{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:58:42Z","timestamp":1757627922158,"version":"3.44.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:00:00Z","timestamp":1756425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:00:00Z","timestamp":1756425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171180"],"award-info":[{"award-number":["62171180"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["252300421237"],"award-info":[{"award-number":["252300421237"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Special projects of Henan Province","award":["251111210900"],"award-info":[{"award-number":["251111210900"]}]},{"name":"Science and Technology Research Project of Henan Province","award":["252102211014"],"award-info":[{"award-number":["252102211014"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"DOI":"10.1140\/epjds\/s13688-025-00584-4","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T11:18:32Z","timestamp":1756466312000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A cross-social platform distributed anomaly behavior detection method"],"prefix":"10.1140","volume":"14","author":[{"given":"Ling","family":"Xing","sequence":"first","affiliation":[]},{"given":"Shiyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Honghai","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huahong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kaikai","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,29]]},"reference":[{"issue":"4","key":"584_CR1","doi-asserted-by":"publisher","first-page":"5917","DOI":"10.1007\/s40747-024-01446-8","volume":"10","author":"L Xing","year":"2024","unstructured":"Xing L, Li S, Zhang Q, et al. (2024) A survey on social network\u2019s anomalous behavior detection. Complex Intell Syst 10(4):5917\u20135932","journal-title":"Complex Intell Syst"},{"issue":"10","key":"584_CR2","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/TKDE.2019.2912817","volume":"32","author":"H Lin","year":"2020","unstructured":"Lin H, Liu GA, Wu JJ, et al. (2020) Fraud detection in dynamic interaction network. IEEE Trans Knowl Data Eng 32(10):1936\u20131950","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"584_CR3","doi-asserted-by":"crossref","unstructured":"Ma X, Liu F, Wu J, Yang J, Xue S, Sheng QZ (2024) Rethinking unsupervised graph anomaly detection with deep learning: residuals and objectives. IEEE Trans Knowl Data Eng","DOI":"10.1109\/TKDE.2024.3501307"},{"issue":"9","key":"584_CR4","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144\u2013150","journal-title":"IEEE Commun Mag"},{"key":"584_CR5","unstructured":"Su X, Xue S, Liu F, Wu J, Yang J, Zhou C, Hu W, Paris C, Nepal S, Jin D, et al (2022) A comprehensive survey on community detection with deep learning. IEEE Trans Neural Netw Learn Syst"},{"key":"584_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109408","volume":"252","author":"B Cai","year":"2022","unstructured":"Cai B, Wang M, Chen Y, Hu Y, Liu M (2022) Mff-net: a multi-feature fusion network for community detection in complex network. Knowl-Based Syst 252:109408","journal-title":"Knowl-Based Syst"},{"key":"584_CR7","doi-asserted-by":"crossref","unstructured":"Xing L, Huang Y, Zhang Q, Wu H, Ma H, Zhang X (2024) A counterfactual inference-based social network user-alignment algorithm. IEEE Trans Comput Soc Syst","DOI":"10.1109\/TCSS.2024.3405999"},{"issue":"8","key":"584_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1063\/5.0005105","volume":"30","author":"ZY Ruan","year":"2020","unstructured":"Ruan ZY, Yu B, Shu XC, et al. (2020) The impact of malicious nodes on the spreading of false information. Chaos 30(8):8","journal-title":"Chaos"},{"issue":"6380","key":"584_CR9","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359(6380):1146\u20131151","journal-title":"Science"},{"issue":"4","key":"584_CR10","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11280-016-0416-y","volume":"20","author":"WB Hu","year":"2017","unstructured":"Hu WB, Wang H, Qiu ZY, et al. (2017) An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent. World Wide Web 20(4):775\u2013795","journal-title":"World Wide Web"},{"key":"584_CR11","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/ICSC.2018.00028","volume-title":"2018 IEEE 12th International Conference on Semantic Computing (ICSC)","author":"F Persia","year":"2018","unstructured":"Persia F, Helmer S (2018) A framework for high-level event detection in a social network context via an extension of iseql. In: 2018 IEEE 12th International Conference on Semantic Computing (ICSC). IEEE, pp\u00a0140\u2013147"},{"issue":"5","key":"584_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2022.101745","volume":"13","author":"S Cheng","year":"2022","unstructured":"Cheng S (2022) Research on data privacy protection technology of social network users based on differential disturbance. Ain Shams Eng J 13(5):101745","journal-title":"Ain Shams Eng J"},{"key":"584_CR13","first-page":"1273","volume-title":"Proceedings of the 20th international conference on artificial intelligence and statistics (AISTATS)","author":"B McMahan","year":"2017","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th international conference on artificial intelligence and statistics (AISTATS). PMLR, pp\u00a01273\u20131282"},{"key":"584_CR14","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.comcom.2021.08.016","volume":"178","author":"J Mu","year":"2021","unstructured":"Mu J, Zhang XC, Li YG, et al. (2021) Deep neural network for text anomaly detection in siot. Comput Commun 178:286\u2013296","journal-title":"Comput Commun"},{"key":"584_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1155\/2022\/3498123","volume":"2022","author":"R Qasim","year":"2022","unstructured":"Qasim R, Bangyal WH, Alqarni MA, et al. (2022) A fine-tuned bert-based transfer learning approach for text classification. J Healthcare Eng 2022:17","journal-title":"J Healthcare Eng"},{"issue":"2","key":"584_CR16","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TII.2017.2753202","volume":"14","author":"M Al-Qurishi","year":"2018","unstructured":"Al-Qurishi M, Hossain MS, Alrubaian M, et al. (2018) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Ind Inform 14(2):799\u2013813","journal-title":"IEEE Trans Ind Inform"},{"key":"584_CR17","unstructured":"Drif A, Hamida ZF, Giordano S (2019) Fake news detection method based on text-features, pp\u00a027\u201332"},{"key":"584_CR18","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1016\/j.procs.2020.03.276","volume":"167","author":"S Deepak","year":"2020","unstructured":"Deepak S, Chitturi B (2020) Deep neural approach to fake-news identification. Proc Comput Sci 167:2236\u20132243","journal-title":"Proc Comput Sci"},{"key":"584_CR19","first-page":"1","volume-title":"2021 IEEE international IoT, electronics and mechatronics conference (IEMTRONICS)","author":"A Keshavarzi","year":"2021","unstructured":"Keshavarzi A, Kannan N, Kochut K (2021) Regpattern2vec: link prediction in knowledge graphs. In: 2021 IEEE international IoT, electronics and mechatronics conference (IEMTRONICS). IEEE, pp\u00a01\u20137"},{"issue":"10","key":"584_CR20","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/TKDE.2019.2912817","volume":"32","author":"H Lin","year":"2020","unstructured":"Lin H, Liu GA, Wu JJ, et al. (2020) Fraud detection in dynamic interaction network. IEEE Trans Knowl Data Eng 32(10):1936\u20131950","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"584_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1002\/widm.1260","volume":"8","author":"L Bahri","year":"2018","unstructured":"Bahri L, Carminati B, Ferrari E (2018) Knowledge-based approaches for identity management in online social networks. Wiley Interdiscip Rev Data Min Knowl Discov 8(5):10","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"584_CR22","first-page":"5685","volume-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)","author":"HY Fan","year":"2020","unstructured":"Fan HY, Zhang FB, Li ZY, et al. (2020) Anomalydae: dual autoencoder for anomaly detection on attributed networks. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). IEEE, pp\u00a05685\u20135689"},{"key":"584_CR23","doi-asserted-by":"crossref","unstructured":"Zhang L, Wu B, Dong P (2025) Attribute graph anomaly detection utilizing memory networks enhanced by multi-embedding comparison. Neurocomputing 129762","DOI":"10.1016\/j.neucom.2025.129762"},{"issue":"7","key":"584_CR24","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TKDE.2023.3328645","volume":"36","author":"J Guo","year":"2023","unstructured":"Guo J, Tang S, Li J, Pan K, Wu L (2023) Rustgraph: robust anomaly detection in dynamic graphs by jointly learning structural-temporal dependency. IEEE Trans Knowl Data Eng 36(7):3472\u20133485","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"584_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neucom.2020.04.047","volume":"407","author":"LG Xue","year":"2020","unstructured":"Xue LG, Chen Y, Luo MN, et al. (2020) An anomaly detection framework for time-evolving attributed networks. Neurocomputing 407:39\u201349","journal-title":"Neurocomputing"},{"issue":"6","key":"584_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1063\/1.5026855","volume":"28","author":"Y Yasami","year":"2018","unstructured":"Yasami Y, Safaei F (2018) Detecting chaotic behaviors in dynamic complex social networks using a feature diffusion-aware model. Chaos 28(6):9","journal-title":"Chaos"},{"key":"584_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112185","volume":"300","author":"T Lei","year":"2024","unstructured":"Lei T, Ou M, Gong C, Li J, Yang K (2024) An unsupervised deep global\u2013local views model for anomaly detection in attributed networks. Knowl-Based Syst 300:112185","journal-title":"Knowl-Based Syst"},{"key":"584_CR28","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. Proc Mach Learn Syst 2:429\u2013450","journal-title":"Proc Mach Learn Syst"},{"key":"584_CR29","unstructured":"Smith V, Chiang C-K, Sanjabi M, Talwalkar AS (2017) Federated multi-task learning. Adv Neural Inf Process Syst 30"},{"key":"584_CR30","unstructured":"Wang H, Yurochkin M, Sun Y, Papailiopoulos D, Khazaeni Y (2020) Federated learning with matched averaging. arXiv preprint. arXiv:2002.06440"},{"key":"584_CR31","unstructured":"Arivazhagan MG, Aggarwal V, Singh AK, Choudhary S (2019) Federated learning with personalization layers. arXiv preprint. arXiv:1912.00818"},{"key":"584_CR32","first-page":"21394","volume":"33","author":"C T.\u00a0Dinh","year":"2020","unstructured":"T.\u00a0Dinh C, Tran N, Nguyen J (2020) Personalized federated learning with Moreau envelopes. Adv Neural Inf Process Syst 33:21394\u201321405","journal-title":"Adv Neural Inf Process Syst"},{"key":"584_CR33","unstructured":"Li X, Jiang M, Zhang X, Kamp M, Dou Q (2021) Fedbn: federated learning on non-iid features via local batch normalization. arXiv preprint. arXiv:2102.07623"},{"key":"584_CR34","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1145\/3133956.3133982","volume-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security","author":"K Bonawitz","year":"2017","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp\u00a01175\u20131191"},{"key":"584_CR35","unstructured":"Li T, Sanjabi M, Beirami A, Smith V (2019) Fair resource allocation in federated learning. arXiv preprint. arXiv:1905.10497"},{"key":"584_CR36","unstructured":"Acar DAE, Zhao Y, Navarro RM, Mattina M, Whatmough PN, Saligrama V (2021) Federated learning based on dynamic regularization. arXiv preprint. arXiv:2111.04263"},{"key":"584_CR37","doi-asserted-by":"crossref","unstructured":"Zhou X, Liang W, Kevin I, Wang K, Yada K, Yang LT, Ma J, Jin Q (2025) Decentralized federated graph learning with lightweight zero trust architecture for next-generation networking security. IEEE J Sel Areas Commun","DOI":"10.1109\/JSAC.2025.3560012"},{"key":"584_CR38","doi-asserted-by":"crossref","unstructured":"Zhou J, Wu J, Ni J, Wang Y, Pan Y, Su Z (2025) Protecting your attention during distributed graph learning: efficient privacy-preserving federated graph attention network. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2025.3536612"},{"key":"584_CR39","doi-asserted-by":"crossref","unstructured":"Li Z, Li C, Li M, Yang L, Weng J (2025) Federated graph transformer with mixture attentions for secure graph knowledge fusions. Inf Fusion: 102954","DOI":"10.1016\/j.inffus.2025.102954"},{"key":"584_CR40","unstructured":"Chen C, Hu W, Xu Z, Zheng Z (2021) Fedgl: federated graph learning framework with global self-supervision. arXiv preprint. arXiv:2105.03170"},{"key":"584_CR41","doi-asserted-by":"crossref","unstructured":"Chen F, Li P, Miyazaki T, Wu C (2021) Fedgraph: federated graph learning with intelligent sampling. IEEE Trans Parallel Distrib Syst","DOI":"10.1109\/TPDS.2021.3125565"},{"key":"584_CR42","unstructured":"Ni X, Xu X, Lyu L, Meng C, Wang W (2021) A vertical federated learning framework for graph convolutional network. arXiv preprint. arXiv:2106.11593"},{"key":"584_CR43","volume-title":"IJCAI workshops","author":"Y Pei","year":"2021","unstructured":"Pei Y, Mao R, Liu Y, Chen C, Xu S, Qiang F, Tech BE (2021) Decentralized federated graph neural networks. In: IJCAI workshops"},{"key":"584_CR44","volume-title":"NeurIPS (federated learning for graphs workshop)","author":"K Zhang","year":"2021","unstructured":"Zhang K, Yang C, Li X, Sun L, Yiu SM (2021) Subgraph federated learning with missing neighbor generation. In: NeurIPS (federated learning for graphs workshop)"},{"key":"584_CR45","unstructured":"He C, Balasubramanian K, Ceyani E, Yang C, Xie H, Sun L, He L, Yang L, Yu PS, Rong Y, et al (2021) Fedgraphnn: a federated learning system and benchmark for graph neural networks. arXiv preprint. arXiv:2104.07145"},{"key":"584_CR46","first-page":"6671","volume":"34","author":"K Zhang","year":"2021","unstructured":"Zhang K, Yang C, Li X, Sun L, Yiu SM (2021) Subgraph federated learning with missing neighbor generation. Adv Neural Inf Process Syst 34:6671\u20136682","journal-title":"Adv Neural Inf Process Syst"},{"key":"584_CR47","volume-title":"Proceedings of the international joint conference on artificial intelligence","author":"J Cai","year":"2024","unstructured":"Cai J, Zhang Y, Fan J, Ng S-K (2024) Lg-fgad: an effective federated graph anomaly detection framework. In: Proceedings of the international joint conference on artificial intelligence"},{"issue":"4","key":"584_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501808","volume":"13","author":"M Jiang","year":"2022","unstructured":"Jiang M, Jung T, Karl R, Zhao T (2022) Federated dynamic graph neural networks with secure aggregation for video-based distributed surveillance. ACM Trans Intell Syst Technol 13(4):1\u201323","journal-title":"ACM Trans Intell Syst Technol"},{"key":"584_CR49","doi-asserted-by":"crossref","unstructured":"Usman M, Lee Y (2025) Dfdg: adaptive federated learning for dynamic graph-based traffic forecasting. Knowl-Based Syst: 114019","DOI":"10.1016\/j.knosys.2025.114019"},{"key":"584_CR50","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1145\/2623330.2623732","volume-title":"Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining","author":"B Perozzi","year":"2014","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp\u00a0701\u2013710"},{"key":"584_CR51","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1145\/2939672.2939754","volume-title":"Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","author":"A Grover","year":"2016","unstructured":"Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp\u00a0855\u2013864"},{"key":"584_CR52","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inf Process Syst 30"},{"key":"584_CR53","doi-asserted-by":"publisher","first-page":"2672","DOI":"10.1145\/3219819.3220024","volume-title":"Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining","author":"W Yu","year":"2018","unstructured":"Yu W, Cheng W, Aggarwal CC, Zhang K, Chen H, Wang W (2018) Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp\u00a02672\u20132681"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00584-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-025-00584-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00584-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:20:02Z","timestamp":1757481602000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-025-00584-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,29]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["584"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-025-00584-4","relation":{},"ISSN":["2193-1127"],"issn-type":[{"type":"electronic","value":"2193-1127"}],"subject":[],"published":{"date-parts":[[2025,8,29]]},"assertion":[{"value":"7 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"66"}}