{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T14:28:01Z","timestamp":1774362481296,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2023YFC3304700"],"award-info":[{"award-number":["2023YFC3304700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72371011"],"award-info":[{"award-number":["72371011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72031001"],"award-info":[{"award-number":["72031001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72242101"],"award-info":[{"award-number":["72242101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72021001"],"award-info":[{"award-number":["72021001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Young Scientist Program of Beijing Universities","award":["JWZO20240201002"],"award-info":[{"award-number":["JWZO20240201002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tkde.2024.3523107","type":"journal-article","created":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T19:21:52Z","timestamp":1735240912000},"page":"1380-1393","source":"Crossref","is-referenced-by-count":34,"title":["Nowhere to H<sup>2<\/sup>IDE: Fraud Detection From Multi-Relation Graphs via Disentangled Homophily and Heterophily Identification"],"prefix":"10.1109","volume":"37","author":[{"given":"Chao","family":"Fu","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4532-7109","authenticated-orcid":false,"given":"Guannan","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6542-4483","authenticated-orcid":false,"given":"Kun","family":"Yuan","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7650-3657","authenticated-orcid":false,"given":"Junjie","family":"Wu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3150803"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025588"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2912817"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00072"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380204"},{"key":"ref11","first-page":"1025","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hamilton"},{"key":"ref12","article-title":"Graph attention networks","volume":"1050","author":"Velickovic","year":"2017","journal-title":"Stat"},{"key":"ref13","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401253"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512195"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/270"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1606.09375"},{"key":"ref19","article-title":"Fastgcn: Fast learning with graph convolutional networks via importance sampling","author":"Chen","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2932096"},{"key":"ref21","article-title":"Predict then propagate: Graph neural networks meet personalized pagerank","author":"Gasteiger","year":"2018"},{"key":"ref22","article-title":"How powerful are graph neural networks?","author":"Xu","year":"2018"},{"key":"ref23","article-title":"GraphSAINT: Graph sampling based inductive learning method","author":"Zeng","year":"2019"},{"key":"ref24","article-title":"Geom-GCN: Geometric graph convolutional networks","author":"Pei","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482487"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20864"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20340"},{"key":"ref28","first-page":"4751","article-title":"Diverse message passing for attribute with heterophily","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467373"},{"key":"ref30","article-title":"Adaptive universal generalized pagerank graph neural network","author":"Chien","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16514"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20319"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref34","first-page":"2180","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21397"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159802"},{"key":"ref37","first-page":"4212","article-title":"Disentangled graph convolutional networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ma"},{"key":"ref38","first-page":"20286","article-title":"Factorizable graph convolutional networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5929"},{"key":"ref40","article-title":"Adversarial graph disentanglement","author":"Zheng","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511929"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3096231"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411996"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467142"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512178"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00098"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583373"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3380709"},{"key":"ref50","first-page":"21076","article-title":"Rethinking graph neural networks for anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tang"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583268"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/380"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10855162\/10816539.pdf?arnumber=10816539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:52:09Z","timestamp":1738090329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10816539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":52,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3523107","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}