{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:43:37Z","timestamp":1742921017103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031159183"},{"type":"electronic","value":"9783031159190"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15919-0_11","type":"book-chapter","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T04:04:59Z","timestamp":1662437099000},"page":"121-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DuSAG: An Anomaly Detection Method in\u00a0Dynamic Graph Based on\u00a0Dual Self-attention"],"prefix":"10.1007","author":[{"given":"Weiqin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Xianyu","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Mark Junjie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zukang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Philip, S.Y.: Outlier detection in graph streams. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 399\u2013409. IEEE (2011)","key":"11_CR1","DOI":"10.1109\/ICDE.2011.5767885"},{"doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Yu, P.S.: On clustering graph streams. In: Proceedings of the 2010 SIAM International Conference on Data Mining, pp. 478\u2013489. SIAM (2010)","key":"11_CR2","DOI":"10.1137\/1.9781611972801.42"},{"doi-asserted-by":"crossref","unstructured":"Brochier, R., Guille, A., Velcin, J.: Link prediction with mutual attention for text-attributed networks. In: Companion Proceedings of The 2019 World Wide Web Conference, pp. 283\u2013284 (2019)","key":"11_CR3","DOI":"10.1145\/3308560.3316587"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10618-012-0289-3","volume":"27","author":"Z Chen","year":"2013","unstructured":"Chen, Z., et al.: Discovery of extreme events-related communities in contrasting groups of physical system networks. Data Min. Knowl. Disc. 27(2), 225\u2013258 (2013)","journal-title":"Data Min. Knowl. Disc."},{"doi-asserted-by":"crossref","unstructured":"Eswaran, D., Faloutsos, C., Guha, S., Mishra, N.: SpotLight: detecting anomalies in streaming graphs. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1378\u20131386 (2018)","key":"11_CR5","DOI":"10.1145\/3219819.3220040"},{"doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855\u2013864 (2016)","key":"11_CR6","DOI":"10.1145\/2939672.2939754"},{"issue":"70","key":"11_CR7","first-page":"1","volume":"21","author":"SM Kazemi","year":"2020","unstructured":"Kazemi, S.M., Goel, R., Jain, K., Kobyzev, I., Sethi, A., Forsyth, P., Poupart, P.: Representation learning for dynamic graphs: a survey. J. Mach. Learn. Res. 21(70), 1\u201373 (2020)","journal-title":"J. Mach. Learn. Res."},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-23502-4_12","volume-title":"Cloud Computing \u2013 CLOUD 2019","author":"P Lin","year":"2019","unstructured":"Lin, P., Ye, K., Xu, C.-Z.: Dynamic network anomaly detection system by using deep learning techniques. In: Da Silva, D., Wang, Q., Zhang, L.-J. (eds.) CLOUD 2019. LNCS, vol. 11513, pp. 161\u2013176. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23502-4_12"},{"unstructured":"Lippmann, R., et al.: Results of the DARPA 1998 offline intrusion detection evaluation. In: Recent Advances in Intrusion Detection, vol. 99, pp. 829\u2013835 (1999)","key":"11_CR9"},{"doi-asserted-by":"crossref","unstructured":"Manzoor, E., Milajerdi, S.M., Akoglu, L.: Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1035\u20131044 (2016)","key":"11_CR10","DOI":"10.1145\/2939672.2939783"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi, T., Ong, K.L., Kam, B.H., Boo, Y.L.: Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis. Support Syst. 133, 113303 (2020)","journal-title":"Decis. Support Syst."},{"doi-asserted-by":"crossref","unstructured":"Ranshous, S., Harenberg, S., Sharma, K., Samatova, N.F.: A scalable approach for outlier detection in edge streams using sketch-based approximations. In: Proceedings of the 2016 SIAM International Conference on Data Mining, pp. 189\u2013197. SIAM (2016)","key":"11_CR12","DOI":"10.1137\/1.9781611974348.22"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/wics.1347","volume":"7","author":"S Ranshous","year":"2015","unstructured":"Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. Wiley Interdisc. Rev. Comput. Stat. 7(3), 223\u2013247 (2015)","journal-title":"Wiley Interdisc. Rev. Comput. Stat."},{"unstructured":"Sankar, A., Wu, Y., Gou, L., Zhang, W., Yang, H.: Dynamic graph representation learning via self-attention networks. arXiv preprint arXiv:1812.09430 (2018)","key":"11_CR14"},{"unstructured":"Vaswani, A., et al.: Attention is all you need. arXiv preprint arXiv:1706.03762 (2017)","key":"11_CR15"},{"unstructured":"Yu, A.W., et al.: QANet: combining local convolution with global self-attention for reading comprehension. arXiv preprint arXiv:1804.09541 (2018)","key":"11_CR16"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2980765.2980767","volume":"18","author":"R Yu","year":"2016","unstructured":"Yu, R., Qiu, H., Wen, Z., Lin, C., Liu, Y.: A survey on social media anomaly detection. ACM SIGKDD Explor. Newsl. 18(1), 1\u201314 (2016)","journal-title":"ACM SIGKDD Explor. Newsl."},{"doi-asserted-by":"crossref","unstructured":"Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: NetWalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2672\u20132681 (2018)","key":"11_CR18","DOI":"10.1145\/3219819.3220024"},{"doi-asserted-by":"crossref","unstructured":"Zheng, L., Li, Z., Li, J., Li, Z., Gao, J.: AddGraph: anomaly detection in dynamic graph using attention-based temporal GCN. In: IJCAI, pp. 4419\u20134425 (2019)","key":"11_CR19","DOI":"10.24963\/ijcai.2019\/614"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15919-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T08:16:22Z","timestamp":1680077782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15919-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031159183","9783031159190"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15919-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bristol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"561","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"255","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}