{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:29:43Z","timestamp":1769747383065,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1614576"],"award-info":[{"award-number":["1614576"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,30]]},"DOI":"10.1145\/3289600.3290964","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"357-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":125,"title":["Interactive Anomaly Detection on Attributed Networks"],"prefix":"10.1145","author":[{"given":"Kaize","family":"Ding","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Jundong","family":"Li","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2463696"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-319-14142-8_8","volume-title":"Data Mining","author":"Aggarwal C. C.","year":"2015","unstructured":"C. C. Aggarwal . Outlier analysis . In Data Mining , pages 237 -- 263 , 2015 . C. C. Aggarwal. Outlier analysis. In Data Mining, pages 237--263, 2015."},{"key":"e_1_3_2_1_3_1","first-page":"127","volume-title":"ICML","author":"Agrawal S.","year":"2013","unstructured":"S. Agrawal and N. Goyal . Thompson sampling for contextual bandits with linear payoffs . In ICML , pages 127 -- 135 , 2013 . S. Agrawal and N. Goyal. Thompson sampling for contextual bandits with linear payoffs. In ICML, pages 127--135, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.38"},{"key":"e_1_3_2_1_7_1","volume-title":"Using confidence bounds for exploitation-exploration trade-offs. Machine Learning Research, 3(Nov):397--422","author":"Auer P.","year":"2002","unstructured":"P. Auer . Using confidence bounds for exploitation-exploration trade-offs. Machine Learning Research, 3(Nov):397--422 , 2002 . P. Auer. Using confidence bounds for exploitation-exploration trade-offs. Machine Learning Research, 3(Nov):397--422, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2003.9416096"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34487-9_40"},{"key":"e_1_3_2_1_11_1","first-page":"737","volume-title":"NIPS","author":"Cesa-Bianchi N.","year":"2013","unstructured":"N. Cesa-Bianchi , C. Gentile , and G. Zappella . A gang of bandits . In NIPS , pages 737 -- 745 , 2013 . N. Cesa-Bianchi, C. Gentile, and G. Zappella. A gang of bandits. In NIPS, pages 737--745, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_13_1","first-page":"2249","volume-title":"NIPS","author":"Chapelle O.","year":"2011","unstructured":"O. Chapelle and L. Li . An empirical evaluation of thompson sampling . In NIPS , pages 2249 -- 2257 , 2011 . O. Chapelle and L. Li. An empirical evaluation of thompson sampling. In NIPS, pages 2249--2257, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903148"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939765"},{"key":"e_1_3_2_1_16_1","first-page":"208","volume-title":"AISTATS","author":"Chu W.","year":"2011","unstructured":"W. Chu , L. Li , L. Reyzin , and R. Schapire . Contextual bandits with linear payoff functions . In AISTATS , pages 208 -- 214 , 2011 . W. Chu, L. Li, L. Reyzin, and R. Schapire. Contextual bandits with linear payoff functions. In AISTATS, pages 208--214, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610523"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339670"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835907"},{"key":"e_1_3_2_1_21_1","first-page":"148","volume-title":"Bandit processes and dynamic allocation indices","author":"Gittins J. C.","year":"1979","unstructured":"J. C. Gittins . Bandit processes and dynamic allocation indices . Royal Statistical Society , pages 148 -- 177 , 1979 . J. C. Gittins. Bandit processes and dynamic allocation indices. Royal Statistical Society, pages 148--177, 1979."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020512"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40708-016-0042-6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018667"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159655"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593666"},{"key":"e_1_3_2_1_27_1","volume-title":"International encyclopedia of ergonomics and human factors","author":"Karwowski W.","year":"2001","unstructured":"W. Karwowski . International encyclopedia of ergonomics and human factors , volume 3 . 2001 . W. Karwowski. International encyclopedia of ergonomics and human factors, volume 3. 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"e_1_3_2_1_29_1","first-page":"817","volume-title":"NIPS","author":"Langford J.","year":"2008","unstructured":"J. Langford and T. Zhang . The epoch-greedy algorithm for multi-armed bandits with side information . In NIPS , pages 817 -- 824 , 2008 . J. Langford and T. Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. In NIPS, pages 817--824, 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172187"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132919"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806501"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835811"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547453"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273587"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304256"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.24"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623682"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567993"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5110-1_13"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618243.2618266"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.88"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379473"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1009"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00065"},{"key":"e_1_3_2_1_48_1","volume-title":"Online interactive collaborative filtering using multi-armed bandit with dependent arms. arXiv preprint arXiv:1708.03058","author":"Wang Q.","year":"2017","unstructured":"Q. Wang , C. Zeng , W. Zhou , T. Li , L. Shwartz , and G. Y. Grabarnik . Online interactive collaborative filtering using multi-armed bandit with dependent arms. arXiv preprint arXiv:1708.03058 , 2017 . Q. Wang, C. Zeng, W. Zhou, T. Li, L. Shwartz, and G. Y. Grabarnik. Online interactive collaborative filtering using multi-armed bandit with dependent arms. arXiv preprint arXiv:1708.03058, 2017."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132880"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911528"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281280"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213894"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.167"}],"event":{"name":"WSDM '19: The Twelfth ACM International Conference on Web Search and Data Mining","location":"Melbourne VIC Australia","acronym":"WSDM '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3290964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3289600.3290964","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3289600.3290964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:21Z","timestamp":1750208541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3290964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":54,"alternative-id":["10.1145\/3289600.3290964","10.1145\/3289600"],"URL":"https:\/\/doi.org\/10.1145\/3289600.3290964","relation":{},"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"2019-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}