{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T02:28:41Z","timestamp":1771986521474,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s00778-021-00723-z","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T18:07:56Z","timestamp":1642442876000},"page":"1085-1101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["eRiskCom: an e-commerce risky community detection platform"],"prefix":"10.1007","volume":"31","author":[{"given":"Fanzhen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Baokun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiaming","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yiqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiqiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"issue":"11","key":"723_CR1","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.14778\/3137628.3137640","volume":"10","author":"E Akbas","year":"2017","unstructured":"Akbas, E., Zhao, P.: Truss-based community search: a truss-equivalence based indexing approach. Proc. VLDB Endow. 10(11), 1298\u20131309 (2017)","journal-title":"Proc. VLDB Endow."},{"key":"723_CR2","doi-asserted-by":"crossref","unstructured":"Akoglu, L., McGlohon, M., Faloutsos, C.: OddBall: spotting anomalies in weighted graphs. In: PAKDD, pp. 410\u2013421 (2010)","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"723_CR3","first-page":"626","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. DMKD 29, 626\u2013688 (2015)","journal-title":"DMKD"},{"key":"723_CR4","first-page":"1406","volume":"29","author":"N Barbieri","year":"2015","unstructured":"Barbieri, N., Bonchi, F., Galimberti, E., Gullo, F.: Efficient and effective community searchs. DMKD 29, 1406\u20131433 (2015)","journal-title":"DMKD"},{"key":"723_CR5","unstructured":"Batagelj, V., Zaversnik, M.: An O(m) algorithm for cores decomposition of networks. arXiv preprint arXiv:cs\/0310049 (2003)"},{"issue":"10","key":"723_CR6","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. 2008(10), P10008 (2008)","journal-title":"J. Stat. Mech."},{"key":"723_CR7","doi-asserted-by":"crossref","unstructured":"Chang, L., Lin, X., Qin, L., Yu, J.X., Zhang, W.: Index-based optimal algorithms for computing steiner components with maximum connectivity. In: SIGMOD, pp. 459\u2013474 (2015)","DOI":"10.1145\/2723372.2746486"},{"key":"723_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y.L., Kuo, M.H., Wu, S.Y., Tang, K.: Discovering recency, frequency, and monetary (RFM) sequential patterns from customers\u2019 purchasing data. Electron. Commer. Rec. Appl. 8(5), 241\u2013251 (2009)","DOI":"10.1016\/j.elerap.2009.03.002"},{"key":"723_CR9","doi-asserted-by":"publisher","first-page":"026132","DOI":"10.1103\/PhysRevE.72.026132","volume":"72","author":"A Clauset","year":"2005","unstructured":"Clauset, A.: Finding local community structure in networks. Phys. Rev. E 72, 026132 (2005)","journal-title":"Phys. Rev. E"},{"key":"723_CR10","unstructured":"Cohen, J.: Trusses: cohesive subgraphs for social network analysis. Technical report, National Security Agency (2008)"},{"issue":"2","key":"723_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/5254.850825","volume":"15","author":"DJ Cook","year":"2000","unstructured":"Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. Appl. 15(2), 32\u201341 (2000)","journal-title":"IEEE Intell. Syst. Appl."},{"key":"723_CR12","doi-asserted-by":"crossref","unstructured":"Cui, W., Xiao, Y., Wang, H., Lu, Y., Wang, W.: Online search of overlapping communities. In: SIGMOD, pp. 277\u2013288 (2013)","DOI":"10.1145\/2463676.2463722"},{"key":"723_CR13","doi-asserted-by":"crossref","unstructured":"Cui, W., Xiao, Y., Wang, H., Wang, W.: Local search of communities in large graphs. In: SIGMOD, pp. 991\u20131002 (2014)","DOI":"10.1145\/2588555.2612179"},{"key":"723_CR14","doi-asserted-by":"crossref","unstructured":"Davis, M., Liu, W., Miller, P., Redpath, G.: Detecting anomalies in graphs with numeric labels. In: CIKM, pp. 1197\u20131202 (2011)","DOI":"10.1145\/2063576.2063749"},{"key":"723_CR15","doi-asserted-by":"crossref","unstructured":"Derzsy, N., Majumdar, S., Malik, R.: An interpretable graph-based mapping of trustworthy machine learning research. In: Complex Networks XII, pp. 73\u201385 (2021)","DOI":"10.1007\/978-3-030-81854-8_7"},{"key":"723_CR16","doi-asserted-by":"crossref","unstructured":"Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., Crovella, M.: Intrusion as (anti)social communication: characterization and detection. In: KDD, pp. 886\u2013894 (2012)","DOI":"10.1145\/2339530.2339670"},{"key":"723_CR17","doi-asserted-by":"crossref","unstructured":"Eberle, W., Holder, L.: Discovering structural anomalies in graph-based data. In: ICDMW, pp. 393\u2013398 (2007)","DOI":"10.1109\/ICDMW.2007.91"},{"key":"723_CR18","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, pp. 226\u2013231 (1996)"},{"key":"723_CR19","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1007\/s00778-017-0482-5","volume":"26","author":"Y Fang","year":"2017","unstructured":"Fang, Y., Cheng, R., Chen, Y., Luo, S., Hu, J.: Effective and efficient attributed community search. VLDB J. 26, 803\u2013828 (2017)","journal-title":"VLDB J."},{"key":"723_CR20","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s00778-019-00556-x","volume":"29","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Huang, X., Qin, L., Zhang, Y., Cheng, R., Lin, X.: A survey of community search over big graphs. VLDB J. 29, 353\u2013392 (2020)","journal-title":"VLDB J."},{"key":"723_CR21","volume-title":"Algorithmic Graph Theory","author":"A Gibbons","year":"1985","unstructured":"Gibbons, A.: Algorithmic Graph Theory. Cambridge University Press, Cambridge (1985)"},{"issue":"12","key":"723_CR22","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan, M., Newman, M.E.: Community structure in social and biological networks. PNAS 99(12), 7821\u20137826 (2002)","journal-title":"PNAS"},{"key":"723_CR23","doi-asserted-by":"crossref","unstructured":"Gupta, M., Mallya, A., Roy, S., Cho, J.H.D., Han, J.: Local learning for mining outlier subgraphs from network datasets. In: SDM, pp. 73\u201381 (2014)","DOI":"10.1137\/1.9781611973440.9"},{"key":"723_CR24","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: NIPS, pp. 1024\u20131034 (2017)"},{"issue":"3","key":"723_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/3199524.3199537","volume":"45","author":"A Hollocou","year":"2018","unstructured":"Hollocou, A., Bonald, T., Lelarge, M.: Multiple local community detection. SIGMETRICS Perform. Eval. Rev. 45(3), 76\u201383 (2018)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"723_CR26","doi-asserted-by":"crossref","unstructured":"Hooi, B., Shin, K., Song, H.A., Beutel, A., Shah, N., Faloutsos, C.: Graph-based fraud detection in the face of camouflage. ACM TKDD 11(4) (2017)","DOI":"10.1145\/3056563"},{"issue":"11","key":"723_CR27","first-page":"2455","volume":"29","author":"J Hu","year":"2017","unstructured":"Hu, J., Wu, X., Cheng, R., Luo, S., Fang, Y.: On minimal steiner maximum-connected subgraph queries. IEEE TKDE 29(11), 2455\u20132469 (2017)","journal-title":"IEEE TKDE"},{"key":"723_CR28","doi-asserted-by":"crossref","unstructured":"Huang, Q., Zhou, C., Wu, J., Wang, M., Wang, B.: Deep structure learning for rumor detection on twitter. In: IJCNN, pp. 1\u20138 (2019)","DOI":"10.1109\/IJCNN.2019.8852468"},{"key":"723_CR29","doi-asserted-by":"crossref","unstructured":"Huang, X., Cheng, H., Qin, L., Tian, W., Yu, J.X.: Querying k-truss community in large and dynamic graphs. In: SIGMOD, pp. 1311\u20131322 (2014)","DOI":"10.1145\/2588555.2610495"},{"issue":"4","key":"723_CR30","doi-asserted-by":"publisher","first-page":"276","DOI":"10.14778\/2856318.2856323","volume":"9","author":"X Huang","year":"2015","unstructured":"Huang, X., Lakshmanan, L.V.S., Yu, J.X., Cheng, H.: Approximate closest community search in networks. Proc. VLDB Endow. 9(4), 276\u2013287 (2015)","journal-title":"Proc. VLDB Endow."},{"key":"723_CR31","doi-asserted-by":"crossref","unstructured":"Jiang, M., Beutel, A., Cui, P., Hooi, B., Yang, S., Faloutsos, C.: A general suspiciousness metric for dense blocks in multimodal data. In: ICDM, pp. 781\u2013786 (2015)","DOI":"10.1109\/ICDM.2015.61"},{"key":"723_CR32","doi-asserted-by":"crossref","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Inferring strange behavior from connectivity pattern in social networks. In: PAKDD, pp. 126\u2013138 (2014)","DOI":"10.1007\/978-3-319-06608-0_11"},{"key":"723_CR33","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.eswa.2018.01.037","volume":"100","author":"J Jurgovsky","year":"2018","unstructured":"Jurgovsky, J., Granitzer, M., Ziegler, K., Calabretto, S., Portier, P.E., He-Guelton, L., Caelen, O.: Sequence classification for credit-card fraud detection. Expert Syst. Appl. 100, 234\u2013245 (2018)","journal-title":"Expert Syst. Appl."},{"key":"723_CR34","unstructured":"Kipf, T.N., Welling, M.: Variational graph auto-encoders. In: Bayesian Deep Learning Workshop, NIPS (2016)"},{"key":"723_CR35","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1016\/j.sbspro.2012.09.168","volume":"62","author":"M Kirlidog","year":"2012","unstructured":"Kirlidog, M., Asuk, C.: A fraud detection approach with data mining in health insurance. Procedia Soc. Behav. Sci. 62, 989\u2013994 (2012)","journal-title":"Procedia Soc. Behav. Sci."},{"issue":"5","key":"723_CR36","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM 46(5), 604\u2013632 (1999)","journal-title":"J. ACM"},{"key":"723_CR37","doi-asserted-by":"crossref","unstructured":"Kloumann, I.M., Kleinberg, J.M.: Community membership identification from small seed sets. In: KDD, pp. 1366\u20131375 (2014)","DOI":"10.1145\/2623330.2623621"},{"issue":"1","key":"723_CR38","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1090\/S0002-9939-1956-0078686-7","volume":"7","author":"JB Kruskal","year":"1956","unstructured":"Kruskal, J.B.: On the shortest spanning subtree of a graph and the traveling salesman problem. Proc. Am. Math. Soc. 7(1), 48\u201350 (1956)","journal-title":"Proc. Am. Math. Soc."},{"key":"723_CR39","doi-asserted-by":"crossref","unstructured":"Lebichot, B., Braun, F., Caelen, O., Saerens, M.: A graph-based, semi-supervised, credit card fraud detection system. In: Complex Networks, pp. 721\u2013733 (2016)","DOI":"10.1007\/978-3-319-50901-3_57"},{"issue":"2","key":"723_CR40","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/382979.383041","volume":"19","author":"R Lempel","year":"2001","unstructured":"Lempel, R., Moran, S.: SALSA: the stochastic approach for link-structure analysis. ACM TOIS 19(2), 131\u2013160 (2001)","journal-title":"ACM TOIS"},{"key":"723_CR41","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, X., Deng, K., Yang, X., Sellis, T., Yu, J.X.: Most influential community search over large social networks. In: ICDE, pp. 871\u2013882 (2017)","DOI":"10.1109\/ICDE.2017.136"},{"key":"723_CR42","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, S., Li, Z., Han, X., Shi, C., Hooi, B., Huang, H., Cheng, X.: Flowscope: spotting money laundering based on graphs. In: AAAI, pp. 4731\u20134738 (2020)","DOI":"10.1609\/aaai.v34i04.5906"},{"key":"723_CR43","doi-asserted-by":"crossref","unstructured":"Li, Y., He, K., Bindel, D., Hopcroft, J.E.: Uncovering the small community structure in large networks: a local spectral approach. In: WWW, pp. 658\u2013668 (2015)","DOI":"10.1145\/2736277.2741676"},{"key":"723_CR44","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11280-019-00710-z","volume":"23","author":"F Liu","year":"2020","unstructured":"Liu, F., Wu, J., Xue, S., Zhou, C., Yang, J., Sheng, Q.: Detecting the evolving community structure in dynamic social networks. World Wide Web 23, 715\u2013733 (2020)","journal-title":"World Wide Web"},{"key":"723_CR45","doi-asserted-by":"crossref","unstructured":"Liu, F., Wu, J., Zhou, C., Yang, J.: Evolutionary community detection in dynamic social networks. In: IJCNN, pp. 1\u20137 (2019)","DOI":"10.1109\/IJCNN.2019.8852006"},{"key":"723_CR46","doi-asserted-by":"crossref","unstructured":"Liu, F., Xue, S., Wu, J., Zhou, C., Hu, W., Paris, C., Nepal, S., Yang, J., Yu, P.S.: Deep learning for community detection: progress, challenges and opportunities. In: IJCAI, pp. 4981\u20134987 (2020)","DOI":"10.24963\/ijcai.2020\/693"},{"key":"723_CR47","unstructured":"Ma, J., Zhang, D., Wang, Y., Zhang, Y., Pozdnoukhov, A.: GraphRAD: a graph-based risky account detection system. In: MLG (2018)"},{"key":"723_CR48","doi-asserted-by":"crossref","unstructured":"Ma, X., Wu, J., Xue, S., Yang, J., Zhou, C., Sheng, Q.Z., Xiong, H., Akoglu, L.: A comprehensive survey on graph anomaly detection with deep learning. IEEE TKDE (2021)","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"723_CR49","doi-asserted-by":"crossref","unstructured":"Majumdar, S.: Fairness, explainability, privacy, and robustness for trustworthy algorithmic decision making. In: S.\u00a0Basak, M.\u00a0Vra\u010dko (eds.) Big Data Analytics in Chemoinformatics and Bioinformatics. Elsevier (2022)","DOI":"10.1016\/B978-0-323-85713-0.00017-7"},{"issue":"16","key":"723_CR50","first-page":"4191","volume":"63","author":"BA Miller","year":"2015","unstructured":"Miller, B.A., Beard, M.S., Wolfe, P.J., Bliss, N.T.: A spectral framework for anomalous subgraph detection. IEEE TSP 63(16), 4191\u20134206 (2015)","journal-title":"IEEE TSP"},{"key":"723_CR51","unstructured":"Miller, B.A., Bliss, N.T., Wolfe, P.J.: Subgraph detection using eigenvector L1 norms. In: NIPS, pp. 1633\u20131641 (2010)"},{"key":"723_CR52","doi-asserted-by":"publisher","first-page":"066133","DOI":"10.1103\/PhysRevE.69.066133","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman, M.E.J.: Fast algorithm for detecting community structure in networks. Phys. Rev. E 69, 066133 (2004)","journal-title":"Phys. Rev. E"},{"key":"723_CR53","doi-asserted-by":"publisher","first-page":"042822","DOI":"10.1103\/PhysRevE.88.042822","volume":"88","author":"MEJ Newman","year":"2013","unstructured":"Newman, M.E.J.: Spectral methods for community detection and graph partitioning. Phys. Rev. E 88, 042822 (2013)","journal-title":"Phys. Rev. E"},{"key":"723_CR54","doi-asserted-by":"publisher","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69, 026113 (2004)","journal-title":"Phys. Rev. E"},{"key":"723_CR55","doi-asserted-by":"crossref","unstructured":"Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: KDD, pp. 631\u2013636 (2003)","DOI":"10.1145\/956750.956831"},{"key":"723_CR56","doi-asserted-by":"publisher","first-page":"036106","DOI":"10.1103\/PhysRevE.76.036106","volume":"76","author":"UN Raghavan","year":"2007","unstructured":"Raghavan, U.N., Albert, R., Kumara, S.: Near linear time algorithm to detect community structures in large-scale networks. Phys. Rev. E 76, 036106 (2007)","journal-title":"Phys. Rev. E"},{"key":"723_CR57","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: KDD, pp. 98\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"key":"723_CR58","doi-asserted-by":"publisher","first-page":"016110","DOI":"10.1103\/PhysRevE.74.016110","volume":"74","author":"J Reichardt","year":"2006","unstructured":"Reichardt, J., Bornholdt, S.: Statistical mechanics of community detection. Phys. Rev. E 74, 016110 (2006)","journal-title":"Phys. Rev. E"},{"issue":"4","key":"723_CR59","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. PNAS 105(4), 1118\u20131123 (2008)","journal-title":"PNAS"},{"key":"723_CR60","doi-asserted-by":"crossref","unstructured":"Shin, K., Hooi, B., Faloutsos, C.: Fast, accurate, and flexible algorithms for dense subtensor mining. ACM TKDD 12(3) (2018)","DOI":"10.1145\/3154414"},{"key":"723_CR61","doi-asserted-by":"crossref","unstructured":"Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: ICDE, pp. 486\u2013495 (2008)","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"723_CR62","doi-asserted-by":"crossref","unstructured":"Sozio, M., Gionis, A.: The community-search problem and how to plan a successful cocktail party. In: KDD, pp. 939\u2013948 (2010)","DOI":"10.1145\/1835804.1835923"},{"key":"723_CR63","doi-asserted-by":"crossref","unstructured":"Su, X., Xue, S., Liu, F., Wu, J., Yang, J., Zhou, C., Hu, W., Paris, C., Nepal, S., Jin, D., Sheng, Q.Z., Yu, P.S.: A comprehensive survey on community detection with deep learning. arXiv preprint arXiv:2105.12584 (2021)","DOI":"10.1109\/TNNLS.2021.3137396"},{"key":"723_CR64","unstructured":"Sun, L., Huang, X., Li, R., Choi, B., Xu, J.: Index-based intimate-core community search in large weighted graphs. IEEE TKDE (2020)"},{"key":"723_CR65","doi-asserted-by":"crossref","unstructured":"Sun, Q., Li, J., Peng, H., Wu, J., Ning, Y., Yu, P.S., He, L.: SUGAR: subgraph neural network with reinforcement pooling and self-supervised mutual information mechanism. In: WWW, pp. 2081\u20132091 (2021)","DOI":"10.1145\/3442381.3449822"},{"key":"723_CR66","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhou, C., Wu, J., Dang, W., Zhu, X., Wang, J.: Deep structure learning for fraud detection. In: ICDM, pp. 567\u2013576 (2018)","DOI":"10.1109\/ICDM.2018.00072"},{"key":"723_CR67","unstructured":"Wang, L., Zong, B., Ma, Q., Cheng, W., Ni, J., Yu, W., Liu, Y., Song, D., Chen, H., Fu, Y.: Inductive and unsupervised representation learning on graph structured objects. In: ICLR (2020)"},{"key":"723_CR68","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, W., Wang, C., Gu, X., Li, B., Meng, D.: Community focusing: yet another query-dependent community detection. In: AAAI, pp. 329\u2013337 (2019)","DOI":"10.1609\/aaai.v33i01.3301329"},{"issue":"10","key":"723_CR69","first-page":"2382","volume":"26","author":"J Wu","year":"2014","unstructured":"Wu, J., Zhu, X., Zhang, C., Yu, P.S.: Bag constrained structure pattern mining for multi-graph classification. IEEE TKDE 26(10), 2382\u20132396 (2014)","journal-title":"IEEE TKDE"},{"issue":"7","key":"723_CR70","doi-asserted-by":"publisher","first-page":"798","DOI":"10.14778\/2752939.2752948","volume":"8","author":"Y Wu","year":"2015","unstructured":"Wu, Y., Jin, R., Li, J., Zhang, X.: Robust local community detection: On free rider effect and its elimination. Proc. VLDB Endow. 8(7), 798\u2013809 (2015)","journal-title":"Proc. VLDB Endow."},{"issue":"6","key":"723_CR71","doi-asserted-by":"publisher","first-page":"397","DOI":"10.14778\/1978665.1978671","volume":"4","author":"DN Yang","year":"2011","unstructured":"Yang, D.N., Chen, Y.L., Lee, W.C., Chen, M.S.: On social-temporal group query with acquaintance constraint. Proc. VLDB Endow. 4(6), 397\u2013408 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"723_CR72","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10115-013-0693-z","volume":"42","author":"J Yang","year":"2015","unstructured":"Yang, J., Leskovec, J.: Defining and evaluating network communities based on ground-truth. Knowl. Inf. Syst. 42, 181\u2013213 (2015)","journal-title":"Knowl. Inf. Syst."},{"key":"723_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, G., Zhao, L., Huang, J., Wu, J., Zhou, C., Yang, J.: eFraudCom: an e-commerce fraud detection system via competitive graph neural networks. ACM TOIS (2021)","DOI":"10.1145\/3474379"},{"key":"723_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Bian, J., Zhu, W.: Trust fraud: a crucial challenge for China\u2019s e-commerce market. Electron. Commer. Rec. Appl. 12(5), 29\u2013308 (2013)","DOI":"10.1016\/j.elerap.2012.11.005"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-021-00723-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00778-021-00723-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-021-00723-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T08:00:39Z","timestamp":1674460839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00778-021-00723-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":74,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["723"],"URL":"https:\/\/doi.org\/10.1007\/s00778-021-00723-z","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"21 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}