{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:14:04Z","timestamp":1742980444955,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819755714"},{"type":"electronic","value":"9789819755721"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5572-1_21","type":"book-chapter","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T23:03:11Z","timestamp":1725058991000},"page":"321-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EGNN-AD: An Effective Graph Neural Network-Based Approach for\u00a0Anomaly Detection on\u00a0Edge-Attributed Graphs"],"prefix":"10.1007","author":[{"given":"Hewen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bryan","family":"Hooi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"He","sequence":"additional","affiliation":[]},{"given":"Juncheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaokui","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,31]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ins.2022.01.048","volume":"592","author":"P Bielak","year":"2022","unstructured":"Bielak, P., Kajdanowicz, T., Chawla, N.V.: Attre2vec: unsupervised attributed edge representation learning. Inf. Sci. 592, 82\u201396 (2022)","journal-title":"Inf. Sci."},{"key":"21_CR2","unstructured":"Brody, S., Alon, U., Yahav, E.: How Attentive are Graph Attention Networks? In: ICLR (May 2022)"},{"key":"21_CR3","unstructured":"Defferrard, M., Bresson, X., Vandergheynst, P.: Convolutional neural networks on graphs with fast localized spectral filtering. NIPS 29 (2016)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: CIKM, pp. 315\u2013324 (2020)","DOI":"10.1145\/3340531.3411903"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Duan, D., Tong, L., Li, Y., Lu, J., Shi, L., Zhang, C.: AANE: anomaly aware network embedding for anomalous link detection. In: ICDM, pp. 1002\u20131007 (2020)","DOI":"10.1109\/ICDM50108.2020.00116"},{"key":"21_CR6","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs. NIPS 2017-Decem, 1025\u20131035 (2017)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Z., Dong, Y., Wang, K., Sun, Y.: Heterogeneous graph transformer. In: WWW, pp. 2704\u20132710 (2020)","DOI":"10.1145\/3366423.3380027"},{"key":"21_CR8","unstructured":"Liu, Y., et al.: Anomaly detection in dynamic graphs via transformer. In: TKDE, vol.\u00a014 (2021)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Z., Dou, Y., Yu, P.S., Deng, Y., Peng, H.: Alleviating the inconsistency problem of applying graph neural network to fraud detection. In: SIGIR, vol.\u00a04, pp. 1569\u20131572 (2020)","DOI":"10.1145\/3397271.3401253"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhou, J., Chen, C., Li, X., Yang, X., Song, L.: Heterogeneous graph neural networks for malicious account detection. In: CIKM, pp. 2077\u20132086 (2018)","DOI":"10.1145\/3269206.3272010"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. KDD 2015-Augus, 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using siamese BERT-networks. In: EMNLP-IJCNLP, pp. 3982\u20133992 (2020)","DOI":"10.18653\/v1\/D19-1410"},{"key":"21_CR13","unstructured":"Thekumparampil, K.K., Wang, C., Oh, S., Li, L.J.: Attention-based graph neural network for semi-supervised learning. arXiv preprint arXiv:1803.03735 (2018)"},{"key":"21_CR14","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph Attention Networks. In: ICLR (2017)"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391298","volume":"14","author":"C Wang","year":"2020","unstructured":"Wang, C., Wang, C., Wang, Z., Ye, X., Yu, P.S.: Edge2vec: edge-based social network embedding. TKDD 14(4), 1\u201324 (2020)","journal-title":"TKDD"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: A semi-supervised graph attentive network for financial fraud detection. In: ICDM, vol. 2019, pp. 598\u2013607 (2019)","DOI":"10.1109\/ICDM.2019.00070"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Wang, H., Yang, R., Huang, K., Xiao, X.: Efficient and effective edge-wise graph representation learning. In: KDD, pp. 2326\u20132336 (2023)","DOI":"10.1145\/3580305.3599321"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J., Wen, R., Wu, C., Huang, Y., Xiong, J.: FDGars: fraudster detection via graph convolutional networks in online app review system. In: WWW, pp. 310\u2013316 (2019)","DOI":"10.1145\/3308560.3316586"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Wang, R., et al.: Deep learning for anomaly detection. In: KDD, pp. 3569\u20133570 (2020)","DOI":"10.1145\/3394486.3406481"},{"key":"21_CR20","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)"},{"key":"21_CR21","unstructured":"Yun, S., Jeong, M., Kim, R., Kang, J., Kim, H.J.: Graph transformer networks. In: Advances in Neural Information Processing Systems, vol.\u00a032 (2019)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Fan, Y., Ye, Y., Zhao, L., Shi, C.: Key player identification in underground forums over attributed heterogeneous information network embedding framework. In: CIKM, pp. 549\u2013558 (2019)","DOI":"10.1145\/3357384.3357876"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Zheng, L., Li, Z.Z., Li, J., Li, Z.Z., Gao, J.: Addgraph: anomaly detection in dynamic graph using attention-based temporal GCN. In: IJCAI, vol. 2019-Augus, pp. 4419\u20134425 (2019)","DOI":"10.24963\/ijcai.2019\/614"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5572-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:49:57Z","timestamp":1732722597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5572-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755714","9789819755721"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5572-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gifu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dasfaa2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}