{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:42Z","timestamp":1750220622381,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61902279"],"award-info":[{"award-number":["61902279"]}]},{"name":"China Postdoctoral Science Foundation","award":["2019M650048"],"award-info":[{"award-number":["2019M650048"]}]},{"name":"Science and Technology Project for livelihood of Qingdao","award":["18-6-1-106-nsh"],"award-info":[{"award-number":["18-6-1-106-nsh"]}]},{"name":"National Key R&D Program of China","award":["2018YFC0832103"],"award-info":[{"award-number":["2018YFC0832103"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3411968","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:04Z","timestamp":1603085464000},"page":"1415-1424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Subgraph Detection with Feature Transfer"],"prefix":"10.1145","author":[{"given":"Ying","family":"Sun","sequence":"first","affiliation":[{"name":"Tianjin University &amp; Inner Mongolia University of Science and Technology, Tianjin, China"}]},{"given":"Wenjun","family":"Wang","sequence":"additional","affiliation":[{"name":"Tianjin University &amp; State Key Laboratory of Communication Content Cognition, Tianjin, China"}]},{"given":"Nannan","family":"Wu","sequence":"additional","affiliation":[{"name":"Tianjin University &amp; State Key Laboratory of Communication Content Cognition, Tianjin, China"}]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"given":"Xue","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"volume-title":"Beyond Trending Topics: Real-World Event Identification on Twitter","author":"Becker Hila","key":"e_1_3_2_2_2_1","unstructured":"Hila Becker , Mor Naaman , and Luis Gravano . 2011. Beyond Trending Topics: Real-World Event Identification on Twitter . In ICWSM. The AAAI Press . Hila Becker, Mor Naaman, and Luis Gravano. 2011. Beyond Trending Topics: Real-World Event Identification on Twitter. In ICWSM. The AAAI Press."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00533250"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0190-4"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.001"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623619"},{"key":"e_1_3_2_2_8_1","volume-title":"Ranking in interconnected multilayer networks reveals versatile nodes. Nature communications","author":"Domenico Manlio De","year":"2015","unstructured":"Manlio De Domenico , Albert Sol\u00e9-Ribalta , Elisa Omodei , Sergio G\u00f3mez , and Alex Arenas . 2015. Ranking in interconnected multilayer networks reveals versatile nodes. Nature communications , Vol. 6 ( 2015 ), 6868. Manlio De Domenico, Albert Sol\u00e9-Ribalta, Elisa Omodei, Sergio G\u00f3mez, and Alex Arenas. 2015. Ranking in interconnected multilayer networks reveals versatile nodes. Nature communications, Vol. 6 (2015), 6868."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1214\/009053604000000265"},{"volume-title":"Survey on the graph alignment problem and a benchmark of suitable algorithms","author":"D\u00f6pmann Christoph","key":"e_1_3_2_2_10_1","unstructured":"Christoph D\u00f6pmann . 2013. Survey on the graph alignment problem and a benchmark of suitable algorithms . Institut f\u00fcr Informatik (2013) . Christoph D\u00f6pmann. 2013. Survey on the graph alignment problem and a benchmark of suitable algorithms. Institut f\u00fcr Informatik (2013)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220002"},{"key":"e_1_3_2_2_12_1","volume-title":"Johnson","author":"Horn Roger A.","year":"1991","unstructured":"Roger A. Horn and Charles R . Johnson . 1991 . Topics in Matrix Analysis . (1991). Roger A. Horn and Charles R. Johnson. 1991. Topics in Matrix Analysis. (1991)."},{"key":"e_1_3_2_2_13_1","first-page":"24","article-title":"Multiplex Network Mining: A Brief Survey","volume":"16","author":"Kanawati Rushed","year":"2015","unstructured":"Rushed Kanawati . 2015 . Multiplex Network Mining: A Brief Survey . IEEE Intelligent Informatics Bulletin , Vol. 16 , 1 (2015), 24 -- 27 . Rushed Kanawati. 2015. Multiplex Network Mining: A Brief Survey. IEEE Intelligent Informatics Bulletin, Vol. 16, 1 (2015), 24--27.","journal-title":"IEEE Intelligent Informatics Bulletin"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnu016"},{"key":"e_1_3_2_2_15_1","volume-title":"BIG-ALIGN: Fast Bipartite Graph Alignment. In 2013 IEEE 13th International Conference on Data Mining","author":"Koutra Danai","year":"2013","unstructured":"Danai Koutra , Hanghang Tong , and David M. Lubensky . 2013 . BIG-ALIGN: Fast Bipartite Graph Alignment. In 2013 IEEE 13th International Conference on Data Mining , Dallas, TX, USA, December 7--10 , 2013 , Hui Xiong, George Karypis, Bhavani M. Thuraisingham, Diane J. Cook, and Xindong Wu (Eds.). IEEE Computer Society, 389--398. https:\/\/doi.org\/10.1109\/ICDM.2013.152 10.1109\/ICDM.2013.152 Danai Koutra, Hanghang Tong, and David M. Lubensky. 2013. BIG-ALIGN: Fast Bipartite Graph Alignment. In 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7--10, 2013, Hui Xiong, George Karypis, Bhavani M. Thuraisingham, Diane J. Cook, and Xindong Wu (Eds.). IEEE Computer Society, 389--398. https:\/\/doi.org\/10.1109\/ICDM.2013.152"},{"key":"e_1_3_2_2_16_1","volume-title":"SVDD-based outlier detection on uncertain data. Knowledge and information systems","author":"Liu Bo","year":"2013","unstructured":"Bo Liu , Yanshan Xiao , Longbing Cao , Zhifeng Hao , and Feiqi Deng . 2013. SVDD-based outlier detection on uncertain data. Knowledge and information systems , Vol. 34 , 3 ( 2013 ), 597--618. Bo Liu, Yanshan Xiao, Longbing Cao, Zhifeng Hao, and Feiqi Deng. 2013. SVDD-based outlier detection on uncertain data. Knowledge and information systems, Vol. 34, 3 (2013), 597--618."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2011.01014.x"},{"key":"e_1_3_2_2_18_1","volume-title":"LOCI: Fast Outlier Detection Using the Local Correlation Integral","author":"Papadimitriou Spiros","year":"2003","unstructured":"Spiros Papadimitriou , Hiroyuki Kitagawa , Phillip B. Gibbons , and Christos Faloutsos . 2003 . LOCI: Fast Outlier Detection Using the Local Correlation Integral . In ICDE. IEEE Computer Society , 315--326. Spiros Papadimitriou, Hiroyuki Kitagawa, Phillip B. Gibbons, and Christos Faloutsos. 2003. LOCI: Fast Outlier Detection Using the Local Correlation Integral. In ICDE. IEEE Computer Society, 315--326."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bts592"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(95)00015-I"},{"key":"e_1_3_2_2_21_1","volume-title":"Connected Sub-graph Detection. In AISTATS (JMLR Workshop and Conference Proceedings","volume":"804","author":"Qian Jing","year":"2014","unstructured":"Jing Qian , Venkatesh Saligrama , and Yuting Chen . 2014 . Connected Sub-graph Detection. In AISTATS (JMLR Workshop and Conference Proceedings , Vol. 33). JMLR.org, 796-- 804 . Jing Qian, Venkatesh Saligrama, and Yuting Chen. 2014. Connected Sub-graph Detection. In AISTATS (JMLR Workshop and Conference Proceedings, Vol. 33). JMLR.org, 796--804."},{"key":"e_1_3_2_2_22_1","volume-title":"Yulan He, and Harith Alani.","author":"Saif Hassan","year":"2014","unstructured":"Hassan Saif , Miriam Fern\u00e1 ndez , Yulan He, and Harith Alani. 2014 . SentiCircles for Contextual and Conceptual Semantic Sentiment Analysis of Twitter. In ESWC (Lecture Notes in Computer Science , Vol. 8465). Springer, 83-- 98 . Hassan Saif, Miriam Fern\u00e1 ndez, Yulan He, and Harith Alani. 2014. SentiCircles for Contextual and Conceptual Semantic Sentiment Analysis of Twitter. In ESWC (Lecture Notes in Computer Science, Vol. 8465). Springer, 83--98."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229329.3229332"},{"key":"e_1_3_2_2_24_1","unstructured":"James Sharpnack Akshay Krishnamurthy and Aarti Singh. 2013. Near-optimal Anomaly Detection in Graphs using Lovasz Extended Scan Statistic. In NIPS. 1959--1967.  James Sharpnack Akshay Krishnamurthy and Aarti Singh. 2013. Near-optimal Anomaly Detection in Graphs using Lovasz Extended Scan Statistic. In NIPS. 1959--1967."},{"key":"e_1_3_2_2_25_1","volume-title":"Sequential Feature Explanations for Anomaly Detection. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Siddiqui Md Amran","year":"2019","unstructured":"Md Amran Siddiqui , Alan Fern , Thomas G Dietterich , and Weng-Keen Wong . 2019. Sequential Feature Explanations for Anomaly Detection. ACM Transactions on Knowledge Discovery from Data (TKDD) , Vol. 13 , 1 ( 2019 ), 1. Md Amran Siddiqui, Alan Fern, Thomas G Dietterich, and Weng-Keen Wong. 2019. Sequential Feature Explanations for Anomaly Detection. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 13, 1 (2019), 1."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0806627105"},{"key":"e_1_3_2_2_27_1","first-page":"359","article-title":"Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection","volume":"36","author":"Szmit Maciej","year":"2012","unstructured":"Maciej Szmit , Anna Szmit , Slawomir Adamus , and Sebastian Bugala . 2012 . Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection . Informatica (Slovenia) , Vol. 36 , 4 (2012), 359 -- 368 . Maciej Szmit, Anna Szmit, Slawomir Adamus, and Sebastian Bugala. 2012. Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection. Informatica (Slovenia), Vol. 36, 4 (2012), 359--368.","journal-title":"Informatica (Slovenia)"},{"key":"e_1_3_2_2_28_1","volume-title":"2017 International Conference on System Science and Engineering (ICSSE). IEEE, 210--214","author":"Van Nguyen Thanh","year":"2017","unstructured":"Nguyen Thanh Van , Tran Ngoc Thinh , 2017 . An anomaly-based network intrusion detection system using deep learning . In 2017 International Conference on System Science and Engineering (ICSSE). IEEE, 210--214 . Nguyen Thanh Van, Tran Ngoc Thinh, et al. 2017. An anomaly-based network intrusion detection system using deep learning. In 2017 International Conference on System Science and Engineering (ICSSE). IEEE, 210--214."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/433"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2868097"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3016011"},{"key":"e_1_3_2_2_32_1","volume-title":"The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI","author":"Wu Nannan","year":"2019","unstructured":"Nannan Wu , Wenjun Wang , Feng Chen , Jianxin Li , Bo Li , and Jinpeng Huai . 2019 b. Uncovering Specific-Shape Graph Anomalies in Attributed Graphs . In The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019 , The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019. AAAI Press , 5433--5440. https:\/\/doi.org\/10.1609\/aaai.v33i01.33015433 10.1609\/aaai.v33i01.33015433 Nannan Wu, Wenjun Wang, Feng Chen, Jianxin Li, Bo Li, and Jinpeng Huai. 2019 b. Uncovering Specific-Shape Graph Anomalies in Attributed Graphs. In The Thirty-Third AAAI Conference on Artificial Intelligence, AAAI 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, IAAI 2019, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019. AAAI Press, 5433--5440. https:\/\/doi.org\/10.1609\/aaai.v33i01.33015433"},{"key":"e_1_3_2_2_33_1","volume-title":"Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar.","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati , Chuan Sheng Foo , Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018 . Efficient GAN-Based Anomaly Detection. CoRR , Vol. abs\/ 1802 .06222 (2018). Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018. Efficient GAN-Based Anomaly Detection. CoRR, Vol. abs\/1802.06222 (2018)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939766"},{"volume-title":"iNEAT: Incomplete Network Alignment","author":"Zhang Si","key":"e_1_3_2_2_35_1","unstructured":"Si Zhang , Hanghang Tong , Jie Tang , Jiejun Xu , and Wei Fan . 2017a. iNEAT: Incomplete Network Alignment . In ICDM. IEEE Computer Society , 1189--1194. Si Zhang, Hanghang Tong, Jie Tang, Jiejun Xu, and Wei Fan. 2017a. iNEAT: Incomplete Network Alignment. In ICDM. IEEE Computer Society, 1189--1194."},{"key":"e_1_3_2_2_36_1","volume-title":"Scott Alcorn, Jingrui He, Hasan Davulcu, and Hanghang Tong.","author":"Zhang Si","year":"2017","unstructured":"Si Zhang , Dawei Zhou , Mehmet Yigit Yildirim , Scott Alcorn, Jingrui He, Hasan Davulcu, and Hanghang Tong. 2017 b. HiDDen: Hierarchical Dense Subgraph Detection with Application to Financial Fraud Detection. In SDM. SIAM , 570--578. Si Zhang, Dawei Zhou, Mehmet Yigit Yildirim, Scott Alcorn, Jingrui He, Hasan Davulcu, and Hanghang Tong. 2017b. HiDDen: Hierarchical Dense Subgraph Detection with Application to Financial Fraud Detection. In SDM. SIAM, 570--578."},{"key":"e_1_3_2_2_37_1","volume-title":"Anomaly detection and fault analysis of wind turbine components based on deep learning network. Renewable energy","author":"Zhao Hongshan","year":"2018","unstructured":"Hongshan Zhao , Huihai Liu , Wenjing Hu , and Xihui Yan . 2018. Anomaly detection and fault analysis of wind turbine components based on deep learning network. Renewable energy , Vol. 127 ( 2018 ), 825--834. Hongshan Zhao, Huihai Liu, Wenjing Hu, and Xihui Yan. 2018. Anomaly detection and fault analysis of wind turbine components based on deep learning network. Renewable energy, Vol. 127 (2018), 825--834."}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event Ireland","acronym":"CIKM '20"},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3411968","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3411968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:23Z","timestamp":1750197683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3411968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":37,"alternative-id":["10.1145\/3340531.3411968","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3411968","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}