{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:54:33Z","timestamp":1767311673223,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819539055","type":"print"},{"value":"9789819539062","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3906-2_3","type":"book-chapter","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:50:22Z","timestamp":1767311422000},"page":"37-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["STM: A Spatio-Temporal Model for\u00a0Dynamic Graph Fraud Detection"],"prefix":"10.1007","author":[{"given":"Yuxiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Runhuai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tianxing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Cao, B., Ye, Q., Xu, W., Zou, Y.: Ftm: A frame-level timeline modeling method for temporal graph representation learning. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol,\u00a037, pp. 6888\u20136896 (2023)","DOI":"10.1609\/aaai.v37i6.25843"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cao, B., Ye, Q., Xu, W., Zou, Y.: FTM: A frame-level timeline modeling method for temporal graph representation learning. In: AAAI, pp. 6888\u20136896. AAAI Press (2023)","DOI":"10.1609\/aaai.v37i6.25843"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Cao, Q., Yang, X., Yu, J., Palow, C.: Uncovering large groups of active malicious accounts in online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 477\u2013488. CCS \u201914, Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2660267.2660269","DOI":"10.1145\/2660267.2660269"},{"key":"3_CR4","unstructured":"Code, datasets: Git repository. https:\/\/anonymous.4open.science\/r\/STM\/ (2024)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM international conference on information & knowledge management, pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"3_CR6","unstructured":"Huang, X., et al.: Dgraph: a large-scale financial dataset for graph anomaly detection. In: NeurIPS (2022)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"54893","DOI":"10.1109\/ACCESS.2024.3380823","volume":"12","author":"J Jemai","year":"2024","unstructured":"Jemai, J., Zarrad, A., Daud, A.: Identifying fraudulent credit card transactions using ensemble learning. IEEE Access 12, 54893\u201354900 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3380823","journal-title":"IEEE Access"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Kaghazgaran, P., Caverlee, J., Squicciarini, A.C.: Combating crowdsourced review manipulators: A neighborhood-based approach. In: WSDM, pp. 306\u2013314. ACM (2018)","DOI":"10.1145\/3159652.3159726"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Kumar, S., Hamilton, W.L., Leskovec, J., Jurafsky, D.: Community interaction and conflict on the web. In: WWW, p. 933\u2013943 (2018)","DOI":"10.1145\/3178876.3186141"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, S., Zhang, X., Leskovec, J.: Predicting dynamic embedding trajectory in temporal interaction networks. In: SIGKDD, pp. 1269\u20131278 (2019)","DOI":"10.1145\/3292500.3330895"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Pick and choose: a GNN-based imbalanced learning approach for fraud detection. In: Proceedings of the Web Conference 2021, pp. 3168\u20133177 (2021)","DOI":"10.1145\/3442381.3449989"},{"key":"3_CR12","unstructured":"Liu, Z., Chen, C., Yang, X., Zhou, J., Li, X., Song, L.: Heterogeneous graph neural networks for malicious account detection. CoRR abs\/2002.12307 (2020)"},{"issue":"3","key":"3_CR13","first-page":"202","volume":"14","author":"TR Liyanagunawardena","year":"2013","unstructured":"Liyanagunawardena, T.R., Adams, A.A., Williams, S.A.: MOOCs: a systematic study of the published literature 2008\u20132012. Int. Rev. Res. Open Distrib. Learn. 14(3), 202\u2013227 (2013)","journal-title":"Int. Rev. Res. Open Distrib. Learn."},{"issue":"12","key":"3_CR14","doi-asserted-by":"publisher","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. 35(12), 12012\u201312038 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR15","unstructured":"Rossi, E., Chamberlain, B., Frasca, F., Eynard, D., Monti, F., Bronstein, M.M.: Temporal graph networks for deep learning on dynamic graphs. CoRR abs\/2006.10637 (2020)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., Wu, J.: H2-fdetector: A GNN-based fraud detector with homophilic and heterophilic connections. In: Proceedings of the ACM Web Conference 2022, pp. 1486\u20131494 (2022)","DOI":"10.1145\/3485447.3512195"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Tian, S., et\u00a0al.: Sad: Semi-supervised anomaly detection on dynamic graphs. arXiv preprint arXiv:2305.13573 (2023)","DOI":"10.24963\/ijcai.2023\/256"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Tian, S., et al.: SAD: semi-supervised anomaly detection on dynamic graphs. In: IJCAI, pp. 2306\u20132314. ijcai.org (2023)","DOI":"10.24963\/ijcai.2023\/256"},{"key":"3_CR19","unstructured":"Trivedi, R., Farajtabar, M., Biswal, P., Zha, H.: Dyrep: learning representations over dynamic graphs. In: ICLR (2019)"},{"key":"3_CR20","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NeurIPS, vol.\u00a030 (2017)"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: Label information enhanced fraud detection against low homophily in graphs. In: Ding, Y., Tang, J., Sequeda, J.F., Aroyo, L., Castillo, C., Houben, G. (eds.) Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 406\u2013416. ACM (2023). https:\/\/doi.org\/10.1145\/3543507.3583373","DOI":"10.1145\/3543507.3583373"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Scalable community search over large-scale graphs based on graph transformer. In: SIGIR (2024)","DOI":"10.1145\/3626772.3657771"},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1109\/TCSS.2022.3158318","volume":"10","author":"Y Xie","year":"2023","unstructured":"Xie, Y., Liu, G., Yan, C., Jiang, C., Zhou, M.: Time-aware attention-based gated network for credit card fraud detection by extracting transactional behaviors. IEEE Trans. Comput. Soc. Syst. 10(3), 1004\u20131016 (2023)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"3_CR24","unstructured":"Xu, D., Ruan, C., K\u00f6rpeoglu, E., Kumar, S., Achan, K.: Inductive representation learning on temporal graphs. In: 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net (2020), https:\/\/openreview.net\/forum?id=rJeW1yHYwH"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Yang, X., Lyu, Y., Tian, T., Liu, Y., Liu, Y., Zhang, X.: Rumor detection on social media with graph structured adversarial learning. In: IJCAI, pp. 1417\u20131423. ijcai.org (2020)","DOI":"10.24963\/ijcai.2020\/197"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Fan, Y., Ye, Y., Zhao, L., Shi, C.: Key player identification in underground forums over attributed heterogeneous information network embedding framework. In: CIKM, pp. 549\u2013558. ACM (2019)","DOI":"10.1145\/3357384.3357876"},{"key":"3_CR27","unstructured":"Zhao, Y., et al.: Botgraph: large scale spamming botnet detection. In: NSDI, pp. 321\u2013334. USENIX Association (2009)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3906-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:50:24Z","timestamp":1767311424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3906-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819539055","9789819539062"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3906-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dasfaa2025.github.io","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}