<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Vec2Struc: A Method Towards Explainable Structural-Based Node Embeddings</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Srishti</forename><surname>Tomar</surname></persName>
							<email>srishti@quantiply.com</email>
							<affiliation key="aff0">
								<orgName type="department">Quantiply</orgName>
								<address>
									<addrLine>333 W San Carlos St. #1650</addrLine>
									<settlement>San Jose</settlement>
									<region>California</region>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ryan</forename><surname>Compton</surname></persName>
							<email>compton@quantiply.com</email>
							<affiliation key="aff0">
								<orgName type="department">Quantiply</orgName>
								<address>
									<addrLine>333 W San Carlos St. #1650</addrLine>
									<settlement>San Jose</settlement>
									<region>California</region>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Vec2Struc: A Method Towards Explainable Structural-Based Node Embeddings</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">05E1294257586E09413B8761DA3E59F4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T15:38+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Network embeddings are a popular new method for encapsulating the complexity of networks in a reduced feature space. However, embeddings obfuscates the complexity of networks and make explainability of such models difficult. We propose Vec2Struc, a new method aimed at providing more explainable representations of network models. This approach examines nodes similar to one another in the generated embedding space and highlights common structures among them. This method provides a means to explore embeddings distributionally and visually, leading towards more transparent and interpretable AI systems utilizing state-of-the-art structural-based node embeddings.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Networks have long been used in analysing complex systems with entity-to-entity relationships. For example, biologists have used networks to represent Protein-to-Protein interactions whereas social scientist's usage has been in understanding of friendship or community relationships <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref>. A growing consensus on the lack of common metrics and modeling of networks has led to a more representative approach in building condensed vectorized representations of network properties.</p><p>Network (or Node) embeddings are an approach that provide scalable learning within networks. Typically, networks are very rich in information and the size of them explored by researchers has increased into the billions of nodes. Through embeddings, a reduced feature space can be created to encapsulate both network and node information. With this reduced space comes more scalable and generalizable methods without needing to reduce the amount of information being stored in the network <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref>.</p><p>There are many variants to embedding approaches <ref type="bibr" target="#b2">(Goyal and Ferrara 2018;</ref><ref type="bibr" target="#b4">Ribeiro, Saverese, and Figueiredo 2017)</ref>, but there remains to be a method for assessing what these embeddings represent as they are an ambiguation of the original network, thus leaving the question how can researchers determine the real-world representation of the node associations in such an ambiguous space? There is a need to map the embedding space to real-world representations if we are to better understand models that rely on network embeddings.</p><p>This short paper proposes Vec2Struc, an algorithmic approach for discovering common structures or topologies between nodes in an embedded space. While this is not a universal approach for network embeddings (more on that below), this provides a first step toward interpreting network embeddings, paving the way for such state-of-the-art techniques to be more usable within AI systems that are dependent on explainability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Network/Node Embeddings</head><p>Network embeddings are formally defined from <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref>:</p><p>Given a network G = (V,E), a network embedding is a mapping f :</p><formula xml:id="formula_0">v i → y i ∈ R d ; ∀i ∈ [n] such that d</formula><p>|V | and the function f preserves some proximity measure defined on network G</p><p>Embeddings have been oriented to two different vectorized representations. 1) a representation of a network as a whole (referred to as network or graph embedding) and 2) a representation of node properties within a network (referred to as node embeddings). This work focuses on the node level representation and hence forth in this paper when referring to network embeddings this is the prospective taken. <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref> categorize embedding methods into taxonomy of three categories: Factorization, Random Walk, and Deep Learning. But these methods miss the importance of the local structures surrounding nodes. Understanding local structure properties is vital for analyzing complex networks as they showcase higher level properties beyond the one-to-one interactions commonly examined.</p><p>Additional methods have been implemented in which the structural identity of a node's neighbor is considered <ref type="bibr" target="#b4">(Ribeiro, Saverese, and Figueiredo 2017)</ref>. Struc2Vec, proposed by <ref type="bibr" target="#b4">(Ribeiro, Saverese, and Figueiredo 2017)</ref>, constructs a structural context for nodes through a multi-layer network which encodes structural similarities within the embeddings. Previous network embedding methods tend to encapsulate information around node distances, however Struc2Vec is noted to be distance agnostic and can embed structural information between nodes very far apart in the network <ref type="bibr" target="#b4">(Ribeiro, Saverese, and Figueiredo 2017)</ref>. While other types of structural based embeddings exist <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref>, this work utilizes Struc2Vec embeddings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Need for Explainable AI</head><p>The need for such complex methods to be explainable is argued by (Weld and Bansal 2019) that most computer-based produced behavior is actually alien to humans and can fail in many unexpected ways. People can't trust nor control complex systems that lack the ability to verify why they produced a specific output. The authors propose multiple criterion for which an AI system to reach such an ability:</p><p>1. It is clear what factors caused the system's action, allowing users to predict how changes to the situation would have led to alternative behaviors</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Permits effective control of the AI by enabling interaction</head><p>To approach such a system, they propose the need to ensure that the underlying reasoning is interpretable (Weld and Bansal 2019). Vec2Struc fulfills the first criterion proposed by (Weld and Bansal 2019) through visual representations of the network topologies. This allows for high-level heuristic evaluation of the embedded space, highlighting the factors for which nodes are associated in structural-based embeddings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Method</head><p>The summary of Vec2Struc is as follows: with an embedding representation generated, the nodes similar to each other need to be gathered. As a pair-wise comparison is exhaustive and computationally heavy, a filter is needed to find which pairs are best to compare neighborhoods. Then with these pairs, find if any common structure exists between them and measure the frequency of such structures to associate them with each embedding. The procedure of Vec2Struc is shown in Fig. <ref type="figure" target="#fig_0">1</ref> and is conducted in four stages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Node Embedding Generation</head><p>Embeddings are generated using an approach oriented toward representing the structural information of a node's neighborhood. While any structural based embedding should work theoretically, we only tested this with Struc2Vec (Ribeiro, Saverese, and Figueiredo 2017).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Cluster Modeling on Embedded Space + Pair-wise Filtering</head><p>Once embeddings are generated, a similarity heuristic is used to find those pairs worth comparing. This can be done through clustering nodes using the embeddings. A Gaussian Mixture model was used in our experiment with the number of clusters chosen through minimizing the Bayesian Information Criterion of the number of clusters. Thus nodes have been binned into groups for which pair-wise comparison can be made more efficiently.</p><p>However, even with the clusters there is still a potential for the pair-wise search space to be too large. We conducted further filtering through only examining pairs of nodes within a cluster that are above a similarity threshold. Using cosine similarity, we found pairs of nodes that are above a similarity of 0.9, providing a reduced search space of node pairs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Ego Structure Extraction of Similar Pairs in Clusters</head><p>Next, using the pairs of nodes that are most similar in their clusters, pair-wise comparisons were conducted on their local neighbor networks. The problem of examining two separate networks and finding common structures has been defined as the Maximum Common Edge Subgraph problem and has been found to be an NP-Hard problem <ref type="bibr" target="#b0">(Bahiense et al. 2012</ref>). Hence the need for a reduced space as algorithmic complexity of this problem makes the runtime of current solutions potentially intractable given a large enough network. To further assist with this performance issue, we only examine 2-hop ego networks centered on nodes of interest before conducting the maximum common subgraph search.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Maximum Common Subgraphs</head><p>To tackle finding common subgraphs, we incorporated the algorithm SailMCS provided by <ref type="bibr" target="#b3">(Larsen et al. 2016)</ref>. This a heuristic algorithm using a combination of iterative local search and a perturbation strategy. This algorithm is parallelized and handled the ego-network sizes we found efficiently enough to make this </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Frequency Distribution of Structures per Cluster</head><p>With the extracted substructures found, we bring this information back to the cluster level by examining the distribution of structures across clusters. Through equivalence checks between each common subgraph (using a graph isomorphism algorithm <ref type="bibr" target="#b1">(Cordella et al. 2001</ref>)), we count how often they occur in each cluster. This distributional representation is used to describe the clusters visually through finding the boundaries of the clusters in the embedded space.</p><p>To test this method, we implemented it on a network built from a network simulator on financial transactions called AMLSim by <ref type="bibr">(Weber et al. 2018)</ref>. AMLSim works well for a testing environment as we were able to specify network size and density as well as incorporate specific substructures within the network. We built a network of ∼ 10,000 nodes with an average degree of 23.25.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results</head><p>Using the AMLSim built network, we found 4 clusters using Struct2Vec embeddings as an input to a Gaussian Mixture Model. Examining the two dominant clusters (Cluster 1 contains 53% of nodes and Cluster 2 contains 38% of nodes), we explored a subset of structures within each cluster. We examined around 1000 structures for each cluster, as the number of possible pair-wise comparisons in each cluster, even after filtering, was high (25 million possible pairwise comparison were possible within Cluster 1). While examining these, many can be considered similar but still vary in the number of nodes and edges, which would cause the strict isomorphic checks within step 3 to fail as the exact number of nodes and edges is needed for these checks to return true. This was a good indication that isomorphic methods are too strict.</p><p>To showcase similar structures, we manually examined the commonly found structures and categorized them. Tables <ref type="table" target="#tab_1">1 and 2</ref> show the frequency in which each category of structure was found. The primary category found was what we refer to as a Fan (shown within Fig. <ref type="figure" target="#fig_2">2a</ref>), which is a central node acting as the only connection between the surrounding neighborhood. Iterations of the Fan structure was seen in many other types, Fan+Triangle (shown in Fig. <ref type="figure" target="#fig_2">2b</ref>) has the inclusion of a triangle clique between two nodes and the central node. The number of triangles present were dominantly one, but some structures were found to have up to 3.</p><p>The next primary structure was a node acting as a bridge between two Fans, referred to as Node Between Fan (shown in 2c). These highlight a more complex structure as a bridge node is the primary connection between two neighborhoods. Lastly, we found a fair amount of path structures which were only a continuous sequence of nodes with those in the middle of the path having exactly 2 edges. Fans were found to have paths extending outside of the central node, which are classified separately from the Fans shown in Fig. <ref type="figure" target="#fig_2">2a</ref>.</p><p>The most common structures overall tended to have a Fan structure, which isn't surprising given that this is a common pattern made from random connections within AML-Sim <ref type="bibr">(Weber et al. 2018)</ref>. Cluster 1 has a higher frequency of Fans with a Triangle, indicating more nuanced relationships. As Cluster 2's second most frequent structure was a node acting as a bridge between two fans (shown within Fig. <ref type="figure" target="#fig_2">2c</ref>) which wasn't present within Cluster 1, indicating nodes in Cluster 2 may be acting as neighbor connectors.</p><p>While unique structures were found across each cluster, many of the them were unable to find a match (82.53% within Cluster 1 and 72.22% within Cluster 2). However, after conducting a visual inspection, many of the structures matched similar high level categorization as the categories already reported within each Cluster. Due to the high amount of no matches we were unable to categorize them into the found types. This further indicates a need for a less strict checks on isomorphism and allow for more higher level similarity measures of substructures to automate this process.</p><p>There were structural types found within the no match category that were too complex and unique to match any other. Fig. <ref type="figure" target="#fig_3">3</ref> shows an interesting structure as it shows a higher connected pair of Fans as there exist multiple bridges instead of the more common one bridge within Fig 2c <ref type="figure">.</ref> Again highlighting the need for better similarity measures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discussion</head><p>This work presents Vec2Struc, a new method pushing more interpretable representations of state-of-the-art network models. As embeddings have continued to highlight their potential for graphical representations in a more compact space <ref type="bibr" target="#b2">(Goyal and Ferrara 2018)</ref>, this method provides a step forward in being able to explain the associations of nodes. This is through addressing the first criterion mentioned by (Weld and Bansal 2019) by bringing forward the   structural factors influencing decisions made using embeddings with visualizations of such structures. Visualizations have been a common representation of other prediction explanations <ref type="bibr" target="#b5">(Ribeiro, Singh, and Guestrin 2016)</ref> as well as a common representation of networks. Applications of this work can be within the areas mentioned above in the Introduction of discovering new Protein-to-Protein interactions as well as social network structures, but directly this can be applied along with AMLSim to be used in financial networks for the discovery of new criminal financial activities in money laundering <ref type="bibr">(Weber et al. 2018)</ref>.</p><p>While this work showcases a test case of this method, it still contains many limits in its ability. First being the computational complexity of the algorithm and the main bottleneck being the Maximum Common Subgraph discovery procedure, which is an NP-Hard problem <ref type="bibr" target="#b0">(Bahiense et al. 2012)</ref>. To work around this, filter techniques were used to only examine the most common pairs, hence the typically assumptions of clustering apply (Clusters within the embedded space are not guaranteed to be separable and goodness of fit measures are needed to audit the cluster model's performance), as well as the thresholds of our similarity check need to be further examined within each space as to what threshold is appropriate. Another issue lies within our experiment, as we needed to conduct further sampling (1000 common subgraphs found per cluster) to allow for a reasonable runtime of SailMCS.</p><p>Future work could expand on this experiment through exploring higher frequency of specific structures of interest, as well as explore other network types as this is unclear of its performance given global network properties, (i.e how does density of the network affect runtime?). Realworld networks need to be explored, as the most common type of structure found (Fan shown in Fig. <ref type="figure" target="#fig_2">2a</ref>) is easily produced from random edge generation. Lastly, additional work is needed in understanding the dynamics of embeddings through these visualizations to reach the second criterion proposed by (Weld and Bansal 2019).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Vec2Struc Procedure.</figDesc><graphic coords="2,347.75,54.00,182.00,337.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>(a) Fan Structures commonly found across both clusters. (b) Fan + Triangle structures more often found within cluster 1.(c) Node between Fan structures commonly found within cluster 2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Examples of commonly found structures across the dominant two clusters.</figDesc><graphic coords="4,106.94,210.43,132.62,91.39" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Structures within Cluster 2 containing multiple bridges.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Distribution of found structures within Cluster 1.</figDesc><table><row><cell>Cluster 1</cell><cell>Tot. Structs</cell><cell>979</cell></row><row><cell>Struc ID</cell><cell>Freq.</cell><cell>Total %</cell></row><row><cell>Fan + Tri</cell><cell>84</cell><cell>8.58%</cell></row><row><cell>Fan</cell><cell>45</cell><cell>4.59%</cell></row><row><cell>Single Match</cell><cell>24</cell><cell>2.45%</cell></row><row><cell>Path</cell><cell>15</cell><cell>1.53%</cell></row><row><cell>Fan + Path</cell><cell>3</cell><cell>0.30%</cell></row><row><cell>No Match</cell><cell>808</cell><cell>82.53%</cell></row><row><cell>Cluster 2</cell><cell>Tot. Structs</cell><cell>1026</cell></row><row><cell>Struc ID</cell><cell>Freq.</cell><cell>Total %</cell></row><row><cell>Fan</cell><cell>126</cell><cell>12.28%</cell></row><row><cell>Node bt. Fan</cell><cell>49</cell><cell>4.77%</cell></row><row><cell>Single Match</cell><cell>44</cell><cell>4.28%</cell></row><row><cell>Fan + Path</cell><cell>24</cell><cell>2.34%</cell></row><row><cell>Fan + Tri</cell><cell>19</cell><cell>1.85%</cell></row><row><cell>Path</cell><cell>19</cell><cell>1.85%</cell></row><row><cell>Fan + Path + Tri</cell><cell>4</cell><cell>0.38%</cell></row><row><cell>No Match</cell><cell>741</cell><cell>72.22%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Distribution of found structures within Cluster 2.</figDesc><table /><note>method tractable. Examples of common subgraphs found can be seen within Fig.2.</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The maximum common edge subgraph problem: A polyhedral investigation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Bahiense</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Manić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Piva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Souza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">160</biblScope>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="2523" to="2541" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An improved algorithm for matching large graphs</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">P</forename><surname>Cordella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Foggia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Sansone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vento</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">3rd IAPR-TC15 workshop on graph-based representations in pattern recognition</title>
				<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="149" to="159" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Graph embedding techniques, applications, and performance: A survey</title>
		<author>
			<persName><forename type="first">P</forename><surname>Goyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ferrara</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-Based Systems</title>
		<imprint>
			<biblScope unit="volume">151</biblScope>
			<biblScope unit="page" from="78" to="94" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A simulated annealing algorithm for maximum common edge subgraph detection in biological networks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Larsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">G</forename><surname>Alkaersig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Ditzel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jurisica</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Alcaraz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Baumbach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Genetic and Evolutionary Computation Conference</title>
				<meeting>of the Genetic and Evolutionary Computation Conference</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="341" to="348" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">struc2vec: Learning node representations from structural identity</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">H</forename><surname>Saverese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Figueiredo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</title>
				<meeting>of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="385" to="394" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Why should i trust you?: Explaining the predictions of any classifier</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Ribeiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Guestrin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining</title>
				<meeting>of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1135" to="1144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">M</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Suzumura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pareja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kanezashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kaler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Leiserson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Schardl</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Scalable graph learning for anti-money laundering: A first look</title>
	</analytic>
	<monogr>
		<title level="m">NeurIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services: the Impact of Fairness, Explainability, Accuracy</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="70" to="79" />
		</imprint>
	</monogr>
	<note>The challenge of crafting intelligible intelligence</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
