{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:31:57Z","timestamp":1757619117637,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819698172"},{"type":"electronic","value":"9789819698189"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9818-9_22","type":"book-chapter","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T12:24:48Z","timestamp":1752927888000},"page":"260-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-scale Contrastive Learning with Feature Fusion for Graph Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Mingjie","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jiong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"22_CR1","unstructured":"Tang, J., Hua, F., Gao, Z., Zhao, P., Li, J.: GADBench: revisiting and benchmarking supervised graph anomaly detection. In: Advances in Neural Information ProcessingSystems, vol. 36, pp. 29628\u201329653 (2023)"},{"key":"22_CR2","unstructured":"Huang, X., Yang, Y., Wang, Y.: DGraph: a large-scale financial dataset for graph anomaly detection. In: Advances in Neural Information Processing Systems, vol. 35, pp. 22765\u201322777 (2022)"},{"key":"22_CR3","unstructured":"Ahmed, S., Hinkelmann, K., Corradini, F.: Combining machine learning with knowledge engineering to detect fake news in social networks - a survey. In: AAAI, vol. 2350 (2019)"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TIFS.2022.3228493","volume":"18","author":"G Duan","year":"2022","unstructured":"Duan, G., Lv, H., Wang, H., Feng, G.: Application of a dynamic line graph neural network for intrusion detection with semisupervised learning. IEEE Trans. Inf. Forensics Secur. 18, 699\u2013714 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R.: Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining. pp. 594\u2013602 (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Akoglu, L.: Scalable anomaly ranking of attributed neighborhoods. In: Proceedings of the 2016 SIAM International Conference on Data Mining, pp. 207\u2013215 (2016)","DOI":"10.1137\/1.9781611974348.24"},{"key":"22_CR7","first-page":"2152","volume":"17","author":"J Li","year":"2017","unstructured":"Li, J., Dani, H., Hu, X., Liu, H.: Radar: residual analysis for anomaly detection in attributed networks. IJCAI 17, 2152\u20132158 (2017)","journal-title":"IJCAI"},{"key":"22_CR8","first-page":"3513","volume":"18","author":"Z Peng","year":"2018","unstructured":"Peng, Z., et al.: Anomalous: a joint modeling approach for anomaly detection on attributed networks. IJCAI 18, 3513\u20133519 (2018)","journal-title":"IJCAI"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Roy, A., et al.: GAD-NR: graph anomaly detection via neighborhood reconstruction. In: Proceedings of the 17th ACM International Conference on Web Search and Data Mining, pp. 576\u2013585 (2024)","DOI":"10.1145\/3616855.3635767"},{"issue":"6","key":"22_CR10","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TNNLS.2021.3068344","volume":"33","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Li, Z., Pan, S., Gong, C., Zhou, C., Karypis, G.: Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Trans. Neural Netw. Learn. Syst. 33(6), 2378\u20132392 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Jin, M., Liu, Y., Zheng, Y., Chi, L., Li, Y.F., Pan, S.: ANEMONE: graph anomaly detection with multi-scale contrastive learning. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, pp. 3122\u20133126 (2021)","DOI":"10.1145\/3459637.3482057"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Pan, J., et al.: PREM: a simple yet effective approach for node-level graph anomaly detection. In: 2023 IEEE International Conference on Data Mining, pp. 1253\u20131258 (2023)","DOI":"10.1109\/ICDM58522.2023.00157"},{"key":"22_CR13","unstructured":"Alon, U., Yahav, E.: On the bottleneck of graph neural networks and its practical implications. In: International Conference on Learning Representations (2021)"},{"key":"22_CR14","unstructured":"Dai, H., Kozareva, Z., Dai, B., Smola, A., Song, L.: Learning steady-states of iterative algorithms over graphs. In: International Conference on Machine Learning, pp. 1106\u20131114 (2018)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Y., Wang, L., Zhang, F., Lin, X.: Unsupervised graph outlier detection: Problem revisit, new insight, and superior method. In: 2023 IEEE 39th International Conference on Data Engineering, pp. 2565\u20132578 (2023)","DOI":"10.1109\/ICDE55515.2023.00197"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Duan, J., et al.: Graph anomaly detection via multi-scale contrastive learning networks with augmented view. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 7459\u20137467 (2023)","DOI":"10.1609\/aaai.v37i6.25907"},{"issue":"12","key":"22_CR17","doi-asserted-by":"publisher","first-page":"12220","DOI":"10.1109\/TKDE.2021.3119326","volume":"35","author":"Y Zheng","year":"2021","unstructured":"Zheng, Y., Jin, M., Liu, Y., Chi, L., Phan, K.T., Chen, Y.: Generative and contrastive self-supervised learning for graph anomaly detection. IEEE Trans. Knowl. Data Eng. 35(12), 12220\u201312233 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, S., Chen, S.: Reconstruction enhanced multi-view contrastive learning for anomaly detection on attributed networks. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence (2022)","DOI":"10.24963\/ijcai.2022\/330"},{"key":"22_CR19","unstructured":"Wu, Q., et al.: Simplifying and empowering transformers for large-graph representations. In: Advances in Neural Information Processing Systems, pp. 64753\u201364773 (2023)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, P.I., et al.: Statistical selection of congruent subspaces for mining attributed graphs. In: IEEE 13th International Conference on Data Mining, pp. 647\u2013656 (2013)","DOI":"10.1109\/ICDM.2013.88"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9818-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T14:54:17Z","timestamp":1757256857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9818-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698172","9789819698189"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9818-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}