{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T11:06:07Z","timestamp":1769771167154,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557189","type":"print"},{"value":"9789819557196","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5719-6_34","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:52Z","timestamp":1769718892000},"page":"533-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph Contrastive Anomaly Detection Based on\u00a0Beta Wavelet Multi-GNNs"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Song","sequence":"first","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kangzheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Chen, T., Tsourakakis, C.: Antibenford subgraphs: unsupervised anomaly detection in financial networks. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 2762\u20132770 (2022)","DOI":"10.1145\/3534678.3539100"},{"key":"34_CR2","unstructured":"Defferrard, M., Bresson, X., Vandergheynst, P.: Convolutional neural networks on graphs with fast localized spectral filtering. In: Proceedings of the 30th International Conference on Neural Information Processing Systems, NIPS\u201916, pp. 3844\u20133852. Curran Associates Inc., Red Hook (2016)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: Proceeding of the 2019 SIAM International Conference on Data Mining (SDM), pp. 594\u2013602 (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Duan, J., et al.: Graph anomaly detection via multi-scale contrastive learning networks with augmented view. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 7459\u20137467 (2023)","DOI":"10.1609\/aaai.v37i6.25907"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"47699","DOI":"10.1109\/ACCESS.2022.3170467","volume":"10","author":"B Dumitrescu","year":"2022","unstructured":"Dumitrescu, B., Baltoiu, A., Budulan, S.: Anomaly detection in graphs of bank transactions for anti money laundering applications. IEEE Access 10, 47699\u201347714 (2022)","journal-title":"IEEE Access"},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.neucom.2015.04.113","volume":"173","author":"A ElAdel","year":"2016","unstructured":"ElAdel, A., Zaied, M., Ben Amar, C.: Fast beta wavelet network-based feature extraction for image copy detection. Neurocomputing 173(2), 306\u2013316 (2016)","journal-title":"Neurocomputing"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Fan, H., Zhang, F., Li, Z.: Anomalydae: dual autoencoder for anomaly detection on attributed networks. In: Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 5685\u20135689 (2020)","DOI":"10.1109\/ICASSP40776.2020.9053387"},{"key":"34_CR8","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 1025\u20131035 (2017)"},{"key":"34_CR9","unstructured":"Hassani, K., Khasahmadi, A.H.: Contrastive multi-view representation learning on graphs. In: International Conference on Machine Learning, pp. 4116\u20134126 (2020)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Jemai, O., Zaied, M., Amar, C.B., Alimi, A.M.: Fbwn: an architecture of fast beta wavelet networks for image classification. In: The 2010 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138 (2010)","DOI":"10.1109\/IJCNN.2010.5596876"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Jin, M., Liu, Y., Zheng, Y., Chi, L., Li, Y.F., Pan, S.: Anemone: graph anomaly detection with multi-scale contrastive learning. In: Proceeding of the 30th ACM International Conference on Information & Knowledge Management, pp. 3122\u20133126 (2021)","DOI":"10.1145\/3459637.3482057"},{"key":"34_CR12","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: International Conference on Learning Representations (2017)"},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"38146","DOI":"10.1109\/ACCESS.2019.2906669","volume":"7","author":"Y Lai","year":"2019","unstructured":"Lai, Y., et al.: Positive data modeling using a mixture of mixtures of inverted beta distributions. IEEE Access 7, 38146\u201338156 (2019)","journal-title":"IEEE Access"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Li, J., Dani, H., Hu, X., Liu, H.: Radar: residual analysis for anomaly detection in attributed networks. In: Proceeding of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2152\u20132158 (2017)","DOI":"10.24963\/ijcai.2017\/299"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Flowscope: spotting money laundering based on graphs. In: Proceeding of the AAAI Conference on Artificial Intelligence, vol. 34, no. 4, pp. 4731\u20134738 (2020)","DOI":"10.1609\/aaai.v34i04.5906"},{"issue":"7","key":"34_CR16","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/JSAC.2021.3078497","volume":"39","author":"Z Li","year":"2021","unstructured":"Li, Z., Rios, A.L.G., Trajkovic, L.: Machine learning for detecting anomalies and intrusions in communication networks. IEEE J. Sel. Areas Commun. 39(7), 2254\u20132264 (2021)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"34_CR17","unstructured":"Liu, K., Zhang, Y.: A temporal knowledge graph completion method based on balanced timestamp distribution. arXiv preprint arXiv:2108.13024 (2021)"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Liu, K., Zhao, F., Chen, H., Li, Y., Xu, G., Jin, H.: Da-net: distributed attention network for temporal knowledge graph reasoning. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, pp. 1289\u20131298 (2022)","DOI":"10.1145\/3511808.3557280"},{"issue":"10","key":"34_CR19","first-page":"4518","volume":"34","author":"K Liu","year":"2023","unstructured":"Liu, K., Zhao, F., Jin, H.: Fs-net: frequency statistical network for temporal knowledge graph reasoning. Int. J. Softw. Inf. 34(10), 4518\u20134532 (2023)","journal-title":"Int. J. Softw. Inf."},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Liu, K., Zhao, F., Xu, G., Wang, X., Jin, H.: Temporal knowledge graph reasoning via time-distributed representation learning. In: 2022 IEEE International Conference on Data Mining (ICDM), pp. 279\u2013288 (2022)","DOI":"10.1109\/ICDM54844.2022.00038"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Liu, K., Zhao, F., Xu, G., Wang, X., Jin, H.: Retia: relation-entity twin-interact aggregation for temporal knowledge graph extrapolation. In: 2023 IEEE 39th International Conference on Data Engineering (ICDE), pp. 1761\u20131774 (2023)","DOI":"10.1109\/ICDE55515.2023.00138"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Liu, K., Zhao, F., Xu, G., Wu, S.: Ie-evo: internal and external evolution-enhanced temporal knowledge graph forecasting. In: 2023 IEEE International Conference on Data Mining (ICDM), pp. 408\u2013417 (2023)","DOI":"10.1109\/ICDM58522.2023.00050"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Liu, K., Zhao, F., Yang, Y., Xu, G.: Dysarl: dynamic structure-aware representation learning for multimodal knowledge graph reasoning. In: Proceedings of the 32nd ACM International Conference on Multimedia, pp. 8247\u20138256 (2024)","DOI":"10.1145\/3664647.3681020"},{"issue":"141","key":"34_CR24","first-page":"1","volume":"25","author":"K Liu","year":"2024","unstructured":"Liu, K., et al.: Pygod: a python library for graph outlier detection. J. Mach. Learn. Res. 25(141), 1\u20139 (2024)","journal-title":"J. Mach. Learn. Res."},{"issue":"6","key":"34_CR25","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TNNLS.2021.3068344","volume":"33","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Li, Z., Pan, S., Gong, C., Zhou, C., Karypis, G.: Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Trans. Neural Netw. Learn. Syst. 33(6), 2378\u20132392 (2022)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Luo, X., et al.: Comga: community-aware attributed graph anomaly detection. In: Proceeding of the 15th ACM International Conference on Web Search and Data Mining (WSDM), pp. 657\u2013665 (2022)","DOI":"10.1145\/3488560.3498389"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Ma, X., Wu, J., Yang, J., Sheng, Q.Z.: Towards graph-level anomaly detection via deep evolutionary mapping. In: Proceeding of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 1631\u20131642 (2023)","DOI":"10.1145\/3580305.3599524"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Miao, K., Shi, X., Zhang, W.A.: Attack signal estimation for intrusion detection in industrial control system. Comput. Secur. 96, 101926 (2020)","DOI":"10.1016\/j.cose.2020.101926"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Peng, Z., Luo, M., Li, J., Liu, H., Zheng, Q.: Anomalous: a joint modeling approach for anomaly detection on attributed networks. In: Proceeding of the 27th International Joint Conference on Artificial Intelligence (IJCAI), pp. 3513\u20133519 (2018)","DOI":"10.24963\/ijcai.2018\/488"},{"key":"34_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303","volume":"133","author":"T Pourhabibi","year":"2020","unstructured":"Pourhabibi, T., Ong, K.L., Kam, B.H., Boo, Y.L.: Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis. Supp. Syst. 133, 113303 (2020)","journal-title":"Decis. Supp. Syst."},{"issue":"3","key":"34_CR31","first-page":"93","volume":"29","author":"P Sen","year":"2008","unstructured":"Sen, P., Namata, G., Bilgic, M., Getoor, L., Gallagher, B., Eliassi-Rad, T.: Collective classification in network data. AI Mag. 29(3), 93\u2013106 (2008)","journal-title":"AI Mag."},{"issue":"7024","key":"34_CR32","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1038\/nature03248","volume":"433","author":"CM Song","year":"2005","unstructured":"Song, C.M., Havlin, S., Makse, H.A.: Self-similarity of complex networks. Nature 433(7024), 392\u2013395 (2005)","journal-title":"Nature"},{"key":"34_CR33","unstructured":"Tang, J., Li, J., Gao, Z., Li, J.: Rethinking graph neural networks for anomaly detection. In: Proceeding of the 39th International Conference on Machine Learning (ICML), pp. 21076\u201321089 (2022)"},{"key":"34_CR34","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: Proceeding of the International Conference on Learning Representations (2018)"},{"key":"34_CR35","unstructured":"Veli\u010dkovi\u0107, P., Fedus, W., Hamilton, W.L., Li\u00f2, P., Bengio, Y., Hjelm, R.D.: Deep graph infomax. In: Proceeding of the International Conference on Learning Representations (2019)"},{"key":"34_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, G., et al.: Fraudre: fraud detection dual-resistant to graph inconsistency and imbalance. In: Proceeding of the 21st IEEE International Conference on Data Mining (ICDM), pp. 867\u2013876 (2021)","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"34_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhao, L.: Unsupervised deep subgraph anomaly detection. In: Proceeding of the 2022 IEEE International Conference on Data Mining (ICDM), pp. 753\u2013762 (2022)","DOI":"10.1109\/ICDM54844.2022.00086"},{"issue":"12","key":"34_CR38","doi-asserted-by":"publisher","first-page":"12220","DOI":"10.1109\/TKDE.2021.3119326","volume":"35","author":"Y Zheng","year":"2021","unstructured":"Zheng, Y., Jin, M., Liu, Y., Chi, L., Phan, K.T., Chen, Y.P.P.: Generative and contrastive self-supervised learning for graph anomaly detection. IEEE Trans. Knowl. Data Eng. 35(12), 12220\u201312233 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5719-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:35:01Z","timestamp":1769718901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5719-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557189","9789819557196"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5719-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2025.sau.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}