{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:19:41Z","timestamp":1742937581356,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031402821"},{"type":"electronic","value":"9783031402838"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40283-8_35","type":"book-chapter","created":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T23:02:48Z","timestamp":1691535768000},"page":"414-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Few-Shot Graph Anomaly Detection via\u00a0Graph Coarsening"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7576-0176","authenticated-orcid":false,"given":"Liting","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4569-8193","authenticated-orcid":false,"given":"Yueheng","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7217-6580","authenticated-orcid":false,"given":"Tianpeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Minglai","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,9]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Chen, M., Zhang, W., Zhang, W., Chen, Q., Chen, H.: Meta relational learning for few-shot link prediction in knowledge graphs. arXiv preprint arXiv:1909.01515 (2019)","key":"35_CR1","DOI":"10.18653\/v1\/D19-1431"},{"doi-asserted-by":"crossref","unstructured":"Cheng, H., Zhou, J.T., Tay, W.P., Wen, B.: Graph neural networks with triple attention for few-shot learning. IEEE Transactions on Multimedia (2023)","key":"35_CR2","DOI":"10.1109\/TMM.2022.3233442"},{"doi-asserted-by":"crossref","unstructured":"Debnath, A.K., de Compadre, R.L.L., Debnath, G., Shusterman, A.J., Hansch, C.: Structure-activity relationship of mutagenic aromatic and heteroaromatic nitro compounds. correlation with molecular orbital energies and hydrophobicity. J. Med. Chemis. 34(2), 786\u2013797 (1991)","key":"35_CR3","DOI":"10.1021\/jm00106a046"},{"doi-asserted-by":"crossref","unstructured":"Ding, K., Zhou, Q., Tong, H., Liu, H.: Few-shot network anomaly detection via cross-network meta-learning. In: Proceedings of the Web Conference 2021, pp. 2448\u20132456 (2021)","key":"35_CR4","DOI":"10.1145\/3442381.3449922"},{"doi-asserted-by":"crossref","unstructured":"Du, H., Li, D., Wang, W.: Abnormal user detection via multiview graph clustering in the mobile e-commerce network. Wireless Communications and Mobile Computing 2022 (2022)","key":"35_CR5","DOI":"10.1155\/2022\/3766810"},{"unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. In: International Conference on Machine Learning, pp. 1126\u20131135. PMLR (2017)","key":"35_CR6"},{"unstructured":"Franceschi, L., Niepert, M., Pontil, M., He, X.: Learning discrete structures for graph neural networks. In: International Conference on Machine Learning, pp. 1972\u20131982. PMLR (2019)","key":"35_CR7"},{"doi-asserted-by":"crossref","unstructured":"Guo, Q., Zhao, X., Fang, Y., Yang, S., Lin, X., Ouyang, D.: Learning hypersphere for few-shot anomaly detection on attributed networks. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 635\u2013645 (2022)","key":"35_CR8","DOI":"10.1145\/3511808.3557377"},{"unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems 30 (2017)","key":"35_CR9"},{"doi-asserted-by":"publisher","unstructured":"Helma, C., King, R.D., Kramer, S., Srinivasan, A.: The Predictive Toxicology Challenge 2000-2001. Bioinformatics 17(1), 107\u2013108 (2001). https:\/\/doi.org\/10.1093\/bioinformatics\/17.1.107. http:\/\/bioinformatics.oxfordjournals.org\/cgi\/doi\/10.1093\/bioinformatics\/17.1.107","key":"35_CR10","DOI":"10.1093\/bioinformatics\/17.1.107"},{"doi-asserted-by":"crossref","unstructured":"Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: FRAUDAR: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 895\u2013904 (2016)","key":"35_CR11","DOI":"10.1145\/2939672.2939747"},{"issue":"6","key":"35_CR12","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.1002\/int.22389","volume":"36","author":"CY Lee","year":"2021","unstructured":"Lee, C.Y., Chen, Y.P.P.: Descriptive prediction of drug side-effects using a hybrid deep learning model. Int. J. Intell. Syst. 36(6), 2491\u20132510 (2021)","journal-title":"Int. J. Intell. Syst."},{"issue":"116","key":"35_CR13","first-page":"1","volume":"20","author":"A Loukas","year":"2019","unstructured":"Loukas, A.: Graph reduction with spectral and cut guarantees. J. Mach. Learn. Res. 20(116), 1\u201342 (2019)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"35_CR14","doi-asserted-by":"publisher","first-page":"19867","DOI":"10.1038\/s41598-022-22086-3","volume":"12","author":"X Luo","year":"2022","unstructured":"Luo, X., et al.: Deep graph level anomaly detection with contrastive learning. Sci. Rep. 12(1), 19867 (2022)","journal-title":"Sci. Rep."},{"doi-asserted-by":"crossref","unstructured":"Ma, R., Pang, G., Chen, L., van den Hengel, A.: Deep graph-level anomaly detection by glocal knowledge distillation. In: Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining, pp. 704\u2013714 (2022)","key":"35_CR15","DOI":"10.1145\/3488560.3498473"},{"doi-asserted-by":"crossref","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Transactions on Knowledge and Data Engineering (2021)","key":"35_CR16","DOI":"10.1109\/TKDE.2021.3118815"},{"unstructured":"Nichol, A., Achiam, J., Schulman, J.: On first-order meta-learning algorithms. arXiv preprint arXiv:1803.02999 (2018)","key":"35_CR17"},{"doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., van den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 353\u2013362 (2019)","key":"35_CR18","DOI":"10.1145\/3292500.3330871"},{"doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: AAAI (2015). https:\/\/networkrepository.com\/","key":"35_CR19","DOI":"10.1609\/aaai.v29i1.9277"},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Zhou, C., Wu, J., Dang, W., Zhu, X., Wang, J.: Deep structure learning for fraud detection. In: 2018 IEEE International Conference on Data Mining (ICDM), pp. 567\u2013576. IEEE (2018)","key":"35_CR20","DOI":"10.1109\/ICDM.2018.00072"},{"unstructured":"Wang, S., Chen, C., Li, J.: Graph few-shot learning with task-specific structures. arXiv preprint arXiv:2210.12130 (2022)","key":"35_CR21"},{"doi-asserted-by":"crossref","unstructured":"Wang, S., Dong, Y., Ding, K., Chen, C., Li, J.: Few-shot node classification with extremely weak supervision. arXiv preprint arXiv:2301.02708 (2023)","key":"35_CR22","DOI":"10.1145\/3539597.3570435"},{"unstructured":"Wu, F., Souza, A., Zhang, T., Fifty, C., Yu, T., Weinberger, K.: Simplifying graph convolutional networks. In: International Conference on Machine Learning, pp. 6861\u20136871. PMLR (2019)","key":"35_CR23"},{"doi-asserted-by":"crossref","unstructured":"Xiong, W., Yu, M., Chang, S., Guo, X., Wang, W.Y.: One-shot relational learning for knowledge graphs. arXiv preprint arXiv:1808.09040 (2018)","key":"35_CR24","DOI":"10.18653\/v1\/D18-1223"},{"doi-asserted-by":"crossref","unstructured":"Yao, H., et al.: Graph few-shot learning via knowledge transfer. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 6656\u20136663 (2020)","key":"35_CR25","DOI":"10.1609\/aaai.v34i04.6142"},{"doi-asserted-by":"crossref","unstructured":"Zafarani, R., Abbasi, M.A., Liu, H.: Social media mining: an introduction. Cambridge University Press (2014)","key":"35_CR26","DOI":"10.1017\/CBO9781139088510"},{"key":"35_CR27","first-page":"24144","volume":"35","author":"G Zhang","year":"2022","unstructured":"Zhang, G., et al.: Dual-discriminative graph neural network for imbalanced graph-level anomaly detection. Adv. Neural. Inf. Process. Syst. 35, 24144\u201324157 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhao, L.: Unsupervised deep subgraph anomaly detection. In: 2022 IEEE International Conference on Data Mining (ICDM), pp. 753\u2013762. IEEE (2022)","key":"35_CR28","DOI":"10.1109\/ICDM54844.2022.00086"},{"doi-asserted-by":"crossref","unstructured":"Zhou, F., Cao, C., Zhang, K., Trajcevski, G., Zhong, T., Geng, J.: Meta-GNN: on few-shot node classification in graph meta-learning. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 2357\u20132360 (2019)","key":"35_CR29","DOI":"10.1145\/3357384.3358106"},{"doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., G\u00fcnnemann, S.: Adversarial attacks on graph neural networks via meta learning (2019)","key":"35_CR30","DOI":"10.24963\/ijcai.2019\/872"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40283-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T23:13:12Z","timestamp":1691536392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40283-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031402821","9783031402838"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40283-8_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ksem2023.conferences.academy\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"395","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"114","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}