{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:14:13Z","timestamp":1763702053230,"version":"3.45.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NO. 62162067","NO. 62162067","NO. 62162067","NO. 62162067"],"award-info":[{"award-number":["NO. 62162067","NO. 62162067","NO. 62162067","NO. 62162067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10115-025-02606-z","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T05:58:49Z","timestamp":1760680729000},"page":"12637-12660","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph representation learning method using diffusion sampling for dynamic graph anomaly detection"],"prefix":"10.1007","volume":"67","author":[{"given":"Jing","family":"He","sequence":"first","affiliation":[]},{"given":"Mian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"YunYun","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"2606_CR1","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1016\/j.ins.2022.06.075","volume":"607","author":"S Kumar","year":"2022","unstructured":"Kumar S, Mallik A, Khetarpal A, Panda B (2022) Influence maximization in social networks using graph embedding and graph neural network. Inf Sci 607:1617\u20131636","journal-title":"Inf Sci"},{"key":"2606_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103627","volume":"302","author":"I Tiddi","year":"2022","unstructured":"Tiddi I, Schlobach S (2022) Knowledge graphs as tools for explainable machine learning: a survey. Artif Intell 302:103627","journal-title":"Artif Intell"},{"issue":"3","key":"2606_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474379","volume":"40","author":"G Zhang","year":"2022","unstructured":"Zhang G, Li Z, Huang J, Wu J, Zhou C, Yang J, Gao J (2022) Efraudcom: an e-commerce fraud detection system via competitive graph neural networks. ACM Transactions on Information Systems (TOIS) 40(3):1\u201329","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"2606_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117921","volume":"207","author":"W Jiang","year":"2022","unstructured":"Jiang W, Luo J (2022) Graph neural network for traffic forecasting: a survey. Expert Syst Appl 207:117921","journal-title":"Expert Syst Appl"},{"key":"2606_CR5","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Cong, F., Zhang, D., Gong, W., Lin, Q., Feng, W., Dong, Y., Tang, J.: Wingnn: Dynamic graph neural networks with random gradient aggregation window. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3650\u20133662 (2023)","DOI":"10.1145\/3580305.3599551"},{"key":"2606_CR6","doi-asserted-by":"crossref","unstructured":"Khan, W., Mohd, A., Suaib, M., Ishrat, M., Shaikh, A.A., Faisal, S.M.: Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks. Data Science and Management (2024)","DOI":"10.1016\/j.dsm.2024.09.002"},{"key":"2606_CR7","doi-asserted-by":"crossref","unstructured":"Khan, W., Ishrat, M., Ahmed, M.N., Abidin, S., Husain, M., Izhar, M., Zamani, A.T., Hussain, M.R., Ali, A.: Enhancing anomaly detection in attributed networks using proximity preservation and advanced embedding techniques. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3544260"},{"key":"2606_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ijcce.2022.08.002","volume":"3","author":"W Khan","year":"2022","unstructured":"Khan W, Haroon M (2022) An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks. International Journal of Cognitive Computing in Engineering 3:153\u2013160","journal-title":"International Journal of Cognitive Computing in Engineering"},{"key":"2606_CR9","doi-asserted-by":"publisher","first-page":"91160","DOI":"10.1109\/ACCESS.2022.3201332","volume":"10","author":"W Khan","year":"2022","unstructured":"Khan W, Haroon M, Khan AN, Hasan MK, Khan A, Mokhtar UA, Islam S (2022) Dvaegmm: dual variational autoencoder with gaussian mixture model for anomaly detection on attributed networks. IEEE Access 10:91160\u201391176","journal-title":"IEEE Access"},{"key":"2606_CR10","doi-asserted-by":"crossref","unstructured":"Khan, W., Ishrat, M., Khan, A.N., Arif, M., Shaikh, A.A., Khubrani, M.M., Alam, S., Shuaib, M., John, R.: Detecting anomalies in attributed networks through sparse canonical correlation analysis combined with random masking and padding. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3398555"},{"key":"2606_CR11","doi-asserted-by":"crossref","unstructured":"Khan, W., Ebrahim, N.: Anogat-sparse-tl: A hybrid framework combining sparsification and graph attention for anomaly detection in attributed networks using the optimized loss function incorporating the twersky loss for improved robustness. Knowledge-Based Systems, 113144 (2025)","DOI":"10.1016\/j.knosys.2025.113144"},{"key":"2606_CR12","doi-asserted-by":"crossref","unstructured":"Kim, H., Lee, B.S., Shin, W.-Y., Lim, S.: Graph anomaly detection with graph neural networks: Current status and challenges. IEEE Access (2022)","DOI":"10.1109\/ACCESS.2022.3211306"},{"key":"2606_CR13","doi-asserted-by":"crossref","unstructured":"Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2672\u20132681 (2018)","DOI":"10.1145\/3219819.3220024"},{"key":"2606_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, L., Li, Z., Li, J., Li, Z., Gao, J.: Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn. In: IJCAI, vol. 3, p. 7 (2019)","DOI":"10.24963\/ijcai.2019\/614"},{"key":"2606_CR15","doi-asserted-by":"crossref","unstructured":"Cai, L., Chen, Z., Luo, C., Gui, J., Ni, J., Li, D., Chen, H.: Structural temporal graph neural networks for anomaly detection in dynamic graphs. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, pp. 3747\u20133756 (2021)","DOI":"10.1145\/3459637.3481955"},{"key":"2606_CR16","unstructured":"Yang, C., Zhou, L., Wen, H., Zhou, Z., Wu, Y.: H-vgrae: A hierarchical stochastic spatial-temporal embedding method for robust anomaly detection in dynamic networks. arXiv preprint arXiv:2007.06903 (2020)"},{"key":"2606_CR17","unstructured":"Liu, Y., Pan, S., Wang, Y.G., Xiong, F., Wang, L., Chen, Q., Lee, V.C.: Anomaly detection in dynamic graphs via transformer. IEEE Transactions on Knowledge and Data Engineering (2021)"},{"key":"2606_CR18","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.neunet.2023.07.026","volume":"166","author":"D Guo","year":"2023","unstructured":"Guo D, Liu Z, Li R (2023) Regraphgan: a graph generative adversarial network model for dynamic network anomaly detection. Neural Netw 166:273\u2013285","journal-title":"Neural Netw"},{"issue":"1","key":"2606_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Networks 20(1):61\u201380","journal-title":"IEEE Trans Neural Networks"},{"key":"2606_CR20","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"2606_CR21","unstructured":"Goyal, P., Kamra, N., He, X., Liu, Y.: Dyngem: Deep embedding method for dynamic graphs. arXiv preprint arXiv:1805.11273 (2018)"},{"key":"2606_CR22","unstructured":"Sankar, A., Wu, Y., Gou, L., Zhang, W., Yang, H.: Dynamic graph representation learning via self-attention networks. arXiv preprint arXiv:1812.09430 (2018)"},{"key":"2606_CR23","doi-asserted-by":"crossref","unstructured":"Pareja, A., Domeniconi, G., Chen, J., Ma, T., Suzumura, T., Kanezashi, H., Kaler, T., Schardl, T., Leiserson, C.: Evolvegcn: Evolving graph convolutional networks for dynamic graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 5363\u20135370 (2020)","DOI":"10.1609\/aaai.v34i04.5984"},{"issue":"2","key":"2606_CR24","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TSMC.2022.3196506","volume":"53","author":"C-Y Zhang","year":"2022","unstructured":"Zhang C-Y, Yao Z-L, Yao H-Y, Huang F, Chen CP (2022) Dynamic representation learning via recurrent graph neural networks. IEEE Transactions on Systems Man and Cybernetics Systems 53(2):1284\u20131297","journal-title":"IEEE Transactions on Systems Man and Cybernetics Systems"},{"key":"2606_CR25","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Philip, S.Y.: Outlier detection in graph streams. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 399\u2013409 (2011). IEEE","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"2606_CR26","doi-asserted-by":"crossref","unstructured":"Ranshous, S., Harenberg, S., Sharma, K., Samatova, N.F.: A scalable approach for outlier detection in edge streams using sketch-based approximations. In: Proceedings of the 2016 SIAM International Conference on Data Mining, pp. 189\u2013197 (2016). SIAM","DOI":"10.1137\/1.9781611974348.22"},{"key":"2606_CR27","doi-asserted-by":"crossref","unstructured":"Manzoor, E., Milajerdi, S.M., Akoglu, L.: Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1035\u20131044 (2016)","DOI":"10.1145\/2939672.2939783"},{"key":"2606_CR28","doi-asserted-by":"crossref","unstructured":"Eswaran, D., Faloutsos, C., Guha, S., Mishra, N.: Spotlight: Detecting anomalies in streaming graphs. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1378\u20131386 (2018)","DOI":"10.1145\/3219819.3220040"},{"key":"2606_CR29","unstructured":"Gasteiger, J., Wei\u00dfenberger, S., G\u00fcnnemann, S.: Diffusion improves graph learning. Advances in neural information processing systems 32 (2019)"},{"key":"2606_CR30","volume-title":"The pagerank citation ranking: Bring order to the web","author":"L Page","year":"1998","unstructured":"Page L, Brin S, Motwani R, Winograd T (1998) The pagerank citation ranking: Bring order to the web. Technical report, stanford University, Technical report"},{"key":"2606_CR31","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"issue":"2","key":"2606_CR32","first-page":"1010","volume":"24","author":"P Moral","year":"2018","unstructured":"Moral P, Villemonais D (2018) Exponential mixing properties for time inhomogeneous diffusion processes with killing. Bernoulli 24(2):1010\u20131032","journal-title":"Bernoulli"},{"issue":"2","key":"2606_CR33","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.socnet.2009.02.002","volume":"31","author":"T Opsahl","year":"2009","unstructured":"Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Social networks 31(2):155\u2013163","journal-title":"Social networks"},{"key":"2606_CR34","doi-asserted-by":"crossref","unstructured":"Rossi, R., Ahmed, N.: The network data repository with interactive graph analytics and visualization. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 29 (2015)","DOI":"10.1609\/aaai.v29i1.9277"},{"issue":"1","key":"2606_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1052812.1052825","volume":"35","author":"B Zhang","year":"2005","unstructured":"Zhang B, Liu R, Massey D, Zhang L (2005) Collecting the internet as-level topology. ACM SIGCOMM Computer Communication Review 35(1):53\u201361","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"2606_CR36","doi-asserted-by":"crossref","unstructured":"Kumar, S., Spezzano, F., Subrahmanian, V., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 221\u2013230 (2016). IEEE","DOI":"10.1109\/ICDM.2016.0033"},{"key":"2606_CR37","doi-asserted-by":"crossref","unstructured":"Kumar, S., Hooi, B., Makhija, D., Kumar, M., Faloutsos, C., Subrahmanian, V.: Rev2: Fraudulent user prediction in rating platforms. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 333\u2013341 (2018)","DOI":"10.1145\/3159652.3159729"},{"issue":"07","key":"2606_CR38","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TKDE.2023.3328645","volume":"36","author":"J Guo","year":"2024","unstructured":"Guo J, Tang S, Li J, Pan K, Wu L (2024) Rustgraph: robust anomaly detection in dynamic graphs by jointly learning structural-temporal dependency. IEEE Transactions on Knowledge & Data Engineering 36(07):3472\u20133485","journal-title":"IEEE Transactions on Knowledge & Data Engineering"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02606-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02606-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02606-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:06:53Z","timestamp":1763701613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02606-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":38,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2606"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02606-z","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"1 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}