{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:09Z","timestamp":1749928209913,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_1","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:37Z","timestamp":1749927037000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Leveraging Anomalies with\u00a0Reference Alignment in\u00a0Graph-Level Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Ye","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Ruikun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Vasnev","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Aggarwal, C.C.: An introduction to outlier analysis. Springer (2017)","DOI":"10.1007\/978-3-319-47578-3"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29, 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Disc."},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/3575637.3575646","volume":"24","author":"K Ding","year":"2022","unstructured":"Ding, K., Xu, Z., Tong, H., Liu, H.: Data augmentation for deep graph learning: a survey. ACM SIGKDD 24(2), 61\u201377 (2022)","journal-title":"ACM SIGKDD"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ding, K., Zhou, Q., Tong, H., Liu, H.: Few-shot network anomaly detection via cross-network meta-learning. In: WWW, pp. 2448\u20132456 (2021)","DOI":"10.1145\/3442381.3449922"},{"key":"1_CR5","unstructured":"Dong, X., Zhang, X., Wang, S.: Rayleigh quotient graph neural networks for graph-level anomaly detection. In: ICLR (2024)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Gao, Y., Wang, X., He, X., Liu, Z., Feng, H., Zhang, Y.: Alleviating structural distribution shift in graph anomaly detection. In: ACM WSDM, pp. 357\u2013365 (2023)","DOI":"10.1145\/3539597.3570377"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Guo, H., Mao, Y.: Interpolating graph pair to regularize graph classification. In: AAAI. vol.\u00a037, pp. 7766\u20137774 (2023)","DOI":"10.1609\/aaai.v37i6.25941"},{"key":"1_CR8","unstructured":"Han, X., Jiang, Z., Liu, N., Hu, X.: G-Mixup: graph data augmentation for graph classification. In: ICML, pp. 8230\u20138248. PMLR (2022)"},{"issue":"06","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1850026","DOI":"10.1142\/S0219720018500269","volume":"16","author":"Q Jiang","year":"2018","unstructured":"Jiang, Q., Ma, J.: A novel graph kernel on chemical compound classification. J. Bioinform. Comput. Biol. 16(06), 1850026 (2018)","journal-title":"J. Bioinform. Comput. Biol."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"111820","DOI":"10.1109\/ACCESS.2022.3211306","volume":"10","author":"H Kim","year":"2022","unstructured":"Kim, H., Lee, B.S., Shin, W.Y., Lim, S.: Graph anomaly detection with graph neural networks: current status and challenges. IEEE Access 10, 111820\u2013111829 (2022)","journal-title":"IEEE Access"},{"key":"1_CR11","unstructured":"Kriege, N.M., Giscard, P.L., Wilson, R.: On valid optimal assignment kernels and applications to graph classification. In: NeurIPS. vol.\u00a029 (2016)"},{"key":"1_CR12","unstructured":"Li, Y., Gu, C., Dullien, T., Vinyals, O., Kohli, P.: Graph matching networks for learning the similarity of graph structured objects. In: ICML, pp. 3835\u20133845. PMLR (2019)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Lim, S.K., Loo, Y., Tran, N.T., Cheung, N.M., Roig, G., Elovici, Y.: DOPING: generative data augmentation for unsupervised anomaly detection with GAN. In: IEEE ICDM, pp. 1122\u20131127. IEEE (2018)","DOI":"10.1109\/ICDM.2018.00146"},{"key":"1_CR14","unstructured":"Ling, H., Jiang, Z., Liu, M., Ji, S., Zou, N.: Graph mixup with soft alignments. In: ICML, pp. 21335\u201321349. PMLR (2023)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Liu, F., et al.: DAGAD: data augmentation for graph anomaly detection. In: IEEE ICDM, pp. 259\u2013268. IEEE (2022)","DOI":"10.1109\/ICDM54844.2022.00036"},{"key":"1_CR16","unstructured":"Liu, Y., Ding, K., Lu, Q., Li, F., Zhang, L.Y., Pan, S.: Towards self-interpretable graph-level anomaly detection. In: NeurIPS. vol.\u00a036 (2024)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Ma, R., Pang, G., Chen, L., van\u00a0den Hengel, A.: Deep graph-level anomaly detection by glocal knowledge distillation. In: ACM WSDM, pp. 704\u2013714 (2022)","DOI":"10.1145\/3488560.3498473"},{"issue":"12","key":"1_CR18","first-page":"12012","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE TKDE 35(12), 12012\u201312038 (2021)","journal-title":"IEEE TKDE"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Ma, X., Wu, J., Yang, J., Sheng, Q.Z.: Towards graph-level anomaly detection via deep evolutionary mapping. In: ACM SIGKDD, pp. 1631\u20131642 (2023)","DOI":"10.1145\/3580305.3599524"},{"key":"1_CR20","unstructured":"Morris, C., Kriege, N.M., Bause, F., Kersting, K., Mutzel, P., Neumann, M.: TUDataset: A collection of benchmark datasets for learning with graphs. ArXiv:2007.08663 (2020)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Noumir, Z., Honeine, P., Richard, C.: On simple one-class classification methods. In: IEEE ISIT, pp. 2022\u20132026. IEEE (2012)","DOI":"10.1109\/ISIT.2012.6283685"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., Jin, H., van\u00a0den Hengel, A.: Deep weakly-supervised anomaly detection. In: ACM SIGKDD, pp. 1795\u20131807 (2023)","DOI":"10.1145\/3580305.3599302"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"150725","DOI":"10.1109\/ACCESS.2020.3016653","volume":"8","author":"TC Pham","year":"2020","unstructured":"Pham, T.C., Doucet, A., Luong, C.M., Tran, C.T., Hoang, V.D.: Improving skin-disease classification based on customized loss function combined with balanced mini-batch logic and real-time image augmentation. IEEE Access 8, 150725\u2013150737 (2020)","journal-title":"IEEE Access"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Qiu, C., Kloft, M., Mandt, S., Rudolph, M.: Raising the bar in graph-level anomaly detection. In: IJCAI (2022)","DOI":"10.24963\/ijcai.2022\/305"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Shimizu, R., Asako, K., Ojima, H., Morinaga, S., Hamada, M., Kuroda, T.: Balanced mini-batch training for imbalanced image data classification with neural network. In: AI4I, pp. 27\u201330. IEEE (2018)","DOI":"10.1109\/AI4I.2018.8665709"},{"key":"1_CR27","unstructured":"Verma, V., et al.: Manifold mixup: better representations by interpolating hidden states. In: ICML, pp. 6438\u20136447. PMLR (2019)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: IEEE ICDM, pp. 598\u2013607. IEEE (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Wang, H., Feng, J., Peng, L., Pan, S., Zhao, S., Jin, H.: Anomaly detection of multivariate time series based on metric learning. In: ICPCSEE, pp. 94\u2013110. Springer (2022)","DOI":"10.1007\/978-981-19-5194-7_8"},{"key":"1_CR30","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? In: ICLR (2019)"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Xu, Z., Huang, X., Zhao, Y., Dong, Y., Li, J.: Contrastive attributed network anomaly detection with data augmentation. In: PAKDD, pp. 444\u2013457. Springer (2022)","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"1_CR32","unstructured":"Zhang, G., et\u00a0al.: Dual-discriminative graph neural network for imbalanced graph-level anomaly detection. In: NeurIPS. vol.\u00a035, pp. 24144\u201324157 (2022)"},{"key":"1_CR33","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: Beyond empirical risk minimization. In: ICLR (2018)"},{"issue":"3","key":"1_CR34","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1089\/big.2021.0069","volume":"11","author":"L Zhao","year":"2023","unstructured":"Zhao, L., Akoglu, L.: On using classification datasets to evaluate graph outlier detection: peculiar observations and new insights. Big Data 11(3), 151\u2013180 (2023)","journal-title":"Big Data"},{"key":"1_CR35","unstructured":"Zhao, L., Sawlani, S., Srinivasan, A., Akoglu, L.: Graph anomaly detection with unsupervised GNNs. arXiv:2210.09535 (2022)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:48Z","timestamp":1749927048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}