{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:57:48Z","timestamp":1725663468119},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9377897","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T21:10:21Z","timestamp":1616188221000},"page":"44-53","source":"Crossref","is-referenced-by-count":1,"title":["GEDet: Adversarially Learned Few-shot Detection of Erroneous Nodes in Graphs"],"prefix":"10.1109","author":[{"given":"Sheng","family":"Guan","sequence":"first","affiliation":[]},{"given":"Peng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Hanchao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yinghui","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186106"},{"key":"ref32","article-title":"Metagan: An adversarial approach to few-shot learning","author":"zhang","year":"2018","journal-title":"NeurIPS"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"article-title":"Generalizing from a few examples: A survey on few-shot learning","year":"2019","author":"wang","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915232"},{"journal-title":"AllenNLP A deep semantic natural language processing platform","year":"2018","author":"gardner","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319888"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"kingma","key":"ref13"},{"article-title":"Semi-supervised classification with graph convolutional networks","year":"2016","author":"kipf","key":"ref14"},{"article-title":"Variational graph auto-encoders","year":"2016","author":"kipf","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00027"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/325"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3324956"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807178"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2012.01.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1561\/2200000013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935914"},{"key":"ref6","article-title":"Good semi-supervised learning that requires a bad gan","author":"dai","year":"2017","journal-title":"NeurIPS"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11872","article-title":"Graphgan: Graph representation learning with generative adversarial nets","author":"wang","year":"2018","journal-title":"AAAI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2912574"},{"article-title":"Labeled graph generative adversarial networks","year":"2019","author":"fan","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271768"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14778\/2850578.2850579"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196916"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994518"},{"key":"ref20","article-title":"Knowledge graph refinement: A survey of approaches and evaluation methods","author":"paulheim","year":"2017","journal-title":"Semantic Web"},{"article-title":"The effectiveness of data augmentation in image classification using deep learning","year":"2017","author":"perez","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/488"},{"journal-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","year":"2015","author":"radford","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017915495"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"ref25","article-title":"Improved techniques for training gans","author":"salimans","year":"2016","journal-title":"NeurIPS"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09377897.pdf?arnumber=9377897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T00:55:28Z","timestamp":1671670528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9377897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9377897","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}