{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:13Z","timestamp":1749928213540,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_6","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:44Z","timestamp":1749927044000},"page":"70-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tailored Bipartite Graph Anomaly Detection via\u00a0Fixed-Attention Network"],"prefix":"10.1007","author":[{"given":"Shaowen","family":"Tang","sequence":"first","affiliation":[]},{"given":"Raymond","family":"K. Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Chai, Z., You, S., Yang, Y., Pu, S., Xu, J., Cai, H., Jiang, W.: Can abnormality be detected by graph neural networks? In: IJCAI. pp. 1945\u20131951 (2022)","DOI":"10.24963\/ijcai.2022\/270"},{"issue":"11","key":"6_CR2","doi-asserted-by":"publisher","first-page":"3657","DOI":"10.14778\/3681954.3682028","volume":"17","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Jiang, J., Sun, S., He, B., Chen, M.: Rush: Real-time burst subgraph detection in dynamic graphs. Proceedings of the VLDB Endowment 17(11), 3657\u20133665 (2024)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Cui, L., Seo, H., Tabar, M., Ma, F., Wang, S., Lee, D.: Deterrent: Knowledge guided graph attention network for detecting healthcare misinformation. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining. pp. 492\u2013502 (2020)","DOI":"10.1145\/3394486.3403092"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Ding, K., Zhou, Q., Tong, H., Liu, H.: Few-shot network anomaly detection via cross-network meta-learning. In: Proceedings of the Web Conference 2021. pp. 2448\u20132456 (2021)","DOI":"10.1145\/3442381.3449922"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM\u201920) (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gao, Y., Wang, X., He, X., Liu, Z., Feng, H., Zhang, Y.: Addressing heterophily in graph anomaly detection: A perspective of graph spectrum. In: Proceedings of the ACM Web Conference 2023. pp. 1528\u20131538 (2023)","DOI":"10.1145\/3543507.3583268"},{"key":"6_CR7","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. In: NIPS (2017)"},{"key":"6_CR8","unstructured":"He, M., Wei, Z., Huang, Z., Xu, H.: Bernnet: Learning arbitrary graph spectral filters via bernstein approximation. In: NeurIPS (2021)"},{"key":"6_CR9","unstructured":"Hou, Y., Li, J., He, Z., Yan, A., Chen, X., McAuley, J.: Bridging language and items for retrieval and recommendation. arXiv preprint arXiv:2403.03952 (2024)"},{"key":"6_CR10","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: International Conference on Learning Representations (ICLR) (2017)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Li, A., Qin, Z., Liu, R., Yang, Y., Li, D.: Spam review detection with graph convolutional networks. In: Proceedings of the 28th ACM international conference on information and knowledge management. pp. 2703\u20132711 (2019)","DOI":"10.1145\/3357384.3357820"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ao, X., Qin, Z., Chi, J., Feng, J., Yang, H., He, Q.: Pick and choose: a gnn-based imbalanced learning approach for fraud detection. In: Proceedings of the web conference 2021. pp. 3168\u20133177 (2021)","DOI":"10.1145\/3442381.3449989"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, Z., Pan, S., Gong, C., Zhou, C., Karypis, G.: Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Transactions on Neural Networks and Learning Systems (2021)","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval. pp. 1569\u20131572 (2020)","DOI":"10.1145\/3397271.3401253"},{"issue":"12","key":"6_CR15","doi-asserted-by":"publisher","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma, X., Wu, J., Xue, S., Yang, J., Zhou, C., Sheng, Q.Z., Xiong, H., Akoglu, L.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. 35(12), 12012\u201312038 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., van\u00a0den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining. pp. 353\u2013362 (2019)","DOI":"10.1145\/3292500.3330871"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., Wu, J.: H2-fdetector: A gnn-based fraud detector with homophilic and heterophilic connections. In: Proceedings of the ACM web conference 2022. pp. 1486\u20131494 (2022)","DOI":"10.1145\/3485447.3512195"},{"key":"6_CR18","unstructured":"Tang, J., Li, J., Gao, Z., Li, J.: Rethinking graph neural networks for anomaly detection. In: International Conference on Machine Learning (2022)"},{"key":"6_CR19","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph Attention Networks. International Conference on Learning Representations (2018)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Wang, J., Wen, R., Wu, C., Huang, Y., Xion, J.: Fdgars: Fraudster detection via graph convolutional networks in online app review system. In: Companion Proceedings of The 2019 World Wide Web Conference. pp. 310\u2013316 (2019)","DOI":"10.1145\/3308560.3316586"},{"key":"6_CR21","unstructured":"Xie, Y., Liu, G., Yan, C., Jiang, C., Zhou, M., Li, M.: Learning transactional behavioral representations for credit card fraud detection. IEEE Transactions on Neural Networks and Learning Systems (2022)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, S., Yin, H., Chen, T., Hung, Q.V.N., Huang, Z., Cui, L.: Gcn-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd international ACM SIGIR conference on research and development in information retrieval. pp. 689\u2013698 (2020)","DOI":"10.1145\/3397271.3401165"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Ding, K., Liu, H., Tong, H.: Learning node abnormality with weak supervision. In: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management. pp. 3584\u20133594 (2023)","DOI":"10.1145\/3583780.3614950"},{"key":"6_CR24","unstructured":"Zhuo, W., Liu, Z., Hooi, B., He, B., Tan, G., Fathony, R., Chen, J.: Partitioning message passing for graph fraud detection. In: The Twelfth International Conference on Learning Representations (2024)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:54Z","timestamp":1749927054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}