":[{"@pid":"133/8537","text":"Chuxu Zhang"},{"@pid":"69/339-1","text":"Meng Jiang 0001"},{"@pid":"74/1890-1","text":"Xiangliang Zhang 0001"},{"@pid":"07/4509","text":"Yanfang Ye 0001"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Multi-modal Network Representation Learning.","venue":"KDD","pages":"3557-3558","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Zhang0ZYC20","doi":"10.1145/3394486.3406475","ee":"https://doi.org/10.1145/3394486.3406475","url":"https://dblp.org/rec/conf/kdd/Zhang0ZYC20"}, "url":"URL#1810994" }, { "@score":"1", "@id":"1810995", "info":{"authors":{"author":[{"@pid":"60/2536","text":"Rui Zhang"},{"@pid":"173/9302","text":"Conrad M. Albrecht"},{"@pid":"10/4661-22","text":"Wei Zhang 0022"},{"@pid":"61/362","text":"Xiaodong Cui"},{"@pid":"12/3138","text":"Ulrich Finkler"},{"@pid":"90/6531-1","text":"David S. Kung 0001"},{"@pid":"162/1952","text":"Siyuan Lu"}]},"title":"Map Generation from Large Scale Incomplete and Inaccurate Data Labels.","venue":"KDD","pages":"2514-2522","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangAZCF0L20","doi":"10.1145/3394486.3403301","ee":"https://doi.org/10.1145/3394486.3403301","url":"https://dblp.org/rec/conf/kdd/ZhangAZCF0L20"}, "url":"URL#1810995" }, { "@score":"1", "@id":"1810996", "info":{"authors":{"author":[{"@pid":"46/1746","text":"Junqi Zhang"},{"@pid":"54/5260","text":"Bing Bai"},{"@pid":"156/6809","text":"Ye Lin"},{"@pid":"19/2208","text":"Jian Liang"},{"@pid":"56/2984","text":"Kun Bai"},{"@pid":"52/3194-1","text":"Fei Wang 0001"}]},"title":"General-Purpose User Embeddings based on Mobile App Usage.","venue":"KDD","pages":"2831-2840","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangBLLBW20","doi":"10.1145/3394486.3403334","ee":"https://doi.org/10.1145/3394486.3403334","url":"https://dblp.org/rec/conf/kdd/ZhangBLLBW20"}, "url":"URL#1810996" }, { "@score":"1", "@id":"1810997", "info":{"authors":{"author":[{"@pid":"37/5580-1","text":"Guangyi Zhang 0001"},{"@pid":"g/AristidesGionis","text":"Aristides Gionis"}]},"title":"Diverse Rule Sets.","venue":"KDD","pages":"1532-1541","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangG20","doi":"10.1145/3394486.3403204","ee":"https://doi.org/10.1145/3394486.3403204","url":"https://dblp.org/rec/conf/kdd/ZhangG20"}, "url":"URL#1810997" }, { "@score":"1", "@id":"1810998", "info":{"authors":{"author":[{"@pid":"255/8703","text":"Shengzhong Zhang"},{"@pid":"97/9726","text":"Zengfeng Huang"},{"@pid":"268/6822","text":"Haicang Zhou"},{"@pid":"250/2528","text":"Ziang Zhou"}]},"title":"SCE: Scalable Network Embedding from Sparsest Cut.","venue":"KDD","pages":"257-265","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangHZZ20","doi":"10.1145/3394486.3403068","ee":"https://doi.org/10.1145/3394486.3403068","url":"https://dblp.org/rec/conf/kdd/ZhangHZZ20"}, "url":"URL#1810998" }, { "@score":"1", "@id":"1810999", "info":{"authors":{"author":[{"@pid":"157/5518","text":"Muhan Zhang"},{"@pid":"342/8438","text":"Christopher Ryan King"},{"@pid":"232/1235","text":"Michael Avidan"},{"@pid":"59/983-1","text":"Yixin Chen 0001"}]},"title":"Hierarchical Attention Propagation for Healthcare Representation Learning.","venue":"KDD","pages":"249-256","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangKAC20","doi":"10.1145/3394486.3403067","ee":"https://doi.org/10.1145/3394486.3403067","url":"https://dblp.org/rec/conf/kdd/ZhangKAC20"}, "url":"URL#1810999" }, { "@score":"1", "@id":"1811000", "info":{"authors":{"author":[{"@pid":"21/1048-1","text":"Peng Zhang 0001"},{"@pid":"04/7212","text":"Chuanren Liu"},{"@pid":"123/5745","text":"Kefeng Ning"},{"@pid":"143/0868","text":"Wenxiang Zhu"},{"@pid":"50/671","text":"Yu Zhang"}]},"title":"Prediction and Profiling of Audience Competition for Online Television Series.","venue":"KDD","pages":"1353-1361","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangLNZZ20","doi":"10.1145/3394486.3403188","ee":"https://doi.org/10.1145/3394486.3403188","url":"https://dblp.org/rec/conf/kdd/ZhangLNZZ20"}, "url":"URL#1811000" }, { "@score":"1", "@id":"1811001", "info":{"authors":{"author":[{"@pid":"174/0010-2","text":"Yingxue Zhang 0002"},{"@pid":"66/580","text":"Yanhua Li"},{"@pid":"16/1951","text":"Xun Zhou"},{"@pid":"06/8315","text":"Xiangnan Kong"},{"@pid":"42/2501-7","text":"Jun Luo 0007"}]},"title":"Curb-GAN: Conditional Urban Traffic Estimation through Spatio-Temporal Generative Adversarial Networks.","venue":"KDD","pages":"842-852","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangLZKL20","doi":"10.1145/3394486.3403127","ee":"https://doi.org/10.1145/3394486.3403127","url":"https://dblp.org/rec/conf/kdd/ZhangLZKL20"}, "url":"URL#1811001" }, { "@score":"1", "@id":"1811002", "info":{"authors":{"author":[{"@pid":"239/9830","text":"Xianli Zhang"},{"@pid":"91/7441","text":"Buyue Qian"},{"@pid":"194/4227-1","text":"Shilei Cao 0001"},{"@pid":"37/4190-139","text":"Yang Li 0139"},{"@pid":"87/3677","text":"Hang Chen"},{"@pid":"44/6510","text":"Yefeng Zheng 0001"},{"@pid":"81/2360","text":"Ian Davidson"}]},"title":"INPREM: An Interpretable and Trustworthy Predictive Model for Healthcare.","venue":"KDD","pages":"450-460","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangQ0LCZD20","doi":"10.1145/3394486.3403087","ee":"https://doi.org/10.1145/3394486.3403087","url":"https://dblp.org/rec/conf/kdd/ZhangQ0LCZD20"}, "url":"URL#1811002" }, { "@score":"1", "@id":"1811003", "info":{"authors":{"author":[{"@pid":"29/1734","text":"Yinghua Zhang"},{"@pid":"86/2159","text":"Yangqiu Song"},{"@pid":"19/2208","text":"Jian Liang"},{"@pid":"56/2984","text":"Kun Bai"},{"@pid":"82/6362-1","text":"Qiang Yang 0001"}]},"title":"Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning.","venue":"KDD","pages":"2989-2997","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangSLB020","doi":"10.1145/3394486.3403349","ee":"https://doi.org/10.1145/3394486.3403349","url":"https://dblp.org/rec/conf/kdd/ZhangSLB020"}, "url":"URL#1811003" }, { "@score":"1", "@id":"1811004", "info":{"authors":{"author":[{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"273/0053","text":"Xiujun Shu"},{"@pid":"132/3971","text":"Bingwen Zhang"},{"@pid":"r/JieRen-13","text":"Jie Ren 0013"},{"@pid":"272/9906","text":"Lizhou Zhou"},{"@pid":"24/1518","text":"Xin Chen"}]},"title":"Cellular Network Radio Propagation Modeling with Deep Convolutional Neural Networks.","venue":"KDD","pages":"2378-2386","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangSZ0ZC20","doi":"10.1145/3394486.3403287","ee":"https://doi.org/10.1145/3394486.3403287","url":"https://dblp.org/rec/conf/kdd/ZhangSZ0ZC20"}, "url":"URL#1811004" }, { "@score":"1", "@id":"1811005", "info":{"authors":{"author":[{"@pid":"119/2063","text":"Si Zhang"},{"@pid":"58/1757","text":"Hanghang Tong"},{"@pid":"61/3251","text":"Yinglong Xia"},{"@pid":"48/305","text":"Liang Xiong"},{"@pid":"39/7544","text":"Jiejun Xu"}]},"title":"NetTrans: Neural Cross-Network Transformation.","venue":"KDD","pages":"986-996","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangTXXX20","doi":"10.1145/3394486.3403141","ee":"https://doi.org/10.1145/3394486.3403141","url":"https://dblp.org/rec/conf/kdd/ZhangTXXX20"}, "url":"URL#1811005" }, { "@score":"1", "@id":"1811006", "info":{"authors":{"author":[{"@pid":"47/3459-1","text":"Shengyu Zhang 0001"},{"@pid":"259/9972","text":"Ziqi Tan"},{"@pid":"75/7785","text":"Zhou Zhao"},{"@pid":"03/5102","text":"Jin Yu"},{"@pid":"194/4245","text":"Kun Kuang"},{"@pid":"260/0216","text":"Tan Jiang"},{"@pid":"84/2644","text":"Jingren Zhou"},{"@pid":"69/3036","text":"Hongxia Yang"},{"@pid":"84/3254-1","text":"Fei Wu 0001"}]},"title":"Comprehensive Information Integration Modeling Framework for Video Titling.","venue":"KDD","pages":"2744-2754","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangTZYKJZYW20","doi":"10.1145/3394486.3403325","ee":"https://doi.org/10.1145/3394486.3403325","url":"https://dblp.org/rec/conf/kdd/ZhangTZYKJZYW20"}, "url":"URL#1811006" }, { "@score":"1", "@id":"1811007", "info":{"authors":{"author":[{"@pid":"57/3892-9","text":"Yao Zhang 0009"},{"@pid":"67/4330","text":"Yun Xiong"},{"@pid":"17/5743","text":"Yun Ye"},{"@pid":"64/8133","text":"Tengfei Liu"},{"@pid":"14/6202","text":"Weiqiang Wang"},{"@pid":"43/3858","text":"Yangyong Zhu"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"}]},"title":"SEAL: Learning Heuristics for Community Detection with Generative Adversarial Networks.","venue":"KDD","pages":"1103-1113","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangXYLWZY20","doi":"10.1145/3394486.3403154","ee":"https://doi.org/10.1145/3394486.3403154","url":"https://dblp.org/rec/conf/kdd/ZhangXYLWZY20"}, "url":"URL#1811007" }, { "@score":"1", "@id":"1811008", "info":{"authors":{"author":[{"@pid":"273/0043","text":"Chiqun Zhang"},{"@pid":"04/2181","text":"Dragomir Yankov"},{"@pid":"61/2706","text":"Chun-Ting Wu"},{"@pid":"272/9928","text":"Simon Shapiro"},{"@pid":"04/7125","text":"Jason Hong"},{"@pid":"95/6985-14","text":"Wei Wu 0014"}]},"title":"What is that Building?: An End-to-end System for Building Recognition from Streetside Images.","venue":"KDD","pages":"2425-2433","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangYWSHW20","doi":"10.1145/3394486.3403292","ee":"https://doi.org/10.1145/3394486.3403292","url":"https://dblp.org/rec/conf/kdd/ZhangYWSHW20"}, "url":"URL#1811008" }, { "@score":"1", "@id":"1811009", "info":{"authors":{"author":[{"@pid":"146/1477","text":"Kaichen Zhang"},{"@pid":"82/8538","text":"Jingbo Zhou"},{"@pid":"273/0074","text":"Donglai Tao"},{"@pid":"08/5342","text":"Panagiotis Karras"},{"@pid":"181/2689","text":"Qing Li"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"}]},"title":"Geodemographic Influence Maximization.","venue":"KDD","pages":"2764-2774","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangZTKLX20","doi":"10.1145/3394486.3403327","ee":"https://doi.org/10.1145/3394486.3403327","url":"https://dblp.org/rec/conf/kdd/ZhangZTKLX20"}, "url":"URL#1811009" }, { "@score":"1", "@id":"1811010", "info":{"authors":{"author":[{"@pid":"24/6914","text":"Hong Zhang"},{"@pid":"54/2752-2","text":"Lan Zhang 0002"},{"@pid":"41/4840","text":"Lan Xu"},{"@pid":"193/1641","text":"Xiaoyang Ma"},{"@pid":"232/5583","text":"Zhengtao Wu"},{"@pid":"84/5810","text":"Cong Tang"},{"@pid":"32/1213","text":"Wei Xu"},{"@pid":"272/9900","text":"Yiguo Yang"}]},"title":"A Request-level Guaranteed Delivery Advertising Planning: Forecasting and Allocation.","venue":"KDD","pages":"2980-2988","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhangZXMWTXY20","doi":"10.1145/3394486.3403348","ee":"https://doi.org/10.1145/3394486.3403348","url":"https://dblp.org/rec/conf/kdd/ZhangZXMWTXY20"}, "url":"URL#1811010" }, { "@score":"1", "@id":"1811011", "info":{"authors":{"author":[{"@pid":"116/8682","text":"Shuai Zhao"},{"@pid":"58/4696","text":"Wen-Ling Hsu"},{"@pid":"86/8408","text":"George Ma"},{"@pid":"84/3954","text":"Tan Xu"},{"@pid":"35/6153","text":"Guy Jacobson"},{"@pid":"39/2892","text":"Raif M. Rustamov"}]},"title":"Characterizing and Learning Representation on Customer Contact Journeys in Cellular Services.","venue":"KDD","pages":"3252-3260","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhaoHMXJR20","doi":"10.1145/3394486.3403377","ee":"https://doi.org/10.1145/3394486.3403377","url":"https://dblp.org/rec/conf/kdd/ZhaoHMXJR20"}, "url":"URL#1811011" }, { "@score":"1", "@id":"1811012", "info":{"authors":{"author":[{"@pid":"173/0246","text":"Yuxuan Zhao"},{"@pid":"153/2166","text":"Madeleine Udell"}]},"title":"Missing Value Imputation for Mixed Data via Gaussian Copula.","venue":"KDD","pages":"636-646","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhaoU20","doi":"10.1145/3394486.3403106","ee":"https://doi.org/10.1145/3394486.3403106","url":"https://dblp.org/rec/conf/kdd/ZhaoU20"}, "url":"URL#1811012" }, { "@score":"1", "@id":"1811013", "info":{"authors":{"author":[{"@pid":"63/6380","text":"Yifei Zhao"},{"@pid":"181/4666","text":"Yu-Hang Zhou"},{"@pid":"36/9904","text":"Mingdong Ou"},{"@pid":"35/2843","text":"Huan Xu"},{"@pid":"84/3795-19","text":"Nan Li 0019"}]},"title":"Maximizing Cumulative User Engagement in Sequential Recommendation: An Online Optimization Perspective.","venue":"KDD","pages":"2784-2792","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhaoZOXL20","doi":"10.1145/3394486.3403329","ee":"https://doi.org/10.1145/3394486.3403329","url":"https://dblp.org/rec/conf/kdd/ZhaoZOXL20"}, "url":"URL#1811013" }, { "@score":"1", "@id":"1811014", "info":{"authors":{"author":[{"@pid":"08/890-1","text":"Xiangyu Zhao 0001"},{"@pid":"31/7711","text":"Xudong Zheng"},{"@pid":"65/9826","text":"Xiwang Yang"},{"@pid":"10/4090","text":"Xiaobing Liu"},{"@pid":"64/10812","text":"Jiliang Tang"}]},"title":"Jointly Learning to Recommend and Advertise.","venue":"KDD","pages":"3319-3327","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhaoZYLT20","doi":"10.1145/3394486.3403384","ee":"https://doi.org/10.1145/3394486.3403384","url":"https://dblp.org/rec/conf/kdd/ZhaoZYLT20"}, "url":"URL#1811014" }, { "@score":"1", "@id":"1811015", "info":{"authors":{"author":[{"@pid":"116/7577","text":"Da Zheng"},{"@pid":"58/10312","text":"Minjie Wang"},{"@pid":"72/3872","text":"Quan Gan"},{"@pid":"z/ZhengZhang","text":"Zheng Zhang 0001"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"}]},"title":"Scalable Graph Neural Networks with Deep Graph Library.","venue":"KDD","pages":"3521-3522","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhengWGZK20","doi":"10.1145/3394486.3406712","ee":"https://doi.org/10.1145/3394486.3406712","url":"https://dblp.org/rec/conf/kdd/ZhengWGZK20"}, "url":"URL#1811015" }, { "@score":"1", "@id":"1811016", "info":{"authors":{"author":[{"@pid":"273/0003","text":"Anton Zhernov"},{"@pid":"16/8758","text":"Krishnamurthy (Dj) Dvijotham"},{"@pid":"238/2829","text":"Ivan Lobov"},{"@pid":"129/8369","text":"Dan A. Calian"},{"@pid":"47/3075","text":"Michelle X. Gong"},{"@pid":"273/0348","text":"Natarajan Chandrashekar"},{"@pid":"217/3322","text":"Timothy A. Mann"}]},"title":"The NodeHopper: Enabling Low Latency Ranking with Constraints via a Fast Dual Solver.","venue":"KDD","pages":"1285-1294","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhernovDLCGCM20","doi":"10.1145/3394486.3403181","ee":"https://doi.org/10.1145/3394486.3403181","url":"https://dblp.org/rec/conf/kdd/ZhernovDLCGCM20"}, "url":"URL#1811016" }, { "@score":"1", "@id":"1811017", "info":{"authors":{"author":[{"@pid":"272/5208","text":"Kuo Zhong"},{"@pid":"14/4899-1","text":"Ying Wei 0001"},{"@pid":"00/4572","text":"Chun Yuan"},{"@pid":"195/9712","text":"Haoli Bai"},{"@pid":"22/1170","text":"Junzhou Huang"}]},"title":"TranSlider: Transfer Ensemble Learning from Exploitation to Exploration.","venue":"KDD","pages":"368-378","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/Zhong0YBH20","doi":"10.1145/3394486.3403079","ee":"https://doi.org/10.1145/3394486.3403079","url":"https://dblp.org/rec/conf/kdd/Zhong0YBH20"}, "url":"URL#1811017" }, { "@score":"1", "@id":"1811018", "info":{"authors":{"author":[{"@pid":"82/8538","text":"Jingbo Zhou"},{"@pid":"271/4450","text":"Zhenwei Tang"},{"@pid":"67/1336","text":"Min Zhao"},{"@pid":"194/6208","text":"Xiang Ge"},{"@pid":"48/5638","text":"Fuzhen Zhuang"},{"@pid":"28/1374","text":"Meng Zhou"},{"@pid":"142/8949","text":"Liming Zou"},{"@pid":"57/6700","text":"Chenglei Yang"},{"@pid":"x/HuiXiong","text":"Hui Xiong 0001"}]},"title":"Intelligent Exploration for User Interface Modules of Mobile App with Collective Learning.","venue":"KDD","pages":"3346-3355","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhouTZGZZZYX20","doi":"10.1145/3394486.3403387","ee":"https://doi.org/10.1145/3394486.3403387","url":"https://dblp.org/rec/conf/kdd/ZhouTZGZZZYX20"}, "url":"URL#1811018" }, { "@score":"1", "@id":"1811019", "info":{"authors":{"author":[{"@pid":"39/3130-3","text":"Dawei Zhou 0003"},{"@pid":"234/8652","text":"Lecheng Zheng"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"},{"@pid":"34/2685","text":"Jingrui He"}]},"title":"A Data-Driven Graph Generative Model for Temporal Interaction Networks.","venue":"KDD","pages":"401-411","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhouZ0H20","doi":"10.1145/3394486.3403082","ee":"https://doi.org/10.1145/3394486.3403082","url":"https://dblp.org/rec/conf/kdd/ZhouZ0H20"}, "url":"URL#1811019" }, { "@score":"1", "@id":"1811020", "info":{"authors":{"author":[{"@pid":"48/3927-2","text":"Kun Zhou 0002"},{"@pid":"52/8700","text":"Wayne Xin Zhao"},{"@pid":"217/1794","text":"Shuqing Bian"},{"@pid":"247/8463","text":"Yuanhang Zhou"},{"@pid":"w/JRWen","text":"Ji-Rong Wen"},{"@pid":"204/9938","text":"Jingsong Yu"}]},"title":"Improving Conversational Recommender Systems via Knowledge Graph based Semantic Fusion.","venue":"KDD","pages":"1006-1014","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhouZBZWY20","doi":"10.1145/3394486.3403143","ee":"https://doi.org/10.1145/3394486.3403143","url":"https://dblp.org/rec/conf/kdd/ZhouZBZWY20"}, "url":"URL#1811020" }, { "@score":"1", "@id":"1811021", "info":{"authors":{"author":[{"@pid":"138/5936","text":"Zhihua Zhu"},{"@pid":"06/2888","text":"Xinxin Fan"},{"@pid":"240/9271","text":"Xiaokai Chu"},{"@pid":"46/4889","text":"Jingping Bi"}]},"title":"HGCN: A Heterogeneous Graph Convolutional Network-Based Deep Learning Model Toward Collective Classification.","venue":"KDD","pages":"1161-1171","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhuFCB20","doi":"10.1145/3394486.3403169","ee":"https://doi.org/10.1145/3394486.3403169","url":"https://dblp.org/rec/conf/kdd/ZhuFCB20"}, "url":"URL#1811021" }, { "@score":"1", "@id":"1811022", "info":{"authors":{"author":[{"@pid":"224/3696","text":"Liangyu Zhu"},{"@pid":"18/8556","text":"Wenbin Lu"},{"@pid":"91/7065","text":"Michael R. Kosorok"},{"@pid":"01/2743-6","text":"Rui Song 0006"}]},"title":"Kernel Assisted Learning for Personalized Dose Finding.","venue":"KDD","pages":"56-65","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhuLKS20","doi":"10.1145/3394486.3403048","ee":"https://doi.org/10.1145/3394486.3403048","url":"https://dblp.org/rec/conf/kdd/ZhuLKS20"}, "url":"URL#1811022" }, { "@score":"1", "@id":"1811023", "info":{"authors":{"author":[{"@pid":"181/2882","text":"Lin Zhu"},{"@pid":"82/2790","text":"Wei Yu"},{"@pid":"272/9992","text":"Kairong Zhou"},{"@pid":"02/3674","text":"Xing Wang"},{"@pid":"273/0249","text":"Wenxing Feng"},{"@pid":"233/6773-5","text":"Pengyu Wang 0005"},{"@pid":"56/1670","text":"Ning Chen"},{"@pid":"116/5284","text":"Pei Lee"}]},"title":"Order Fulfillment Cycle Time Estimation for On-Demand Food Delivery.","venue":"KDD","pages":"2571-2580","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhuYZWF0CL20","doi":"10.1145/3394486.3403307","ee":"https://doi.org/10.1145/3394486.3403307","url":"https://dblp.org/rec/conf/kdd/ZhuYZWF0CL20"}, "url":"URL#1811023" }, { "@score":"1", "@id":"1811024", "info":{"authors":{"author":[{"@pid":"15/10220","text":"Chenyi Zhuang"},{"@pid":"121/0956","text":"Ziqi Liu"},{"@pid":"67/2010-12","text":"Zhiqiang Zhang 0012"},{"@pid":"272/9924","text":"Yize Tan"},{"@pid":"53/8405","text":"Zhengwei Wu"},{"@pid":"195/4399-1","text":"Zhining Liu 0001"},{"@pid":"272/9921","text":"Jianping Wei"},{"@pid":"251/9600","text":"Jinjie Gu"},{"@pid":"22/4415","text":"Guannan Zhang"},{"@pid":"99/3847-11","text":"Jun Zhou 0011"},{"@pid":"57/2210","text":"Yuan Qi 0001"}]},"title":"Hubble: An Industrial System for Audience Expansion in Mobile Marketing.","venue":"KDD","pages":"2455-2463","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZhuangLZTW0WGZZ20","doi":"10.1145/3394486.3403295","ee":"https://doi.org/10.1145/3394486.3403295","url":"https://dblp.org/rec/conf/kdd/ZhuangLZTW0WGZZ20"}, "url":"URL#1811024" }, { "@score":"1", "@id":"1811025", "info":{"authors":{"author":[{"@pid":"172/6951","text":"Daniel Zügner"},{"@pid":"43/3011","text":"Stephan Günnemann"}]},"title":"Certifiable Robustness of Graph Convolutional Networks under Structure Perturbations.","venue":"KDD","pages":"1656-1665","year":"2020","type":"Conference and Workshop Papers","access":"closed","key":"conf/kdd/ZugnerG20","doi":"10.1145/3394486.3403217","ee":"https://doi.org/10.1145/3394486.3403217","url":"https://dblp.org/rec/conf/kdd/ZugnerG20"}, "url":"URL#1811025" }, { "@score":"1", "@id":"1861672", "info":{"authors":{"author":[{"@pid":"213/9138-1","text":"Rajesh Gupta 0001"},{"@pid":"l/YanLiu2","text":"Yan Liu 0002"},{"@pid":"64/10812","text":"Jiliang Tang"},{"@pid":"06/3956","text":"B. Aditya Prakash"}]},"title":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, CA, USA, August 23-27, 2020","venue":"KDD","publisher":"ACM","year":"2020","type":"Editorship","key":"conf/kdd/2020","doi":"10.1145/3394486","ee":"https://doi.org/10.1145/3394486","url":"https://dblp.org/rec/conf/kdd/2020"}, "url":"URL#1861672" } ] } } } )