{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:47:09Z","timestamp":1775882829396,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T00:00:00Z","timestamp":1709510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF (National Science Foundation) grant","award":["IIS-223956"],"award-info":[{"award-number":["IIS-223956"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,4]]},"DOI":"10.1145\/3616855.3635767","type":"proceedings-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T18:18:12Z","timestamp":1709576292000},"page":"576-585","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["GAD-NR: Graph Anomaly Detection via Neighborhood Reconstruction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3037-8920","authenticated-orcid":false,"given":"Amit","family":"Roy","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4967-8565","authenticated-orcid":false,"given":"Juan","family":"Shu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6362-4385","authenticated-orcid":false,"given":"Jia","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9145-4531","authenticated-orcid":false,"given":"Carl","family":"Yang","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7659-3526","authenticated-orcid":false,"given":"Olivier","family":"Elshocht","sequence":"additional","affiliation":[{"name":"Sony R&amp;D Center Brussels Laboratory, Zaventem, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9177-7668","authenticated-orcid":false,"given":"Jeroen","family":"Smeets","sequence":"additional","affiliation":[{"name":"Sony R&amp;D Center Brussels Laboratory, Zaventem, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3742-0845","authenticated-orcid":false,"given":"Pan","family":"Li","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,3,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375668"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396816"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330112"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330112"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371788"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371788"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11642"},{"key":"e_1_3_2_2_10_1","volume-title":"KDD","author":"Chen Tianyi","year":"2022","unstructured":"Tianyi Chen and Charalampos Tsourakakis. Antibenford subgraphs: Unsupervised anomaly detection in financial networks. In KDD, 2022."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412070"},{"key":"e_1_3_2_2_12_1","volume-title":"Entropy","author":"Contreras-Reyes Javier E","year":"2012","unstructured":"Javier E Contreras-Reyes and Reinaldo B Arellano-Valle. Kullback--leibler divergence measure for multivariate skew-normal distributions. Entropy, 2012."},{"key":"e_1_3_2_2_13_1","volume-title":"Selfsupervised anomaly detection in static attributed graphs. arxiv","author":"No\u00ebl Pierre-Andr\u00e9","year":"2021","unstructured":"Pierre-Andr\u00e9 No\u00ebl, David V\u00e1zquez, and Perouz Taslakian. Selfsupervised anomaly detection in static attributed graphs. arxiv, 2021."},{"key":"e_1_3_2_2_14_1","volume-title":"NeurIPS","author":"Corso Gabriele","year":"2020","unstructured":"Gabriele Corso, Luca Cavalleri, Dominique Beaini, Pietro Li\u00f2 Principal neighbourhood aggregation for graph nets. NeurIPS, 2020."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290964"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339670"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_2_19_1","volume-title":"Paul Reidy, and Gesine Reinert. Anomaly detection in networks with application to financial transaction networks. arXiv preprint arXiv:1901.00402","author":"Elliott Andrew","year":"2019","unstructured":"Andrew Elliott, Mihai Cucuringu, Milton Martinez Luaces, Paul Reidy, and Gesine Reinert. Anomaly detection in networks with application to financial transaction networks. arXiv preprint arXiv:1901.00402, 2019."},{"key":"e_1_3_2_2_20_1","volume-title":"Anomalydae: Dual autoencoder for anomaly detection on attributed networks","author":"Fan Haoyi","year":"2020","unstructured":"Haoyi Fan, Fengbin Zhang, and Zuoyong Li. Anomalydae: Dual autoencoder for anomaly detection on attributed networks. In ICASSP. IEEE, 2020."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3488336"},{"key":"e_1_3_2_2_22_1","volume-title":"ICML. PMLR","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer, Samuel S Schoenholz, Patrick F Riley, Oriol Vinyals, and George E Dahl. Neural message passing for quantum chemistry. In ICML. PMLR, 2017."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_24_1","volume-title":"AAAI","author":"Guti\u00e9rrez-G\u00f3mez Leonardo","year":"2020","unstructured":"Leonardo Guti\u00e9rrez-G\u00f3mez, Alexandre Bovet, and Jean-Charles Delvenne. Multiscale anomaly detection on attributed networks. In AAAI, 2020."},{"key":"e_1_3_2_2_25_1","volume-title":"NeurIPS","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. Inductive representation learning on large graphs. NeurIPS, 2017."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1214\/10-AOAS329"},{"key":"e_1_3_2_2_27_1","volume-title":"Reducing the dimensionality of data with neural networks. science","author":"Hinton Geoffrey E","year":"2006","unstructured":"Geoffrey E Hinton and Ruslan R Salakhutdinov. Reducing the dimensionality of data with neural networks. science, 2006."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8728"},{"key":"e_1_3_2_2_30_1","volume-title":"Hopcount based self-supervised anomaly detection on attributed networks","author":"Huang Tianjin","year":"2023","unstructured":"Tianjin Huang, Yulong Pei, Vlado Menkovski, and Mykola Pechenizkiy. Hopcount based self-supervised anomaly detection on attributed networks. In ECML PKDD. Springer, 2023."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014102"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"e_1_3_2_2_33_1","volume-title":"CIKM","author":"Jin Ming","year":"2021","unstructured":"Ming Jin, Yixin Liu, Yu Zheng, Lianhua Chi, Yuan-Fang Li, and Shirui Pan. Anemone: graph anomaly detection with multi-scale contrastive learning. In CIKM, 2021."},{"key":"e_1_3_2_2_34_1","volume-title":"Computing","author":"Jonker Roy","year":"1987","unstructured":"Roy Jonker and Anton Volgenant. A shortest augmenting path algorithm for dense and sparse linear assignment problems. Computing, 1987."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954791"},{"key":"e_1_3_2_2_36_1","volume-title":"NeurIPS Workshop on Bayesian Deep Learning","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. Variational graph auto-encoders. NeurIPS Workshop on Bayesian Deep Learning, 2016."},{"key":"e_1_3_2_2_37_1","volume-title":"NeurIPS Workshop on Bayesian Deep Learning","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. Variational graph auto-encoders. NeurIPS Workshop on Bayesian Deep Learning, 2016."},{"key":"e_1_3_2_2_38_1","volume-title":"ICLR","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In ICLR, 2017."},{"key":"e_1_3_2_2_39_1","volume-title":"NeurIPS","author":"Langford John","year":"2007","unstructured":"John Langford and Tong Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. NeurIPS, 2007."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172187"},{"key":"e_1_3_2_2_41_1","volume-title":"CIKM","author":"Li Yuening","year":"2019","unstructured":"Yuening Li, Xiao Huang, Jundong Li, Mengnan Du, and Na Zou. Specae: Spectral autoencoder for anomaly detection in attributed networks. In CIKM, 2019."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_2_2_43_1","volume-title":"NeurIPS Datasets and Benchmarks Track","author":"Liu Kay","year":"2022","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, et al. Bond: Benchmarking unsupervised outlier node detection on static attributed graphs. In NeurIPS Datasets and Benchmarks Track, 2022."},{"key":"e_1_3_2_2_44_1","volume-title":"et al. Pygod: A python library for graph outlier detection. arXiv preprint arXiv:2204.12095","author":"Liu Kay","year":"2022","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, et al. Pygod: A python library for graph outlier detection. arXiv preprint arXiv:2204.12095, 2022."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"e_1_3_2_2_46_1","volume-title":"Mul-gad: a semi-supervised graph anomaly detection framework via aggregating multi-view information. arXiv preprint arXiv:2212.05478","author":"Liu Zhiyuan","year":"2022","unstructured":"Zhiyuan Liu, Chunjie Cao, and Jingzhang Sun. Mul-gad: a semi-supervised graph anomaly detection framework via aggregating multi-view information. arXiv preprint arXiv:2212.05478, 2022."},{"key":"e_1_3_2_2_47_1","volume-title":"WSDM","author":"Luo Xuexiong","year":"2022","unstructured":"Xuexiong Luo, Jia Wu, Amin Beheshti, Jian Yang, Xiankun Zhang, Yuan Wang, and Shan Xue. Comga: Community-aware attributed graph anomaly detection. In WSDM, 2022."},{"key":"e_1_3_2_2_48_1","volume-title":"TKDE","author":"Ma Xiaoxiao","year":"2021","unstructured":"Xiaoxiao Ma, Jia Wu, Shan Xue, Jian Yang, Chuan Zhou, Quan Z Sheng, Hui Xiong, and Leman Akoglu. A comprehensive survey on graph anomaly detection with deep learning. TKDE, 2021."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT49905.2020.9263819"},{"key":"e_1_3_2_2_50_1","first-page":"23","author":"Miller Benjamin","year":"2010","unstructured":"Benjamin Miller, Nadya Bliss, and Patrick Wolfe. Subgraph detection using eigenvector l1 norms. NeurIPS, 23, 2010.","journal-title":"NeurIPS"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-021-00365-8"},{"key":"e_1_3_2_2_52_1","first-page":"2022","author":"Pan Weisen","year":"2022","unstructured":"Weisen Pan, Jian Li, Lisa Gao, Liexiang Yue, Yan Yang, Lingli Deng, and Chao Deng. Semantic graph neural network: A conversion from spam email classification to graph classification. Scientific Programming, 2022, 2022.","journal-title":"Scientific Programming"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422548"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/488"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3015098"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623682"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"e_1_3_2_2_59_1","volume-title":"Anomaly detection in online social networks. Social networks","author":"Savage David","year":"2014","unstructured":"David Savage, Xiuzhen Zhang, Xinghuo Yu, Pauline Chou, and Qingmai Wang. Anomaly detection in online social networks. Social networks, 2014."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7133008"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014894"},{"key":"e_1_3_2_2_62_1","volume-title":"Valeria Ricci, Silvia Ronchiadin, Angela Ugrinoska, et al. Smurf-based anti-money laundering in time-evolving transaction networks","author":"Starnini Michele","year":"2021","unstructured":"Michele Starnini, Charalampos E Tsourakakis, Maryam Zamanipour, Andr\u00e9 Panisson, Walter Allasia, Marco Fornasiero, Laura Li Puma, Valeria Ricci, Silvia Ronchiadin, Angela Ugrinoska, et al. Smurf-based anti-money laundering in time-evolving transaction networks. In ECML PKDD. Springer, 2021."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_2_64_1","volume-title":"NeurIPS","author":"Tang Jianheng","year":"2023","unstructured":"Jianheng Tang, Fengrui Hua, Ziqi Gao, Peilin Zhao, and Jia Li. Gadbench: Revisiting and benchmarking supervised graph anomaly detection. NeurIPS, 2023."},{"key":"e_1_3_2_2_65_1","volume-title":"ICML","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. Rethinking graph neural networks for anomaly detection. In ICML, 2022."},{"key":"e_1_3_2_2_66_1","volume-title":"ICLR","author":"Tang Mingyue","year":"2022","unstructured":"Mingyue Tang, Carl Yang, and Pan Li. Graph auto-encoder via neighborhood wasserstein reconstruction. ICLR, 2022."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.13"},{"key":"e_1_3_2_2_68_1","volume-title":"Management Science","author":"Vlasselaer V\u00e9ronique Van","year":"2017","unstructured":"V\u00e9ronique Van Vlasselaer, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, and Bart Baesens. Gotcha! network-based fraud detection for social security fraud. Management Science, 2017."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467141"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00070"},{"key":"e_1_3_2_2_71_1","volume-title":"WWW","author":"Wang Jianyu","year":"2019","unstructured":"Jianyu Wang, Rui Wen, Chunming Wu, Yu Huang, and Jian Xiong. Fdgars: Fraudster detection via graph convolutional networks in online app review system. In WWW, 2019."},{"key":"e_1_3_2_2_72_1","volume-title":"Atnetrust: Attributed trust network embedding for trust prediction in online social networks","author":"Wang Qi","year":"2020","unstructured":"Qi Wang, Weiliang Zhao, Jian Yang, Jia Wu, Chuan Zhou, and Qianli Xing. Atnetrust: Attributed trust network embedding for trust prediction in online social networks. In ICDM. IEEE, 2020."},{"key":"e_1_3_2_2_73_1","volume-title":"Boosting for multi-graph classification","author":"Wu Jia","year":"2014","unstructured":"Jia Wu, Shirui Pan, Xingquan Zhu, and Zhihua Cai. Boosting for multi-graph classification. IEEE Transactions on Cybernetics, 2014."},{"key":"e_1_3_2_2_74_1","volume-title":"Multi-instance multigraph dual embedding learning","author":"Wu Jia","year":"2013","unstructured":"Jia Wu, Xingquan Zhu, Chengqi Zhang, and Zhihua Cai. Multi-instance multigraph dual embedding learning. In ICDM. IEEE, 2013."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_3_2_2_76_1","volume-title":"ICLR","author":"Xu Keyulu","year":"2019","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. How powerful are graph neural networks? In ICLR, 2019."},{"key":"e_1_3_2_2_77_1","volume-title":"SIGKDD","author":"Xu Xiaowei","year":"2007","unstructured":"Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, and Thomas AJ Schweiger. Scan: a structural clustering algorithm for networks. In SIGKDD, 2007."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817946.2820606"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980765.2980767"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3271771"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5482"}],"event":{"name":"WSDM '24: The 17th ACM International Conference on Web Search and Data Mining","location":"Merida Mexico","acronym":"WSDM '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 17th ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616855.3635767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616855.3635767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:50:27Z","timestamp":1755823827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616855.3635767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,4]]},"references-count":83,"alternative-id":["10.1145\/3616855.3635767","10.1145\/3616855"],"URL":"https:\/\/doi.org\/10.1145\/3616855.3635767","relation":{},"subject":[],"published":{"date-parts":[[2024,3,4]]},"assertion":[{"value":"2024-03-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}