{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:37:34Z","timestamp":1773247054901,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1408924"],"award-info":[{"award-number":["IIS-1408924"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1314632"],"award-info":[{"award-number":["CNS-1314632"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330946","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"647-657","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach"],"prefix":"10.1145","author":[{"given":"Minji","family":"Yoon","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Bryan","family":"Hooi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Kijung","family":"Shin","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.123"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_6_1","volume-title":"Autopart: Parameter-free graph partitioning and outlier detection. In PKDD .","author":"Chakrabarti Deepayan","year":"2004","unstructured":"Deepayan Chakrabarti . 2004 . Autopart: Parameter-free graph partitioning and outlier detection. In PKDD . Deepayan Chakrabarti. 2004. Autopart: Parameter-free graph partitioning and outlier detection. In PKDD ."},{"key":"e_1_3_2_1_7_1","volume-title":"Conference Board of the Mathematical Sciences.","author":"Chung F.R.K.","unstructured":"F.R.K. Chung . {n. d.}. Spectral Graph Theory . Number no. 92 in CBMS Regional Conference Series . Conference Board of the Mathematical Sciences. F.R.K. Chung. {n. d.}. Spectral Graph Theory . Number no. 92 in CBMS Regional Conference Series. Conference Board of the Mathematical Sciences."},{"key":"e_1_3_2_1_8_1","volume-title":"SEDANSPOT: Detecting Anomalies in Edge Streams. In ICDM .","author":"Eswaran Dhivya","year":"2018","unstructured":"Dhivya Eswaran and Christos Faloutsos . 2018 . SEDANSPOT: Detecting Anomalies in Edge Streams. In ICDM . Dhivya Eswaran and Christos Faloutsos. 2018. SEDANSPOT: Detecting Anomalies in Edge Streams. In ICDM ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835828"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056563"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746403"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2824443"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/382979.383041"},{"key":"e_1_3_2_1_17_1","volume-title":"Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection","volume":"99","author":"Lippmann Richard","year":"1999","unstructured":"Richard Lippmann , Robert K Cunningham , David J Fried , Isaac Graf , Kris R Kendall , Seth E Webster , and Marc A Zissman . 1999 . Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection , Vol. 99 . 829--835. Richard Lippmann, Robert K Cunningham, David J Fried, Isaac Graf, Kris R Kendall, Seth E Webster, and Marc A Zissman. 1999. Results of the DARPA 1998 Offline Intrusion Detection Evaluation.. In Recent advances in intrusion detection, Vol. 99. 829--835."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Stephen Ranshous Steve Harenberg Kshitij Sharma and Nagiza F Samatova. 2016. A scalable approach for outlier detection in edge streams using sketch-based approximations. In SDM .  Stephen Ranshous Steve Harenberg Kshitij Sharma and Nagiza F Samatova. 2016. A scalable approach for outlier detection in edge streams using sketch-based approximations. In SDM .","DOI":"10.1137\/1.9781611974348.22"},{"key":"e_1_3_2_1_20_1","first-page":"120","article-title":"The Enron email dataset database schema and brief statistical report. Information sciences institute technical report","volume":"4","author":"Shetty Jitesh","year":"2004","unstructured":"Jitesh Shetty and Jafar Adibi . 2004 . The Enron email dataset database schema and brief statistical report. Information sciences institute technical report , University of Southern California , Vol. 4 , 1 (2004), 120 -- 128 . Jitesh Shetty and Jafar Adibi. 2004. The Enron email dataset database schema and brief statistical report. Information sciences institute technical report, University of Southern California , Vol. 4, 1 (2004), 120--128.","journal-title":"University of Southern California"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1077-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154414"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098087"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150445"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Hanghang Tong and Ching-Yung Lin. 2011. Non-negative residual matrix factorization with application to graph anomaly detection. In SDM .  Hanghang Tong and Ching-Yung Lin. 2011. Non-negative residual matrix factorization with application to graph anomaly detection. In SDM .","DOI":"10.1137\/1.9781611972818.13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Teng Wang Chunsheng Fang Derek Lin and S Felix Wu. 2015. Localizing temporal anomalies in large evolving graphs. In SDM .  Teng Wang Chunsheng Fang Derek Lin and S Felix Wu. 2015. Localizing temporal anomalies in large evolving graphs. In SDM .","DOI":"10.1137\/1.9781611974010.104"},{"key":"e_1_3_2_1_27_1","volume-title":"Social network analysis: Methods and applications","author":"Wasserman Stanley","unstructured":"Stanley Wasserman and Katherine Faust . 1994. Social network analysis: Methods and applications . Cambridge university press . Stanley Wasserman and Katherine Faust. 1994. Social network analysis: Methods and applications .Cambridge university press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281280"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186107"},{"key":"e_1_3_2_1_30_1","volume-title":"TPA: Fast, Scalable, and Accurate method for Approximate Random Walk with Restart on Billion Scale Graphs. In ICDE .","author":"Yoon Minji","year":"2018","unstructured":"Minji Yoon , Jinhong Jung , and U Kang . 2018 b. TPA: Fast, Scalable, and Accurate method for Approximate Random Walk with Restart on Billion Scale Graphs. In ICDE . Minji Yoon, Jinhong Jung, and U Kang. 2018b. TPA: Fast, Scalable, and Accurate method for Approximate Random Walk with Restart on Billion Scale Graphs. In ICDE ."}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330946","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:04Z","timestamp":1750206364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":29,"alternative-id":["10.1145\/3292500.3330946","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330946","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}