{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:44Z","timestamp":1742914304844,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030602895"},{"type":"electronic","value":"9783030602901"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60290-1_15","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T21:02:30Z","timestamp":1602622950000},"page":"193-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LOCATE: Locally Anomalous Behavior Change Detection in Behavior Information Sequence"],"prefix":"10.1007","author":[{"given":"Dingshan","family":"Cui","sequence":"first","affiliation":[]},{"given":"Lei","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Xinao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jyrki","family":"Nummenmaa","sequence":"additional","affiliation":[]},{"given":"Ruiqi","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Yu, P.S.: Outlier detection in graph streams. In: ICDE, pp. 399\u2013409 (2011)","key":"15_CR1","DOI":"10.1109\/ICDE.2011.5767885"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2015). https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min. Knowl. Disc."},{"doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: SDM, pp. 594\u2013602 (2019)","key":"15_CR3","DOI":"10.1137\/1.9781611975673.67"},{"doi-asserted-by":"crossref","unstructured":"Dong, Y., Chawla, N.V., Swami, A.: Metapath2vec: scalable representation learning for heterogeneous networks. In: KDD, pp. 135\u2013144 (2017)","key":"15_CR4","DOI":"10.1145\/3097983.3098036"},{"key":"15_CR5","first-page":"2121","volume":"12","author":"JC Duchi","year":"2011","unstructured":"Duchi, J.C., Hazan, E., Singer, Y.: Adaptive subgradient methods for online learning and stochastic optimization. J. Mach. Learn. Res. 12, 2121\u20132159 (2011)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Eswaran, D., Faloutsos, C., Guha, S., Mishra, N.: Spotlight: detecting anomalies in streaming graphs. In: KDD, pp. 1378\u20131386 (2018)","key":"15_CR6","DOI":"10.1145\/3219819.3220040"},{"doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: Node2Vec: scalable feature learning for networks. In: KDD, pp. 855\u2013864 (2016)","key":"15_CR7","DOI":"10.1145\/2939672.2939754"},{"doi-asserted-by":"crossref","unstructured":"Guo, G., Ouyang, S., He, X., Yuan, F., Liu, X.: Dynamic item block and prediction enhancing block for sequential recommendation. In: IJCAI, pp. 1373\u20131379 (2019)","key":"15_CR8","DOI":"10.24963\/ijcai.2019\/190"},{"doi-asserted-by":"crossref","unstructured":"Gupta, M., Gao, J., Sun, Y., Han, J.: Integrating community matching and outlier detection for mining evolutionary community outliers. In: KDD, pp. 859\u2013867 (2012)","key":"15_CR9","DOI":"10.1145\/2339530.2339667"},{"doi-asserted-by":"crossref","unstructured":"Hang, M., Pytlarz, I., Neville, J.: Exploring student check-in behavior for improved point-of-interest prediction. In: KDD, pp. 321\u2013330 (2018)","key":"15_CR10","DOI":"10.1145\/3219819.3219902"},{"unstructured":"Hariri, N., Mobasher, B., Burke, R.: Adapting to user preference changes in interactive recommendation. In: IJCAI, pp. 4268\u20134274 (2015)","key":"15_CR11"},{"doi-asserted-by":"crossref","unstructured":"Ji, T., Yang, D., Gao, J.: Incremental local evolutionary outlier detection for dynamic social networks. In: KDD, pp. 1\u201315 (2013)","key":"15_CR12","DOI":"10.1007\/978-3-642-40991-2_1"},{"doi-asserted-by":"crossref","unstructured":"Manzoor, E., Milajerdi, S.M., Akoglu, L.: Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In: KDD, pp. 1035\u20131044 (2016)","key":"15_CR13","DOI":"10.1145\/2939672.2939783"},{"doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: KDD, pp. 701\u2013710 (2014)","key":"15_CR14","DOI":"10.1145\/2623330.2623732"},{"issue":"11","key":"15_CR15","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1109\/TKDE.2018.2873391","volume":"31","author":"V Ranjbar","year":"2019","unstructured":"Ranjbar, V., Salehi, M., Jandaghi, P., Jalili, M.: QANet: tensor decomposition approach for query-based anomaly detection in heterogeneous information networks. IEEE Trans. Knowl. Data Eng. 31(11), 2178\u20132189 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Ranshous, S., Harenberg, S., Sharma, K., Samatova, N.F.: A scalable approach for outlier detection in edge streams using sketch-based approximations. In: SDM, pp. 189\u2013197 (2016)","key":"15_CR16","DOI":"10.1137\/1.9781611974348.22"},{"doi-asserted-by":"crossref","unstructured":"Sricharan, K., Das, K.: Localizing anomalous changes in time-evolving graphs. In: SIGMOD, pp. 13470\u20131358 (2014)","key":"15_CR17","DOI":"10.1145\/2588555.2612184"},{"issue":"11","key":"15_CR18","doi-asserted-by":"publisher","first-page":"992","DOI":"10.14778\/3402707.3402736","volume":"4","author":"Y Sun","year":"2011","unstructured":"Sun, Y., Han, J., Yan, X., Yu, P.S., Wu, T.: PathSim: meta path-based top-k similarity search in heterogeneous information networks. Proc. VLDB Endow. 4(11), 992\u20131003 (2011)","journal-title":"Proc. VLDB Endow."},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TKDE.2018.2840974","volume":"31","author":"D Yang","year":"2019","unstructured":"Yang, D., Qu, B., Cudr\u00e9-Mauroux, P.: Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31(3), 507\u2013520 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: NetWalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: KDD, pp. 2672\u20132681 (2018)","key":"15_CR20","DOI":"10.1145\/3219819.3220024"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Your style your identity: leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network. In: WWW, pp. 3448\u20133454 (2019)","key":"15_CR21","DOI":"10.1145\/3308558.3313537"},{"doi-asserted-by":"crossref","unstructured":"Zheng, L., Li, Z., Li, J., Li, Z., Gao, J.: AddGraph: anomaly detection in dynamic graph using attention-based temporal GCN. In: IJCAI, pp. 4419\u20134425 (2019)","key":"15_CR22","DOI":"10.24963\/ijcai.2019\/614"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60290-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:12:21Z","timestamp":1619266341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-60290-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602895","9783030602901"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60290-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.tjudb.cn\/apwebwaim2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"259","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was organized as a fully online conference.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}