<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Novel Approach for Adverse Events Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jia Zhu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuzhi Liang</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Changqin Huang</string-name>
          <email>cqhuang@scnu.edu.cn</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Min Yang</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jing Xiao</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yong Tang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computer Science, South China Normal University</institution>
          ,
          <addr-line>Guangzhou</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Computer Science, The University of Hong Kong</institution>
          ,
          <addr-line>Hong Kong</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <fpage>41</fpage>
      <lpage>45</lpage>
      <abstract>
        <p>Adverse events detection is critical in many fields, e.g., adverse drug event (ADE) detection in medical field. ADE is an unexpected and harmful consequence of drug usage. Many researchers found that identifying the correlation between the use of drugs and adverse events from biomedical literature can contribute a lot to drug safety monitoring. In this paper, we propose a novel approach based on biomedical literature to detect ADE. We first construct a graph using candidate ADE extracted from biomedical literature, and then propose a method to select critical vertices from the graph as core vertices with a clustering algorithm to group these core vertices to build subgraphs. Lastly, the correlations between drugs and events are calculated based on the subgraphs for ADE detection. Experiments show that our approach is highly feasible.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Adverse events detection, such as adverse drug event (ADE)
detection, is very important in drug safety assessment. It
encompasses all scientific and data gathering activities relating
to the detection, assessment, and understanding of adverse
events of medical products through the product life cycle
[Saless, 2005]. ADE refers to any unfortunate medical and
health events that occur during the course of drug treatment,
and this event does not necessarily have a causal relationship
with drug therapy [Liu et al., 2016; Cai et al., 2017]. ADE
might be caused by several drugs interacting with each other
when administered concomitantly. Though drug standards
are guided for the production and usage of drugs, it will still
lead to the occurrence of ADE even if we obey the criteria
drug standards.</p>
      <p>As we all know, traditionally drug safety monitoring
relies on data from spontaneous reporting systems (SRS), such
as the US Food and Drug Administration’ (FDA) Adverse
Event Reporting System (FAERS), which contains reports of
suspected ADE submitted by health care providers,
manufactures, and patients. However, FAERS data do have some
limitations. For example, FDA does not receive reports for
every adverse event or medication error that occurs in a
product. Therefore, FAERS data is not sufficient to calculate the
incidence of an adverse event or medication error in the U.S.
population.</p>
      <p>Since there is no sufficient medical data or authoritative
evidence to identify the correlations between drugs and adverse
events quickly, it is challenging but extremely necessary to
detect ADE effectively using other methods. In this paper,
we focus on using the data extracted from biomedical
literature according to [Winnenburg and Shah, 2016]. We
propose a novel graph-based approach called G-ADE to detect
ADE. In G-ADE, we first construct a graph using candidate
ADE extracted from biomedical literature. We then propose
a novel method to select important vertices from the graph
as core vertices, and design an algorithm using these core
vertices for clustering in order to build a set of subgraphs.
This step is our main contribution in this paper because
finding core vertices in a graph has been proved extremely
useful for later processing [Yang et al., 2016; Min et al., 2009;
Yang et al., 2017; Yang and Chow, 2014]. Lastly, the
correlation between each drug-event pair is calculated based on
the subgraphs we constructed in the previous step to identify
ADE. We have also perform a few experiments to validate our
work using a gold standard of drug-adverse event correlations
spanning 159 drugs and four events.</p>
      <p>The rest of this paper is organized as follows. In Section
2, we describe details of G-ADE including a core vertices
selection algorithm with subgraphs generation. In Section 3, we
describe our experiments with evaluation methods and result
analysis, and compare G-ADE with other methods. We also
conclude and discuss this study in Section 4.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Proposed Approach</title>
      <p>The overview of G-ADE is described in Figure 1. The process
can be summarized as follows. Firstly, we extract all
associated pairs between all adverse events and drugs from
MEDLINE according to [Winnenburg and Shah, 2016], and use
these pairs as basic knowledge to construct a fully connected
drug-event graph. These pairs represent a list of potential
ADE to be validated. Secondly, we propose a core vertices
selection algorithm to select core vertices in the drug-event
graph we built. Thirdly, we adopt an algorithm to generate
a set of subgraphs based on the core vertices obtained in the
previous step based on the idea from [Min et al., 2009] for
the purpose of key information extraction. Finally, we
connect all the subgraphs into a graph that in fact is a smaller size
of the original graph, and compute the similarity of all
drugevent pairs based on this new graph. If the drug-event pair’s
similarity is higher than the threshold we set up, we will
recognize it as ADE. We will introduce the details of each step
in the following sections.</p>
      <sec id="sec-2-1">
        <title>2.1 Core Vertices Selection</title>
        <p>As we described earlier, the key is to select critical vertices as
core vertices in order to construct subgraphs. We propose a
method that computes each vertex’s importance based on
vectors generated by DeepWalk [Perozzi et al., 2014]. DeepWalk
has been proved successfully in social networks and graph
analysis. It learns the latent representations by modeling a
stream of short random walk, and then encodes it in a
continuous vector space with low dimensions. In our purposed
method, we apply DeepWalk to the drug-event graph to get
a 64-dimensions vectors for each vertex. Let G = (V, E) to
be the drug-event graph, v 2 V , which represents a drug or
an event. H is the set of neighbor vertices of v, Hi 2 H, n
is the number of the neighbor vertices. We have Equation (1)
to compute the score of importance for each vertex. The core
vertices selection algorithm to adopt the score is described in
Algorithm 1.</p>
        <p>score = i=1
n
P Distv,Hi
n
(1)</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Personal Rank for Clustering</title>
        <p>Once we have a list of core vertices, we adopt Personal
Rank(PR) [Haveliwala, 2003] algorithm to generate
associated subgraphs. PR is a graph clustering algorithm based
on random walk [Haveliwala, 2003], which performs well in
recommendation system and social network [Li et al., 2012;
Shen et al., 2016]. The basic idea of PR is similar to
PageRank [Bianchini et al., 2005]. Firstly, the algorithm computes
the score of importance of each vertex in the network, and
then sorts each node according to the score of the importance.
Eventually, the algorithm outputs Top-N vertices. The score
of importance is defined in Equation (2):
P Ri = (1 ↵ )ri+↵</p>
        <p>X</p>
        <p>P Rj
j2 ini |outi|
, ri =
⇢ 1
0 i 6= vcore,
i = vcore (2)</p>
        <p>Algorithm 1 Core Vertices Selection Algorithm
Require: G = (V, E), a drug-event graph, t, a threshold
used to filter
Ensure: List, a sorted list of core vertices
1: learns the vectors of the V , vectors are the DeepWalk</p>
        <p>Vectors
2: for each v 2 V do
3: for each Hi 2 H do
4: compute Distv,Hi , the distance between v and</p>
        <p>Hi using vectors
5: end for
6: compute v’score using Equation (1)
7: end for
8: sorted v by its score, and put v which score is higher than
t into List
where P Ri represents the score of importance of vertex i,
↵ is the probability of walking, outi represents the out
degree of vertex i and inj represents the in degree of vertex j,
vcore represents the core vertex. As shown in Figure 2, we set
P R of core vertices(A,B,C) to 1 and other vertices(a,b,c,d)
to 0 initially. Therefore, we have P R(A) = P R(B) =
P R(C) = 1, and P R(a) = P R(b) = P R(c) = P R(d) = 0
in the beginning, then we starts to walk from the vertex with
P R 6= 0. The probability of walking is ↵ , correspondingly,
the probability of stopping is 1 ↵ . For example, the
probability of walking from A to a or c is 0.5 as a and c share the
importance of A, that is P R(a) = P R(c) = P R(A) ⇤ 0.5.
The process then continues to walk with probability of ↵ or
stop and go back to A with probability of 1 ↵ . The process
will keep running until the P R of each vertex is stable. We
select up to top-100 highest PR vertices that attached to each
core vertex to construct subgraphs. In other words, we will
get a set of clusters/subgraphs in the end of this process.
As now we have a set of clusters(subgraphs), we next want
to transform all the clusters into a graph for further
processing. We define Sg is the set of clusters we got in the
previous step, and G = (V, E) is the original graph. If
Ga = (Va, Ea) and Gb = (Vb, Eb) are two clusters in Sg,
we put Ga and Gb into a new graph if there is an edge
between va and vb in G, and va 2 Va, vb 2 Vb. We
continue this process until all possible clusters are checked, and
a new graph is generated eventually. We then calculate the
similarity between drug vertices and event vertices in this
new graph according to their associated vectors generated by
DeepWalk. Note that the reason we run DeepWalk again on
the graph to generate new vector for each vertex because the
structure of the graph is changed. If two vertices’ associated
vectors are very similar, then means these two vertices has
very closed information in the graph [Perozzi et al., 2014;
Cunchao Tu, 2016; Yang and Liu, 2015; Zhu et al., 2016;
2012]. In other words, this drug-event pair has higher
probability to be an ADE. Therefore, according to the similarity of
each pair, we can mine ADE from the graph if the similarity
of drug-event pair is higher than a certain threshold we set.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Experiments</title>
      <p>In this section, we will introduce the evaluation we have done
on OMOP standard data set [Ryan et al., 2013]. The
experimental results show evidence of significant improvement of
our proposed approach over baseline methods.
3.1</p>
      <sec id="sec-3-1">
        <title>Datasets</title>
      </sec>
      <sec id="sec-3-2">
        <title>Literature Data Set</title>
        <p>The data set used in this paper can be downloaded from the
website1. It consists of candidate ADE pairs extracted from
MeSH term indexes of all 366k articles in MEDLINE that
are indexed with certain combinations of MeSH terms and
qualifiers according to [Winnenburg and Shah, 2016]. The
creation of this data set is described in detail in [Winnenburg
et al., 2015]. We extract PMID-Drug pairs (paper id and drug)
and PMID-Event pairs (paper id and event) from data set. The
detail data set is shown in Table 1.</p>
        <sec id="sec-3-2-1">
          <title>Name</title>
        </sec>
        <sec id="sec-3-2-2">
          <title>Pmid</title>
        </sec>
        <sec id="sec-3-2-3">
          <title>Drug</title>
        </sec>
        <sec id="sec-3-2-4">
          <title>Event</title>
        </sec>
        <sec id="sec-3-2-5">
          <title>Pmid - Drug pairs</title>
        </sec>
        <sec id="sec-3-2-6">
          <title>Pmid - Event pairs</title>
          <p>Number
366k
3416
1602
418k
552k
We evaluate the experimental performance against the drug
safety reference set established by the observational medical
outcome partnership (OMOP) [Ryan et al., 2013]. This set
contains 399 drug-outcome pairs, covering 183 drugs from
several drug classes and four significant and actively
monitored adverse event outcomes: acute myocardial infarction,
acute renal failure, acute liver injury, and upper
gastrointestinal bleeding. Here we only select the positive part that
indicates ADE as the ground truth to validate our approach. Note
that we have removed a few drugs that cannot be found in our
graph. The data set is shown in Table 2.</p>
          <p>1ftp://nlmpubs.nlm.nih.gov/online/mesh/2015/meshtrees/</p>
        </sec>
        <sec id="sec-3-2-7">
          <title>Aggregation Outcome</title>
        </sec>
        <sec id="sec-3-2-8">
          <title>Acute kidney injury</title>
        </sec>
        <sec id="sec-3-2-9">
          <title>Acute liver injury</title>
        </sec>
        <sec id="sec-3-2-10">
          <title>Acute myocardial infarction</title>
        </sec>
        <sec id="sec-3-2-11">
          <title>GI bleed</title>
        </sec>
        <sec id="sec-3-2-12">
          <title>Total</title>
        </sec>
        <sec id="sec-3-2-13">
          <title>Drugs</title>
        </sec>
        <sec id="sec-3-2-14">
          <title>Positive Negative 23 79</title>
          <p>33
24
159
59
33
61
62
215
In order to evaluate the feasibility of G-ADE and the core
vertices selection algorithm, we use the following two
methods(BG and CVTn) as the baseline methods.</p>
          <p>* Basic Graph(BG): In this approach, We firstly
construct a graph using all candidate ADE extracted from
biomedical literature as described in Section 3.1. We
obtain the corresponding vector of event and drug
through the DeepWalk algorithm. Finally, their
correlations are calculated by cosine similarity, namely, basic
graph(BG).
* Core Vertices from Top n Nodes(CVTn): In this
method, we construct the graph using the same measure
as BG. We then simply select top N nodes as the core
vertices according to the degree of the node. We rebuild
new subgraphs using the core vertices with a clustering
algorithm. Lastly, the correlation/similarity between the
drug and the event is calculated based on the subgraphs.</p>
          <p>We name it as CVTn.
3.3</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Evaluation Standard</title>
        <p>In the experiment, we calculate the similarity between event
and drug to according to the associated vector of each
vertex. The cosine similarity measure [On, 2008] between two
vectors is used that calculates the cosine of the angle between
them, and the cosine similarity formula is defined as:
SimilarityEvent,Drug =</p>
        <p>! VEvent ⇥ !VDrug
!||VEvent|| ⇥ ||!VDrug||
(3)</p>
        <p>The higher the similarity is, the more this event relates to
the drug. At the same time, we verify the accuracy of the
standard data set by different thresholds. If the similarity between
drugs and events is higher than the threshold, we think they
are relevant. That is, the drug has an adverse effect on the
event. Therefore, we can calculate the predication accuracy
as: Accuracy = N/M , where N is the number of the
drugeven pair matched the ADE in OMOP and M is the number
of ADE in OMOP.
39.6% 42.1%
74.8% 75.4%
85.5% 86.8%
PR</p>
        <p>K-means
42.8%
76.1%
86.1%
The overall performance of G-ADE and two
baselines(BG,CVTn) methods in terms of accuracy at different
thresholds using the OMOP data set as reference is
summarized in Table 3. Note that since the third step for clustering
of CVTn and G-ADE can both be replaced by other clustering
algorithms, e.g., K-means [Kanungo et al., 2002]. Therefore,
we have also provided the evaluation results produced by
Kmeans. In our experiments, we set K = 10 as this setting can
achieve the best performance on our dataset.</p>
        <p>From the Table 3, we can clearly see that G-ADE
outperforms the BG and CVTn methods with different clustering
algorithms (Personal Rank and K-means) at different
thresholds. Obviously, the prediction accuracy is improved for all
approaches with higher threshold. On the other hand, though
CVTn method performs better than the BG method but not
as good as G-ADE with both clustering algorithms, which
demonstrates that the core vertices selection plays an
important role to improve prediction accuracy. Overall, our
proposed approach based on core vertices selection and PG
clustering for the detection of adverse drug events is feasible as
91.1% prediction accuracy is achieved. Therefore, we can
conclude that through the core vertices selection and personal
rank clustering algorithm, the accuracy of adverse drug event
detection is effectively improved because the robust
performance is shown in our experiments.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>Adverse drug event (ADE), defined as adverse patient
outcomes caused by medications, is a common issue but
difficult to detect. In this paper, We propose an approach called
G-ADE based on biomedical literature to detect ADE. We
first construct a graph using candidate ADE extracted from
biomedical literature. We then propose a core vertices
selection algorithm to select important vertices from the graph as
core vertices, and design a PR algorithm using the core
vertices for clustering to build subgraphs. Last but not least, the
correlation between the drug and the event is calculated using
the vector generated by DeepWalk based on the subgraphs. If
the correlation value is sufficiently high, we take this pair as
ADE. Our experimental results show that G-ADE performs
better than two baseline methods in a few scenarios. In the
future, we will pay more attention to build subgraphs on
ensemble different clustering methods to further improve the
performance and attempt to gain data from social networking
as this is where a lot of patients may talk about uncommon
side effects from medication and hence could lead to
interesting clinical results.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgement</title>
      <p>
        This work was partially supported by the National
Natural Science Foundation of China (61370229),
the Natural Science Foundation of Guangdong
Province, China(2015A030310509), the Public
Research and Capacity Building in Guangdong Province,
China(2016A030303055), the S&amp;T Projects of Guangdong
Province, China
        <xref ref-type="bibr" rid="ref13">(2015A030401087, 2016B030305004,
2016B010109008)</xref>
        , and the S&amp;T Project of Guangzhou
Municipality(201604010054).
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Bianchini et al.,
          <year>2005</year>
          ]
          <string-name>
            <given-names>Monica</given-names>
            <surname>Bianchini</surname>
          </string-name>
          , Marco Gori, and
          <string-name>
            <given-names>Franco</given-names>
            <surname>Scarselli</surname>
          </string-name>
          .
          <article-title>Inside pagerank</article-title>
          .
          <source>Acm Transactions on Internet Technology</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ):
          <fpage>92</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Cai et al.,
          <year>2017</year>
          ]
          <string-name>
            <given-names>Ruichu</given-names>
            <surname>Cai</surname>
          </string-name>
          , Mei Liu, Yong Hu, Brittany L.
          <string-name>
            <surname>Melton</surname>
            ,
            <given-names>Michael E.</given-names>
          </string-name>
          <string-name>
            <surname>Matheny</surname>
            , Hua Xu,
            <given-names>Lian</given-names>
          </string-name>
          <string-name>
            <surname>Duan</surname>
          </string-name>
          , and
          <string-name>
            <surname>Lemuel</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Waitman</surname>
          </string-name>
          .
          <article-title>Identification of adverse drug-drug interactions through causal association rule discovery from spontaneous adverse event reports</article-title>
          .
          <source>Artificial Intelligence in Medicine</source>
          ,
          <volume>76</volume>
          :
          <fpage>7</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>[Cunchao</given-names>
            <surname>Tu</surname>
          </string-name>
          ,
          <year>2016</year>
          ]
          <string-name>
            <given-names>Zhiyuan</given-names>
            <surname>Liu Maosong Sun Cunchao Tu</surname>
          </string-name>
          , Weicheng Zhang.
          <article-title>Max-margin deepwalk: Discriminative learning of network representation</article-title>
          .
          <source>In IJCAI</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>[Haveliwala</source>
          , 2003] Taher H Haveliwala.
          <article-title>Topic-sensitive pagerank</article-title>
          .
          <source>In International Conference on World Wide Web</source>
          , pages
          <fpage>517</fpage>
          -
          <lpage>526</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Kanungo et al.,
          <year>2002</year>
          ]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kanungo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Mount</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Netanyahu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Piatko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Silverman</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>An efficient k-means clustering algorithm: Analysis and implementation</article-title>
          .
          <source>IEEE Trans. Pattern Analysis and Machine Intelligence</source>
          .,
          <volume>24</volume>
          :
          <fpage>881</fpage>
          -
          <lpage>892</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>[Li</surname>
          </string-name>
          et al.,
          <year>2012</year>
          ]
          <string-name>
            <given-names>Xin</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Xin</given-names>
            <surname>Su</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Mengyue</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Social network-based recommendation:a graph random walk kernel approach</article-title>
          .
          <source>In Proceedings of the 12th ACM/IEEECS joint conference on Digital Libraries</source>
          , pages
          <fpage>409</fpage>
          -
          <lpage>410</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Liu et al.,
          <year>2016</year>
          ] Jing Liu,
          <string-name>
            <given-names>Songzheng</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and Xiaodi</given-names>
            <surname>Zhang</surname>
          </string-name>
          .
          <article-title>An ensemble method for extracting adverse drug events from social media</article-title>
          .
          <source>Artificial Intelligence in Medicine</source>
          ,
          <volume>70</volume>
          :
          <fpage>62</fpage>
          -
          <lpage>76</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Min et al.,
          <year>2009</year>
          ]
          <string-name>
            <given-names>Wu</given-names>
            <surname>Min</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Xiaoli</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Chee Keong Kwoh, and See Kiong Ng. A core-attachment based method to detect protein complexes in ppi networks</article-title>
          .
          <source>BMC Bioinformatics</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ):
          <fpage>169</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [On, 2008]
          <string-name>
            <given-names>Byung</given-names>
            <surname>Won</surname>
          </string-name>
          <article-title>On. Social network analysis on name disambiguation and more</article-title>
          .
          <source>In International Conference on Convergence and Hybrid Information Technology</source>
          , pages
          <fpage>1081</fpage>
          -
          <lpage>1088</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Perozzi et al.,
          <year>2014</year>
          ]
          <string-name>
            <given-names>Bryan</given-names>
            <surname>Perozzi</surname>
          </string-name>
          , Rami Al-Rfou, and
          <string-name>
            <given-names>Steven</given-names>
            <surname>Skiena</surname>
          </string-name>
          .
          <article-title>Deepwalk: online learning of social representations</article-title>
          .
          <source>In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          , pages
          <fpage>701</fpage>
          -
          <lpage>710</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [Ryan et al.,
          <year>2013</year>
          ]
          <string-name>
            <given-names>P. B.</given-names>
            <surname>Ryan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Schuemie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Welebob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J</given-names>
            <surname>Duke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S</given-names>
            <surname>Valentine</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Hartzema</surname>
          </string-name>
          .
          <article-title>Defining a reference set to support methodological research in drug safety</article-title>
          .
          <source>Drug Safety</source>
          ,
          <volume>36</volume>
          (
          <issue>1</issue>
          ):
          <fpage>33</fpage>
          -
          <lpage>47</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[Saless</source>
          , 2005]
          <string-name>
            <given-names>Fatieh</given-names>
            <surname>Saless</surname>
          </string-name>
          .
          <article-title>Review of fda guidance on risk management: Good pharmacovigilance practices and pharmacoepidemiologic assessment</article-title>
          .
          <source>Genetic Engineering News</source>
          ,
          <volume>25</volume>
          (
          <issue>18</issue>
          ):
          <fpage>14</fpage>
          -
          <lpage>0</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [Shen et al.,
          <year>2016</year>
          ]
          <string-name>
            <given-names>B</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B</given-names>
            <surname>Hu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H</given-names>
            <surname>Zhang</surname>
          </string-name>
          .
          <article-title>Method for the analysis of the preferences of network users</article-title>
          .
          <source>Networks Iet</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ):
          <fpage>8</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[Winnenburg and Shah</source>
          , 2016]
          <string-name>
            <given-names>R.</given-names>
            <surname>Winnenburg</surname>
          </string-name>
          and
          <string-name>
            <given-names>NH</given-names>
            <surname>Shah</surname>
          </string-name>
          .
          <article-title>Generalized enrichment analysis improves the detection of adverse drug events from the biomedical literature</article-title>
          .
          <source>BMC Bioinformatics</source>
          ,
          <volume>17</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [Winnenburg et al.,
          <year>2015</year>
          ]
          <string-name>
            <given-names>Rainer</given-names>
            <surname>Winnenburg</surname>
          </string-name>
          , Alfred Sorbello, Anna Ripple, Rave Harpaz, Joseph Tonning, Ana Szarfman,
          <string-name>
            <given-names>Henry</given-names>
            <surname>Francis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Olivier</given-names>
            <surname>Bodenreider</surname>
          </string-name>
          .
          <article-title>Leveraging medline indexing for pharmacovigilance - inherent limitations and mitigation strategies</article-title>
          .
          <source>Journal of Biomedical Informatics</source>
          , 57(C):
          <volume>425</volume>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[Yang and Chow</source>
          , 2014]
          <string-name>
            <given-names>Min</given-names>
            <surname>Yang</surname>
          </string-name>
          and
          <string-name>
            <surname>Kam-Pui Chow</surname>
          </string-name>
          .
          <article-title>Authorship attribution for forensic investigation with thousands of authors</article-title>
          .
          <source>In IFIP International Information Security Conference</source>
          , pages
          <fpage>339</fpage>
          -
          <lpage>350</lpage>
          . Springer Berlin Heidelberg,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>[Yang and Liu</source>
          , 2015]
          <string-name>
            <given-names>Cheng</given-names>
            <surname>Yang</surname>
          </string-name>
          and Zhiyuan Liu.
          <article-title>Comprehend deepwalk as matrix factorization</article-title>
          .
          <source>Computer Science</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [Yang et al.,
          <year>2016</year>
          ]
          <string-name>
            <given-names>Min</given-names>
            <surname>Yang</surname>
          </string-name>
          , Jincheng Mei, Fei Xu,
          <string-name>
            <given-names>Wenting</given-names>
            <surname>Tu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Ziyu</given-names>
            <surname>Lu</surname>
          </string-name>
          .
          <article-title>Discovering author interest evolution in topic modeling</article-title>
          .
          <source>In Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval</source>
          , pages
          <fpage>801</fpage>
          -
          <lpage>804</lpage>
          . ACM,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [Yang et al.,
          <year>2017</year>
          ]
          <string-name>
            <given-names>Min</given-names>
            <surname>Yang</surname>
          </string-name>
          , Dingju Zhu,
          <string-name>
            <given-names>Yong</given-names>
            <surname>Tang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Jingxuan</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Authorship attribution with topic drift model</article-title>
          .
          <source>In The Thirty-First AAAI Conference on Artificial Intelligence</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . AAAI,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [Zhu et al.,
          <year>2012</year>
          ]
          <string-name>
            <given-names>Jia</given-names>
            <surname>Zhu</surname>
          </string-name>
          , Qing Xie, and
          <article-title>Eun Jung Chin. A hybrid time-series link prediction framework for large social network</article-title>
          .
          <source>Database and Expert Systems Applications</source>
          , pages
          <fpage>345</fpage>
          -
          <lpage>359</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [Zhu et al.,
          <year>2016</year>
          ]
          <string-name>
            <given-names>Jia</given-names>
            <surname>Zhu</surname>
          </string-name>
          , Qing Xie,
          <article-title>Shoou-i Yu, and Wai Hung Wong</article-title>
          .
          <article-title>Exploiting link structure for web page genre identification</article-title>
          .
          <source>Data Mining and Knowledge Discovery</source>
          ,
          <volume>30</volume>
          (
          <issue>3</issue>
          ):
          <fpage>550</fpage>
          -
          <lpage>575</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>