{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:21:06Z","timestamp":1772547666426,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819755714","type":"print"},{"value":"9789819755721","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5572-1_5","type":"book-chapter","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T23:03:11Z","timestamp":1725058991000},"page":"68-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging Homophily-Augmented Energy Propagation for\u00a0Bot Detection on\u00a0Graphs"],"prefix":"10.1007","author":[{"given":"Bradley","family":"Ashmore","sequence":"first","affiliation":[]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,31]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: Ton_iot telemetry dataset: a new generation dataset of iot and iiot for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Ashmore, B., Chen, L.: Hover: Homophilic oversampling via edge removal for class-imbalanced bot detection on graphs. In: CIKM, pp. 3728\u20133732 (2023)","DOI":"10.1145\/3583780.3615264"},{"key":"5_CR3","unstructured":"Bitterwolf, J., Meinke, A., Augustin, M., Hein, M.: Breaking down out-of-distribution detection. In: ICML, pp. 2041\u20132074 (2022)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Cen, J., Yun, P., Cai, J., Wang, M.Y., Liu, M.: Deep metric learning for open world semantic segmentation. In: ICCV, pp. 15333\u201315342 (2021)","DOI":"10.1109\/ICCV48922.2021.01505"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chatterjee, M., Namin, A.S., Datta, P.: Evidence fusion for malicious bot detection in iot. In: IEEE International Conference on Big Data, pp. 4545\u20134548 (2018)","DOI":"10.1109\/BigData.2018.8621895"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. JAIR 16, 321\u2013357 (2002)","journal-title":"JAIR"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, X., Wu, D.: Enhancing robustness of graph convolutional networks via dropping graph connections. In: ECML PKDD, pp. 412\u2013428 (2021)","DOI":"10.1007\/978-3-030-67664-3_25"},{"issue":"21","key":"5_CR8","doi-asserted-by":"publisher","first-page":"3500","DOI":"10.3390\/electronics11213500","volume":"11","author":"P Cui","year":"2022","unstructured":"Cui, P., Wang, J.: Out-of-distribution (ood) detection based on deep learning: a review. Electronics 11(21), 3500 (2022)","journal-title":"Electronics"},{"key":"5_CR9","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"5_CR10","unstructured":"Hendrycks, D., Gimpel, K.: A baseline for detecting misclassified and out-of-distribution examples in neural networks. In: ICLR (2017)"},{"key":"5_CR11","unstructured":"Hendrycks, D., Mazeika, M., Dietterich, T.: Deep anomaly detection with outlier exposure. In: ICLR (2019)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Hsu, Y.C., Shen, Y., Jin, H., Kira, Z.: Generalized odin: detecting out-of-distribution image without learning from out-of-distribution data. In: CVPR, pp. 10951\u201310960 (2020)","DOI":"10.1109\/CVPR42600.2020.01096"},{"key":"5_CR13","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: ICLR (2017)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Li, Q., Chen, L., Cai, Y., Wu, D.: Hierarchical graph neural network for patient treatment preference prediction with external knowledge. In: PAKDD, pp. 204\u2013215 (2023)","DOI":"10.1007\/978-3-031-33380-4_16"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, X., Chen, L., Wu, D.: Distilling knowledge on text graph for social media attribute inference. In: SIGIR, pp. 2024\u20132028 (2022)","DOI":"10.1145\/3477495.3531968"},{"key":"5_CR16","first-page":"30277","volume":"35","author":"Z Li","year":"2022","unstructured":"Li, Z., Wu, Q., Nie, F., Yan, J.: Graphde: a generative framework for debiased learning and out-of-distribution detection on graphs. Adv. Neural. Inf. Process. Syst. 35, 30277\u201330290 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"12","key":"5_CR17","first-page":"6999","volume":"33","author":"Z Li","year":"2021","unstructured":"Li, Z., Liu, F., Yang, W., Peng, S., Zhou, J.: A survey of convolutional neural networks: analysis, applications, and prospects. TNNLS 33(12), 6999\u20137019 (2021)","journal-title":"TNNLS"},{"key":"5_CR18","unstructured":"Liang, S., Li, Y., Srikant, R.: Enhancing the reliability of out-of-distribution image detection in neural networks. In: ICLR (2018)"},{"key":"5_CR19","first-page":"20887","volume":"34","author":"D Lim","year":"2021","unstructured":"Lim, D., Hohne, F., Li, X.: Large scale learning on non-homophilous graphs: new benchmarks and strong simple methods. NeurIPS 34, 20887\u201320902 (2021)","journal-title":"NeurIPS"},{"key":"5_CR20","first-page":"21464","volume":"33","author":"W Liu","year":"2020","unstructured":"Liu, W., Wang, X., Owens, J., Li, Y.: Energy-based out-of-distribution detection. Adv. Neural. Inf. Process. Syst. 33, 21464\u201321475 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zheng, Y., Zhang, D., Lee, V.C., Pan, S.: Beyond smoothing: Unsupervised graph representation learning with edge heterophily discriminating. In: AAAI, pp. 4516\u20134524 (2023)","DOI":"10.1609\/aaai.v37i4.25573"},{"key":"5_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100747","volume":"22","author":"WW Lo","year":"2023","unstructured":"Lo, W.W., Kulatilleke, G., Sarhan, M., Layeghy, S., Portmann, M.: Xg-bot: an explainable deep graph neural network for botnet detection and forensics. Internet Things 22, 100747 (2023)","journal-title":"Internet Things"},{"key":"5_CR23","first-page":"1362","volume":"35","author":"S Luan","year":"2022","unstructured":"Luan, S., Hua, C., Lu, Q., Zhu, J., Zhao, M.: Revisiting heterophily for graph neural networks. NeurIPS 35, 1362\u20131375 (2022)","journal-title":"NeurIPS"},{"key":"5_CR24","first-page":"1048","volume":"34","author":"J Ma","year":"2021","unstructured":"Ma, J., Deng, J., Mei, Q.: Subgroup generalization and fairness of graph neural networks. NeurIPS 34, 1048\u20131061 (2021)","journal-title":"NeurIPS"},{"key":"5_CR25","unstructured":"Ma, Y., Liu, X., Shah, N., Tang, J.: Is homophily a necessity for graph neural networks? In: ICLR (2022)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Moustafa, N.: A new distributed architecture for evaluating ai-based security systems at the edge: Network ton_iot datasets. Sustainable Cities and Society (2021)","DOI":"10.1016\/j.scs.2021.102994"},{"key":"5_CR27","unstructured":"Pei, H., Wei, B., Chang, K.C.C., Lei, Y., Yang, B.: Geom-gcn: geometric graph convolutional networks. In: ICLR (2020)"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"159756","DOI":"10.1109\/ACCESS.2020.3020507","volume":"8","author":"BM Rahal","year":"2020","unstructured":"Rahal, B.M., Santos, A., Nogueira, M.: A distributed architecture for ddos prediction and bot detection. IEEE Access 8, 159756\u2013159772 (2020)","journal-title":"IEEE Access"},{"key":"5_CR29","first-page":"18033","volume":"34","author":"M Stadler","year":"2021","unstructured":"Stadler, M., Charpentier, B.: Graph posterior network: Bayesian predictive uncertainty for node classification. NeurIPS 34, 18033\u201318048 (2021)","journal-title":"NeurIPS"},{"key":"5_CR30","first-page":"144","volume":"34","author":"Y Sun","year":"2021","unstructured":"Sun, Y., Guo, C., Li, Y.: React: Out-of-distribution detection with rectified activations. Adv. Neural. Inf. Process. Syst. 34, 144\u2013157 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5_CR31","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. In: ICLR (2018)"},{"key":"5_CR32","unstructured":"Wu, Q., Chen, Y., Yang, C., Yan, J.: Energy-based out-of-distribution detection for graph neural networks. In: ICLR (2023)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Yan, Y., Hashemi, M., Swersky, K., Yang, Y., Koutra, D.: Two sides of the same coin: Heterophily and oversmoothing in graph convolutional neural networks. In: ICDM, pp. 1287\u20131292 (2022)","DOI":"10.1109\/ICDM54844.2022.00169"},{"key":"5_CR34","first-page":"12964","volume":"35","author":"N Yang","year":"2022","unstructured":"Yang, N., Zeng, K., Wu, Q., Jia, X., Yan, J.: Learning substructure invariance for out-of-distribution molecular representations. NeurIPS 35, 12964\u201312978 (2022)","journal-title":"NeurIPS"},{"key":"5_CR35","unstructured":"Yang, Z., Cohen, W., Salakhudinov, R.: Revisiting semi-supervised learning with graph embeddings. In: ICML, pp. 40\u201348 (2016)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, B., Li, J., Chen, C., Lee, K., Lee, I.: A practical botnet traffic detection system using gnn. In: CSS, pp. 66\u201378 (2022)","DOI":"10.1007\/978-3-030-94029-4_5"},{"issue":"1","key":"5_CR37","first-page":"27","volume":"9","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Perdisci, R., Lee, W., Luo, X., Sarfraz, U.: Building a scalable system for stealthy p2p-botnet detection. TIFS 9(1), 27\u201338 (2013)","journal-title":"TIFS"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Zhao, T., Zhang, X., Wang, S.: Graphsmote: imbalanced node classification on graphs with graph neural networks. In: WSDM, pp. 833\u2013841 (2021)","DOI":"10.1145\/3437963.3441720"},{"key":"5_CR39","unstructured":"Zhou, J., Xu, Z., Rush, A.M., Yu, M.: Automating botnet detection with graph neural networks. In: MLSys (2020)"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Zhu, J., et al.: Graph neural networks with heterophily. In: AAAI, pp. 11168\u201311176 (2021)","DOI":"10.1609\/aaai.v35i12.17332"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5572-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T23:04:14Z","timestamp":1725059054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5572-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755714","9789819755721"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5572-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gifu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2024a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dasfaa2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}