{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:36:56Z","timestamp":1772908616824,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HKUST(GZ)-Chuanglin Graph Data Joint Lab and Guangzhou-HKUST(GZ) Joint Funding Scheme","award":["2023A03J0673"],"award-info":[{"award-number":["2023A03J0673"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206067"],"award-info":[{"award-number":["62206067"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645429","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"4083-4094","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Weakly Supervised Anomaly Detection via Knowledge-Data Alignment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4188-6517","authenticated-orcid":false,"given":"Haihong","family":"Zhao","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0434-6707","authenticated-orcid":false,"given":"Chenyi","family":"Zi","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2633-512X","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6459-6283","authenticated-orcid":false,"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[{"name":"CreateLink Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7385-5186","authenticated-orcid":false,"given":"Yan","family":"Zhou","sequence":"additional","affiliation":[{"name":"CreateLink Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6362-4385","authenticated-orcid":false,"given":"Jia","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6","author":"Akcay Samet","year":"2019","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6, 2018, Revised Selected Papers, Part III 14. Springer, 622--637."},{"key":"e_1_3_2_2_2_1","first-page":"311","article-title":"SisPorto 2.0: a program for automated analysis of cardiotocograms","volume":"9","author":"de Campos Diogo","year":"2000","unstructured":"Diogo Ayres-de Campos, Joao Bernardes, Antonio Garrido, Joaquim Marques-de Sa, and Luis Pereira-Leite. 2000. SisPorto 2.0: a program for automated analysis of cardiotocograms. Journal of Maternal-Fetal Medicine, Vol. 9, 5 (2000), 311--318.","journal-title":"Journal of Maternal-Fetal Medicine"},{"key":"e_1_3_2_2_3_1","volume-title":"International Conference on Learning Representations.","author":"B\u00e9cigneul Gary","year":"2020","unstructured":"Gary B\u00e9cigneul, Octavian-Eugen Ganea, Benson Chen, Regina Barzilay, and Tommi S Jaakkola. 2020. Optimal transport graph neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_4_1","volume-title":"Thirty-seventh Conference on Neural Information Processing Systems.","author":"Botao WANG","year":"2023","unstructured":"WANG Botao, Jia Li, Yang Liu, Jiashun Cheng, Yu Rong, Wenjia Wang, and Fugee Tsung. 2023. Deep Insights into Noisy Pseudo Labeling on Graph Data. In Thirty-seventh Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_5_1","volume-title":"IEEE\/IST workshop on monitoring, attack detection and mitigation (MonAM)","volume":"28","author":"Bouzida Yacine","year":"2006","unstructured":"Yacine Bouzida and Frederic Cuppens. 2006. Neural networks vs. decision trees for intrusion detection. In IEEE\/IST workshop on monitoring, attack detection and mitigation (MonAM), Vol. 28. 29."},{"key":"e_1_3_2_2_6_1","volume-title":"Classification and regression trees (Wadsworth","author":"Breiman L","year":"1984","unstructured":"L Breiman, JH Friedman, RA Olshen, and CJ Stone. 1984. Classification and regression trees (Wadsworth, Belmont, CA). ISBN-13 (1984), 978--0412048418."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3272396"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103603"},{"key":"e_1_3_2_2_9_1","volume-title":"Support vector machine. Machine learning","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik. 1995. Support vector machine. Machine learning, Vol. 20, 3 (1995), 273--297."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_2_11_1","volume-title":"Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems","author":"Cuturi Marco","year":"2013","unstructured":"Marco Cuturi. 2013. Sinkhorn distances: Lightspeed computation of optimal transport. Advances in neural information processing systems , Vol. 26 (2013)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/502090.502091"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3166\/jancl.11.11-34"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3000001.3000069"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.989"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"e_1_3_2_2_17_1","volume-title":"Introduction to Mathematical Logic","author":"Detlovs Vilnis","unstructured":"Vilnis Detlovs and Karlis Podnieks. 2011. Introduction to Mathematical Logic. University of Latvia (2011)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449922"},{"key":"e_1_3_2_2_19_1","volume-title":"Neuro-symbolic constraint programming for structured prediction. arXiv preprint arXiv:2103.17232","author":"Dragone Paolo","year":"2021","unstructured":"Paolo Dragone, Stefano Teso, and Andrea Passerini. 2021. Neuro-symbolic constraint programming for structured prediction. arXiv preprint arXiv:2103.17232 (2021)."},{"key":"e_1_3_2_2_20_1","first-page":"327","article-title":"Neural-symbolic learning and reasoning: A survey and interpretation","volume":"342","author":"Avila Garcez Artur","year":"2022","unstructured":"Artur d'Avila Garcez, Sebastian Bader, Howard Bowman, Luis C Lamb, Leo de Penning, BV Illuminoo, Hoifung Poon, and COPPE Gerson Zaverucha. 2022. Neural-symbolic learning and reasoning: A survey and interpretation. Neuro-Symbolic Artificial Intelligence: The State of the Art, Vol. 342, 1 (2022), 327.","journal-title":"Neuro-Symbolic Artificial Intelligence: The State of the Art"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00037"},{"key":"e_1_3_2_2_22_1","volume-title":"Stochastic optimization for large-scale optimal transport. Advances in neural information processing systems","author":"Genevay Aude","year":"2016","unstructured":"Aude Genevay, Marco Cuturi, Gabriel Peyr\u00e9, and Francis Bach. 2016. Stochastic optimization for large-scale optimal transport. Advances in neural information processing systems , Vol. 29 (2016)."},{"key":"e_1_3_2_2_23_1","first-page":"18932","article-title":"Revisiting deep learning models for tabular data","volume":"34","author":"Gorishniy Yury","year":"2021","unstructured":"Yury Gorishniy, Ivan Rubachev, Valentin Khrulkov, and Artem Babenko. 2021. Revisiting deep learning models for tabular data. Advances in Neural Information Processing Systems , Vol. 34 (2021), 18932--18943.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_24_1","first-page":"32142","article-title":"Adbench: Anomaly detection benchmark","volume":"35","author":"Han Songqiao","year":"2022","unstructured":"Songqiao Han, Xiyang Hu, Hailiang Huang, Minqi Jiang, and Yue Zhao. 2022. Adbench: Anomaly detection benchmark. Advances in Neural Information Processing Systems , Vol. 35 (2022), 32142--32159.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","unstructured":"Mark Hopkins Erik Reeber George Forman and Jaap Suermondt. 1999. Spambase. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C53G6X.","DOI":"10.24432\/C53G6X"},{"key":"e_1_3_2_2_26_1","volume-title":"Esad: End-to-end deep semi-supervised anomaly detection. arXiv preprint arXiv:2012.04905","author":"Huang Chaoqin","year":"2020","unstructured":"Chaoqin Huang, Fei Ye, Peisen Zhao, Ya Zhang, Yan-Feng Wang, and Qi Tian. 2020. Esad: End-to-end deep semi-supervised anomaly detection. arXiv preprint arXiv:2012.04905 (2020)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838788"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599258"},{"key":"e_1_3_2_2_29_1","volume-title":"2023 b. Weakly supervised anomaly detection: A survey. arXiv preprint arXiv:2302.04549","author":"Jiang Minqi","year":"2023","unstructured":"Minqi Jiang, Chaochuan Hou, Ao Zheng, Xiyang Hu, Songqiao Han, Hailiang Huang, Xiangnan He, Philip S Yu, and Yue Zhao. 2023 b. Weakly supervised anomaly detection: A survey. arXiv preprint arXiv:2302.04549 (2023)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78090-0_7"},{"key":"e_1_3_2_2_31_1","first-page":"1150","article-title":"IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems","volume":"18","author":"Khan Haider Adnan","year":"2019","unstructured":"Haider Adnan Khan, Nader Sehatbakhsh, Luong N Nguyen, Robert L Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zaji\u0107. 2019. IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Transactions on Dependable and Secure Computing, Vol. 18, 3 (2019), 1150--1163.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_32_1","volume-title":"The 3rd International Conference on Learning Representations.","author":"Kingma DP","year":"2015","unstructured":"DP Kingma. 2015. Adam: a method for stochastic optimization. In The 3rd International Conference on Learning Representations."},{"key":"e_1_3_2_2_33_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations.","author":"Thomas","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_34_1","volume-title":"Internet Encyclopedia of Philosophy.","author":"Klement Kevin C.","unstructured":"Kevin C. Klement. 2004. Propositional Logic. In Internet Encyclopedia of Philosophy."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378346"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330847"},{"key":"e_1_3_2_2_37_1","first-page":"6265","article-title":"Semi-supervised hierarchical graph classification","volume":"45","author":"Li Jia","year":"2022","unstructured":"Jia Li, Yongfeng Huang, Heng Chang, and Yu Rong. 2022a. Semi-supervised hierarchical graph classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 45, 5 (2022), 6265--6276.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313461"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599806"},{"key":"e_1_3_2_2_40_1","volume-title":"Dual-MGAN: An Efficient Approach for Semi-supervised Outlier Detection with Few Identified Anomalies. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Li Zhe","year":"2022","unstructured":"Zhe Li, Chunhua Sun, Chunli Liu, Xiayu Chen, Meng Wang, and Yezheng Liu. 2022b. Dual-MGAN: An Efficient Approach for Semi-supervised Outlier Detection with Few Identified Anomalies. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 16, 6 (2022), 1--30."},{"key":"e_1_3_2_2_41_1","volume-title":"Dual-MGAN: An Efficient Approach for Semi-supervised Outlier Detection with Few Identified Anomalies. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Li Zhe","year":"2022","unstructured":"Zhe Li, Chunhua Sun, Chunli Liu, Xiayu Chen, Meng Wang, and Yezheng Liu. 2022c. Dual-MGAN: An Efficient Approach for Semi-supervised Outlier Detection with Few Identified Anomalies. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 16, 6 (2022), 1--30."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539082"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2925287"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"e_1_3_2_2_46_1","volume-title":"Explainable deep few-shot anomaly detection with deviation networks. arXiv preprint arXiv:2108.00462","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Choubo Ding, Chunhua Shen, and Anton van den Hengel. 2021a. Explainable deep few-shot anomaly detection with deviation networks. arXiv preprint arXiv:2108.00462 (2021)."},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795--1807","author":"Pang Guansong","unstructured":"Guansong Pang, Chunhua Shen, Huidong Jin, and Anton van den Hengel. 2023. Deep weakly-supervised anomaly detection. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795--1807."},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining. 353--362","author":"Pang Guansong","unstructured":"Guansong Pang, Chunhua Shen, and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining. 353--362."},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. 1298--1308","author":"Pang Guansong","unstructured":"Guansong Pang, Anton van den Hengel, Chunhua Shen, and Longbing Cao. 2021b. Toward deep supervised anomaly detection: Reinforcement learning from partially labeled anomaly data. In Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. 1298--1308."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(87)80053-6"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_2_53_1","volume-title":"International conference on machine learning. PMLR, 4393--4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International conference on machine learning. PMLR, 4393--4402."},{"key":"e_1_3_2_2_54_1","volume-title":"Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations.","author":"Ruff Lukas","year":"2019","unstructured":"Lukas Ruff, Robert A Vandermeulen, Nico G\u00f6rnitz, Alexander Binder, Emmanuel M\u00fcller, Klaus-Robert M\u00fcller, and Marius Kloft. 2019. Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_55_1","volume-title":"International Conference on Machine Learning. PMLR, 9016--9025","author":"Sipple John","year":"2020","unstructured":"John Sipple. 2020. Interpretable, multidimensional, multimodal anomaly detection with negative sampling for detection of device failure. In International Conference on Machine Learning. PMLR, 9016--9025."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11203"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","unstructured":"Ashwin Srinivasan. 1993. Statlog (Landsat Satellite). UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C55887.","DOI":"10.24432\/C55887"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599256"},{"key":"e_1_3_2_2_59_1","volume-title":"GADBench: Revisiting and Benchmarking Supervised Graph Anomaly Detection. In Thirty-seventh Conference on Neural Information Processing Systems.","author":"Tang Jianheng","year":"2023","unstructured":"Jianheng Tang, Fengrui Hua, Ziqi Gao, Peilin Zhao, and Jia Li. 2023 a. GADBench: Revisiting and Benchmarking Supervised Graph Anomaly Detection. In Thirty-seventh Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_60_1","volume-title":"International Conference on Machine Learning. PMLR, 21076--21089","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In International Conference on Machine Learning. PMLR, 21076--21089."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00129"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.205"},{"key":"e_1_3_2_2_63_1","volume-title":"Anomaly detection by leveraging incomplete anomalous knowledge with anomaly-aware bidirectional gans. arXiv preprint arXiv:2204.13335","author":"Tian Bowen","year":"2022","unstructured":"Bowen Tian, Qinliang Su, and Jian Yin. 2022. Anomaly detection by leveraging incomplete anomalous knowledge with anomaly-aware bidirectional gans. arXiv preprint arXiv:2204.13335 (2022)."},{"key":"e_1_3_2_2_64_1","first-page":"33536","article-title":"Multi-granularity cross-modal alignment for generalized medical visual representation learning","volume":"35","author":"Wang Fuying","year":"2022","unstructured":"Fuying Wang, Yuyin Zhou, Shujun Wang, Varut Vardhanabhuti, and Lequan Yu. 2022. Multi-granularity cross-modal alignment for generalized medical visual representation learning. Advances in Neural Information Processing Systems , Vol. 35 (2022), 33536--33549.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_65_1","volume-title":"Embedding symbolic knowledge into deep networks. Advances in neural information processing systems","author":"Xie Yaqi","year":"2019","unstructured":"Yaqi Xie, Ziwei Xu, Mohan S Kankanhalli, Kuldeep S Meel, and Harold Soh. 2019a. Embedding symbolic knowledge into deep networks. Advances in neural information processing systems , Vol. 32 (2019)."},{"key":"e_1_3_2_2_66_1","unstructured":"Yaqi Xie Ziwei Xu Kuldeep S Meel Mohan S Kankanhalli and Harold Soh. 2019b. Embedding Symbolic Knowledge into Deep Networks. In NeurIPS."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"e_1_3_2_2_68_1","volume-title":"A survey on neural-symbolic learning systems. Neural Networks","author":"Yu Dongran","year":"2023","unstructured":"Dongran Yu, Bo Yang, Dayou Liu, Hui Wang, and Shirui Pan. 2023. A survey on neural-symbolic learning systems. Neural Networks (2023)."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583357"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00086"},{"key":"e_1_3_2_2_71_1","volume-title":"TOT: Topology-Aware Optimal Transport for Multimodal Hate Detection. In Proceedings of the AAAI Conference on Artificial Intelligence","volume":"37","author":"Zhang Linhao","year":"2023","unstructured":"Linhao Zhang, Li Jin, Xian Sun, Guangluan Xu, Zequn Zhang, Xiaoyu Li, Nayu Liu, Qing Liu, and Shiyao Yan. 2023 a. TOT: Topology-Aware Optimal Transport for Multimodal Hate Detection. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 37. 4884--4892."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614759"},{"key":"e_1_3_2_2_73_1","volume-title":"All in One and One for All: A Simple yet Effective Method towards Cross-domain Graph Pretraining. arXiv preprint arXiv:2402.09834","author":"Zhao Haihong","year":"2024","unstructured":"Haihong Zhao, Aochuan Chen, Xiangguo Sun, Hong Cheng, and Jia Li. 2024. All in One and One for All: A Simple yet Effective Method towards Cross-domain Graph Pretraining. arXiv preprint arXiv:2402.09834 (2024)."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3271715"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3086137"},{"key":"e_1_3_2_2_76_1","volume-title":"International conference on learning representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645429","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:29:12Z","timestamp":1755822552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":76,"alternative-id":["10.1145\/3589334.3645429","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645429","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}