{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T21:53:16Z","timestamp":1766267596298,"version":"3.37.3"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100007175","name":"Conseil National de la Recherche Scientifique","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007175","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.patcog.2020.107746","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T05:49:09Z","timestamp":1604296149000},"page":"107746","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":24,"special_numbering":"C","title":["A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs"],"prefix":"10.1016","volume":"112","author":[{"given":"Abd Errahmane","family":"Kiouche","sequence":"first","affiliation":[]},{"given":"Sofiane","family":"Lagraa","sequence":"additional","affiliation":[]},{"given":"Karima","family":"Amrouche","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0670-815X","authenticated-orcid":false,"given":"Hamida","family":"Seba","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patcog.2020.107746_bib0001","doi-asserted-by":"crossref","first-page":"107394","DOI":"10.1016\/j.patcog.2020.107394","article-title":"Video anomaly detection and localization using motion-field shape description and homogeneity testing","volume":"105","author":"Zhang","year":"2020","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0002","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.patrec.2020.07.020","article-title":"Blockchain-based anomaly detection of electricity consumption in smart grids","volume":"138","author":"Li","year":"2020","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patcog.2020.107746_bib0003","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.patcog.2018.11.019","article-title":"Online anomaly detection for long-term ecg monitoring using wearable devices","volume":"88","author":"Carrera","year":"2019","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0004","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.patrec.2017.11.004","article-title":"Distributing extreme learning machines with apache spark for netflow-based malware activity detection","volume":"101","author":"Kozik","year":"2018","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patcog.2020.107746_bib0005","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","article-title":"A comparative evaluation of outlier detection algorithms: experiments and analyses","volume":"74","author":"Domingues","year":"2018","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0006","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.patcog.2019.01.002","article-title":"Integration of deep feature extraction and ensemble learning for outlier detection","volume":"89","author":"Chakraborty","year":"2019","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0007","series-title":"Proceedings of the 2019 SIAM International Conference on Data Mining","first-page":"594","article-title":"Deep anomaly detection on attributed networks","author":"Ding","year":"2019"},{"key":"10.1016\/j.patcog.2020.107746_bib0008","series-title":"2018 IEEE International Conference on Data Mining (ICDM)","first-page":"953","article-title":"Sedanspot: Detecting anomalies in edge streams","author":"Eswaran","year":"2018"},{"key":"10.1016\/j.patcog.2020.107746_bib0009","series-title":"Proceedings of the 2012 SIAM international conference on data mining","first-page":"624","article-title":"Event detection in social streams","author":"Aggarwal","year":"2012"},{"key":"10.1016\/j.patcog.2020.107746_bib0010","article-title":"Mining fraudsters and fraudulent strategies in large-scale mobile social networks","author":"Yang","year":"2019","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"10.1016\/j.patcog.2020.107746_bib0011","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","article-title":"Graph based anomaly detection and description: asurvey","volume":"29","author":"Akoglu","year":"2015","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.patcog.2020.107746_bib0012","series-title":"Proceedings of the Sixth ACM International Conference on Web Search and Data Mining","first-page":"667","article-title":"Modeling dynamic behavior in large evolving graphs","author":"Rossi","year":"2013"},{"key":"10.1016\/j.patcog.2020.107746_bib0013","series-title":"Proceedings of the 2016\u00a0SIAM International Conference on Data Mining, Miami, Florida, USA, May 5\u20137, 2016","first-page":"189","article-title":"A scalable approach for outlier detection in edge streams using sketch-based approximations","author":"Ranshous","year":"2016"},{"key":"10.1016\/j.patcog.2020.107746_bib0014","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.patcog.2019.01.045","article-title":"Depth-based subgraph convolutional auto-encoder for network representation learning","volume":"90","author":"Zhang","year":"2019","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0015","series-title":"Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1035","article-title":"Fast memory-efficient anomaly detection in streaming heterogeneous graphs","author":"Manzoor","year":"2016"},{"key":"10.1016\/j.patcog.2020.107746_bib0016","series-title":"Proceedings of the 6th Industrial Conference on Data Mining Conference on Advances in Data Mining: Applications in Medicine, Web Mining, Marketing, Image and Signal Mining","first-page":"576","article-title":"Computer network monitoring and abnormal event detection using graph matching and multidimensional scaling","author":"Bunke","year":"2006"},{"key":"10.1016\/j.patcog.2020.107746_bib0017","doi-asserted-by":"crossref","DOI":"10.1142\/S0218001414500013","article-title":"Graph matching and learning in pattern recognition in the last 10 years","author":"Foggia","year":"2014","journal-title":"Int. J. Pattern Recognit Artif Intell."},{"issue":"5","key":"10.1016\/j.patcog.2020.107746_bib0018","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1007\/s10618-014-0367-9","article-title":"Classy: fast clustering streams of call-graphs","volume":"28","author":"Kostakis","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.patcog.2020.107746_sbref0019","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.patrec.2018.05.002","article-title":"On the exact computation of the graph edit distance","volume":"134","author":"Blumenthal","year":"2020","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"10.1016\/j.patcog.2020.107746_bib0020","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.patcog.2014.01.002","article-title":"A long trip in the charming world of graphs for pattern recognition","volume":"48","author":"Vento","year":"2015","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0021","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.patcog.2019.01.043","article-title":"Graph edit distance: restrictions to be a metric","volume":"90","author":"Serratosa","year":"2019","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2020.107746_bib0022","series-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"1378","article-title":"Spotlight: Detecting anomalies in streaming graphs","author":"Eswaran","year":"2018"},{"issue":"1","key":"10.1016\/j.patcog.2020.107746_bib0023","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","article-title":"An improved data stream summary: the count-min sketch and its applications","volume":"55","author":"Cormode","year":"2005","journal-title":"J. Algorithm."},{"issue":"3","key":"10.1016\/j.patcog.2020.107746_bib0024","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TKDE.2010.28","article-title":"Efficiently indexing large sparse graphs for similarity search","volume":"24","author":"Wang","year":"2012","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.patcog.2020.107746_bib0025","series-title":"Proceedings of the thiry-fourth annual ACM symposium on Theory of computing","first-page":"380","article-title":"Similarity estimation techniques from rounding algorithms","author":"Charikar","year":"2002"},{"key":"10.1016\/j.patcog.2020.107746_bib0026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TNNLS.2020.3004626","article-title":"A comprehensive survey on graph neural networks","author":"Wu","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.patcog.2020.107746_bib0027","series-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"2672","article-title":"Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks","author":"Yu","year":"2018"},{"key":"10.1016\/j.patcog.2020.107746_bib0028","series-title":"IJCAI","first-page":"4419","article-title":"Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn.","author":"Zheng","year":"2019"},{"key":"10.1016\/j.patcog.2020.107746_bib0029","series-title":"International Conference on Learning Representations","article-title":"Dyrep: Learning representations over dynamic graphs","author":"Trivedi","year":"2018"},{"key":"10.1016\/j.patcog.2020.107746_bib0030","series-title":"2018 IEEE International Conference on Big Data (Big Data)","first-page":"3762","article-title":"dynnode2vec: Scalable dynamic network embedding","author":"Mahdavi","year":"2018"},{"key":"10.1016\/j.patcog.2020.107746_bib0031","series-title":"AAAI","first-page":"5363","article-title":"Evolvegcn: Evolving graph convolutional networks for dynamic graphs.","author":"Pareja","year":"2020"},{"key":"10.1016\/j.patcog.2020.107746_bib0032","article-title":"Graph2vec: learning distributed representations of graphs","author":"Narayanan","year":"2017","journal-title":"arXiv preprint arXiv:1707.05005"},{"key":"10.1016\/j.patcog.2020.107746_bib0033","series-title":"Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1365","article-title":"Deep graph kernels","author":"Yanardag","year":"2015"},{"key":"10.1016\/j.patcog.2020.107746_bib0034","doi-asserted-by":"crossref","first-page":"107000","DOI":"10.1016\/j.patcog.2019.107000","article-title":"Dynamic graph convolutional networks","volume":"97","author":"Manessi","year":"2020","journal-title":"Pattern Recognit."},{"issue":"5","key":"10.1016\/j.patcog.2020.107746_bib0035","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.patrec.2009.10.011","article-title":"A graph matching method and a graph matching distance based on subgraph assignments","volume":"31","author":"Raveaux","year":"2010","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.patcog.2020.107746_bib0036","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1142\/S021800140900748X","article-title":"Graph classification based on vector space embedding","volume":"23","author":"Riesen","year":"2009","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"10.1016\/j.patcog.2020.107746_bib0037","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","article-title":"Silhouettes: a graphical aid to the interpretation and validation of cluster analysis","volume":"20","author":"Rousseeuw","year":"1987","journal-title":"J. Comput. Appl. Math."},{"year":"2001","author":"Grimmett","series-title":"Probability and Random Processes","key":"10.1016\/j.patcog.2020.107746_bib0038"},{"key":"10.1016\/j.patcog.2020.107746_bib0039","series-title":"Dynamic Networks in Cybersecurity","article-title":"Cybersecurity data sources for dynamic network research","author":"Kent","year":"2015"},{"key":"10.1016\/j.patcog.2020.107746_bib0040","series-title":"2007 IEEE symposium on computational intelligence and data mining","first-page":"504","article-title":"Incremental local outlier detection for data streams","author":"Pokrajac","year":"2007"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320320305495?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320320305495?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T03:46:02Z","timestamp":1669434362000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320320305495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":40,"alternative-id":["S0031320320305495"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2020.107746","relation":{},"ISSN":["0031-3203"],"issn-type":[{"type":"print","value":"0031-3203"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2020.107746","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107746"}}