{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:06:59Z","timestamp":1764785219356,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005825","name":"National Institute of Food and Agriculture","doi-asserted-by":"publisher","award":["2020-67021-32799"],"award-info":[{"award-number":["2020-67021-32799"]}],"id":[{"id":"10.13039\/100005825","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DHS","award":["17STQAC00001-07-00"],"award-info":[{"award-number":["17STQAC00001-07-00"]}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF2110088"],"award-info":[{"award-number":["W911NF2110088"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001121C0165"],"award-info":[{"award-number":["HR001121C0165"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1947135,2134079,2316233,2324770,1939725"],"award-info":[{"award-number":["1947135,2134079,2316233,2324770,1939725"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3614950","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:26Z","timestamp":1697874326000},"page":"3584-3594","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Learning Node Abnormality with Weak Supervision"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2571-5796","authenticated-orcid":false,"given":"Qinghai","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6684-6752","authenticated-orcid":false,"given":"Kaize","family":"Ding","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3264-7904","authenticated-orcid":false,"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4405-3887","authenticated-orcid":false,"given":"Hanghang","family":"Tong","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_2_1","volume-title":"Multiple instance learning networks for fine-grained sentiment analysis. TACL","author":"Angelidis Stefanos","year":"2018","unstructured":"Stefanos Angelidis and Mirella Lapata . 2018. Multiple instance learning networks for fine-grained sentiment analysis. TACL ( 2018 ). Stefanos Angelidis and Mirella Lapata. 2018. Multiple instance learning networks for fine-grained sentiment analysis. TACL (2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Markus M Breunig Hans-Peter Kriegel Raymond T Ng and J\u00f6rg Sander. 2000. LOF: identifying density-based local outliers. In SIGMOD.  Markus M Breunig Hans-Peter Kriegel Raymond T Ng and J\u00f6rg Sander. 2000. LOF: identifying density-based local outliers. In SIGMOD.","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939784"},{"key":"e_1_3_2_1_5_1","unstructured":"Ting Chen Simon Kornblith Mohammad Norouzi and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML.  Ting Chen Simon Kornblith Mohammad Norouzi and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML."},{"key":"e_1_3_2_1_6_1","volume-title":"Weakly supervised object localization with multi-fold multiple instance learning. TPAMI","author":"Cinbis Ramazan Gokberk","year":"2016","unstructured":"Ramazan Gokberk Cinbis , Jakob Verbeek , and Cordelia Schmid . 2016. Weakly supervised object localization with multi-fold multiple instance learning. TPAMI ( 2016 ). Ramazan Gokberk Cinbis, Jakob Verbeek, and Cordelia Schmid. 2016. Weakly supervised object localization with multi-fold multiple instance learning. TPAMI (2016)."},{"volume-title":"Introduction to international disaster management","author":"Coppola Damon P","key":"e_1_3_2_1_7_1","unstructured":"Damon P Coppola . 2006. Introduction to international disaster management . Elsevier . Damon P Coppola. 2006. Introduction to international disaster management. Elsevier."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019b. Deep anomaly detection on attributed networks. In SDM.  Kaize Ding Jundong Li Rohit Bhanushali and Huan Liu. 2019b. Deep anomaly detection on attributed networks. In SDM.","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kaize Ding Jundong Li and Huan Liu. 2019a. Interactive anomaly detection on attributed networks. In WSDM.  Kaize Ding Jundong Li and Huan Liu. 2019a. Interactive anomaly detection on attributed networks. In WSDM.","DOI":"10.1145\/3289600.3290964"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25898"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575637.3575646"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3542602"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449922"},{"key":"e_1_3_2_1_14_1","unstructured":"Yingtong Dou Zhiwei Liu Li Sun Yutong Deng Hao Peng and Philip S Yu. 2020. Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In CIKM.  Yingtong Dou Zhiwei Liu Li Sun Yutong Deng Hao Peng and Philip S Yu. 2020. Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In CIKM."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357944"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098040"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3470801"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ji Feng and Zhi-Hua Zhou. 2017. Deep MIML network. In AAAI.  Ji Feng and Zhi-Hua Zhou. 2017. Deep MIML network. In AAAI.","DOI":"10.1609\/aaai.v31i1.10890"},{"key":"e_1_3_2_1_19_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS."},{"key":"e_1_3_2_1_20_1","unstructured":"Kaveh Hassani and Amir Hosein Khasahmadi. 2020. Contrastive multi-view representation learning on graphs. In ICML.  Kaveh Hassani and Amir Hosein Khasahmadi. 2020. Contrastive multi-view representation learning on graphs. In ICML."},{"key":"e_1_3_2_1_21_1","unstructured":"Kaiming He Haoqi Fan Yuxin Wu Saining Xie and Ross Girshick. 2020. Momentum contrast for unsupervised visual representation learning. In CVPR.  Kaiming He Haoqi Fan Yuxin Wu Saining Xie and Ross Girshick. 2020. Momentum contrast for unsupervised visual representation learning. In CVPR."},{"key":"e_1_3_2_1_22_1","unstructured":"Maximilian Ilse Jakub Tomczak and Max Welling. 2018. Attention-based deep multiple instance learning. In ICML.  Maximilian Ilse Jakub Tomczak and Max Welling. 2018. Attention-based deep multiple instance learning. In ICML."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539286"},{"key":"e_1_3_2_1_24_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_25_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling . 2017 . Semi-Supervised Classification with Graph Convolutional Networks. In ICLR. Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR."},{"key":"e_1_3_2_1_26_1","volume-title":"Nando De Freitas, and Padhraic Smyth","author":"Kotzias Dimitrios","year":"2015","unstructured":"Dimitrios Kotzias , Misha Denil , Nando De Freitas, and Padhraic Smyth . 2015 . From group to individual labels using deep features. In KDD. Dimitrios Kotzias, Misha Denil, Nando De Freitas, and Padhraic Smyth. 2015. From group to individual labels using deep features. In KDD."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Hans-Peter Kriegel Peer Kroger Erich Schubert and Arthur Zimek. 2011. Interpreting and unifying outlier scores. In SDM.  Hans-Peter Kriegel Peer Kroger Erich Schubert and Arthur Zimek. 2011. Interpreting and unifying outlier scores. In SDM.","DOI":"10.1137\/1.9781611972818.2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM.  Ao Li Zhou Qin Runshi Liu Yiqun Yang and Dong Li. 2019. Spam review detection with graph convolutional networks. In CIKM.","DOI":"10.1145\/3357384.3357820"},{"key":"e_1_3_2_1_29_1","volume-title":"Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI.","author":"Li Jundong","year":"2017","unstructured":"Jundong Li , Harsh Dani , Xia Hu , and Huan Liu . 2017 a. Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI. Jundong Li, Harsh Dani, Xia Hu, and Huan Liu. 2017a. Radar: Residual Analysis for Anomaly Detection in Attributed Networks.. In IJCAI."},{"key":"e_1_3_2_1_30_1","unstructured":"Yuncheng Li Jianchao Yang Yale Song Liangliang Cao Jiebo Luo and Li-Jia Li. 2017b. Learning from noisy labels with distillation. In CVPR.  Yuncheng Li Jianchao Yang Yale Song Liangliang Cao Jiebo Luo and Li-Jia Li. 2017b. Learning from noisy labels with distillation. In CVPR."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570446"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"e_1_3_2_1_33_1","unstructured":"Oded Maron and Aparna Lakshmi Ratan. 1998. Multiple-instance learning for natural scene classification.. In ICML.  Oded Maron and Aparna Lakshmi Ratan. 1998. Multiple-instance learning for natural scene classification.. In ICML."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_2_1_35_1","volume-title":"Yvonne M\u00fclle, and Klemens B\u00f6hm.","author":"M\u00fcller Emmanuel","year":"2013","unstructured":"Emmanuel M\u00fcller , Patricia Iglesias S\u00e1nchez , Yvonne M\u00fclle, and Klemens B\u00f6hm. 2013 . Ranking outlier nodes in subspaces of attributed graphs. In ICDEW. Emmanuel M\u00fcller, Patricia Iglesias S\u00e1nchez, Yvonne M\u00fclle, and Klemens B\u00f6hm. 2013. Ranking outlier nodes in subspaces of attributed graphs. In ICDEW."},{"key":"e_1_3_2_1_36_1","volume-title":"Yijun Chen, and Xin Sun.","author":"Ngai Eric WT","year":"2011","unstructured":"Eric WT Ngai , Yong Hu , Yiu Hing Wong , Yijun Chen, and Xin Sun. 2011 . The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision support systems, Vol. 50 , 3 (2011), 559--569. Eric WT Ngai, Yong Hu, Yiu Hing Wong, Yijun Chen, and Xin Sun. 2011. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision support systems, Vol. 50, 3 (2011), 559--569."},{"key":"e_1_3_2_1_37_1","volume-title":"Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748","author":"van den Oord Aaron","year":"2018","unstructured":"Aaron van den Oord , Yazhe Li , and Oriol Vinyals . 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 ( 2018 ). Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In KDD.  Guansong Pang Chunhua Shen and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In KDD.","DOI":"10.1145\/3292500.3330871"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In KDD.  Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In KDD.","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_40_1","volume-title":"Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694","author":"Ruff Lukas","year":"2019","unstructured":"Lukas Ruff , Robert A Vandermeulen , Nico G\u00f6rnitz , Alexander Binder , Emmanuel M\u00fcller , Klaus-Robert M\u00fcller , and Marius Kloft . 2019. Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694 ( 2019 ). Lukas Ruff, Robert A Vandermeulen, Nico G\u00f6rnitz, Alexander Binder, Emmanuel M\u00fcller, Klaus-Robert M\u00fcller, and Marius Kloft. 2019. Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694 (2019)."},{"key":"e_1_3_2_1_41_1","unstructured":"Patricia Iglesias S\u00e1nchez Emmanuel M\u00fcller Oretta Irmler and Klemens B\u00f6hm. 2014. Local context selection for outlier ranking in graphs with multiple numeric node attributes. In SSDBM.  Patricia Iglesias S\u00e1nchez Emmanuel M\u00fcller Oretta Irmler and Klemens B\u00f6hm. 2014. Local context selection for outlier ranking in graphs with multiple numeric node attributes. In SSDBM."},{"key":"e_1_3_2_1_42_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen , Galileo Namata , Mustafa Bilgic , Lise Getoor , Brian Galligher , and Tina Eliassi-Rad . 2008. Collective classification in network data. AI magazine ( 2008 ). Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine (2008)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"David B Skillicorn. 2007. Detecting anomalies in graphs. In ISI.  David B Skillicorn. 2007. Detecting anomalies in graphs. In ISI.","DOI":"10.1109\/ISI.2007.379473"},{"key":"e_1_3_2_1_44_1","volume-title":"Conditional anomaly detection. TKDE","author":"Song Xiuyao","year":"2007","unstructured":"Xiuyao Song , Mingxi Wu , Christopher Jermaine , and Sanjay Ranka . 2007. Conditional anomaly detection. TKDE ( 2007 ). Xiuyao Song, Mingxi Wu, Christopher Jermaine, and Sanjay Ranka. 2007. Conditional anomaly detection. TKDE (2007)."},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Machine Learning. PMLR, 21076--21089","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang , Jiajin Li , Ziqi Gao , and Jia Li . 2022 . Rethinking graph neural networks for anomaly detection . In International Conference on Machine Learning. PMLR, 21076--21089 . Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In International Conference on Machine Learning. PMLR, 21076--21089."},{"key":"e_1_3_2_1_46_1","volume-title":"Contrastive multiview coding. arXiv preprint arXiv:1906.05849","author":"Tian Yonglong","year":"2019","unstructured":"Yonglong Tian , Dilip Krishnan , and Phillip Isola . 2019. Contrastive multiview coding. arXiv preprint arXiv:1906.05849 ( 2019 ). Yonglong Tian, Dilip Krishnan, and Phillip Isola. 2019. Contrastive multiview coding. arXiv preprint arXiv:1906.05849 (2019)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Hanghang Tong Christos Faloutsos and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In ICDM.  Hanghang Tong Christos Faloutsos and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In ICDM.","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_3_2_1_48_1","volume-title":"Multiple instance learning with graph neural networks. arXiv preprint arXiv:1906.04881","author":"Tu Ming","year":"2019","unstructured":"Ming Tu , Jing Huang , Xiaodong He , and Bowen Zhou . 2019. Multiple instance learning with graph neural networks. arXiv preprint arXiv:1906.04881 ( 2019 ). Ming Tu, Jing Huang, Xiaodong He, and Bowen Zhou. 2019. Multiple instance learning with graph neural networks. arXiv preprint arXiv:1906.04881 (2019)."},{"key":"e_1_3_2_1_49_1","unstructured":"Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR.  Petar Velivc kovi\u0107 Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio and Yoshua Bengio. 2018. Graph attention networks. In ICLR."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Daixin Wang Jianbin Lin Peng Cui Quanhui Jia Zhen Wang Yanming Fang Quan Yu Jun Zhou Shuang Yang and Yuan Qi. 2019. A Semi-supervised Graph Attentive Network for Financial Fraud Detection. In ICDM.  Daixin Wang Jianbin Lin Peng Cui Quanhui Jia Zhen Wang Yanming Fang Quan Yu Jun Zhou Shuang Yang and Yuan Qi. 2019. A Semi-supervised Graph Attentive Network for Financial Fraud Detection. In ICDM.","DOI":"10.1109\/ICDM.2019.00070"},{"key":"e_1_3_2_1_51_1","volume-title":"Dynamic Transfer Learning across Graphs. arXiv preprint arXiv:2305.00664","author":"Wang Haohui","year":"2023","unstructured":"Haohui Wang , Yuzhen Mao , Jianhui Sun , Si Zhang , and Dawei Zhou . 2023. Dynamic Transfer Learning across Graphs. arXiv preprint arXiv:2305.00664 ( 2023 ). Haohui Wang, Yuzhen Mao, Jianhui Sun, Si Zhang, and Dawei Zhou. 2023. Dynamic Transfer Learning across Graphs. arXiv preprint arXiv:2305.00664 (2023)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Jianling Wang Kaize Ding Liangjie Hong Huan Liu and James Caverlee. 2020. Next-item recommendation with sequential hypergraphs. In SIGIR.  Jianling Wang Kaize Ding Liangjie Hong Huan Liu and James Caverlee. 2020. Next-item recommendation with sequential hypergraphs. In SIGIR.","DOI":"10.1145\/3397271.3401133"},{"key":"e_1_3_2_1_53_1","volume-title":"Christopher Fifty, Tao Yu, and Kilian Q Weinberger.","author":"Wu Felix","year":"2019","unstructured":"Felix Wu , Tianyi Zhang , Amauri Holanda de Souza Jr , Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019 . Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019). Felix Wu, Tianyi Zhang, Amauri Holanda de Souza Jr, Christopher Fifty, Tao Yu, and Kilian Q Weinberger. 2019. Simplifying graph convolutional networks. arXiv preprint arXiv:1902.07153 (2019)."},{"key":"e_1_3_2_1_54_1","unstructured":"Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2019. How powerful are graph neural networks?. In ICLR.  Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2019. How powerful are graph neural networks?. In ICLR."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Xin Xu and Eibe Frank. 2004. Logistic regression and boosting for labeled bags of instances. In PAKDD.  Xin Xu and Eibe Frank. 2004. Logistic regression and boosting for labeled bags of instances. In PAKDD.","DOI":"10.1007\/978-3-540-24775-3_35"},{"key":"e_1_3_2_1_56_1","volume-title":"Weakly supervised histopathology cancer image segmentation and classification. Medical image analysis","author":"Xu Yan","year":"2014","unstructured":"Yan Xu , Jun-Yan Zhu , I Eric , Chao Chang , Maode Lai , and Zhuowen Tu. 2014. Weakly supervised histopathology cancer image segmentation and classification. Medical image analysis ( 2014 ). Yan Xu, Jun-Yan Zhu, I Eric, Chao Chang, Maode Lai, and Zhuowen Tu. 2014. Weakly supervised histopathology cancer image segmentation and classification. Medical image analysis (2014)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599446"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450053"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557291"},{"key":"e_1_3_2_1_60_1","unstructured":"Jiaxuan You Bowen Liu Zhitao Ying Vijay Pande and Jure Leskovec. 2018. Graph convolutional policy network for goal-directed molecular graph generation. In NeurIPS.  Jiaxuan You Bowen Liu Zhitao Ying Vijay Pande and Jure Leskovec. 2018. Graph convolutional policy network for goal-directed molecular graph generation. In NeurIPS."},{"key":"e_1_3_2_1_61_1","volume-title":"Graph contrastive learning with augmentations. (NeurIPS","author":"You Yuning","year":"2020","unstructured":"Yuning You , Tianlong Chen , Yongduo Sui , Ting Chen , Zhangyang Wang , and Yang Shen . 2020. Graph contrastive learning with augmentations. (NeurIPS ( 2020 ). Yuning You, Tianlong Chen, Yongduo Sui, Ting Chen, Zhangyang Wang, and Yang Shen. 2020. Graph contrastive learning with augmentations. (NeurIPS (2020)."},{"key":"e_1_3_2_1_62_1","volume-title":"Mohammad Ali Abbasi, and Huan Liu","author":"Zafarani Reza","year":"2014","unstructured":"Reza Zafarani , Mohammad Ali Abbasi, and Huan Liu . 2014 . Social media mining: an introduction. Cambridge University Press . Reza Zafarani, Mohammad Ali Abbasi, and Huan Liu. 2014. Social media mining: an introduction. Cambridge University Press."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.64"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0001-0"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Tong Zhao Chuchen Deng Kaifeng Yu Tianwen Jiang Daheng Wang and Meng Jiang. 2020. Error-Bounded Graph Anomaly Loss for GNNs. In CIKM.  Tong Zhao Chuchen Deng Kaifeng Yu Tianwen Jiang Daheng Wang and Meng Jiang. 2020. Error-Bounded Graph Anomaly Loss for GNNs. In CIKM.","DOI":"10.1145\/3340531.3411979"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3119326"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In KDD.  Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In KDD.","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_69_1","volume-title":"ADMIRING: Adversarial multi-network mining. In ICDM.","author":"Zhou Qinghai","year":"2019","unstructured":"Qinghai Zhou , Liangyue Li , Nan Cao , Lei Ying , and Hanghang Tong . 2019 b. ADMIRING: Adversarial multi-network mining. In ICDM. Qinghai Zhou, Liangyue Li, Nan Cao, Lei Ying, and Hanghang Tong. 2019b. ADMIRING: Adversarial multi-network mining. In ICDM."},{"key":"e_1_3_2_1_70_1","volume-title":"Adversarial Attacks on Multi-Network Mining: Problem Definition and Fast Solutions","author":"Zhou Qinghai","year":"2021","unstructured":"Qinghai Zhou , Liangyue Li , Nan Cao , Lei Ying , and Hanghang Tong . 2021a. Adversarial Attacks on Multi-Network Mining: Problem Definition and Fast Solutions . IEEE Transactions on Knowledge and Data Engineering ( 2021 ). Qinghai Zhou, Liangyue Li, Nan Cao, Lei Ying, and Hanghang Tong. 2021a. Adversarial Attacks on Multi-Network Mining: Problem Definition and Fast Solutions. IEEE Transactions on Knowledge and Data Engineering (2021)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Qinghai Zhou Liangyue Li and Hanghang Tong. 2019a. Towards Real Time Team Optimization. In Big Data.  Qinghai Zhou Liangyue Li and Hanghang Tong. 2019a. Towards Real Time Team Optimization. In Big Data.","DOI":"10.1109\/BigData47090.2019.9006078"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449886"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Zhi-Hua Zhou Yu-Yin Sun and Yu-Feng Li. 2009. Multi-instance learning by treating instances as non-iid samples. In ICML.  Zhi-Hua Zhou Yu-Yin Sun and Yu-Feng Li. 2009. Multi-instance learning by treating instances as non-iid samples. In ICML.","DOI":"10.1145\/1553374.1553534"},{"key":"e_1_3_2_1_74_1","volume-title":"Multi-instance multi-label learning. Artificial Intelligence","author":"Zhou Zhi-Hua","year":"2012","unstructured":"Zhi-Hua Zhou , Min-Ling Zhang , Sheng-Jun Huang , and Yu-Feng Li. 2012. Multi-instance multi-label learning. Artificial Intelligence ( 2012 ). Zhi-Hua Zhou, Min-Ling Zhang, Sheng-Jun Huang, and Yu-Feng Li. 2012. Multi-instance multi-label learning. Artificial Intelligence (2012)."},{"key":"e_1_3_2_1_75_1","volume-title":"Deep graph contrastive representation learning. arXiv preprint arXiv:2006.04131","author":"Zhu Yanqiao","year":"2020","unstructured":"Yanqiao Zhu , Yichen Xu , Feng Yu , Qiang Liu , Shu Wu , and Liang Wang . 2020. Deep graph contrastive representation learning. arXiv preprint arXiv:2006.04131 ( 2020 ). Yanqiao Zhu, Yichen Xu, Feng Yu, Qiang Liu, Shu Wu, and Liang Wang. 2020. Deep graph contrastive representation learning. arXiv preprint arXiv:2006.04131 (2020)."}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Birmingham United Kingdom","acronym":"CIKM '23"},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3614950","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3614950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:44Z","timestamp":1750178204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3614950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":75,"alternative-id":["10.1145\/3583780.3614950","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3614950","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}