{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:40:49Z","timestamp":1775882449772,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412070","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:03Z","timestamp":1603085463000},"page":"1989-1992","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Generative Adversarial Attributed Network Anomaly Detection"],"prefix":"10.1145","author":[{"given":"Zhenxing","family":"Chen","sequence":"first","affiliation":[{"name":"JD Digits, Beijing, China"}]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"JD Finance America Coporation, Mountain View, CA, USA"}]},{"given":"Meiqing","family":"Wang","sequence":"additional","affiliation":[{"name":"JD Digits, Beijing, China"}]},{"given":"Peng","family":"Dai","sequence":"additional","affiliation":[{"name":"JD Finance America Coporation, Mountain View, CA, USA"}]},{"given":"Jun","family":"Lv","sequence":"additional","affiliation":[{"name":"JD Digits, Beijing, China"}]},{"given":"Liefeng","family":"Bo","sequence":"additional","affiliation":[{"name":"JD Finance America Coporation, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Asian Conference on Computer Vision","author":"Akcay Samet","year":"2018","unstructured":"Samet Akcay , Amir Atapour-Abarghouei , and Toby P Breckon . Ganomaly : Semi-supervised anomaly detection via adversarial training .In Asian Conference on Computer Vision , 2018 . Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. Ganomaly: Semi-supervised anomaly detection via adversarial training.In Asian Conference on Computer Vision, 2018."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_2_3_1","volume-title":"July","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola , Arindam Banerjee , and Vipin Kumar . Anomaly detection: A survey. ACM Comput. Surv., 41(1) , July 2009 . Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM Comput. Surv., 41(1), July 2009."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472539"},{"key":"e_1_3_2_2_5_1","volume-title":"SIAM International Conference on Data Mining","author":"Ding Kaize","year":"2019","unstructured":"Kaize Ding , Jundong Li , Bhanushali Rohit , and Huan Liu . Deepanomaly detection on attributed networks . In SIAM International Conference on Data Mining , 2019 . Kaize Ding, Jundong Li, Bhanushali Rohit, and Huan Liu. Deepanomaly detection on attributed networks. In SIAM International Conference on Data Mining, 2019."},{"key":"e_1_3_2_2_6_1","volume-title":"International Conference on Acoustics, Speech, and Signal Processing","author":"Fan Haoyi","year":"2020","unstructured":"Haoyi Fan , Fengbin Zhang , and Zuoyong Li. Anomalydae : Dual autoencoder for anomaly detection on attributed networks . In International Conference on Acoustics, Speech, and Signal Processing , 2020 . Haoyi Fan, Fengbin Zhang, and Zuoyong Li. Anomalydae: Dual autoencoder for anomaly detection on attributed networks. In International Conference on Acoustics, Speech, and Signal Processing, 2020."},{"key":"e_1_3_2_2_7_1","volume-title":"Asian Conference on Machine Learning","author":"Gherbi Elies","year":"2019","unstructured":"Elies Gherbi , Blaise Hanczar , Jean-Christophe Janodet , and Witold Klaudel . An encoding adversarial network for anomaly detection . In Asian Conference on Machine Learning , 2019 .1 Elies Gherbi, Blaise Hanczar, Jean-Christophe Janodet, and Witold Klaudel. An encoding adversarial network for anomaly detection. In Asian Conference on Machine Learning, 2019.1"},{"key":"e_1_3_2_2_8_1","volume-title":"International Conference on Neural Information Processing Systems","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . Generative adversarial nets . In International Conference on Neural Information Processing Systems , 2014 . Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In International Conference on Neural Information Processing Systems, 2014."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8728"},{"key":"e_1_3_2_2_10_1","volume-title":"Codetect: financial fraud detection with anomaly feature detection","author":"Huang Dongxu","year":"2018","unstructured":"Dongxu Huang , Dejun Mu , Libin Yang , and Xiaoyan Cai . Codetect: financial fraud detection with anomaly feature detection . 2018 . Dongxu Huang, Dejun Mu, Libin Yang, and Xiaoyan Cai. Codetect: financial fraud detection with anomaly feature detection. 2018."},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Learning Representations","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba. Adam : A method for stochastic optimization . International Conference on Learning Representations , 2014 . Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. International Conference on Learning Representations, 2014."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00796ED1V01Y201708DMK014"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219850"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/488"},{"key":"e_1_3_2_2_15_1","volume-title":"AAAI Conference on Artificial Intelligence","author":"Ryan","year":"2015","unstructured":"Ryan A. Rossi and Nesreen K. Ahmed. The network data repository with interactive graph analytics and visualization . In AAAI Conference on Artificial Intelligence , 2015 .2 Ryan A. Rossi and Nesreen K. Ahmed. The network data repository with interactive graph analytics and visualization. In AAAI Conference on Artificial Intelligence, 2015.2"},{"key":"e_1_3_2_2_16_1","article-title":"Adversarial training towards robust multimedia recommender system","author":"Tang Jinhui","year":"2019","unstructured":"Jinhui Tang , Xiaoyu Du , Xiangnan He , Fajie Yuan , Qi Tian , and Tat-Seng Chua . Adversarial training towards robust multimedia recommender system . IEEE Transactions on Knowledge and Data Engineering , 2019 . Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua. Adversarial training towards robust multimedia recommender system. IEEE Transactions on Knowledge and Data Engineering, 2019.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_17_1","article-title":"Graph representation learning with generative adversarial nets","author":"Wang Hongwei","year":"2017","unstructured":"Hongwei Wang , Jia Wang , Jialin Wang , Miao Zhao , Weinan Zhang , Fuzheng Zhang , Xing Xie , and Minyi Guo . Graphgan : Graph representation learning with generative adversarial nets . IEEE Transactions on Knowledge and Data Engineering , 2017 . Hongwei Wang, Jia Wang, Jialin Wang, Miao Zhao, Weinan Zhang, Fuzheng Zhang, Xing Xie, and Minyi Guo. Graphgan: Graph representation learning with generative adversarial nets. IEEE Transactions on Knowledge and Data Engineering, 2017.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_18_1","first-page":"824","volume-title":"Scan: A structural clustering algorithm for networks. Number 3","author":"Xu Xiaowei","year":"2007","unstructured":"Xiaowei Xu , Nurcan Yuruk , Zhidan Feng , and Thomas Schweiger . Scan: A structural clustering algorithm for networks. Number 3 , pages 824 -- 833 , 01 2007 . Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, and Thomas Schweiger. Scan: A structural clustering algorithm for networks. Number 3, pages 824--833, 01 2007."},{"key":"e_1_3_2_2_19_1","volume-title":"Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. Efficient GAN-based anomaly detection","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati , Chuan Sheng Foo , Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. Efficient GAN-based anomaly detection , 2018 . Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. Efficient GAN-based anomaly detection, 2018."}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:29Z","timestamp":1750197749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":19,"alternative-id":["10.1145\/3340531.3412070","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412070","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}