{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:18:37Z","timestamp":1757312317330,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605668"},{"type":"electronic","value":"9789819605675"}],"license":[{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0567-5_12","type":"book-chapter","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T08:37:19Z","timestamp":1733128639000},"page":"146-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust Graph Learning Against Camouflaged Malicious Actors"],"prefix":"10.1007","author":[{"given":"Venus","family":"Haghighi","sequence":"first","affiliation":[]},{"given":"Nasrin","family":"Shabani","sequence":"additional","affiliation":[]},{"given":"Behnaz","family":"Soltani","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Beheshti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,3]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bo, D., Wang, X., Shi, C., Shen, H.: Beyond low-frequency information in graph convolutional networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 3950\u20133957 (2021)","DOI":"10.1609\/aaai.v35i5.16514"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Chen, H., et al.: Label-aware graph convolutional networks. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 1977\u20131980 (2020)","DOI":"10.1145\/3340531.3412139"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Haghighi, V.: From classic GNNs to hyper-GNNs for detecting camouflaged malicious actors. In: Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, pp. 1220\u20131221 (2023)","DOI":"10.1145\/3539597.3572989"},{"key":"12_CR5","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.acha.2010.04.005","volume":"30","author":"DK Hammond","year":"2011","unstructured":"Hammond, D.K., et al.: Wavelets on graphs via spectral graph theory. Appl. Comput. Harmon. Anal. 30(2), 129\u2013150 (2011)","journal-title":"Appl. Comput. Harmon. Anal."},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TSP.2018.2879624","volume":"67","author":"R Levie","year":"2018","unstructured":"Levie, R., Monti, F., Bresson, X., Bronstein, M.M.: CayleyNets: graph convolutional neural networks with complex rational spectral filters. IEEE Trans. Signal Process. 67(1), 97\u2013109 (2018)","journal-title":"IEEE Trans. Signal Process."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1569\u20131572 (2020)","DOI":"10.1145\/3397271.3401253"},{"issue":"12","key":"12_CR9","doi-asserted-by":"publisher","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2023","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. 35(12), 12012\u201312038 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"McAuley, J.J., Leskovec, J.: From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 897\u2013908 (2013)","DOI":"10.1145\/2488388.2488466"},{"key":"12_CR11","unstructured":"Nt, H., Maehara, T.: Revisiting graph neural networks: all we have is low-pass filters. arXiv preprint arXiv:1905.09550 (2019)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., Wu, J.: H2-FDetector: a GNN-based fraud detector with homophilic and heterophilic connections. In: Proceedings of the ACM Web Conference, pp. 1486\u20131494 (2022)","DOI":"10.1145\/3485447.3512195"},{"issue":"3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSP.2012.2235192","volume":"30","author":"DI Shuman","year":"2013","unstructured":"Shuman, D.I., Narang, S.K., Frossard, P., Ortega, A., Vandergheynst, P.: The emerging field of signal processing on graphs: extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Process. Mag. 30(3), 83\u201398 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"12_CR15","unstructured":"Tang, J., Li, J., Gao, Z., Li, J.: Rethinking graph neural networks for anomaly detection. In: Proceedings of the International Conference on Machine Learning, pp. 21076\u201321089. PMLR (2022)"},{"key":"12_CR16","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. In: Proceedings of the International Conference on Learning Representations (2018)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Y., et\u00a0al.: Label information enhanced fraud detection against low homophily in graphs. In: Proceedings of the ACM Web Conference, pp. 406\u2013416 (2023)","DOI":"10.1145\/3543507.3583373"},{"key":"12_CR18","unstructured":"Welling, M., Kipf, T.N.: Semi-supervised classification with graph convolutional networks. In: Proceedings of the International Conference on Learning Representations (2016)"},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Philip, S.Y.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 4\u201324 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"12_CR20","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? In: Proceedings of the International Conference on Learning Representations, ICLR (2019)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, G., et al.: FRAUDRE: fraud detection dual-resistant to graph inconsistency and imbalance. In: Proceedings of the IEEE International Conference on Data Mining, pp. 867\u2013876 (2021)","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"12_CR22","first-page":"7793","volume":"33","author":"J Zhu","year":"2020","unstructured":"Zhu, J., Yan, Y., Zhao, L., Heimann, M., Akoglu, L., Koutra, D.: Beyond homophily in graph neural networks: current limitations and effective designs. Adv. Neural. Inf. Process. Syst. 33, 7793\u20137804 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0567-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T09:05:46Z","timestamp":1733130346000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0567-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,3]]},"ISBN":["9789819605668","9789819605675"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0567-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,3]]},"assertion":[{"value":"3 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}