{"id":"https://openalex.org/W4409158377","doi":"https://doi.org/10.1145/3690624.3709246","title":"SCode: A Spherical Code Metric Learning Approach to Continuously Monitoring Predictive Events in Networked Data","display_name":"SCode: A Spherical Code Metric Learning Approach to Continuously Monitoring Predictive Events in Networked Data","publication_year":2025,"publication_date":"2025-04-04","ids":{"openalex":"https://openalex.org/W4409158377","doi":"https://doi.org/10.1145/3690624.3709246"},"language":"en","primary_location":{"id":"doi:10.1145/3690624.3709246","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709246","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3690624.3709246","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022074740","display_name":"Qu Liu","orcid":"https://orcid.org/0009-0006-0370-9957"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qu Liu","raw_affiliation_strings":["University of Massachusetts, Lowell, Lowell, Massachusetts, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, Lowell, Massachusetts, USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116926103","display_name":"Emil Zulawnik","orcid":null},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emil Zulawnik","raw_affiliation_strings":["University of Massachusetts, Lowell, Lowell, Massachusetts, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, Lowell, Massachusetts, USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048219544","display_name":"Tingjian Ge","orcid":"https://orcid.org/0000-0003-2225-8291"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tingjian Ge","raw_affiliation_strings":["University of Massachusetts, Lowell, Lowell, Massachusetts, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts, Lowell, Lowell, Massachusetts, USA","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022074740"],"corresponding_institution_ids":["https://openalex.org/I133738476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07392475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"824","last_page":"835"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.7191662192344666},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7173024415969849},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6222195029258728},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38210204243659973},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2288653552532196},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10531023144721985}],"concepts":[{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.7191662192344666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7173024415969849},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6222195029258728},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38210204243659973},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2288653552532196},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10531023144721985},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690624.3709246","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709246","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3690624.3709246","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690624.3709246","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W74727102","https://openalex.org/W176495558","https://openalex.org/W1570963478","https://openalex.org/W1648907168","https://openalex.org/W1980073965","https://openalex.org/W1999529874","https://openalex.org/W2001474264","https://openalex.org/W2035503723","https://openalex.org/W2064675550","https://openalex.org/W2141420453","https://openalex.org/W2164082612","https://openalex.org/W2164463086","https://openalex.org/W2519887557","https://openalex.org/W2579923771","https://openalex.org/W2584020404","https://openalex.org/W2604272474","https://openalex.org/W2741809018","https://openalex.org/W2766311542","https://openalex.org/W2901504064","https://openalex.org/W2963646042","https://openalex.org/W2964015378","https://openalex.org/W2974168418","https://openalex.org/W2985576648","https://openalex.org/W2998702515","https://openalex.org/W3024560045","https://openalex.org/W3164101172","https://openalex.org/W4205807230","https://openalex.org/W4236965008","https://openalex.org/W4290877727","https://openalex.org/W4312037431","https://openalex.org/W4320068442","https://openalex.org/W4385567578"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Dynamic":[0],"graphs":[1],"are":[2],"common":[3],"in":[4,23],"many":[5],"applications":[6],"to":[7,39,45,113],"conveniently":[8],"model":[9,83],"heterogeneous":[10],"data":[11,60,74,118],"integrated":[12],"from":[13,76],"multiple":[14,124],"sources.":[15],"We":[16],"study":[17],"the":[18,27,41,64,68,109,137,140],"monitoring":[19],"of":[20,59,67,139],"predictive":[21,69],"events":[22,125],"dynamic":[24,78],"graphs.":[25],"Treating":[26],"problem":[28],"as":[29,106,108],"a":[30,57,77,85],"continuous":[31],"multi-label":[32],"classification,":[33],"we":[34],"use":[35],"deep":[36],"metric":[37],"learning":[38],"manage":[40],"embedding":[42,54,120],"space":[43],"and":[44,84,121],"create":[46],"spherical":[47],"codes":[48],"where":[49],"each":[50],"codeword":[51],"is":[52,102],"an":[53],"vector":[55],"representing":[56],"cluster":[58],"state":[61,119],"embeddings":[62,75],"with":[63],"same":[65],"results":[66],"events.":[70],"By":[71],"continuously":[72],"training":[73,129],"graph":[79],"neural":[80],"network":[81],"(DGNN)":[82],"code":[86],"generator":[87],"together,":[88],"our":[89,128],"method,":[90],"called":[91],"SCode,":[92],"achieves":[93],"significantly":[94],"better":[95],"accuracy":[96],"than":[97],"DGNN":[98,110],"baselines.":[99],"Moreover,":[100],"SCode":[101],"also":[103,133],"about":[104],"twice":[105],"fast":[107],"baselines,":[111],"owing":[112],"its":[114],"efficient":[115],"matching":[116],"between":[117],"codewords":[122],"for":[123],"together.":[126],"Finally,":[127],"sample":[130],"complexity":[131],"analysis":[132],"sheds":[134],"light":[135],"on":[136],"generalizability":[138],"online":[141],"learning.":[142]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
