{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:01:58Z","timestamp":1764784918157,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3542678","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"4733-4742","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Dynamic Network Anomaly Modeling of Cell-Phone Call Detail Records for Infectious Disease Surveillance"],"prefix":"10.1145","author":[{"given":"Carl","family":"Yang","sequence":"first","affiliation":[{"name":"Emory University, Atlanta, GA, USA"}]},{"given":"Hongwen","family":"Song","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta, GA, USA"}]},{"given":"Mingyue","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Leon","family":"Danon","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"given":"Ymir","family":"Vigfusson","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Real-time anomaly detection for streaming analytics. arXiv preprint arXiv:1607.02480","author":"Ahmad Subutai","year":"2016","unstructured":"Subutai Ahmad and Scott Purdy. 2016. Real-time anomaly detection for streaming analytics. arXiv preprint arXiv:1607.02480 (2016)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_2_3_1","volume-title":"Oddball: Spotting anomalies in weighted graphs. In PAKDD.","author":"Akoglu Leman","year":"2010","unstructured":"Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting anomalies in weighted graphs. In PAKDD."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Samuel Altmann Luke Milsom Hannah Zillessen Raffaele Blasone Frederic Gerdon Ruben Bach Frauke Kreuter Daniele Nosenzo S\u00e9verine Toussaert Johannes Abeler et al. 2020. Acceptability of app-based contact tracing for COVID-19: Cross-country survey study. JMIR mHealth and uHealth Vol. 8 8 (2020) e19857.","DOI":"10.2196\/19857"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Khaled Ammar. 2016. Techniques and systems for large dynamic graphs. In SIGMOD.","DOI":"10.1145\/2926693.2929897"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep08923"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2101345118"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tmaid.2012.12.003"},{"key":"e_1_3_2_2_9_1","first-page":"86","article-title":"Pathology of the swine-origin influenza A (H1N1) flu","volume":"207","author":"Calore Edenilson E","year":"2011","unstructured":"Edenilson E Calore, David E Uip, and Nilda M Perez. 2011. Pathology of the swine-origin influenza A (H1N1) flu. JPRP, Vol. 207, 2 (2011), 86--90.","journal-title":"JPRP"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_3_2_2_12_1","volume-title":"Jaline Gerardin, Beth Redbird, David Grusky, and Jure Leskovec.","author":"Chang Serina","year":"2021","unstructured":"Serina Chang, Emma Pierson, Pang Wei Koh, Jaline Gerardin, Beth Redbird, David Grusky, and Jure Leskovec. 2021. Mobility network models of COVID-19 explain inequities and inform reopening. Nature, Vol. 589, 7840 (2021), 82--87."},{"key":"e_1_3_2_2_13_1","volume-title":"Gc-lstm: Graph convolution embedded lstm for dynamic link prediction. arXiv preprint arXiv:1812.04206","author":"Chen Jinyin","year":"2018","unstructured":"Jinyin Chen, Xuanheng Xu, Yangyang Wu, and Haibin Zheng. 2018. Gc-lstm: Graph convolution embedded lstm for dynamic link prediction. arXiv preprint arXiv:1812.04206 (2018)."},{"key":"e_1_3_2_2_14_1","volume-title":"et almbox","author":"Crawford Forrest W","year":"2022","unstructured":"Forrest W Crawford, Sydney A Jones, Matthew Cartter, et almbox. 2022. Impact of close interpersonal contact on COVID-19 incidence: Evidence from 1 year of mobile device data. Science advances, Vol. 8, 1 (2022)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Laxman Dhulipala Guy E Blelloch and Julian Shun. 2019. Low-latency graph streaming using compressed purely-functional trees. In PLDI.","DOI":"10.1145\/3325976"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2935975"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/maq.12440"},{"key":"e_1_3_2_2_18_1","volume-title":"Distinger: A distributed graph data structure for massive dynamic graph processing","author":"Feng Guoyao","year":"2015","unstructured":"Guoyao Feng, Xiao Meng, and Khaled Ammar. 2015. Distinger: A distributed graph data structure for massive dynamic graph processing. In IEEE BigData."},{"key":"e_1_3_2_2_19_1","volume-title":"Nature","volume":"457","author":"Ginsberg Jeremy","year":"2009","unstructured":"Jeremy Ginsberg, Matthew H Mohebbi, Rajan S Patel, Lynnette Brammer, Mark S Smolinski, and Larry Brilliant. 2009. Detecting influenza epidemics using search engine query data. Nature, Vol. 457, 7232 (2009), 1012--1014."},{"key":"e_1_3_2_2_20_1","volume-title":"Israel Moves to Tap Secret Trove of Cellphone Data. The New York Times (16","author":"Halbfinger David M.","year":"2020","unstructured":"David M. Halbfinger, Isabel Kershner, and Ronen Bergman. 2020. To Track Coronavirus, Israel Moves to Tap Secret Trove of Cellphone Data. The New York Times (16 March 2020). Issue 2020-03-16."},{"key":"e_1_3_2_2_21_1","unstructured":"William L Hamilton Rex Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS."},{"key":"e_1_3_2_2_22_1","volume-title":"What is syndromic surveillance? MMWR","author":"Henning Kelly J","year":"2004","unstructured":"Kelly J Henning. 2004. What is syndromic surveillance? MMWR (2004), 7--11."},{"key":"e_1_3_2_2_23_1","volume-title":"Long short-term memory. Neural computation","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, Vol. 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_2_25_1","unstructured":"Wenjie Hu Yang Yang Ziqiang Cheng Carl Yang and Xiang Ren. 2021. Time-Series Event Prediction with Evolutionary State Graph. In WSDM."},{"key":"e_1_3_2_2_26_1","volume-title":"Measuring digital development: Facts and figures","author":"Union International Telecommunication","year":"2020","unstructured":"International Telecommunication Union. 2020. Measuring digital development: Facts and figures 2020."},{"key":"e_1_3_2_2_27_1","first-page":"644","article-title":"An improved approximation for the Gaussian Q-function","volume":"11","author":"Karagiannidis George K","year":"2007","unstructured":"George K Karagiannidis and Athanasios S Lioumpas. 2007. An improved approximation for the Gaussian Q-function. IEEE COMML, Vol. 11, 8 (2007), 644--646.","journal-title":"IEEE COMML"},{"key":"e_1_3_2_2_28_1","unstructured":"Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR."},{"key":"e_1_3_2_2_29_1","volume-title":"Measuring mobility to monitor travel and physical distancing interventions: a common framework for mobile phone data analysis. The Lancet Digital Health","author":"Kishore Nishant","year":"2020","unstructured":"Nishant Kishore, Mathew V Kiang, Kenth Eng\u00f8-Monsen, Navin Vembar, Andrew Schroeder, Satchit Balsari, and Caroline O Buckee. 2020. Measuring mobility to monitor travel and physical distancing interventions: a common framework for mobile phone data analysis. The Lancet Digital Health (2020)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.160294"},{"key":"e_1_3_2_2_31_1","volume-title":"Science","volume":"343","author":"Lazer David","year":"2014","unstructured":"David Lazer, Ryan Kennedy, Gary King, and Alessandro Vespignani. 2014. The parable of Google Flu: traps in big data analysis. Science, Vol. 343, 6176 (2014), 1203--1205."},{"key":"e_1_3_2_2_32_1","volume-title":"A Comprehensive Survey on Graph Anomaly Detection with Deep Learning. arXiv preprint arXiv:2106.07178","author":"Ma Xiaoxiao","year":"2021","unstructured":"Xiaoxiao Ma, Jia Wu, Shan Xue, Jian Yang, Quan Z Sheng, and Hui Xiong. 2021. A Comprehensive Survey on Graph Anomaly Detection with Deep Learning. arXiv preprint arXiv:2106.07178 (2021)."},{"key":"e_1_3_2_2_33_1","unstructured":"Pankaj Malhotra Lovekesh Vig Gautam Shroff and Puneet Agarwal. 2015. Long short term memory networks for anomaly detection in time series. In ESANN."},{"key":"e_1_3_2_2_34_1","volume-title":"Yvonne M\u00fclle, and Klemens B\u00f6hm.","author":"M\u00fcller Emmanuel","year":"2013","unstructured":"Emmanuel M\u00fcller, Patricia Iglesias S\u00e1nchez, Yvonne M\u00fclle, and Klemens B\u00f6hm. 2013. Ranking outlier nodes in subspaces of attributed graphs. In ICDEW."},{"key":"e_1_3_2_2_35_1","volume-title":"Evolvegcn: Evolving graph convolutional networks for dynamic graphs. In AAAI.","author":"Pareja Aldo","year":"2020","unstructured":"Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao Schardl, and Charles Leiserson. 2020. Evolvegcn: Evolving graph convolutional networks for dynamic graphs. In AAAI."},{"key":"e_1_3_2_2_36_1","volume-title":"Machine-learned epidemiology: real-time detection of foodborne illness at scale. NPJ digital medicine","author":"Sadilek Adam","year":"2018","unstructured":"Adam Sadilek, Stephanie Caty, Lauren DiPrete, Raed Mansour, Tom Schenk, Mark Bergtholdt, Ashish Jha, Prem Ramaswami, and Evgeniy Gabrilovich. 2018. Machine-learned epidemiology: real-time detection of foodborne illness at scale. NPJ digital medicine, Vol. 1, 1 (2018), 1--7."},{"key":"e_1_3_2_2_37_1","unstructured":"Hacs im Sak Andrew Senior and Francc oise Beaufays. 2014. Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling. In INTERSPEECH."},{"key":"e_1_3_2_2_38_1","volume-title":"Syndromic surveillance using web data: a systematic review. J Innov Health Inform","author":"Samaras Loukas","year":"2020","unstructured":"Loukas Samaras, Elena Garc\u00eda-Barriocanal, and Miguel-Angel Sicilia. 2020. Syndromic surveillance using web data: a systematic review. J Innov Health Inform (2020), 39--77."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_2_40_1","volume-title":"Blind-sided by privacy? Digital contact tracing, the Apple\/Google API and big tech's newfound role as global health policy makers. Ethics and Information Technology","author":"Sharon Tamar","year":"2020","unstructured":"Tamar Sharon. 2020. Blind-sided by privacy? Digital contact tracing, the Apple\/Google API and big tech's newfound role as global health policy makers. Ethics and Information Technology (2020), 1--13."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.2807\/ese.15.49.19742-en"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.2307\/1422689"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Xian Teng Yu-Ru Lin and Xidao Wen. 2017. Anomaly detection in dynamic networks using multi-view time-series hypersphere learning. In CIKM.","DOI":"10.1145\/3132847.3132964"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1003716"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2005241118"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Dashun Wang Dino Pedreschi Chaoming Song Fosca Giannotti and Albert-Laszlo Barabasi. 2011. Human mobility social ties and link prediction. In KDD.","DOI":"10.1145\/2020408.2020581"},{"key":"e_1_3_2_2_47_1","unstructured":"Xuhong Wang Baihong Jin Ying Du Ping Cui Yingshui Tan and Yupu Yang. 2021. One-class graph neural networks for anomaly detection in attributed networks. Neural. Comput. Appl. (2021) 1--13."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1223467"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1504964112"},{"key":"e_1_3_2_2_50_1","unstructured":"Yuanzhen Xie Zijing Ou Liang Chen Yang Liu Kun Xu Carl Yang and Zibin Zheng. 2021. Learning and Updating Node Embedding on Dynamic Heterogeneous Information Network. In WSDM."},{"key":"e_1_3_2_2_51_1","volume-title":"Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962","author":"Xu Da","year":"2020","unstructured":"Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan. 2020. Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962 (2020)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101777"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Li Zheng Zhenpeng Li Jian Li Zhao Li and Jun Gao. 2019 a. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN.. In IJCAI.","DOI":"10.24963\/ijcai.2019\/614"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Washington DC USA","acronym":"KDD '22"},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3542678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3542678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:53Z","timestamp":1750186973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3542678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":55,"alternative-id":["10.1145\/3534678.3542678","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3542678","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}