{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:40:51Z","timestamp":1773776451418,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599504","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:13:58Z","timestamp":1691172838000},"page":"93-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Sketch-Based Anomaly Detection in Streaming Graphs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4175-3565","authenticated-orcid":false,"given":"Siddharth","family":"Bhatia","sequence":"first","affiliation":[{"name":"TurboML, Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5474-2957","authenticated-orcid":false,"given":"Mohit","family":"Wadhwa","sequence":"additional","affiliation":[{"name":"Google, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1839-7504","authenticated-orcid":false,"given":"Kenji","family":"Kawaguchi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3261-8430","authenticated-orcid":false,"given":"Neil","family":"Shah","sequence":"additional","affiliation":[{"name":"Snap Inc., Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-5968","authenticated-orcid":false,"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5645-1754","authenticated-orcid":false,"given":"Bryan","family":"Hooi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098087"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_1_3_1","volume-title":"Midas: Microcluster-based detector of anomalies in edge streams,\" in AAAI","author":"Bhatia S.","year":"2020","unstructured":"S. Bhatia , B. Hooi , M. Yoon , K. Shin , and C. Faloutsos , \" Midas: Microcluster-based detector of anomalies in edge streams,\" in AAAI , 2020 . S. Bhatia, B. Hooi, M. Yoon, K. Shin, and C. Faloutsos, \"Midas: Microcluster-based detector of anomalies in edge streams,\" in AAAI, 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"Oddball: Spotting anomalies in weighted graphs,\" in PAKDD","author":"Akoglu L.","year":"2010","unstructured":"L. Akoglu , M. McGlohon , and C. Faloutsos , \" Oddball: Spotting anomalies in weighted graphs,\" in PAKDD , 2010 . L. Akoglu, M. McGlohon, and C. Faloutsos, \"Oddball: Spotting anomalies in weighted graphs,\" in PAKDD, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Parameter-free graph partitioning and outlier detection,\" in PKDD","author":"Chakrabarti D.","year":"2004","unstructured":"D. Chakrabarti , \"Autopart : Parameter-free graph partitioning and outlier detection,\" in PKDD , 2004 . D. Chakrabarti, \"Autopart: Parameter-free graph partitioning and outlier detection,\" in PKDD, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"Graph-based fraud detection in the face of camouflage,\" TKDD","author":"Hooi B.","year":"2017","unstructured":"B. Hooi , K. Shin , H. A. Song , A. Beutel , N. Shah , and C. Faloutsos , \" Graph-based fraud detection in the face of camouflage,\" TKDD , 2017 . B. Hooi, K. Shin, H. A. Song, A. Beutel, N. Shah, and C. Faloutsos, \"Graph-based fraud detection in the face of camouflage,\" TKDD, 2017."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746403"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. M. Kleinberg \"Authoritative sources in a hyperlinked environment \" JACM 1999.  J. M. Kleinberg \"Authoritative sources in a hyperlinked environment \" JACM 1999.","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_9_1","volume-title":"Patterns and anomalies in k-cores of real-world graphs with applications,\" KAIS","author":"Shin K.","year":"2018","unstructured":"K. Shin , T. Eliassi-Rad , and C. Faloutsos , \" Patterns and anomalies in k-cores of real-world graphs with applications,\" KAIS , 2018 . K. Shin, T. Eliassi-Rad, and C. Faloutsos, \"Patterns and anomalies in k-cores of real-world graphs with applications,\" KAIS, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"H. Tong and C.-Y. Lin \"Non-negative residual matrix factorization with application to graph anomaly detection \" in SDM 2011.  H. Tong and C.-Y. Lin \"Non-negative residual matrix factorization with application to graph anomaly detection \" in SDM 2011.","DOI":"10.1137\/1.9781611972818.13"},{"key":"e_1_3_2_1_11_1","volume-title":"Sedanspot: Detecting anomalies in edge streams,\" in ICDM","author":"Eswaran D.","year":"2018","unstructured":"D. Eswaran and C. Faloutsos , \" Sedanspot: Detecting anomalies in edge streams,\" in ICDM , 2018 . D. Eswaran and C. Faloutsos, \"Sedanspot: Detecting anomalies in edge streams,\" in ICDM, 2018."},{"key":"e_1_3_2_1_12_1","volume-title":"Mining persistent activity in continually evolving networks.,\" in KDD","author":"Belth C.","year":"2020","unstructured":"C. Belth , X. Zheng , and D. Koutra , \" Mining persistent activity in continually evolving networks.,\" in KDD , 2020 . C. Belth, X. Zheng, and D. Koutra, \"Mining persistent activity in continually evolving networks.,\" in KDD, 2020."},{"key":"e_1_3_2_1_13_1","volume-title":"F-fade: Frequency factorization for anomaly detection in edge streams,\" in WSDM","author":"Chang Y.-Y.","year":"2021","unstructured":"Y.-Y. Chang , P. Li , R. Sosic , M. Afifi , M. Schweighauser , and J. Leskovec , \" F-fade: Frequency factorization for anomaly detection in edge streams,\" in WSDM , 2021 . Y.-Y. Chang, P. Li, R. Sosic, M. Afifi, M. Schweighauser, and J. Leskovec, \"F-fade: Frequency factorization for anomaly detection in edge streams,\" in WSDM, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach,\" in KDD","author":"Yoon M.","year":"2019","unstructured":"M. Yoon , B. Hooi , K. Shin , and C. Faloutsos , \" Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach,\" in KDD , 2019 . M. Yoon, B. Hooi, K. Shin, and C. Faloutsos, \"Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach,\" in KDD, 2019."},{"key":"e_1_3_2_1_15_1","volume-title":"Eigenpulse: Detecting surges in large streaming graphs with row augmentation,\" in PAKDD","author":"Zhang J.","year":"2019","unstructured":"J. Zhang , S. Liu , W. Yu , W. Feng , and X. Cheng , \" Eigenpulse: Detecting surges in large streaming graphs with row augmentation,\" in PAKDD , 2019 . J. Zhang, S. Liu, W. Yu, W. Feng, and X. Cheng, \"Eigenpulse: Detecting surges in large streaming graphs with row augmentation,\" in PAKDD, 2019."},{"key":"e_1_3_2_1_16_1","volume-title":"Netspot: Spotting significant anomalous regions on dynamic networks,\" in SDM","author":"Bogdanov P.","year":"2013","unstructured":"P. Bogdanov , C. Faloutsos , M. Mongiov\u00ec , E. E. Papalexakis , R. Ranca , and A. K. Singh , \" Netspot: Spotting significant anomalous regions on dynamic networks,\" in SDM , 2013 . P. Bogdanov, C. Faloutsos, M. Mongiov\u00ec, E. E. Papalexakis, R. Ranca, and A. K. Singh, \"Netspot: Spotting significant anomalous regions on dynamic networks,\" in SDM, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Edgecentric: Anomaly detection in edge-attributed networks,\" in ICDMW","author":"Shah N.","year":"2016","unstructured":"N. Shah , A. Beutel , B. Hooi , L. Akoglu , S. Gunnemann , D. Makhija , M. Kumar , and C. Faloutsos , \" Edgecentric: Anomaly detection in edge-attributed networks,\" in ICDMW , 2016 . N. Shah, A. Beutel, B. Hooi, L. Akoglu, S. Gunnemann, D. Makhija, M. Kumar, and C. Faloutsos, \"Edgecentric: Anomaly detection in edge-attributed networks,\" in ICDMW, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139241"},{"key":"e_1_3_2_1_19_1","volume-title":"The importance of unexpectedness: Discovering buzzing stories in anomalous temporal graphs,\" Web Intelligence","author":"Bonchi F.","year":"2019","unstructured":"F. Bonchi , I. Bordino , F. Gullo , and G. Stilo , \" The importance of unexpectedness: Discovering buzzing stories in anomalous temporal graphs,\" Web Intelligence , 2019 . F. Bonchi, I. Bordino, F. Gullo, and G. Stilo, \"The importance of unexpectedness: Discovering buzzing stories in anomalous temporal graphs,\" Web Intelligence, 2019."},{"key":"e_1_3_2_1_20_1","volume-title":"Identifying buzzing stories via anomalous temporal subgraph discovery,\" in WI","author":"Bonchi F.","year":"2016","unstructured":"F. Bonchi , I. Bordino , F. Gullo , and G. Stilo , \" Identifying buzzing stories via anomalous temporal subgraph discovery,\" in WI , 2016 . F. Bonchi, I. Bordino, F. Gullo, and G. Stilo, \"Identifying buzzing stories via anomalous temporal subgraph discovery,\" in WI, 2016."},{"key":"e_1_3_2_1_21_1","volume-title":"Bayesian robust attributed graph clustering: Joint learning of partial anomalies and group structure,\" in AAAI","author":"Bojchevski A.","year":"2018","unstructured":"A. Bojchevski and S. G\u00fcnnemann , \" Bayesian robust attributed graph clustering: Joint learning of partial anomalies and group structure,\" in AAAI , 2018 . A. Bojchevski and S. G\u00fcnnemann, \"Bayesian robust attributed graph clustering: Joint learning of partial anomalies and group structure,\" in AAAI, 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"},{"key":"e_1_3_2_1_23_1","volume-title":"Semi-supervised anomaly detection on attributed graphs,\" IJCNN","author":"Kumagai A.","year":"2021","unstructured":"A. Kumagai , T. Iwata , and Y. Fujiwara , \" Semi-supervised anomaly detection on attributed graphs,\" IJCNN , 2021 . A. Kumagai, T. Iwata, and Y. Fujiwara, \"Semi-supervised anomaly detection on attributed graphs,\" IJCNN, 2021."},{"key":"e_1_3_2_1_24_1","first-page":"09876","article-title":"Anomaly detection in dynamic graphs via transformer","volume":"2106","author":"Liu Y.","year":"2021","unstructured":"Y. Liu , S. Pan , Y. G. Wang , F. Xiong , L. Wang , and V. C. Lee , \" Anomaly detection in dynamic graphs via transformer ,\" ArXiv , vol. abs\/ 2106 . 09876 , 2021 . Y. Liu, S. Pan, Y. G. Wang, F. Xiong, L. Wang, and V. C. Lee, \"Anomaly detection in dynamic graphs via transformer,\" ArXiv, vol. abs\/2106.09876, 2021.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_25_1","volume-title":"An efficient framework for detecting evolving anomalous subgraphs in dynamic networks,\" INFOCOM","author":"Shao M.","year":"2018","unstructured":"M. Shao , J. Li , F. Chen , and X. Chen , \" An efficient framework for detecting evolving anomalous subgraphs in dynamic networks,\" INFOCOM , 2018 . M. Shao, J. Li, F. Chen, and X. Chen, \"An efficient framework for detecting evolving anomalous subgraphs in dynamic networks,\" INFOCOM, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"Mstream: Fast anomaly detection in multi-aspect streams,\" The Web Conference (WWW)","author":"Bhatia S.","year":"2021","unstructured":"S. Bhatia , A. Jain , P. Li , R. Kumar , and B. Hooi , \" Mstream: Fast anomaly detection in multi-aspect streams,\" The Web Conference (WWW) , 2021 . S. Bhatia, A. Jain, P. Li, R. Kumar, and B. Hooi, \"Mstream: Fast anomaly detection in multi-aspect streams,\" The Web Conference (WWW), 2021."},{"key":"e_1_3_2_1_27_1","volume-title":"Memstream: Memorybased anomaly detection in multi-aspect streams with concept drift,\" The Web Conference (WWW)","author":"Bhatia S.","year":"2022","unstructured":"S. Bhatia , A. Jain , S. Srivastava , K. Kawaguchi , and B. Hooi , \" Memstream: Memorybased anomaly detection in multi-aspect streams with concept drift,\" The Web Conference (WWW) , 2022 . S. Bhatia, A. Jain, S. Srivastava, K. Kawaguchi, and B. Hooi, \"Memstream: Memorybased anomaly detection in multi-aspect streams with concept drift,\" The Web Conference (WWW), 2022."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220107"},{"key":"e_1_3_2_1_29_1","volume-title":"Fast anomaly detection for streaming data,\" in IJCAI","author":"Tan S. C.","year":"2011","unstructured":"S. C. Tan , K. M. Ting , and T. F. Liu , \" Fast anomaly detection for streaming data,\" in IJCAI , 2011 . S. C. Tan, K. M. Ting, and T. F. Liu, \"Fast anomaly detection for streaming data,\" in IJCAI, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093742.3095102"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2733472"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2322385"},{"key":"e_1_3_2_1_33_1","volume-title":"Anomaly detection in streams with extreme value theory,\" KDD","author":"Siffer A.","year":"2017","unstructured":"A. Siffer , P.-A. Fouque , A. Termier , C. Largouet , and C. Largou\u00ebt , \" Anomaly detection in streams with extreme value theory,\" KDD , 2017 . A. Siffer, P.-A. Fouque, A. Termier, C. Largouet, and C. Largou\u00ebt, \"Anomaly detection in streams with extreme value theory,\" KDD, 2017."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"M. U. Togbe M. Barry A. Boly Y. Chabchoub R. Chiky J. Montiel and V.-T. Tran \"Anomaly detection for data streams based on isolation forest using scikitmultiflow \" in ICCSA 2020.  M. U. Togbe M. Barry A. Boly Y. Chabchoub R. Chiky J. Montiel and V.-T. Tran \"Anomaly detection for data streams based on isolation forest using scikitmultiflow \" in ICCSA 2020.","DOI":"10.1007\/978-3-030-58811-3_2"},{"key":"e_1_3_2_1_35_1","volume-title":"Augsplicing: Synchronized behavior detection in streaming tensors,\" AAAI","author":"Zhang J.","year":"2021","unstructured":"J. Zhang , S. Liu , W. Hou , S. Bhatia , H.-W. Shen , W. Yu , and X. Cheng , \" Augsplicing: Synchronized behavior detection in streaming tensors,\" AAAI , 2021 . J. Zhang, S. Liu,W. Hou, S. Bhatia, H.-W. Shen,W. Yu, and X. Cheng, \"Augsplicing: Synchronized behavior detection in streaming tensors,\" AAAI, 2021."},{"key":"e_1_3_2_1_36_1","volume-title":"Graph stream classification using labeled and unlabeled graphs,\" in ICDE","author":"Pan S.","year":"2013","unstructured":"S. Pan , X. Zhu , C. Zhang , and S. Y. Philip , \" Graph stream classification using labeled and unlabeled graphs,\" in ICDE , 2013 . S. Pan, X. Zhu, C. Zhang, and S. Y. Philip, \"Graph stream classification using labeled and unlabeled graphs,\" in ICDE, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"Processing of massive audit data streams for real-time anomaly intrusion detection,\" Computer communications","author":"Wang W.","year":"2008","unstructured":"W. Wang , X. Guan , and X. Zhang , \" Processing of massive audit data streams for real-time anomaly intrusion detection,\" Computer communications , 2008 . W. Wang, X. Guan, and X. Zhang, \"Processing of massive audit data streams for real-time anomaly intrusion detection,\" Computer communications, 2008."},{"key":"e_1_3_2_1_38_1","volume-title":"An incremental datastream sketch using sparse random projections,\" in SDM","author":"Menon A. K.","year":"2007","unstructured":"A. K. Menon , G. V. A. Pham , S. Chawla , and A. Viglas , \" An incremental datastream sketch using sparse random projections,\" in SDM , 2007 . A. K. Menon, G. V. A. Pham, S. Chawla, and A. Viglas, \"An incremental datastream sketch using sparse random projections,\" in SDM, 2007."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/2078331.2078335"},{"key":"e_1_3_2_1_40_1","volume-title":"Higher-order count sketch: Dimensionality reduction that retains efficient tensor operations,\" DCC","author":"Shi Y.","year":"2020","unstructured":"Y. Shi and A. Anandkumar , \" Higher-order count sketch: Dimensionality reduction that retains efficient tensor operations,\" DCC , 2020 . Y. Shi and A. Anandkumar, \"Higher-order count sketch: Dimensionality reduction that retains efficient tensor operations,\" DCC, 2020."},{"key":"e_1_3_2_1_41_1","first-page":"03407","article-title":"Deep learning for anomaly detection: A survey","volume":"1901","author":"Chalapathy R.","year":"2019","unstructured":"R. Chalapathy and S. Chawla , \" Deep learning for anomaly detection: A survey ,\" ArXiv , vol. abs\/ 1901 . 03407 , 2019 . R. Chalapathy and S. Chawla, \"Deep learning for anomaly detection: A survey,\" ArXiv, vol. abs\/1901.03407, 2019.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_42_1","volume-title":"A review,\" arXiv preprint arXiv:2007.02500","author":"Pang G.","year":"2020","unstructured":"G. Pang , C. Shen , L. Cao , and A. van den Hengel , \"Deep learning for anomaly detection : A review,\" arXiv preprint arXiv:2007.02500 , 2020 . G. Pang, C. Shen, L. Cao, and A. van den Hengel, \"Deep learning for anomaly detection: A review,\" arXiv preprint arXiv:2007.02500, 2020."},{"key":"e_1_3_2_1_43_1","volume-title":"Exgan:Adversarial generation of extreme samples,\" AAAI Conference on Artificial Intelligence (AAAI)","author":"Bhatia S.","year":"2021","unstructured":"S. Bhatia , A. Jain , and B. Hooi , \" Exgan:Adversarial generation of extreme samples,\" AAAI Conference on Artificial Intelligence (AAAI) , 2021 . S. Bhatia, A. Jain, and B. Hooi, \"Exgan:Adversarial generation of extreme samples,\" AAAI Conference on Artificial Intelligence (AAAI), 2021."},{"key":"e_1_3_2_1_44_1","volume-title":"Efficient algorithms for densest subgraph discovery on large directed graphs,\" SIGMOD","author":"Ma C.","year":"2020","unstructured":"C. Ma , Y. Fang , R. Cheng , L. Lakshmanan , W. Zhang , and X. Lin , \" Efficient algorithms for densest subgraph discovery on large directed graphs,\" SIGMOD , 2020 . C. Ma, Y. Fang, R. Cheng, L. Lakshmanan, W. Zhang, and X. Lin, \"Efficient algorithms for densest subgraph discovery on large directed graphs,\" SIGMOD, 2020."},{"key":"e_1_3_2_1_45_1","volume-title":"Efficient densest subgraph computation in evolving graphs,\" WWW","author":"Epasto A.","year":"2015","unstructured":"A. Epasto , S. Lattanzi , and M. Sozio , \" Efficient densest subgraph computation in evolving graphs,\" WWW , 2015 . A. Epasto, S. Lattanzi, and M. Sozio, \"Efficient densest subgraph computation in evolving graphs,\" WWW, 2015."},{"key":"e_1_3_2_1_46_1","volume-title":"Near-optimal fully dynamic densest subgraph,\" STOC","author":"Sawlani S.","year":"2020","unstructured":"S. Sawlani and J. Wang , \" Near-optimal fully dynamic densest subgraph,\" STOC , 2020 . S. Sawlani and J. Wang, \"Near-optimal fully dynamic densest subgraph,\" STOC, 2020."},{"key":"e_1_3_2_1_47_1","volume-title":"Densest subgraph in dynamic graph streams,\" MFCS","author":"Mcgregor A.","year":"2015","unstructured":"A. Mcgregor , D. Tench , S. Vorotnikova , and H. Vu , \" Densest subgraph in dynamic graph streams,\" MFCS , 2015 . A. Mcgregor, D. Tench, S. Vorotnikova, and H. Vu, \"Densest subgraph in dynamic graph streams,\" MFCS, 2015."},{"key":"e_1_3_2_1_48_1","volume-title":"Metric sublinear algorithms via linear sampling,\" FOCS","author":"Esfandiari H.","year":"2018","unstructured":"H. Esfandiari and M. Mitzenmacher , \" Metric sublinear algorithms via linear sampling,\" FOCS , 2018 . H. Esfandiari and M. Mitzenmacher, \"Metric sublinear algorithms via linear sampling,\" FOCS, 2018."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_50_1","volume-title":"On anomalous hotspot discovery in graph streams,\" in ICDM","author":"Yu W.","year":"2013","unstructured":"W. Yu , C. C. Aggarwal , S. Ma , and H. Wang , \" On anomalous hotspot discovery in graph streams,\" in ICDM , 2013 . W. Yu, C. C. Aggarwal, S. Ma, and H. Wang, \"On anomalous hotspot discovery in graph streams,\" in ICDM, 2013."},{"key":"e_1_3_2_1_51_1","volume-title":"A scalable approach for outlier detection in edge streams using sketch-based approximations,\" in SDM","author":"Ranshous S.","year":"2016","unstructured":"S. Ranshous , S. Harenberg , K. Sharma , and N. F. Samatova , \" A scalable approach for outlier detection in edge streams using sketch-based approximations,\" in SDM , 2016 . S. Ranshous, S. Harenberg, K. Sharma, and N. F. Samatova, \"A scalable approach for outlier detection in edge streams using sketch-based approximations,\" in SDM, 2016."},{"key":"e_1_3_2_1_52_1","volume-title":"Localizing anomalous changes in time-evolving graphs,\" in SIGMOD","author":"Sricharan K.","year":"2014","unstructured":"K. Sricharan and K. Das , \" Localizing anomalous changes in time-evolving graphs,\" in SIGMOD , 2014 . K. Sricharan and K. Das, \"Localizing anomalous changes in time-evolving graphs,\" in SIGMOD, 2014."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494564"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150445"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_56_1","volume-title":"Incremental frequent subgraph mining on large evolving graphs,\" TKDE","author":"Abdelhamid E.","year":"2017","unstructured":"E. Abdelhamid , M. Canim , M. Sadoghi , B. Bhattacharjee , Y.-C. Chang , and P. Kalnis , \" Incremental frequent subgraph mining on large evolving graphs,\" TKDE , 2017 . E. Abdelhamid, M. Canim, M. Sadoghi, B. Bhattacharjee, Y.-C. Chang, and P. Kalnis, \"Incremental frequent subgraph mining on large evolving graphs,\" TKDE, 2017."},{"key":"e_1_3_2_1_57_1","volume-title":"The pagerank citation ranking : Bringing order to the web,\" in WWW","author":"Page L.","year":"1999","unstructured":"L. Page , S. Brin , R. Motwani , and T. Winograd , \" The pagerank citation ranking : Bringing order to the web,\" in WWW , 1999 . L. Page, S. Brin, R. Motwani, and T. Winograd, \"The pagerank citation ranking : Bringing order to the web,\" in WWW, 1999."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_59_1","volume-title":"a survey,\" SIGMOD Record","author":"Mcgregor A.","year":"2014","unstructured":"A. Mcgregor , \"Graph stream algorithms : a survey,\" SIGMOD Record , 2014 . A. Mcgregor, \"Graph stream algorithms: a survey,\" SIGMOD Record, 2014."},{"key":"e_1_3_2_1_60_1","volume-title":"On finding dense subgraphs,\" in ICALP","author":"Khuller S.","year":"2009","unstructured":"S. Khuller and B. Saha , \" On finding dense subgraphs,\" in ICALP , 2009 . S. Khuller and B. Saha, \"On finding dense subgraphs,\" in ICALP, 2009."},{"key":"e_1_3_2_1_61_1","volume-title":"Results of the darpa 1998 offline intrusion detection evaluation.,\" in Recent advances in intrusion detection","author":"Lippmann R.","year":"1999","unstructured":"R. Lippmann , R. K. Cunningham , D. J. Fried , I. Graf , K. R. Kendall , S. E. Webster , and M. A. Zissman , \" Results of the darpa 1998 offline intrusion detection evaluation.,\" in Recent advances in intrusion detection , 1999 . R. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, and M. A. Zissman, \"Results of the darpa 1998 offline intrusion detection evaluation.,\" in Recent advances in intrusion detection, 1999."},{"key":"e_1_3_2_1_62_1","volume-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection,\" computers & security","author":"Shiravi A.","year":"2012","unstructured":"A. Shiravi , H. Shiravi , M. Tavallaee , and A. A. Ghorbani , \" Toward developing a systematic approach to generate benchmark datasets for intrusion detection,\" computers & security , 2012 . A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, \"Toward developing a systematic approach to generate benchmark datasets for intrusion detection,\" computers & security, 2012."},{"key":"e_1_3_2_1_63_1","volume-title":"A survey of network-based intrusion detection data sets,\" Computers & Security","author":"Ring M.","year":"2019","unstructured":"M. Ring , S. Wunderlich , D. Scheuring , D. Landes , and A. Hotho , \" A survey of network-based intrusion detection data sets,\" Computers & Security , 2019 . M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, \"A survey of network-based intrusion detection data sets,\" Computers & Security, 2019."},{"key":"e_1_3_2_1_64_1","volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization,\" in ICISSP","author":"Sharafaldin I.","year":"2018","unstructured":"I. Sharafaldin , A. H. Lashkari , and A. A. Ghorbani , \" Toward generating a new intrusion detection dataset and intrusion traffic characterization,\" in ICISSP , 2018 . I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, \"Toward generating a new intrusion detection dataset and intrusion traffic characterization,\" in ICISSP, 2018."},{"key":"e_1_3_2_1_65_1","volume-title":"Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,\" in ICCST","author":"Sharafaldin I.","year":"2019","unstructured":"I. Sharafaldin , A. H. Lashkari , S. Hakak , and A. A. Ghorbani , \" Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,\" in ICCST , 2019 . I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, \"Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,\" in ICCST, 2019."},{"key":"e_1_3_2_1_66_1","unstructured":"R. C. Forest. https:\/\/github.com\/aws\/random-cut-forest-by-aws 2021.  R. C. Forest. https:\/\/github.com\/aws\/random-cut-forest-by-aws 2021."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:52Z","timestamp":1750178272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":67,"alternative-id":["10.1145\/3580305.3599504","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599504","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}