{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:45:25Z","timestamp":1772905525953,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARC","award":["DP210101347"],"award-info":[{"award-number":["DP210101347"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3498473","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"704-714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Deep Graph-level Anomaly Detection by Glocal Knowledge Distillation"],"prefix":"10.1145","author":[{"given":"Rongrong","family":"Ma","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Guansong","family":"Pang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Ling","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Anton","family":"van den Hengel","sequence":"additional","affiliation":[{"name":"University of Adelaide, Adelaide, SA, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Managing and Mining Graph Data","author":"Aggarwal Charu C","unstructured":"Charu C Aggarwal and Haixun Wang. 2010. Graph data management and mining: a survey of algorithms and applications. In Managing and Mining Graph Data . Springer, 13--68."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Paul Bergmann Michael Fauser David Sattlegger and Carsten Steger. 2020. Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In CVPR. 4183--4192.","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Markus M Breunig Hans-Peter Kriegel Raymond T Ng and J\u00f6rg Sander. 2000. LOF: identifying density-based local outliers. In ACM SIGMOD. 93--104.","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_2_5_1","volume-title":"Exploration by random network distillation. arXiv preprint arXiv:1810.12894","author":"Burda Yuri","year":"2018","unstructured":"Yuri Burda, Harrison Edwards, Amos Storkey, and Oleg Klimov. 2018. Exploration by random network distillation. arXiv preprint arXiv:1810.12894 (2018)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"e_1_3_2_2_7_1","volume-title":"Outlier detection with autoencoder ensembles","author":"Chen Jinghui","unstructured":"Jinghui Chen, Saket Sathe, Charu Aggarwal, and Deepak Turaga. 2017. Outlier detection with autoencoder ensembles. In SDM. SIAM, 90--98."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li Nitin Agarwal and Huan Liu. 2020. Inductive anomaly detection on attributed networks. In IJCAI. 1288--1294.","DOI":"10.24963\/ijcai.2020\/179"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Dhivya Eswaran Christos Faloutsos Sudipto Guha and Nina Mishra. 2018. Spotlight: detecting anomalies in streaming graphs. In KDD. 1378--1386.","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_2_10_1","volume-title":"Fahad Shahbaz Khan, Marius Popescu, and Mubarak Shah.","author":"Georgescu Mariana-Iuliana","year":"2021","unstructured":"Mariana-Iuliana Georgescu, Antonio Barbalau, Radu Tudor Ionescu, Fahad Shahbaz Khan, Marius Popescu, and Mubarak Shah. 2021. Anomaly detection in video via self-supervised and multi-task learning. In CVPR . 12742--12752."},{"key":"e_1_3_2_2_11_1","volume-title":"Outlier detection using replicator neural networks","author":"Hawkins Simon","unstructured":"Simon Hawkins, Hongxing He, Graham Williams, and Rohan Baxter. 2002. Outlier detection using replicator neural networks. In DaWaK. Springer, 170--180."},{"key":"e_1_3_2_2_12_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)."},{"key":"e_1_3_2_2_13_1","volume-title":"Chao Liu, Min Yu, Weiqing Huang, and Prasant Mohapatra.","author":"Jiang Jianguo","year":"2019","unstructured":"Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, and Prasant Mohapatra. 2019. Anomaly detection with graph convolutional networks for insider threat and fraud detection. In MILCOM. IEEE, 109--114."},{"key":"e_1_3_2_2_14_1","unstructured":"Kristian Kersting Nils M. Kriege Christopher Morris Petra Mutzel and Marion Neumann. 2016. Benchmark Data Sets for Graph Kernels. http:\/\/graphkernels.cs.tu-dortmund.de"},{"key":"e_1_3_2_2_15_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_16_1","volume-title":"Semi-supervised anomaly detection on attributed graphs. arXiv preprint arXiv:2002.12011","author":"Kumagai Atsutoshi","year":"2020","unstructured":"Atsutoshi Kumagai, Tomoharu Iwata, and Yasuhiro Fujiwara. 2020. Semi-supervised anomaly detection on attributed graphs. arXiv preprint arXiv:2002.12011 (2020)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107746"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22389"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3001719"},{"key":"e_1_3_2_2_20_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In ICDM. IEEE, 413--422."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Emaad Manzoor Sadegh M Milajerdi and Leman Akoglu. 2016. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In KDD . 1035--1044.","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_2_22_1","volume-title":"Graph2vec: learning distributed representations of graphs. arXiv preprint arXiv:1707.05005","author":"Narayanan Annamalai","year":"2017","unstructured":"Annamalai Narayanan, Mahinthan Chandramohan, Rajasekar Venkatesan, Lihui Chen, Yang Liu, and Shantanu Jaiswal. 2017. Graph2vec: learning distributed representations of graphs. arXiv preprint arXiv:1707.05005 (2017)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5517-9"},{"key":"e_1_3_2_2_24_1","volume-title":"Connie Khor Li Kou, Sojeong Park, Farhan Akram, and Hwee Kuan Lee.","author":"Ngo Phuc Cuong","year":"2019","unstructured":"Phuc Cuong Ngo, Amadeus Aristo Winarto, Connie Khor Li Kou, Sojeong Park, Farhan Akram, and Hwee Kuan Lee. 2019. Fence GAN: towards better anomaly detection. In ICTAI. IEEE, 141--148."},{"key":"e_1_3_2_2_25_1","volume-title":"Anomaly detection in large labeled multi-graph databases. arXiv preprint arXiv:2010.03600","author":"Nguyen Hung T","year":"2020","unstructured":"Hung T Nguyen, Pierre J Liang, and Leman Akoglu. 2020. Anomaly detection in large labeled multi-graph databases. arXiv preprint arXiv:2010.03600 (2020)."},{"key":"e_1_3_2_2_26_1","volume-title":"Randomized prior functions for deep reinforcement learning. arXiv preprint arXiv:1806.03335","author":"Osband Ian","year":"2018","unstructured":"Ian Osband, John Aslanides, and Albin Cassirer. 2018. Randomized prior functions for deep reinforcement learning. arXiv preprint arXiv:1806.03335 (2018)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Guansong Pang Longbing Cao Ling Chen and Huan Liu. 2018. Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In KDD. 2041--2050.","DOI":"10.1145\/3219819.3220042"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In KDD. 353--362.","DOI":"10.1145\/3292500.3330871"},{"key":"e_1_3_2_2_30_1","volume-title":"Kai Ming Ting, and David Albrecht","author":"Pang Guansong","year":"2015","unstructured":"Guansong Pang, Kai Ming Ting, and David Albrecht. 2015. LeSiNN: detecting anomalies by identifying least similar nearest neighbours. In 2015 ICDMW. IEEE, 623--630."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2917862"},{"key":"e_1_3_2_2_32_1","volume-title":"Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft.","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In ICML. PMLR, 4393--4402."},{"key":"e_1_3_2_2_33_1","volume-title":"Mohammad Hossein Rohban, and Hamid R Rabiee","author":"Salehi Mohammadreza","year":"2020","unstructured":"Mohammadreza Salehi, Niousha Sadjadi, Soroosh Baselizadeh, Mohammad Hossein Rohban, and Hamid R Rabiee. 2020. Multiresolution knowledge distillation for anomaly detection. arXiv preprint arXiv:2011.11108 (2020)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"e_1_3_2_2_35_1","first-page":"582","article-title":"Support vector method for novelty detection","volume":"12","author":"Sch\u00f6lkopf Bernhard","year":"1999","unstructured":"Bernhard Sch\u00f6lkopf, Robert Williamson, Alex Smola, John Shawe-Taylor, and John Platt. 1999. Support vector method for novelty detection. In NIPS, Vol. 12. 582--588.","journal-title":"NIPS"},{"key":"e_1_3_2_2_36_1","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"Shervashidze Nino","year":"2011","unstructured":"Nino Shervashidze, Pascal Schweitzer, Erik Jan Van Leeuwen, Kurt Mehlhorn, and Karsten M Borgwardt. 2011. Weisfeiler-lehman graph kernels. Journal of Machine Learning Research , Vol. 12, 9 (2011).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Kumar Sricharan and Kamalika Das. 2014. Localizing anomalous changes in time-evolving graphs. In ACM SIGMOD . 1347--1358.","DOI":"10.1145\/2588555.2612184"},{"key":"e_1_3_2_2_38_1","unstructured":"Fan-Yun Sun Jordan Hoffmann Vikas Verma and Jian Tang. 2019. InfoGraph: unsupervised and semi-supervised graph-Level representation learning via mutual information maximization. In ICLR ."},{"key":"e_1_3_2_2_39_1","volume-title":"MAD 2011 Workshop Proceedings . Citeseer, 113","author":"Varfis A","year":"2011","unstructured":"A Varfis, E Kotsakis, A Tsois, AV Donati, M Sjachyn, E Camossi, P Villa, T Dimitrova, and M Pellissier. 2011. ConTraffic: maritime container traffic anomaly detection. In MAD 2011 Workshop Proceedings . Citeseer, 113."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Hu Wang Guansong Pang Chunhua Shen and Congbo Ma. 2020. Unsupervised Representation Learning by Predicting Random Distances. In IJCAI .","DOI":"10.24963\/ijcai.2020\/408"},{"key":"e_1_3_2_2_41_1","volume-title":"One-class graph neural networks for anomaly detection in attributed networks. Neural Computing and Applications","author":"Wang Xuhong","year":"2021","unstructured":"Xuhong Wang, Baihong Jin, Ying Du, Ping Cui, Yingshui Tan, and Yupu Yang. 2021. One-class graph neural networks for anomaly detection in attributed networks. Neural Computing and Applications (2021), 1--13."},{"key":"e_1_3_2_2_42_1","volume-title":"Wiley Encyclopedia of Clinical Trials (2007), 1--3.","author":"Woolson RF","unstructured":"RF Woolson. 2007. Wilcoxon signed-rank test. Wiley Encyclopedia of Clinical Trials (2007), 1--3."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/e23020201"},{"key":"e_1_3_2_2_45_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Minji Yoon Bryan Hooi Kijung Shin and Christos Faloutsos. 2019. Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In KDD . 647--657.","DOI":"10.1145\/3292500.3330946"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Wenchao Yu Wei Cheng Charu C Aggarwal Kai Zhang Haifeng Chen and Wei Wang. 2018. Netwalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In KDD . 2672--2681.","DOI":"10.1145\/3219819.3220024"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"e_1_3_2_2_49_1","volume-title":"Deep learning on graphs: a survey","author":"Zhang Ziwei","year":"2020","unstructured":"Ziwei Zhang, Peng Cui, and Wenwu Zhu. 2020. Deep learning on graphs: a survey. IEEE Transactions on Knowledge and Data Engineering (2020)."},{"key":"e_1_3_2_2_50_1","volume-title":"On using classification datasets to evaluate graph outlier detection: peculiar observations and new insights. arXiv preprint arXiv:2012.12931","author":"Zhao Lingxiao","year":"2020","unstructured":"Lingxiao Zhao and Leman Akoglu. 2020. On using classification datasets to evaluate graph outlier detection: peculiar observations and new insights. arXiv preprint arXiv:2012.12931 (2020)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Tong Zhao Chuchen Deng Kaifeng Yu Tianwen Jiang Daheng Wang and Meng Jiang. 2020. Error-Bounded Graph Anomaly Loss for GNNs. In CIKM. 1873--1882.","DOI":"10.1145\/3340531.3411979"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Li Zheng Zhenpeng Li Jian Li Zhao Li and Jun Gao. 2019 a. AddGraph: anomaly detection in dynamic graph using attention-based temporal GCN. In IJCAI . 4419--4425.","DOI":"10.24963\/ijcai.2019\/614"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In KDD. 665--674.","DOI":"10.1145\/3097983.3098052"}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","location":"Virtual Event AZ USA","acronym":"WSDM '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:19Z","timestamp":1750188679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":54,"alternative-id":["10.1145\/3488560.3498473","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3498473","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}