<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Empowering Knowledge Bases: A Machine Learning Perspective (Invited Paper and Talk)</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bari</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>The construction of Knowledge Bases requires quite often the intervention of knowledge engineering and domain experts, resulting in a time consuming task. Alternative approaches have been developed for building knowledge bases from existing sources of information such as web pages and crowdsourcing; seminal examples are NELL, DBPedia, YAGO and several others. With the goal of building very large sources of knowledge, as recently for the case of Knowledge Graphs, even more complex integration processes have been set up, involving multiple sources of information, human expert intervention, crowdsourcing. Despite signi cant e orts for making Knowledge Graphs as comprehensive and reliable as possible, they tend to su er of incompleteness and noise, due to the complex building process. Nevertheless, even for highly human curated knowledge bases, cases of incompleteness can be found, for instance with disjointness axioms missing quite often. Machine learning methods have been proposed with the purpose of re ning, enriching, completing and possibly raising potential issues in existing knowledge bases while showing the ability to cope with noise. The talk will concentrate on classes of mostly symbol-based machine learning methods, speci cally focusing on concept learning, rule learning and disjointness axioms learning problems, showing how the developed methods can be exploited for enriching existing knowledge bases. During the talk it will be highlighted as, a key element of the illustrated solutions, is represented by the integration of: background knowledge, deductive reasoning and the evidence coming from the mass of the data. The last part of the talk will be devoted to the presentation of an approach for injecting background knowledge into numeric-based embedding models to be used for predictive tasks on Knowledge Graphs.1</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The construction of Knowledge Bases (KBs) quite often results a time
consuming task since the intervention of knowledge engineering and domain experts is
needed. For this reason, alternative solutions have been developed, exploiting</p>
    </sec>
    <sec id="sec-2">
      <title>1 Copyright © 2021 for this paper by its authors. Use permitted under Creative</title>
      <p>Commons License Attribution 4.0 International (CC BY 4.0).
existing sources of information such as web pages; seminal examples are NELL2,
DBpedia3, YAGO4. Recently the construction of very large KBs, named
Knowledge Graphs (KGs), has been targeted and several examples already exist,
spanning from enterprise products, such as those built by Google and Amazon to
other open KGs such as Freebase5 and Wikidata6, to mention a few of them.</p>
      <p>
        A KG is a graph of data intended to convey knowledge of the real world,
conforming to a graph-based data model where nodes represent entities of interest
and edges represent possibly di erent relations between these entities,
furthermore the data graph can be enhanced with schema, generally by the use of
ontologies that are employed to de ne and reason about the semantics of nodes
and edges [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. KGs are very large data collections requiring even more complex
integration processes than in the past, involving multiple sources of information,
human expert intervention, crowdsourcing. Despite signi cant e orts for making
KGs as comprehensive as possible, it is well known [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] they tend to su er of
incompleteness and noise, due to the complex building process. Nevertheless, even
for highly human curated KBs as for some ontologies, cases of incompleteness
can be found, for instance with disjointness axioms missing quite often [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ] that,
as a consequence, may generate noise, that is invalid information with respect
to the domain of reference despite of having a consistent KB.
      </p>
      <p>
        Machine Learning (ML) methods, mostly grounded on inductive approaches,
have been proposed for re ning, enriching, completing and possibly raising
issues in existing KBs while showing the ability to cope with noise [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Problems
such as link prediction but also query answering and instance retrieval have been
regarded as classi cation problems. Suitable methods, often inspired by
symbolbased solutions in the Inductive Logic Programming (ILP) [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] eld (aiming at
inducing an hypothesised logic program from a background knowledge and a
collection of examples), have been proposed [
        <xref ref-type="bibr" rid="ref19 ref27 ref31 ref39 ref9">9, 27, 31, 19, 39</xref>
        ]. Most of them are
able to cope with expressive representation languages such as Description Logics
(DLs) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], theoretical foundation for OWL7, standard representation language
in the Semantic Web [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and the Open World Assumption (OWA) typically
adopted, di erently from the Closed Wold Assumption (CWA) that is usually
assumed in the traditional ML settings. Also, problems such as ontology re
nement and enrichment at terminology/schema level, e.g. providing complex
descriptions for a given concept name or assessing disjointness axioms, have been
regarded as concept learning problems to be solved via supervised/unsupervised
inductive learning methods for DL representations [
        <xref ref-type="bibr" rid="ref17 ref18 ref30 ref36 ref42">17, 18, 30, 42, 36</xref>
        ].
      </p>
      <p>
        Nowadays, numeric-based ML methods such as embeddings [
        <xref ref-type="bibr" rid="ref26 ref6">6, 26</xref>
        ] and deep
learning [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] solutions are receiving major attention because of their impressive
ability to scale when applied to very large data collections. Mostly KG re
ne
      </p>
    </sec>
    <sec id="sec-3">
      <title>2 http://rtw.ml.cmu.edu/rtw/</title>
    </sec>
    <sec id="sec-4">
      <title>3 https://www.dbpedia.org/</title>
    </sec>
    <sec id="sec-5">
      <title>4 https://yago-knowledge.org/</title>
    </sec>
    <sec id="sec-6">
      <title>5 https://developers.google.com/freebase</title>
    </sec>
    <sec id="sec-7">
      <title>6 https://www.wikidata.org/</title>
    </sec>
    <sec id="sec-8">
      <title>7 https://www.w3.org/OWL/</title>
      <p>ment tasks, and speci cally link/type predictions and triple classi cations are
targeted, with the goal of improving/limiting incompleteness in KGs.
Nevertheless, the important gain, in terms of scalability, that numeric-based methods are
obtaining is penalizing: a) the possibility to have interpretable models as a
result of a learning process; b) the ability to exploit deductive (and complementary
forms of) reasoning; c) the expressiveness of the representations to be considered
and the compliance with the OWA.</p>
      <p>For these reasons, the talk will focus primarily on the advances in the class of
symbol-based ML methods, speci cally analyzing concept learning, rule
learning and disjointness axioms learning problems and related solutions to be used
for enriching existing KBs. The key point is represented by the integration of:
background knowledge, deductive reasoning and the evidence coming from the
mass of data. The main idea consists in exploiting the evidence coming from
assertional knowledge and deductive reasoning for drawing plausible conclusions
to be possibly represented with intensional models. The last part of the talk
will be dedicated to the presentation of an approach for injecting background
knowledge into numeric-based ML methods and speci cally embedding models
to be used for predictive tasks on KGs.</p>
      <p>Accordingly, in the following, concept learning (see Sect. 2), rule learning
(see Sect. 3) and disjointness axioms learning (see Sect. 4) are brie y surveyed
while semantically enriched numeric based solutions are illustrated in Sect. 5.
Discussions on future research directions and conclusions are reported in Sect. 6.
2</p>
      <sec id="sec-8-1">
        <title>Concept Learning for Ontology Enrichment</title>
        <p>With the purpose of enriching ontologies at terminological level, methods for
learning concept descriptions for a concept name have been proposed. The
problem has been regarded as a supervised concept learning problem aiming at
approximating an intensional DLs de nition, given a set of individuals of an
ontological KB acting as positive/negative training examples.</p>
        <p>
          Various solutions, e.g. DL-Foil [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and celoe [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] (part of the
DLLearner suite8), have been formalized. They are mostly grounded on a
separateand-conquer (sequential covering) strategy: a new concept description is built
by specializing, via suitable re nement operators, a partial solution to correctly
cover (i.e. decide a consistent classi cation for) as many training instances as
possible. Whilst DL-Foil works under OWA, celoe works under CWA. Both of
them may su er of ending up in sub-optimal solutions. In order to overcome such
issue, DL-Focl [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ], Parcel [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] and SpACEL [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ] have been proposed.
DLFocl is an optimized version of DL-Foil, implementing a base greedy covering
strategy. Parcel combines top-down and bottom-up re nements in the search
space. Speci cally, the learning problem is split into various sub-problems,
according to a divide-and-conquer strategy, that are solved by running celoe as
a subroutine. Once the partial solutions are obtained, they are combined in
        </p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>8 https://dl-learner.org/.</title>
      <p>a bottom-up fashion. SpACEL extends Parcel by performing a symmetrical
specialization of a concept description.</p>
      <p>These solutions proved to be able to learn approximated concept descriptions
for a target concept name to be used for possibly introducing new (inclusion or
equality) axioms in the KB, nevertheless, quite often, relatively small ontological
KBs have been considered for the experiments, revealing that currently these
solutions have limited ability to scale on very large KBs such as KGs.
3</p>
      <sec id="sec-9-1">
        <title>Rule Learning for Knowledge Completion</title>
        <p>Knowledge completion consists in nding new information at assertional level,
that is facts, that are missing in a considered KB. This task has received
increasing attention with the development of KGs that are well known to be incomplete,
since it is also strongly related to the link prediction task (see Sect. 5).</p>
        <p>
          One of the most well known system for knowledge completion of RDF9
knowledge bases is AMIE [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Inspired by association rule mining [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and ILP
literature, AMIE aims at mining logic rules from RDF knowledge bases with the nal
goal of predicting new facts, that are RDF triples. AMIE (and its optimized
version AMIE+ [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]) currently represents the most scalable rule mining system for
learning rules on large RDF data collections and it is also explicitly tailored to
support the OWA. However, it does not exploit any form of deductive reasoning.
        </p>
        <p>
          A related rule mining system, similarly based on a level-wise generate and
test strategy has been proposed [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. It aims at learning SWRL rules [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] from
OWL ontologies while exploiting schema level information and deductive
reasoning during learning process. Both AMIE and the solution presented in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]
showed the ability to mine useful rules and to predict new assertional knowledge.
However, the solution proposed in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] showed limited ability to scale due to the
exploitation of the reasoning capabilities. Nevertheless, with [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] additional rules
could be obtained to be exploited for generalizing towards other kind of axioms
(besides facts) such as general inclusion axioms, to be only validated by a domain
expert or knowledge engineering.
4
        </p>
      </sec>
      <sec id="sec-9-2">
        <title>Learning Disjointness Axioms</title>
        <p>
          Disjointness axioms are essential for making explicit the negative knowledge
about a domain, yet they are often overlooked when modelling ontologies [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ]
(thus also a ecting the e cacy of reasoning services). To tackle this problem,
automated methods for discovering these axioms from the data distribution have
been devised.
        </p>
        <p>
          A solution grounded on association rule mining [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] has been proposed in [
          <xref ref-type="bibr" rid="ref42">42</xref>
          ].
It is based on studying the correlation between classes comparatively, namely
association rules, negative association rules and correlation coe cient.
Background knowledge and reasoning capabilities are used to a limited extent.
Different approaches have been instead proposed in [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] and [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] where relational
        </p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>9 https://www.w3.org/RDF/</title>
      <p>learning methods and techniques based on formal concept analysis have been
respectively employed to the purpose. However, no speci c assessment of the
quality of the induced axioms is made.</p>
      <p>
        A di erent solution has been proposed in [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] where, moving from the
assumption that two or more concepts may be mutually disjoint when the sets
of their (known) instances do not overlap, the problem has been regarded as
a clustering problem, aiming at nding partitions of similar individuals of the
KB, according to a cohesion criterion quantifying the degree of homogeneity of
the individuals in an element of the partition. Speci cally, the problem has been
cast as a conceptual clustering problem, where the goal is both to nd the best
possible partitioning of the individuals and also to induce intensional de nitions
of the corresponding classes expressed in the standard representation languages.
Emerging disjointness axioms are captured by the employment of
terminological cluster trees (TCTs) and by minimizing the risk of mutual overlap between
concepts. Once the TCT is grown, groups of (disjoint) clusters located at sibling
nodes identify concepts involved in candidate disjointness axioms to be derived.
Unlike [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ], based on the statistical correlation between instances, the empirical
evaluation of [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] showed its ability to discover disjointness axioms also
involving complex concept descriptions, thanks to the exploitation of the underlying
ontology as background knowledge.
5
      </p>
      <sec id="sec-10-1">
        <title>Enriched Embedding Models for Knowledge Graph</title>
      </sec>
      <sec id="sec-10-2">
        <title>Completion</title>
        <p>Symbol-based ML methods adopt symbols for representing entities and
relationships of a domain and infer generalizations, ideally readily interpretable even by
the humans, that provide new insights into the data. Di erently, numeric-based
methods typically adopt feature vector (propositional) representations and
cannot provide interpretable models but they usually result rather scalable. For this
reason numeric-based solutions have been mainly used for performing link
prediction in KGs (also referred to as knowledge graph completion), which amounts
to predict the existence (or the probability of correctness) of triples in the large
KGs, that are known to be often missing facts. Mostly RDF representation
language has been targeted and almost no reasoning is exploited; most expressive
languages (such as OWL) are basically discarded.</p>
        <p>
          Among the others, KG embedding methods have received the greatest
attention. They aim at converting the data graph into an optimal low-dimensional
space in which graph structural information and graph properties are preserved
as much as possible [
          <xref ref-type="bibr" rid="ref26 ref6">6, 26</xref>
          ]. The low-dimensional spaces enable computationally
e cient solutions that scale better with the KG dimensions. Graph embedding
methods may di er in their main building blocks: the representation space (e.g.
point-wise, complex, discrete, Gaussian, manifold), the encoding model (e.g.
linear, factorization, neural models) and the scoring function (that can be based
on distance, energy, semantic matching or other criteria) [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. In any case, the
objective consists in learning embeddings such that the score of a valid (positive)
triple is lower than the score of an invalid (negative) triple.
        </p>
        <p>
          TransE [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] has been the very rst embedding model registering very high
scalability performances. The method relies on a stochastic optimization process,
that iteratively updates the distributed representations by increasing the score
of the positive triples i.e. the observed triples, while lowering the score of
unobserved triples standing as negative examples. The embedding of all entities
and predicates in the KG is learned by minimizing a margin-based ranking loss.
Nevertheless, TransE resulted limited in representing properly various types
of properties such as re exive ones, and 1-to-N , N -to-1 and N -to-N relations.
To tackle this limitation, moving from TransE, a large family of models has
been originated; among the others, TransR [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ], has been proposed resulting
as more suitable to handle non 1-to-1 relations.
        </p>
        <p>
          An important point that needs to be highlighted is that, because RDF
representation is mostly tackled, most of the considered data collections only contain
positive (training) examples, since usually false facts are not encoded. However,
as negative examples are needed when learning vector embeddings, for
obtaining negative examples two di erent approaches are generally adopted: either
corrupting true/observed triples with the goal of generating plausible negative
examples or making a local-closed world assumption (LCWA) in which the data
collection is assumed as locally complete [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ]. In both cases, wrong negative
information may be generated and thus used when training and learning the
embedding models. Even more so, existing embedding models do not make use
of the additional semantic information that may be coded when more expressive
representation languages are adopted.
        </p>
        <p>
          Recently, empowered embedding models, targeting KG re nement tasks, have
been proposed. In [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] a KG embedding method considering also logical rules
has been formalized, where triples in the KG and rules are represented in a
uni ed framework. A common loss over both representations is de ned which is
minimized to learn the embeddings. This proposal resulted in a novel solution
but the speci c form of prior knowledge that needs to be available for the KG
constitutes its main drawback. A similar drawback also applies to [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], where a
solution based on adversarial training is formalized, exploiting Datalog clauses
to encode assumptions which are used to regularize neural link predictors. An
inconsistency loss is derived that measures the degree of violation of such
assumptions on a set of adversarial examples.
        </p>
        <p>
          Complementary solutions have been developed. Besides graph structural
information, they exploit the additional knowledge that is typically available when
rich representation languages as RDFS and OWL are employed. Di erently from
the works previously mentioned, these solutions do not require any speci c
additional formalisms for representing prior knowledge. Particularly, in [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] it has
been proved the e ectiveness of combining embedding methods and strategies
relying on reasoning services for the injection of background knowledge to
enhance the performance of a speci c predictive model. Following this line,
TransOWL, aiming at injecting background knowledge during the learning process,
and its upgraded version TransROWL, where a newly de ned and more
suitable loss function and scoring function are also exploited, have been proposed [
          <xref ref-type="bibr" rid="ref10 ref11">11,
10</xref>
          ]. These solutions can take advantage of an informed corruption process that
leverages on reasoning capabilities, while limiting the amount of false negatives
that a less informed random corruption process may cause. Speci cally,
TransOWL formalizes a model characterized by two main components devoted to
inject background knowledge in the embedding-based model during the training
phase: 1) Reasoning: It is used for generating corrupted triples that can certainly
represent negative instances, thus avoiding false negatives, for a more e ective
model training. Precisely, using a reasoner, corrupted triples are generated
exploiting available RDF/OWL axioms, particularly domain, range, disjointWith,
functionalProperty; 2) Background Knowledge Injection: A set of di erent
axioms, that are equivalentClass, equivalentProperty, inverseOf and subClassOf, are
employed for de ning constraints on the score function to be used in the training
phase, so that the resulting vectors, related to such axioms, re ect their speci c
properties. As a consequence, new triples are also added to the training set on
the grounds of these axioms.
        </p>
        <p>These models have been proved improving their e ectiveness on link
prediction and triple classi cation tasks when compared to models such as TransE
and TransR, grounded on the use of a random corruption process and structural
graph properties only. Nevertheless, some shortcomings also emerged, precisely
when some of the considered schema axioms were missing, suggesting that
additional e orts need to be pursued in this direction.
6</p>
      </sec>
      <sec id="sec-10-3">
        <title>Discussion and Conclusions</title>
        <p>Existing symbol-based ML methods are not actually comparable, in terms of
scalability, to numeric-based ML solutions. Nevertheless, as already discussed
in Sect. 1 and Sect. 5, this gain is not for free since it is obtained mostly by
giving up expressive representation languages, such as OWL, and by almost
forgetting one of the most powerful characteristic of these languages, that is
being empowered with deductive reasoning capabilities that allow to derive new
knowledge. Furthermore, di erently from symbol-based methods, numeric-based
solutions lack of the ability to provide interpretable models, thus limiting the
possibility to interpret and understand the motivations for the returned results.
Additionally, tasks such as concept and/or disjointness axioms learning cannot
be performed without symbol-based methods which can certainly bene t of very
large amount of information for providing potentially more accurate results.</p>
        <p>
          Even if some initial results have been registered for semantically enriched
embedding solutions (Sect. 5), signi cant research e orts need to be devoted
towards developing ML solutions that, while keeping scalability, are able to target
expressive representations as well as to provide interpretable models. This
actually means pushing towards the integration of numeric and symbolic approaches.
Some discussions in this direction have been developed by the Neural-Symbolic
Learning and Reasoning community [
          <xref ref-type="bibr" rid="ref21 ref23">21, 23</xref>
          ], which seeks to integrate principles
from neural networks learning and logical reasoning. The main conclusion has
been that neural-symbolic integration appears particularly suitable for
applications characterized by the joint availability of large amounts of (heterogeneous)
data and knowledge descriptions, which is actually the case for KGs.
Additionally, a set of key challenges and opportunities have been outlined [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], such
as: how to represent expressive logics within neural networks, how neural
networks should reason with variables, or how to extract symbolic representation
from trained neural networks. Preliminary results have been recently registered,
encouraging pursuing the research direction. An example is represented by
SimplE [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], a scalable tensor-based factorization model that is able to learn
interpretable embeddings incorporating logical rules through weight tying. Ideas for
extracting propositional rules from trained neural networks under a background
knowledge have been illustrated in [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ], showing that the exploitation of a
background knowledge allows: a) to reduce the cardinality of extracted rule sets; b)
to reproduce the input-output function of the trained neural network.
        </p>
        <p>
          A conceptual sketch for explaining the classi cation behavior of arti cial
neural networks in a non-propositional setting with the use of a background
knowledge has been proposed [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ]. This sheds the light on another important
issue, that is, the necessity of providing explanations to ML results [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ],
particularly when they come from very large KBs. The solution illustrated in [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ] is
in agreement with the idea of exploiting symbol-based interpretable models to
explain conclusions [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Nevertheless, interpretable models describe how
solutions are obtained but not why they are obtained, whilst, as argued in [
          <xref ref-type="bibr" rid="ref16 ref21">16, 21</xref>
          ],
providing an explanation should mean supplying a line of reasoning illustrating
the decision making process of a model using human understandable features [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
Hence, in a more broad sense, providing an explanation requires to open the box
of the reasoning process and make it understandable.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imielinski</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swami</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining association rules between sets of items in large databases</article-title>
          . In: Buneman,
          <string-name>
            <surname>P.</surname>
          </string-name>
          , et al.
          <source>(eds.) Proc. of the 1993 ACM SIGMOD Int. Conf. on Management of Data</source>
          , pp.
          <volume>207</volume>
          {
          <fpage>216</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>1993</year>
          ). https://doi.org/10.1145/170035.170072
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F</given-names>
          </string-name>
          . (eds.):
          <article-title>Description Logic Handbook, 2nd edition</article-title>
          . Cambridge University Press (
          <year>2010</year>
          ). https://doi.org/10.1017/CBO9780511711787
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sertkaya</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Completing description logic knowledge bases using formal concept analysis</article-title>
          . In: Veloso, M. (ed.)
          <source>IJCAI</source>
          <year>2007</year>
          ,
          <source>Proceedings of the 20th International Joint Conference on Arti cial Intelligence</source>
          . pp.
          <volume>230</volume>
          {
          <fpage>235</fpage>
          . AAAI Press (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lassila</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>The semantic web</article-title>
          .
          <source>Scienti c American</source>
          <volume>284</volume>
          (
          <issue>5</issue>
          ),
          <volume>34</volume>
          {
          <fpage>43</fpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bordes</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Usunier</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garcia-Duran</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weston</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakhnenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Translating embeddings for modeling multi-relational data</article-title>
          . In: Burges,
          <string-name>
            <surname>C.J.C.</surname>
          </string-name>
          , et al. (eds.)
          <source>Proceedings of NIPS</source>
          <year>2013</year>
          , pp.
          <volume>2787</volume>
          {
          <fpage>2795</fpage>
          . Curran Associates, Inc. (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Cai</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>V.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A comprehensive survey of graph embedding: Problems, techniques, and applications</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>30</volume>
          (
          <issue>09</issue>
          ),
          <volume>1616</volume>
          {
          <fpage>1637</fpage>
          (
          <year>2018</year>
          ). https://doi.org/10.1109/TKDE.
          <year>2018</year>
          .2807452
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lecue</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
          </string-name>
          , H.:
          <article-title>Knowledge-based transfer learning explanation</article-title>
          . In: Thielscher,
          <string-name>
            <surname>M.</surname>
          </string-name>
          , et al. (eds.)
          <source>Principles of Knowledge Representation and Reasoning: Proc. of the 16th International Conference</source>
          ,
          <string-name>
            <surname>KR</surname>
          </string-name>
          <year>2018</year>
          . pp.
          <volume>349</volume>
          {
          <fpage>358</fpage>
          . AAAI Press (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Logic and learning: Can we provide explanations in the current knowledge lake</article-title>
          ? In: Bonatti,
          <string-name>
            <surname>P.</surname>
          </string-name>
          , et al. (eds.)
          <article-title>Knowledge Graphs: New Directions for Knowledge Representation on the Semantic Web (Dagstuhl Seminar 18371), Dagstuhl Reports</article-title>
          , vol.
          <volume>8</volume>
          , pp.
          <volume>37</volume>
          {
          <fpage>38</fpage>
          . Schloss Dagstuhl{
          <article-title>Leibniz-Zentrum fuer Informatik (</article-title>
          <year>2019</year>
          ). https://doi.org/10.4230/DagRep.8.9.
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Query answering and ontology population: An inductive approach</article-title>
          . In: Bechhofer,
          <string-name>
            <surname>S.</surname>
          </string-name>
          , et al. (eds.)
          <source>The Semantic Web: Research and Applications, 5th European Semantic Web Conference, ESWC</source>
          <year>2008</year>
          ,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>5021</volume>
          , pp.
          <volume>288</volume>
          {
          <fpage>302</fpage>
          . Springer (
          <year>2008</year>
          ). https://doi.org/10.1007/978- 3-
          <fpage>540</fpage>
          -68234-9 23
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quatraro</surname>
            ,
            <given-names>N.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.:
          <article-title>Embedding models for knowledge graphs induced by clusters of relations and background knowledge</article-title>
          .
          <source>In: 1st International Joint Conf. on Learning &amp; Reasoning, IJCLR</source>
          <year>2021</year>
          ,
          <string-name>
            <surname>Proceedings</surname>
          </string-name>
          (
          <year>2021</year>
          ), to appear
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quatraro</surname>
            ,
            <given-names>N.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.:
          <article-title>Injecting background knowledge into embedding models for predictive tasks on knowledge graphs</article-title>
          . In: Verborgh,
          <string-name>
            <surname>R.</surname>
          </string-name>
          , et al. (eds.) The Semantic Web International Conference, ESWC 2021,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>12731</volume>
          , pp.
          <volume>441</volume>
          {
          <fpage>457</fpage>
          . Springer (
          <year>2021</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -77385-4 26
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tettamanzi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          :
          <article-title>Evolutionary discovery of multirelational association rules from ontological knowledge bases</article-title>
          . In: Blomqvist,
          <string-name>
            <surname>E.</surname>
          </string-name>
          , et al. (eds.)
          <article-title>Knowledge Engineering and Knowledge Management International Conference</article-title>
          , EKAW 2016,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>10024</volume>
          , pp.
          <volume>113</volume>
          {
          <issue>128</issue>
          (
          <year>2016</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -49004-5 8
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>: Machine learning for the semantic web: Lessons learnt and next research directions</article-title>
          .
          <source>Semantic Web</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ),
          <volume>195</volume>
          {
          <fpage>203</fpage>
          (
          <year>2020</year>
          ). https://doi.org/10.3233/SW-200388
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>De Raedt</surname>
          </string-name>
          , L. (ed.):
          <article-title>Logical and Relational Learning: From ILP to MRDM (Cognitive Technologies)</article-title>
          . Springer-Verlag (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Deng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>D</given-names>
          </string-name>
          . (eds.):
          <article-title>Deep Learning: Methods and Applications</article-title>
          . NOW Publishers (
          <year>2014</year>
          ). https://doi.org/10.1561/2000000039
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Doran</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schulz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Besold</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>What does explainable AI really mean? A new conceptualization of perspectives</article-title>
          . In: Besold,
          <string-name>
            <given-names>T.R.</given-names>
            ,
            <surname>Kutz</surname>
          </string-name>
          ,
          <string-name>
            <surname>O</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 1st International Workshop on Comprehensibility and Explanation in AI</source>
          and
          <article-title>ML 2017 co-located with 16th Int. Conf. of the Italian Association for Arti cial Intelligence (AI*IA 2017), CEUR Work</article-title>
          .
          <source>Proc.</source>
          , vol.
          <year>2071</year>
          .
          <article-title>CEUR-WS.org (</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>DL-FOIL concept learning in description logics</article-title>
          . In: Zelezny,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Lavrac</surname>
          </string-name>
          , N. (eds.)
          <article-title>Inductive Logic Programming</article-title>
          , 18th International Conference, ILP 2008,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>5194</volume>
          , pp.
          <volume>107</volume>
          {
          <fpage>121</fpage>
          . Springer (
          <year>2008</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -85928-4 12
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Metric-based stochastic conceptual clustering for ontologies</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>34</volume>
          (
          <issue>8</issue>
          ),
          <volume>792</volume>
          {
          <fpage>806</fpage>
          (
          <year>2009</year>
          ). https://doi.org/10.1016/j.is.
          <year>2009</year>
          .
          <volume>03</volume>
          .008
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Galarraga</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Te ioudi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hose</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suchanek</surname>
            ,
            <given-names>F.M.:</given-names>
          </string-name>
          <article-title>AMIE: association rule mining under incomplete evidence in ontological knowledge bases</article-title>
          . In: Schwabe,
          <string-name>
            <surname>D.</surname>
          </string-name>
          , et al. (eds.) 22nd
          <source>International World Wide Web Conference, WWW '13</source>
          . pp.
          <volume>413</volume>
          {
          <fpage>422</fpage>
          . International World Wide Web Conferences Steering Committee / ACM (
          <year>2013</year>
          ). https://doi.org/10.1145/2488388.2488425
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Galarraga</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Te ioudi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hose</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suchanek</surname>
            ,
            <given-names>F.M.</given-names>
          </string-name>
          :
          <article-title>Fast rule mining in ontological knowledge bases with AMIE+</article-title>
          .
          <source>VLDB Journal</source>
          <volume>24</volume>
          (
          <issue>6</issue>
          ),
          <volume>707</volume>
          {
          <fpage>730</fpage>
          (
          <year>2015</year>
          ). https://doi.org/10.1007/s00778-015-0394-1
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>d'Avila Garcez</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Besold</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Raedt</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , Foldiak,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Hitzler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Icard</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          , Kuhnberger,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Lamb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Miikkulainen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Silver</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>Neural-symbolic learning and reasoning: Contributions and challenges</article-title>
          . In: 2015
          <string-name>
            <given-names>AAAI</given-names>
            <surname>Spring</surname>
          </string-name>
          <article-title>Symposia</article-title>
          . AAAI Press (
          <year>2015</year>
          ), http://www.aaai.org/ocs/index.php/SSS/SSS15/ paper/view/10281
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Jointly embedding knowledge graphs and logical rules</article-title>
          .
          <source>In: Proceedings of EMNLP 2016</source>
          . pp.
          <volume>192</volume>
          {
          <fpage>202</fpage>
          .
          <string-name>
            <surname>ACL</surname>
          </string-name>
          (
          <year>2016</year>
          ). https://doi.org/10.18653/v1/
          <fpage>D16</fpage>
          -1019
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bianchi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ebrahimi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          :
          <article-title>Neural-symbolic integration and the semantic web</article-title>
          .
          <source>Semantic Web Journal</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ),
          <volume>3</volume>
          {
          <fpage>11</fpage>
          (
          <year>2020</year>
          ). https://doi.org/10.3233/SW-190368
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Hogan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blomqvist</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cochez</surname>
          </string-name>
          , M.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Melo</surname>
          </string-name>
          , G.,
          <string-name>
            <surname>Gutierrez</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gayo</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neumaier</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polleres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Navigli</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ngomo</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashid</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmelzeisen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sequeda</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zimmermann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Knowledge graphs</article-title>
          .
          <source>ACM Computing Surveys</source>
          <volume>54</volume>
          ,
          <issue>1</issue>
          {
          <fpage>37</fpage>
          (
          <year>2021</year>
          ). https://doi.org/https://doi.org/10.1145/3447772
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            .,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>SWRL: A semantic web rule language combining owl and ruleml (</article-title>
          <year>2004</year>
          ), http: //www.aaai.org/ocs/index.php/SSS/SSS15/paper/view/10281
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cambria</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marttinen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>P.S.:</given-names>
          </string-name>
          <article-title>A survey on knowledge graphs: Representation, acquisition</article-title>
          and applications arXiv:
          <year>2002</year>
          .
          <volume>00388</volume>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Jozefowska</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lawrynowicz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukaszewski</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The role of semantics in mining frequent patterns from knowledge bases in description logics with rules</article-title>
          .
          <source>TPLP</source>
          <volume>10</volume>
          (
          <issue>3</issue>
          ),
          <volume>251</volume>
          {
          <fpage>289</fpage>
          (
          <year>2010</year>
          ). https://doi.org/10.1017/S1471068410000098
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Kazemi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poole</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Simple embedding for link prediction in knowledge graphs</article-title>
          . In: Bengio,
          <string-name>
            <surname>S.</surname>
          </string-name>
          , et al. (eds.)
          <source>Advances in Neural Information Processing Systems 31: Annual Conf. on Neural Information Processing Systems</source>
          <year>2018</year>
          , NeurIPS
          <year>2018</year>
          , pp.
          <volume>4289</volume>
          {
          <fpage>4300</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Labaf</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Evans</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Propositional rule extraction from neural networks under background knowledge</article-title>
          . In: Besold,
          <string-name>
            <surname>T.R.</surname>
          </string-name>
          , et al. (eds.)
          <source>Proceedings of the Twelfth International Workshop on Neural-Symbolic Learning and Reasoning</source>
          , NeSy
          <year>2017</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <year>2003</year>
          .
          <article-title>CEUR-WS.org (</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Auer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Buhmann, L.,
          <string-name>
            <surname>Tramp</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Class expression learning for ontology engineering</article-title>
          .
          <source>J. Web Semant</source>
          .
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <volume>71</volume>
          {
          <fpage>81</fpage>
          (
          <year>2011</year>
          ). https://doi.org/10.1016/j.websem.
          <year>2011</year>
          .
          <volume>01</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Buhmann, L.:
          <article-title>ORE - a tool for repairing and enriching knowledge bases</article-title>
          . In:
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          , et al. (eds.)
          <source>The Semantic Web - ISWC 2010 - 9th International Semantic Web Conference, ISWC</source>
          <year>2010</year>
          ,
          <article-title>Revised Selected Papers, Part II</article-title>
          . LNCS, vol.
          <volume>6497</volume>
          , pp.
          <volume>177</volume>
          {
          <fpage>193</fpage>
          . Springer (
          <year>2010</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -17749-1 12
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Learning entity and relation embeddings for knowledge graph completion</article-title>
          .
          <source>In: AAAI 2015 Proceedings</source>
          . p.
          <volume>2181</volume>
          {
          <fpage>2187</fpage>
          . AAAI Press (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Minervini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Costabello</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , Mun~oz, E.,
          <string-name>
            <surname>Novacek</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vandenbussche</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Regularizing knowledge graph embeddings via equivalence and inversion axioms</article-title>
          . In: Ceci,
          <string-name>
            <surname>M.</surname>
          </string-name>
          , et al. (eds.)
          <source>Proceedings of ECML PKDD</source>
          <year>2017</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>I. LNAI</given-names>
          </string-name>
          , vol.
          <volume>10534</volume>
          , pp.
          <volume>668</volume>
          {
          <fpage>683</fpage>
          . Springer (
          <year>2017</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -71249-9 40
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Minervini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demeester</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , Rocktaschel, T.,
          <string-name>
            <surname>Riedel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Adversarial sets for regularising neural link predictors</article-title>
          . In: Elidan,
          <string-name>
            <surname>G.</surname>
          </string-name>
          , et al. (eds.)
          <article-title>UAI 2017 Proceedings</article-title>
          . AUAI Press (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Nickel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murphy</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tresp</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gabrilovich</surname>
          </string-name>
          , E.:
          <article-title>A review of relational machine learning for knowledge graphs</article-title>
          .
          <source>Proceedings of the IEEE</source>
          <volume>104</volume>
          (
          <issue>1</issue>
          ),
          <volume>11</volume>
          {
          <fpage>33</fpage>
          (
          <year>2016</year>
          ). https://doi.org/10.1109/JPROC.
          <year>2015</year>
          .2483592
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Rizzo</surname>
          </string-name>
          , G.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Terminological cluster trees for disjointness axiom discovery</article-title>
          . In: Blomqvist,
          <string-name>
            <surname>E.</surname>
          </string-name>
          , et al. (eds.)
          <source>The Semantic Web - 14th International Conference, ESWC</source>
          <year>2017</year>
          , Proceedings,
          <string-name>
            <surname>Part I. LNCS</surname>
          </string-name>
          , vol.
          <volume>10249</volume>
          , pp.
          <volume>184</volume>
          {
          <fpage>201</fpage>
          . Springer (
          <year>2017</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -58068-5 12
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Rizzo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanizzi</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A framework for tackling myopia in concept learning on the web of data</article-title>
          . In:
          <string-name>
            <surname>Faron-Zucker</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , et al. (eds.)
          <article-title>Knowledge Engineering and Knowledge Management International Conference</article-title>
          , EKAW 2018,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>11313</volume>
          , pp.
          <volume>338</volume>
          {
          <fpage>354</fpage>
          . Springer (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -03667-6 22
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Sarker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xie</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doran</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raymer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Explaining trained neural networks with semantic web technologies: First steps</article-title>
          . In: Besold,
          <string-name>
            <surname>T.R.</surname>
          </string-name>
          , et al. (eds.)
          <source>Proceedings of the 12th Int. Workshop on Neural-Symbolic Learning and Reasoning</source>
          , NeSy
          <year>2017</year>
          . CEUR Workshop Proc., vol.
          <year>2003</year>
          .
          <article-title>CEUR-WS.org (</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Tiddi</surname>
            , I., d'Aquin,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motta</surname>
          </string-name>
          , E.:
          <article-title>Dedalo: Looking for clusters explanations in a labyrinth of linked data</article-title>
          . In: Presutti,
          <string-name>
            <surname>V.</surname>
          </string-name>
          , et al. (eds.)
          <source>The Semantic Web: Trends and Challenges - 11th Int. Conference, ESWC</source>
          <year>2014</year>
          ,
          <article-title>Proceedings</article-title>
          . LNCS, vol.
          <volume>8465</volume>
          , pp.
          <volume>333</volume>
          {
          <fpage>348</fpage>
          . Springer (
          <year>2014</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -07443-6 23
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guesgen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marsland</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An approach to parallel class expression learning</article-title>
          . In: Bikakis,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Giurca</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Rules on the Web: Research and Applications - 6th Int. Symposium, RuleML</source>
          <year>2012</year>
          ,
          <article-title>Proc</article-title>
          .,
          <source>LNCS</source>
          , vol.
          <volume>7438</volume>
          , pp.
          <volume>302</volume>
          {
          <fpage>316</fpage>
          . Springer (
          <year>2012</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -32689-9 25
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Tran</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dietrich</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guesgen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marsland</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Parallel symmetric class expression learning</article-title>
          .
          <source>J. of Machine Learning Research</source>
          <volume>18</volume>
          (
          <issue>64</issue>
          ),
          <volume>1</volume>
          {
          <fpage>34</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42. Volker, J.,
          <string-name>
            <surname>Fleischhacker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stuckenschmidt</surname>
          </string-name>
          , H.:
          <article-title>Automatic acquisition of class disjointness</article-title>
          .
          <source>Journal of Web Semantics</source>
          <volume>35</volume>
          (
          <issue>P2</issue>
          ),
          <volume>124</volume>
          {
          <fpage>139</fpage>
          (
          <year>2015</year>
          ). https://doi.org/10.1016/j.websem.
          <year>2015</year>
          .
          <volume>07</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>T.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A survey of the web ontology landscape</article-title>
          . In: Cruz,
          <string-name>
            <surname>I.</surname>
          </string-name>
          , et al. (eds.)
          <source>The Semantic Web - ISWC</source>
          <year>2006</year>
          ,
          <article-title>5th Int</article-title>
          .
          <source>Semantic Web Conference Proceedings. LNCS</source>
          , vol.
          <volume>4273</volume>
          . Springer (
          <year>2006</year>
          ),
          <source>doi: 10.1007/11926078 49</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>