{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:40:48Z","timestamp":1767724848702,"version":"3.48.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shanghai Pujiang Program","award":["24PJA004"],"award-info":[{"award-number":["24PJA004"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2232025D-33"],"award-info":[{"award-number":["2232025D-33"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402491"],"award-info":[{"award-number":["62402491"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372146"],"award-info":[{"award-number":["62372146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62322202"],"award-info":[{"award-number":["62322202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U25B2029"],"award-info":[{"award-number":["U25B2029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2025M771524"],"award-info":[{"award-number":["2025M771524"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Technology Research and Development Program of the Zhejiang Province","award":["2025C01023"],"award-info":[{"award-number":["2025C01023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2025.3647221","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:23:11Z","timestamp":1766773391000},"page":"288-303","source":"Crossref","is-referenced-by-count":0,"title":["Learning Subgraph-Based Normality for Interpretable Graph-Level Anomaly Detection"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6009-780X","authenticated-orcid":false,"given":"Ge","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information and Intelligent Science, Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6588-3014","authenticated-orcid":false,"given":"Zhenyu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-5801","authenticated-orcid":false,"given":"Jia","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1049-1002","authenticated-orcid":false,"given":"Pengfei","family":"Jiao","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4408-1952","authenticated-orcid":false,"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0458-5977","authenticated-orcid":false,"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6645-0597","authenticated-orcid":false,"given":"Xixun","family":"Lin","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6045-0_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11857-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403383"},{"key":"ref4","first-page":"24144","article-title":"Dual-discriminative graph neural network for imbalanced graph-level anomaly detection","volume-title":"Proc. NeurIPS","author":"Zhang"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/305"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1089\/big.2021.0069"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498473"},{"key":"ref9","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff"},{"article-title":"Exploration by random network distillation","volume-title":"Proc. ICLR","author":"Burda","key":"ref10"},{"key":"ref11","first-page":"15524","article-title":"Interpretable and generalizable graph learning via stochastic attention mechanism","volume-title":"Proc. ICML","author":"Miao"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20335"},{"article-title":"Discovering invariant rationales for graph neural networks","volume-title":"Proc. ICLR","author":"Wu","key":"ref13"},{"key":"ref14","first-page":"15734","article-title":"Nested graph neural networks","volume-title":"Proc. NeurIPS","author":"Zhang"},{"article-title":"From stars to subgraphs: Uplifting any GNN with local structure awareness","volume-title":"Proc. ICLR","author":"Zhao","key":"ref15"},{"key":"ref16","first-page":"8975","article-title":"Towards self-interpretable graph-level anomaly detection","volume-title":"Proc. NeurIPS","author":"Liu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3711896.3736983"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015399"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6203"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1606.09375"},{"article-title":"Analyzing the expressive power of graph neural networks in a spectral perspective","volume-title":"Proc. ICLR","author":"Balcilar","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00067"},{"article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. ICLR","author":"Kipf","key":"ref23"},{"article-title":"Graph attention networks","volume-title":"Proc. ICLR","author":"Veli\u010dkovi\u0107","key":"ref24"},{"key":"ref25","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. NeurIPS","volume":"30","author":"Hamilton"},{"article-title":"How powerful are graph neural networks?","volume-title":"Proc. ICLR","author":"Xu","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2999032"},{"key":"ref29","first-page":"4805","article-title":"Hierarchical graph representation learning with differentiable pooling","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ying"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014602"},{"key":"ref31","first-page":"2153","article-title":"Provably powerful graph networks","volume-title":"Proc. NeurIPS","volume":"32","author":"Maron"},{"key":"ref32","first-page":"599","article-title":"Breaking the limits of message passing graph neural networks","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Balcilar"},{"issue":"77","key":"ref33","first-page":"2539","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"Shervashidze","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref34","first-page":"19620","article-title":"Parameterized explainer for graph neural network","volume-title":"Proc. NIPS","volume":"33","author":"Luo"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403085"},{"key":"ref36","first-page":"4203","article-title":"Improving molecular graph neural network explainability with orthonormalization and induced sparsity","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Henderson"},{"key":"ref37","first-page":"12225","article-title":"PGM-explainer: Probabilistic graphical model explanations for graph neural networks","volume-title":"Proc. NeurIPS","volume":"33","author":"Vu"},{"key":"ref38","first-page":"72446","article-title":"Evaluating post-hoc explanations for graph neural networks via robustness analysis","volume-title":"Proc. NeurIPS","author":"Fang"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2102-4_36"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref41","first-page":"20827","article-title":"Out-of-distribution detection with deep nearest neighbors","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sun"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3696410.3714879"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2025.3584090"},{"article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. ICLR","author":"Zong","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00299"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1606"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3272731"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516570"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.06.035"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570446"},{"article-title":"Categorical reparameterization with gumbel-softmax","volume-title":"Proc. ICLR","author":"Jang","key":"ref52"},{"article-title":"Auto-encoding variational Bayes","volume-title":"Proc. ICLR","author":"Kingma","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2320500"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1021\/jm00106a046"},{"key":"ref56","first-page":"4204","article-title":"Understanding attention and generalization in graph neural networks","volume-title":"Proc. NIPS","author":"Knyazev"},{"key":"ref57","article-title":"TUDataset: A collection of benchmark datasets for learning with graphs","author":"Morris","year":"2020","journal-title":"arXiv:2007.08663"},{"key":"ref58","first-page":"9240","article-title":"GNNExplainer: Generating explanations for graph neural networks","volume-title":"Proc. NeurIPS","author":"Ying"},{"article-title":"Interpreting graph neural networks for NLP with differentiable edge masking","volume-title":"Proc. ICLR","author":"Schlichtkrull","key":"ref59"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11316097.pdf?arnumber=11316097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:34:43Z","timestamp":1767724483000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3647221","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2026]]}}}