{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T09:43:38Z","timestamp":1758361418429,"version":"3.44.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2024JKF02ZK10"],"award-info":[{"award-number":["2024JKF02ZK10"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10489-025-06402-8","type":"journal-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T20:01:41Z","timestamp":1744833701000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temporal subgraph contrastive learning for anomaly detection on dynamic attributed graphs"],"prefix":"10.1007","volume":"55","author":[{"given":"Yang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Minglai","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Wenjun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"6402_CR1","unstructured":"Ma X, Wu J, Xue S, Yang J, Zhou C, Sheng QZ, Xiong H, Akoglu L (2021) A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans Knowl Data Eng"},{"key":"6402_CR2","doi-asserted-by":"crossref","unstructured":"Anand K, Kumar J, Anand K (2017) Anomaly detection in online social network: A survey. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp 456\u2013459. IEEE","DOI":"10.1109\/ICICCT.2017.7975239"},{"key":"6402_CR3","doi-asserted-by":"crossref","unstructured":"Hooi B, Song HA, Beutel A, Shah N, Shin K, Faloutsos C (2016) Fraudar: Bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 895\u2013904","DOI":"10.1145\/2939672.2939747"},{"key":"6402_CR4","volume-title":"efraudcom: An e-commerce fraud detection system via competitive graph neural networks","author":"G Zhang","year":"2018","unstructured":"Zhang G, Li Z, Huang J, Wu J, Zhou C, Yang J (2018) efraudcom: An e-commerce fraud detection system via competitive graph neural networks. ACM Trans. Inf, Syst"},{"issue":"3","key":"6402_CR5","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Mining Knowl Disc 29(3):626\u2013688","journal-title":"Data Mining Knowl Disc"},{"key":"6402_CR6","doi-asserted-by":"crossref","unstructured":"Cai L, Chen Z, Luo C, Gui J, Ni J, Li D, Chen H (2021) Structural temporal graph neural networks for anomaly detection in dynamic graphs. In: the ACM International Conference on Information and Knowledge Management, pp 3747\u20133756","DOI":"10.1145\/3459637.3481955"},{"issue":"2","key":"6402_CR7","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.ifacol.2018.03.074","volume":"51","author":"A Narayan","year":"2018","unstructured":"Narayan A, Roe PH (2018) Learning graph dynamics using deep neural networks. IFAC-PapersOnLine 51(2):433\u2013438","journal-title":"IFAC-PapersOnLine"},{"key":"6402_CR8","doi-asserted-by":"crossref","unstructured":"Ji T, Yang D, Gao J (2013) Incremental local evolutionary outlier detection for dynamic social networks. In: the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp 1\u201315. Springer","DOI":"10.1007\/978-3-642-40991-2_1"},{"key":"6402_CR9","doi-asserted-by":"crossref","unstructured":"Yu Y, Wang W, Wu N, Liu H, Shao M (2022) Iisd: Integrated interaction subgraph detection for event mining. Knowl-Based Syst (Mar.15), 240","DOI":"10.1016\/j.knosys.2021.108080"},{"key":"6402_CR10","doi-asserted-by":"crossref","unstructured":"Tang C, Xu L, Yang B, Tang Y, Zhao D (2023) Gru-based interpretable multivariate time series anomaly detection in industrial control system. Comput Secur 127:103094","DOI":"10.1016\/j.cose.2023.103094"},{"key":"6402_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.inffus.2022.10.008","volume":"91","author":"G Li","year":"2023","unstructured":"Li G, Jung JJ (2023) Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges. Inf Fusion 91:93\u2013102","journal-title":"Inf Fusion"},{"key":"6402_CR12","doi-asserted-by":"crossref","unstructured":"Yu Y, Wang W, Wu N, Liu H, Shao M (2022) Iisd: Integrated interaction subgraph detection for event mining. Knowl-Based Syst 240:108080","DOI":"10.1016\/j.knosys.2021.108080"},{"key":"6402_CR13","doi-asserted-by":"crossref","unstructured":"Ding K, Li J, Bhanushali R, Liu H (2019) Deep anomaly detection on attributed networks. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp 594\u2013602. SIAM","DOI":"10.1137\/1.9781611975673.67"},{"key":"6402_CR14","unstructured":"Liu Y, Pan S, Wang YG, Xiong F, Wang L, Chen Q, Lee VC (2021) Anomaly detection in dynamic graphs via transformer. IEEE Trans Knowl Data Eng"},{"key":"6402_CR15","doi-asserted-by":"crossref","unstructured":"Jin M, Liu Y, Zheng Y, Chi L, Li Y-F, Pan S (2021) Anemone: Graph anomaly detection with multi-scale contrastive learning. In: Proceedings of the 30th ACM International Conference on Information & Knowledge Management, pp 3122\u20133126","DOI":"10.1145\/3459637.3482057"},{"key":"6402_CR16","doi-asserted-by":"crossref","unstructured":"Pareja A, Domeniconi G, Chen J, Ma T, Suzumura T, Kanezashi H, Kaler T, Schardl T, Leiserson C (2020) Evolvegcn: Evolving graph convolutional networks for dynamic graphs. In: the AAAI Conference on Artificial Intelligence, vol 34, pp 5363\u20135370","DOI":"10.1609\/aaai.v34i04.5984"},{"key":"6402_CR17","doi-asserted-by":"crossref","unstructured":"Yoon M, Hooi B, Shin K, Faloutsos C (2019) Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In: the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 647\u2013657","DOI":"10.1145\/3292500.3330946"},{"issue":"23","key":"6402_CR18","doi-asserted-by":"publisher","first-page":"28655","DOI":"10.1007\/s10489-023-04985-8","volume":"53","author":"B Xue","year":"2023","unstructured":"Xue B, Gao X, Zhai F, Li B, Yu J, Fu S, Chen L, Meng Z (2023) A contrastive autoencoder with multi-resolution segment-consistency discrimination for multivariate time series anomaly detection. Appl Intell 53(23):28655\u201328674","journal-title":"Appl Intell"},{"key":"6402_CR19","doi-asserted-by":"crossref","unstructured":"Teng X, Lin Y-R, Wen X (2017) Anomaly detection in dynamic networks using multi-view time-series hypersphere learning. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp 827\u2013836","DOI":"10.1145\/3132847.3132964"},{"key":"6402_CR20","doi-asserted-by":"crossref","unstructured":"Cho K, Van\u00a0Merri\u00ebnboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"6402_CR21","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:1609.02907"},{"key":"6402_CR22","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. arXiv:1710.10903"},{"key":"6402_CR23","unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv:1810.00826"},{"key":"6402_CR24","first-page":"13272","volume":"33","author":"S Geisler","year":"2020","unstructured":"Geisler S, Z\u00fcgner D, G\u00fcnnemann S (2020) Reliable graph neural networks via robust aggregation. Adv Neural Inf Process Syst 33:13272\u201313284","journal-title":"Adv Neural Inf Process Syst"},{"key":"6402_CR25","first-page":"7548","volume":"33","author":"S Zhu","year":"2020","unstructured":"Zhu S, Pan S, Zhou C, Wu J, Cao Y, Wang B (2020) Graph geometry interaction learning. Adv Neural Inf Process Syst 33:7548\u20137558","journal-title":"Adv Neural Inf Process Syst"},{"issue":"6","key":"6402_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450316","volume":"15","author":"M Wu","year":"2021","unstructured":"Wu M, Pan S, Du L, Zhu X (2021) Learning graph neural networks with positive and unlabeled nodes. ACM Trans Knowl Disc Data (TKDD) 15(6):1\u201325","journal-title":"ACM Trans Knowl Disc Data (TKDD)"},{"key":"6402_CR27","doi-asserted-by":"crossref","unstructured":"Kale R, Thing VLL (2023) Few-shot weakly-supervised cybersecurity anomaly detection. Comput Secur 130:103194","DOI":"10.1016\/j.cose.2023.103194"},{"key":"6402_CR28","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.ins.2021.11.008","volume":"584","author":"Y Gao","year":"2022","unstructured":"Gao Y, Yu X, Zhang H (2022) Graph clustering using triangle-aware measures in large networks. Inf Sci 584:618\u2013632","journal-title":"Inf Sci"},{"key":"6402_CR29","doi-asserted-by":"crossref","unstructured":"Gao Y, Yu X, Zhang H (2021) Overlapping community detection by constrained personalized pagerank. Exp Syst Appl 173:114682","DOI":"10.1016\/j.eswa.2021.114682"},{"key":"6402_CR30","doi-asserted-by":"crossref","unstructured":"Chen J, Pi D, Wang X (2024) A two-stage adversarial transformer based approach for multivariate industrial time series anomaly detection. Appl Intell, 1\u201320","DOI":"10.1007\/s10489-024-05395-0"},{"key":"6402_CR31","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neucom.2020.04.047","volume":"407","author":"L Xue","year":"2020","unstructured":"Xue L, Chen Y, Luo M, Peng Z, Liu J (2020) An anomaly detection framework for time-evolving attributed networks. Neurocomput 407:39\u201349","journal-title":"Neurocomput"},{"key":"6402_CR32","doi-asserted-by":"crossref","unstructured":"Goel R, Kazemi SM, Brubaker M, Poupart P (2020) Diachronic embedding for temporal knowledge graph completion. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 34, pp 3988\u20133995","DOI":"10.1609\/aaai.v34i04.5815"},{"key":"6402_CR33","doi-asserted-by":"crossref","unstructured":"Sharma K, Trivedi R, Sridhar R, Kumar S (2023) Temporal dynamics-aware adversarial attacks on discrete-time dynamic graph models. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 2023\u20132035","DOI":"10.1145\/3580305.3599517"},{"key":"6402_CR34","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.neucom.2022.08.072","volume":"509","author":"Y Yu","year":"2022","unstructured":"Yu Y, Wang W, Shao M, Wu N, Sun Y, Sun Y, Tian Q (2022) Multi-users interaction anomalous subgraph detection for event mining. Neurocomput 509:34\u201345","journal-title":"Neurocomput"},{"key":"6402_CR35","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.neunet.2023.07.026","volume":"166","author":"D Guo","year":"2023","unstructured":"Guo D, Liu Z, Li R (2023) Regraphgan: A graph generative adversarial network model for dynamic network anomaly detection. Neural Netw 166:273\u2013285","journal-title":"Neural Netw"},{"key":"6402_CR36","unstructured":"Liu J, Shang X, Han X, Zheng K, Yin H (2024) Detecting anomalies in dynamic graphs via memory enhanced normality"},{"key":"6402_CR37","doi-asserted-by":"crossref","unstructured":"Diro A, Kaisar S, Vasilakos AV, Anwar A, Nasirian A, Olani G (2024) Anomaly detection for space information networks: A survey of challenges, techniques, and future directions. Comput Secur 139:103705","DOI":"10.1016\/j.cose.2024.103705"},{"key":"6402_CR38","doi-asserted-by":"crossref","unstructured":"Sricharan K, Das K (2014) Localizing anomalous changes in time-evolving graphs. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp 1347\u20131358","DOI":"10.1145\/2588555.2612184"},{"key":"6402_CR39","doi-asserted-by":"crossref","unstructured":"Zheng L, Li Z, Li J, Li Z, Gao J (2019) Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn. In: IJCAI, pp 4419\u20134425","DOI":"10.24963\/ijcai.2019\/614"},{"key":"6402_CR40","doi-asserted-by":"crossref","unstructured":"Yu W, Cheng W, Aggarwal CC, Zhang K, Wang W (2018) Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks. In: the 24th ACM SIGKDD International Conference","DOI":"10.1145\/3219819.3220024"},{"key":"6402_CR41","unstructured":"Yang C, Zhou L, Wen H, Zhou Z, Wu Y (2020) H-vgrae: A hierarchical stochastic spatial-temporal embedding method for robust anomaly detection in dynamic networks. arXiv:2007.06903"},{"key":"6402_CR42","doi-asserted-by":"crossref","unstructured":"Chen A, Fu Y, Zheng X, lu G (2022) An efficient network behavior anomaly detection using a hybrid dbn-lstm network. Comput Secur 114:102600","DOI":"10.1016\/j.cose.2021.102600"},{"issue":"8","key":"6402_CR43","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"6402_CR44","doi-asserted-by":"crossref","unstructured":"Zuo Y, Liu G, Lin H, Guo J, Hu X, Wu J (2018) Embedding temporal network via neighborhood formation. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 2857\u20132866","DOI":"10.1145\/3219819.3220054"},{"issue":"2","key":"6402_CR45","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TNET.2022.3201668","volume":"31","author":"Y Gao","year":"2023","unstructured":"Gao Y, Zhang H, Yu X (2023) Higher-order community detection: On information degeneration and its elimination. IEEE\/ACM Trans Netw 31(2):891\u2013903","journal-title":"IEEE\/ACM Trans Netw"},{"key":"6402_CR46","unstructured":"Kong X, Zhang W, Wang H, Hou M, Chen X, Yan X, Das SK (2024) Federated graph anomaly detection via contrastive self-supervised learning. IEEE Trans Neural Netw Learn Syst, 1\u201314"},{"key":"6402_CR47","doi-asserted-by":"crossref","unstructured":"Tong, H., Faloutsos, C., Pan, J.-Y.: Fast random walk with restart and its applications. In: Sixth International Conference on Data Mining (ICDM\u201906), pp. 613\u2013622 (2006). IEEE","DOI":"10.1109\/ICDM.2006.70"},{"key":"6402_CR48","doi-asserted-by":"crossref","unstructured":"Desmier E, Plantevit M, Robardet C, Boulicaut J-F (2012) Cohesive co-evolution patterns in dynamic attributed graphs. In: International Conference on Discovery Science, pp 110\u2013124. Springer","DOI":"10.1007\/978-3-642-33492-4_11"},{"key":"6402_CR49","unstructured":"Zheng Y, Jin M, Liu Y, Chi L, Phan KT, Chen Y-PP (2021) Generative and contrastive self-supervised learning for graph anomaly detection. IEEE Trans Knowl Data Eng"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06402-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T19:37:14Z","timestamp":1758310634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06402-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":49,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["6402"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06402-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"23 February 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors all follow the COPE guidelines and the rules of good scientific practice. The authors also ensure that they respect the third party\u2019s rights, such as copyright and moral rights.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and Informed Consent for the Data Used"}}],"article-number":"667"}}