{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:17Z","timestamp":1750220357046,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program","award":["2019YFC0850105"],"award-info":[{"award-number":["2019YFC0850105"]}]},{"name":"Key Research and Development Project of Hebei Province","award":["20310101D"],"award-info":[{"award-number":["20310101D"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3457337.3457846","type":"proceedings-article","created":{"date-parts":[[2021,5,30]],"date-time":"2021-05-30T01:14:42Z","timestamp":1622337282000},"page":"91-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An Anomaly Event Detection Method Based on GNN Algorithm for Multi-data Sources"],"prefix":"10.1145","author":[{"given":"Yipeng","family":"Ji","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Shaoning","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Yangyang","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Public Safety Risk Perception and Control by Big Data, Beijing, China"}]},{"given":"Shenwen","family":"Lin","sequence":"additional","affiliation":[{"name":"CNCERT, Beijing, China"}]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Biwei Network Technology Co., Ltd. &amp; Beijing Xindatek Technology Co., Ltd., Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Aggarwal and C. Charu. 2013. Outlier Detection in Categorical Text and Mixed Attribute Data. Springer New York. 199--223 pages.  Aggarwal and C. Charu. 2013. Outlier Detection in Categorical Text and Mixed Attribute Data. Springer New York. 199--223 pages.","DOI":"10.1007\/978-1-4614-6396-2_7"},{"volume-title":"Soft Science Workshop at Kanazawa","year":"2001","author":"Asai H","key":"e_1_3_2_1_2_1"},{"volume-title":"Knowledge-Preserving Incremental Social Event Detection via Heterogeneous GNNs. arXiv preprint arXiv:2101.08747","year":"2021","author":"Cao Yuwei","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-020-00980-7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411975"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500858"},{"volume-title":"TOPOSCH: Latency-Aware Scheduling Based on Critical Path Analysis on Shared YARN Clusters. In 2020 IEEE 13th International Conference on Cloud Computing (CLOUD). IEEE, 619--627","year":"2020","author":"Hu Chunming","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJITWE.2020100103"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2007.32"},{"volume-title":"Modeling relation paths for knowledge base completion via joint adversarial training. Knowledge-Based Systems","year":"2020","author":"Li Chen","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-8201-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401253"},{"volume-title":"Heterogeneous Similarity Graph Neural Network on Electronic Health Records. arXiv preprint arXiv:2101.06800","year":"2021","author":"Liu Zheng","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.041"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507840"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5987"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3367471.3367491"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298043"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2959991"},{"volume-title":"LIME: Low-Cost and Incremental Learning for Dynamic Heterogeneous Information Networks","year":"2021","author":"Peng Hao","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"By Karl Rohe Sourav Chatterjee and Y. U. Bin. 2012. SPECTRAL CLUSTERING AND THE HIGH-DIMENSIONAL STOCHASTIC BLOCKMODEL1. (2012).  By Karl Rohe Sourav Chatterjee and Y. U. Bin. 2012. SPECTRAL CLUSTERING AND THE HIGH-DIMENSIONAL STOCHASTIC BLOCKMODEL1. (2012)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.96.6.2758"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00178"},{"volume-title":"Pairwise Learning for Name Disambiguation in Large-Scale Heterogeneous Academic Networks. arXiv preprint arXiv:2008.13099","year":"2020","author":"Sun Qingyun","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-015-9489-2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.25"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Shu Wu and Shengrui Wang. 2013. Information-Theoretic Outlier Detection for Large-Scale Categorical Data. (2013).  Shu Wu and Shengrui Wang. 2013. Information-Theoretic Outlier Detection for Large-Scale Categorical Data. (2013).","DOI":"10.1109\/TKDE.2011.261"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946658"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.113"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102152"}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21"},"container-title":["Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457337.3457846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3457337.3457846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:19Z","timestamp":1750191439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457337.3457846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":32,"alternative-id":["10.1145\/3457337.3457846","10.1145\/3457337"],"URL":"https:\/\/doi.org\/10.1145\/3457337.3457846","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}