{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:53:54Z","timestamp":1753181634636,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031434266"},{"type":"electronic","value":"9783031434273"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43427-3_5","type":"book-chapter","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T21:01:41Z","timestamp":1694898101000},"page":"69-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Pattern Mining for Anomaly Detection in Graphs: Application to Fraud in Public Procurement"],"prefix":"10.1007","author":[{"given":"Lucas","family":"Potin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0344-2686","authenticated-orcid":false,"given":"Rosa","family":"Figueiredo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2619-2835","authenticated-orcid":false,"given":"Vincent","family":"Labatut","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1059-4095","authenticated-orcid":false,"given":"Christine","family":"Largeron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,17]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.engappai.2016.01.030","volume":"50","author":"N Acosta-Mendoza","year":"2016","unstructured":"Acosta-Mendoza, N., Gago-Alonso, A., Carrasco-Ochoa, J.A., Francisco Mart\u00ednez-Trinidad, J., Eladio Medina-Pagola, J.: Improving graph-based image classification by using emerging patterns as attributes. Eng. Appl. Artif. Intell. 50, 215\u2013225 (2016). https:\/\/doi.org\/10.1016\/j.engappai.2016.01.030","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2014","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2014). https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min. Knowl. Disc."},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-030-62365-4_37","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2020","author":"D Carneiro","year":"2020","unstructured":"Carneiro, D., Veloso, P., Ventura, A., Palumbo, G., Costa, J.: Network analysis for fraud detection in Portuguese public procurement. In: Analide, C., Novais, P., Camacho, D., Yin, H. (eds.) IDEAL 2020. LNCS, vol. 12490, pp. 390\u2013401. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62365-4_37"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-35975-0_2","volume-title":"Uncertainty Reasoning for the Semantic Web II","author":"RN Carvalho","year":"2013","unstructured":"Carvalho, R.N., Matsumoto, S., Laskey, K.B., Costa, P.C.G., Ladeira, M., Santos, L.L.: Probabilistic ontology and knowledge fusion for procurement fraud detection in Brazil. In: Bobillo, F., et al. (eds.) UniDL\/URSW 2008-2010. LNCS (LNAI), vol. 7123, pp. 19\u201340. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35975-0_2"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 1\u201327 (2011). https:\/\/doi.org\/10.1145\/1961189.1961199","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"10","key":"5_CR6","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1109\/TPAMI.2004.75","volume":"26","author":"LP Cordella","year":"2004","unstructured":"Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: A (sub)graph isomorphism algorithm for matching large graphs. IEEE Trans. Pattern Anal. Mach. Intell. 26(10), 1367\u20131372 (2004). https:\/\/doi.org\/10.1109\/TPAMI.2004.75","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR7","unstructured":"CSIRO\u2019s Data61: Stellargraph machine learning library (2018). https:\/\/github.com\/stellargraph\/stellargraph"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Debnath, A.S., Lopez, R.L., Debnath, G., Shusterman, A., Hansch, C.: Structure-activity relationship of mutagenic aromatic and heteroaromatic nitro compounds. correlation with molecular orbital energies and hydrophobicity. J. Med. Chem. 34(2), 786\u2013797 (1991). https:\/\/doi.org\/10.1021\/jm00106a046","DOI":"10.1021\/jm00106a046"},{"issue":"4","key":"5_CR9","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/s0022-2836(03)00628-4","volume":"330","author":"PD Dobson","year":"2003","unstructured":"Dobson, P.D., Doig, A.J.: Distinguishing enzyme structures from non-enzymes without alignments. J. Mol. Biol. 330(4), 771\u2013783 (2003). https:\/\/doi.org\/10.1016\/s0022-2836(03)00628-4","journal-title":"J. Mol. Biol."},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Dou, Y., Shu, K., Xia, C., Yu, P.S., Sun, L.: User preference-aware fake news detection. In: 44th ACM SIGIR International Conference on Research and Development in Information Retrieval, pp. 2051\u20132055 (2021). https:\/\/doi.org\/10.1145\/3404835.3462990","DOI":"10.1145\/3404835.3462990"},{"key":"5_CR11","unstructured":"European Union: Tenders Electronic Daily (2023). https:\/\/ted.europa.eu\/"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1140\/epjds\/s13688-022-00329-7","volume":"11","author":"A Falc\u00f3n-Cort\u00e9s","year":"2022","unstructured":"Falc\u00f3n-Cort\u00e9s, A., Aldana, A., Larralde, H.: Practices of public procurement and the risk of corrupt behavior before and after the government transition in M\u00e9xico. EPJ Data Science 11, 19 (2022). https:\/\/doi.org\/10.1140\/epjds\/s13688-022-00329-7","journal-title":"EPJ Data Science"},{"key":"5_CR13","unstructured":"Fazekas, M., T\u00f3th, I.J.: New ways to measure institutionalised grand corruption in public procurement. Technical report, U4 Anti-Corruption Resource Centre (2014). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2519385"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1177\/1065912916639137","volume":"69","author":"M Fazekas","year":"2016","unstructured":"Fazekas, M., T\u00f3th, I.J.: From corruption to state capture: a new analytical framework with empirical applications from Hungary. Polit. Res. Q. 69(2), 320\u2013334 (2016). https:\/\/doi.org\/10.1177\/1065912916639137","journal-title":"Polit. Res. Q."},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10610-016-9312-3","volume":"23","author":"J Ferwerda","year":"2017","unstructured":"Ferwerda, J., Deleanu, I., Unger, B.: Corruption in public procurement: finding the right indicators. Eur. J. Crim. Policy Res. 23(2), 245\u2013267 (2017). https:\/\/doi.org\/10.1007\/s10610-016-9312-3","journal-title":"Eur. J. Crim. Policy Res."},{"key":"5_CR16","unstructured":"Ferwerda, J., Deleanu, I.S.: Identifying and reducing corruption in public procurement in the EU. Technical report, European Commission (2013). https:\/\/ec.europa.eu\/anti-fraud\/sites\/antifraud\/files\/docs\/body\/identifying_reducing_corruption_in_public_procurement_en.pdf"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-37188-3_13","volume-title":"Big Data Analytics","author":"P Fournier-Viger","year":"2019","unstructured":"Fournier-Viger, P., Cheng, C., Lin, J.C.-W., Yun, U., Kiran, R.U.: TKG: efficient mining of top-k frequent subgraphs. In: Madria, S., Fournier-Viger, P., Chaudhary, S., Reddy, P.K. (eds.) BDA 2019. LNCS, vol. 11932, pp. 209\u2013226. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37188-3_13"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-46131-1_8","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Fournier-Viger","year":"2016","unstructured":"Fournier-Viger, P., et al.: The SPMF open-source data mining library version 2. In: Berendt, B., et al. (eds.) ECML PKDD 2016. LNCS (LNAI), vol. 9853, pp. 36\u201340. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46131-1_8"},{"key":"5_CR19","unstructured":"Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using NetworkX. In: 7th Python in Science Conference, pp. 11\u201315 (2008). https:\/\/conference.scipy.org\/proceedings\/SciPy2008\/paper_2\/"},{"issue":"5","key":"5_CR20","doi-asserted-by":"publisher","first-page":"e97896","DOI":"10.1371\/journal.pone.0097896","volume":"9","author":"M Houbraken","year":"2014","unstructured":"Houbraken, M., Demeyer, S., Michoel, T., Audenaert, P., Colle, D., Pickavet, M.: The index-based subgraph matching algorithm with general symmetries (ISMAGS): exploiting symmetry for faster subgraph enumeration. PLoS ONE 9(5), e97896 (2014). https:\/\/doi.org\/10.1371\/journal.pone.0097896","journal-title":"PLoS ONE"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11751649_46","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"S-M Hsieh","year":"2006","unstructured":"Hsieh, S.-M., Hsu, C.-C., Hsu, L.-F.: Efficient method to perform isomorphism testing of labeled graphs. In: Gavrilova, M.L., et al. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 422\u2013431. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11751649_46"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Huan, J., Wang, W., Prins, J.: Efficient mining of frequent subgraphs in the presence of isomorphism. In: 3rd IEEE International Conference on Data Mining (2003). https:\/\/doi.org\/10.1109\/icdm.2003.1250974","DOI":"10.1109\/icdm.2003.1250974"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-319-18038-0_56","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"B Kane","year":"2015","unstructured":"Kane, B., Cuissart, B., Cr\u00e9milleux, B.: Minimal jumping emerging patterns: computation and practical assessment. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9077, pp. 722\u2013733. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18038-0_56"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"111820","DOI":"10.1109\/access.2022.3211306","volume":"10","author":"H Kim","year":"2022","unstructured":"Kim, H., Lee, B.S., Shin, W.Y., Lim, S.: Graph anomaly detection with graph neural networks: current status and challenges. IEEE Access 10, 111820\u2013111829 (2022). https:\/\/doi.org\/10.1109\/access.2022.3211306","journal-title":"IEEE Access"},{"key":"5_CR25","unstructured":"Kriege, N.M., Giscard, P.L., Wilson, R.: On valid optimal assignment kernels and applications to graph classification. In: 30th International Conference on Neural Information Processing Systems, pp. 1623\u20131631 (2016). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2016\/hash\/0efe32849d230d7f53049ddc4a4b0c60-Abstract.html"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Li, R., Wang, W.: REAFUM: representative approximate frequent subgraph mining. In: SIAM International Conference on Data Mining, pp. 757\u2013765 (2015). https:\/\/doi.org\/10.1137\/1.9781611974010.85","DOI":"10.1137\/1.9781611974010.85"},{"issue":"4","key":"5_CR27","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s10723-020-09526-y","volume":"18","author":"O Loyola-Gonz\u00e1lez","year":"2020","unstructured":"Loyola-Gonz\u00e1lez, O., Medina-P\u00e9rez, M.A., Choo, K.R.: A review of supervised classification based on contrast patterns: applications, trends, and challenges. J. Grid Comput. 18(4), 797\u2013845 (2020). https:\/\/doi.org\/10.1007\/s10723-020-09526-y","journal-title":"J. Grid Comput."},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"19867","DOI":"10.1038\/s41598-022-22086-3","volume":"12","author":"X Luo","year":"2022","unstructured":"Luo, X., et al.: Deep graph level anomaly detection with contrastive learning. Sci. Rep. 12, 19867 (2022). https:\/\/doi.org\/10.1038\/s41598-022-22086-3","journal-title":"Sci. Rep."},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Ma, R., Pang, G., Chen, L., van den Hengel, A.: Deep graph-level anomaly detection by glocal knowledge distillation. In: 15th ACM International Conference on Web Search and Data Mining, pp. 704\u2013714 (2022). https:\/\/doi.org\/10.1145\/3488560.3498473","DOI":"10.1145\/3488560.3498473"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. (2021, in press). https:\/\/doi.org\/10.1109\/TKDE.2021.3118815","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Malik, R., Khan, K.U., Nawaz, W.: Maximal gSpan: multi-document summarization through frequent subgraph mining. In: 17th International Conference on Ubiquitous Information Management and Communication, pp. 1\u20137 (2023). https:\/\/doi.org\/10.1109\/imcom56909.2023.10035618","DOI":"10.1109\/imcom56909.2023.10035618"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"102140","DOI":"10.1016\/j.ejpoleco.2021.102140","volume":"73","author":"F Mar\u00e9chal","year":"2022","unstructured":"Mar\u00e9chal, F., Morand, P.H.: Are social and environmental clauses a tool for favoritism? Analysis of French public procurement contracts. Eur. J. Polit. Econ. 73, 102140 (2022). https:\/\/doi.org\/10.1016\/j.ejpoleco.2021.102140","journal-title":"Eur. J. Polit. Econ."},{"issue":"5","key":"5_CR33","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1021\/ci500611v","volume":"55","author":"JP M\u00e9tivier","year":"2015","unstructured":"M\u00e9tivier, J.P., et al.: Discovering structural alerts for mutagenicity using stable emerging molecular patterns. J. Chem. Inf. Model. 55(5), 925\u2013940 (2015). https:\/\/doi.org\/10.1021\/ci500611v","journal-title":"J. Chem. Inf. Model."},{"issue":"2","key":"5_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2431211.2431218","volume":"45","author":"CH Mooney","year":"2013","unstructured":"Mooney, C.H., Roddick, J.F.: Sequential pattern mining - approaches and algorithms. ACM Comput. Surv. 45(2), 1\u201339 (2013). https:\/\/doi.org\/10.1145\/2431211.2431218","journal-title":"ACM Comput. Surv."},{"key":"5_CR35","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: graph2vec: learning distributed representations of graphs. In: 13th International Workshop on Mining and Learning with Graphs, p. 21 (2017). https:\/\/arxiv.org\/abs\/1707.05005"},{"key":"5_CR36","unstructured":"National Fraud Authority: Red flags for integrity: Giving the green light to open data solutions. Technical report, Open Contracting Partnership, Development Gateway (2016). https:\/\/www.open-contracting.org\/wp-content\/uploads\/2016\/11\/OCP2016-Red-flags-for-integrityshared-1.pdf"},{"key":"5_CR37","unstructured":"Potin, L., Labatut, V., Figueiredo, R., Largeron, C., Morand, P.H.: FOPPA: a database of French Open Public Procurement Award notices. Technical report, Avignon Universit\u00e9 (2022). https:\/\/hal.archives-ouvertes.fr\/hal-03796734"},{"key":"5_CR38","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1038\/s41597-023-02213-z","volume":"10","author":"L Potin","year":"2023","unstructured":"Potin, L., Labatut, V., Largeron, C., Morand, P.H.: FOPPA: an open database of French public procurement award notices from 2010\u20132020. Sci. Data 10, 303 (2023). https:\/\/doi.org\/10.1038\/s41597-023-02213-z","journal-title":"Sci. Data"},{"key":"5_CR39","doi-asserted-by":"publisher","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi, T., Ong, K.L., Kam, B.H., Boo, Y.L.: Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis. Support Syst. 133, 113303 (2020). https:\/\/doi.org\/10.1016\/j.dss.2020.113303","journal-title":"Decis. Support Syst."},{"issue":"1\u20133","key":"5_CR40","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1332\/251569213x15664519748613","volume":"31","author":"I Rizzo","year":"2013","unstructured":"Rizzo, I.: Efficiency and integrity issues in public procurement performance. J. Public Finance Public Choice 31(1\u20133), 111\u2013128 (2013). https:\/\/doi.org\/10.1332\/251569213x15664519748613","journal-title":"J. Public Finance Public Choice"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Rozemberczki, B., Kiss, O., Sarkar, R.: Karate Club: an API oriented open-source Python framework for unsupervised learning on graphs. In: 29th ACM International Conference on Information and Knowledge Management, pp. 3125\u20133132 (2020). https:\/\/doi.org\/10.1145\/3340531.3412757","DOI":"10.1145\/3340531.3412757"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"Shaul, Z., Naaz, S.: cgSpan: closed graph-based substructure pattern mining. In: IEEE International Conference on Big Data (2021). https:\/\/doi.org\/10.1109\/BigData52589.2021.9671995","DOI":"10.1109\/BigData52589.2021.9671995"},{"key":"5_CR43","unstructured":"Shervashidze, N., Schweitzer, P., van Leeuwen, E.J., Mehlhorn, K., Borgwardt, K.M.: Weisfeiler-Lehman graph kernels. J. Mach. Learn. Res. 12(77), 2539\u20132561 (2011). http:\/\/jmlr.org\/papers\/v12\/shervashidze11a.html"},{"key":"5_CR44","unstructured":"Siglidis, G., Nikolentzos, G., Limnios, S., Giatsidis, C., Skianis, K., Vazirgiannis, M.: GraKeL: a graph kernel library in Python. J. Mach. Learn. Res. 21(54), 1\u20135 (2020). https:\/\/www.jmlr.org\/papers\/v21\/18-370.html"},{"issue":"5","key":"5_CR45","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1002\/sam.10084","volume":"3","author":"M Thoma","year":"2010","unstructured":"Thoma, M., et al.: Discriminative frequent subgraph mining with optimality guarantees. Stat. Anal. Data Min. 3(5), 302\u2013318 (2010). https:\/\/doi.org\/10.1002\/sam.10084","journal-title":"Stat. Anal. Data Min."},{"issue":"10","key":"5_CR46","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1093\/bioinformatics\/btg130","volume":"19","author":"H Toivonen","year":"2003","unstructured":"Toivonen, H., Srinivasan, A., King, R.D., Kramer, S., Helma, C.: Statistical evaluation of the predictive toxicology challenge 2000\u20132001. Bioinformatics 19(10), 1183\u20131193 (2003). https:\/\/doi.org\/10.1093\/bioinformatics\/btg130","journal-title":"Bioinformatics"},{"key":"5_CR47","doi-asserted-by":"publisher","first-page":"10818","DOI":"10.1038\/s41598-019-47198-1","volume":"9","author":"J Wachs","year":"2019","unstructured":"Wachs, J., Kert\u00e9sz, J.: A network approach to cartel detection in public auction markets. Sci. Rep. 9, 10818 (2019). https:\/\/doi.org\/10.1038\/s41598-019-47198-1","journal-title":"Sci. Rep."},{"key":"5_CR48","doi-asserted-by":"publisher","unstructured":"Wale, N., Karypis, G.: Comparison of descriptor spaces for chemical compound retrieval and classification. In: 6th International Conference on Data Mining, pp. 678\u2013689 (2006). https:\/\/doi.org\/10.1109\/icdm.2006.39","DOI":"10.1109\/icdm.2006.39"},{"key":"5_CR49","doi-asserted-by":"publisher","unstructured":"Yan, X., Cheng, H., Han, J., Yu, P.S.: Mining significant graph patterns by leap search. In: ACM SIGMOD International Conference on Management of Data, pp. 433\u2013444 (2008). https:\/\/doi.org\/10.1145\/1376616.1376662","DOI":"10.1145\/1376616.1376662"},{"key":"5_CR50","doi-asserted-by":"publisher","unstructured":"Yan, X., Han, J.: gSpan: graph-based substructure pattern mining. In: IEEE International Conference on Data Mining, pp. 721\u2013724 (2002). https:\/\/doi.org\/10.1109\/ICDM.2002.1184038","DOI":"10.1109\/ICDM.2002.1184038"},{"key":"5_CR51","unstructured":"Yang, Z., Zhang, G., Wu, J., Yang, J.: A comprehensive survey of graph-level learning. arXiv cs.LG, 2301.05860 (2023). https:\/\/arxiv.org\/abs\/2301.05860"},{"key":"5_CR52","doi-asserted-by":"publisher","unstructured":"Yuan, H., Yu, H., Gui, S., Ji, S.: Explainability in graph neural networks: a taxonomic survey. IEEE Trans. Pattern Anal. Mach. Intell. (2022, in press). https:\/\/doi.org\/10.1109\/tpami.2022.3204236","DOI":"10.1109\/tpami.2022.3204236"},{"key":"5_CR53","doi-asserted-by":"publisher","unstructured":"Zhang, M., Cui, Z., Neumann, M., Chen, Y.: An end-to-end deep learning architecture for graph classification. In: AAAI Conference on Artificial Intelligence, vol. 32, pp. 4438\u20134445 (2018). https:\/\/doi.org\/10.1609\/aaai.v32i1.11782","DOI":"10.1609\/aaai.v32i1.11782"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43427-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T21:02:06Z","timestamp":1694898126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43427-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031434266","9783031434273"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43427-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Anomaly detection can have ethical implications, for instance if the methods are used to discriminate against certain individuals. In this respect, however, our PANG methodological framework does not present any more risk than the supervised classification methods developed in machine learning.Moreover, this work takes place in the framework of a project aiming, among other things, at proposing ways of automatically red flagging contracts and economic agents depending on fraud risk. Therefore, the method that we propose is meant to be used by public authorities to better regulate public procurement and the management of the related open data.Finally, the data used in this article are publicly shared, and were collected from a public open data repository handled by the European Union. They do not contain any personal information, and cannot be used directly to infer any personal information, as they only describe the economic transactions of companies and public institutions regarding public procurement.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Implications"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"829","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"196","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.63","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Applied Data Science Track: 239 submissions, 58 accepted papers; Demo Track: 31 submissions, 16 accepted papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}