{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:41Z","timestamp":1750219841112,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1A5A1021944","2021R1I1A3043889"],"award-info":[{"award-number":["2021R1A5A1021944","2021R1I1A3043889"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1145\/3625007.3627502","type":"proceedings-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T15:12:42Z","timestamp":1710515562000},"page":"229-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["AD-TIN: Edge Anomaly Detection for Temporal Interaction Networks using Multi-representation Attention"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8426-0392","authenticated-orcid":false,"given":"Aming","family":"Wu","sequence":"first","affiliation":[{"name":"Kyungpook National University, Daegu, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0625-8232","authenticated-orcid":false,"given":"Young-Woo","family":"Kwon","sequence":"additional","affiliation":[{"name":"Kyungpook National University, Daegu, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"557","article-title":"Graph neural networks in anomaly detection","author":"Wang S.","year":"2022","unstructured":"S. Wang and P. S. Yu, \"Graph neural networks in anomaly detection,\" Graph Neural Networks: Foundations, Frontiers, and Applications, pp. 557--578, 2022.","journal-title":"Graph Neural Networks: Foundations, Frontiers, and Applications"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"L. Guti\u00e9rrez-G\u00f3mez A. Bovet and J.-C. Delvenne \"Multi-scale anomaly detection on attributed networks \" in Proceedings of the AAAI conference on artificial intelligence vol. 34 pp. 678--685 2020.","DOI":"10.1609\/aaai.v34i01.5409"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100463"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. Ranshous M. Chaudhary and N. F. Samatova \"Efficient outlier detection in hyperedge streams using minhash and locality-sensitive hashing \" in Complex Networks & Their Applications VI: Proceedings of Complex Networks 2017 (The Sixth International Conference on Complex Networks and Their Applications) pp. 105--116 Springer 2018.","DOI":"10.1007\/978-3-319-72150-7_9"},{"key":"e_1_3_2_1_5_1","first-page":"7","article-title":"Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn","volume":"3","author":"Zheng L.","year":"2019","unstructured":"L. Zheng, Z. Li, J. Li, Z. Li, and J. Gao, \"Addgraph: Anomaly detection in dynamic graph using attention-based temporal gcn.,\" in IJCAI, vol. 3, p. 7, 2019.","journal-title":"IJCAI"},{"key":"e_1_3_2_1_6_1","first-page":"870","volume-title":"Security and Privacy in Computing and Communications (TrustCom)","author":"Zhu D.","year":"2020","unstructured":"D. Zhu, Y. Ma, and Y. Liu, \"A flexible attentive temporal graph networks for anomaly detection in dynamic networks,\" in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 870--875, IEEE, 2020."},{"issue":"3","key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1109\/TITS.2020.3026025","article-title":"Graphsage-based traffic speed forecasting for segment network with sparse data","volume":"23","author":"Liu J.","year":"2020","unstructured":"J. Liu, G. P. Ong, and X. Chen, \"Graphsage-based traffic speed forecasting for segment network with sparse data,\" IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 1755--1766, 2020.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_1_8_1","first-page":"475","volume-title":"Subset node anomaly tracking over large dynamic graphs,\" in Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"Guo X.","year":"2022","unstructured":"X. Guo, B. Zhou, and S. Skiena, \"Subset node anomaly tracking over large dynamic graphs,\" in Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 475--485, 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"2258","DOI":"10.1109\/INFOCOM.2018.8485830","volume-title":"An efficient framework for detecting evolving anomalous subgraphs in dynamic networks,\" in IEEE INFOCOM 2018-IEEE Conference on Computer Communications","author":"Shao M.","year":"2018","unstructured":"M. Shao, J. Li, F. Chen, and X. Chen, \"An efficient framework for detecting evolving anomalous subgraphs in dynamic networks,\" in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2258--2266, IEEE, 2018."},{"key":"e_1_3_2_1_10_1","first-page":"2081","article-title":"Sugar: Subgraph neural network with reinforcement pooling and self-supervised mutual information mechanism","author":"Sun Q.","year":"2021","unstructured":"Q. Sun, J. Li, H. Peng, J. Wu, Y. Ning, P. S. Yu, and L. He, \"Sugar: Subgraph neural network with reinforcement pooling and self-supervised mutual information mechanism,\" in Proceedings of the Web Conference 2021, pp. 2081--2091, 2021.","journal-title":"Proceedings of the Web Conference"},{"key":"e_1_3_2_1_11_1","first-page":"2672","volume-title":"Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks,\" in Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining","author":"Yu W.","year":"2018","unstructured":"W. Yu, W. Cheng, C. C. Aggarwal, K. Zhang, H. Chen, and W. Wang, \"Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks,\" in Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp. 2672--2681, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.138"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Unified graph embedding-based anomalous edge detection,\" in 2020 International Joint Conference on Neural Networks (IJCNN)","author":"Ouyang L.","year":"2020","unstructured":"L. Ouyang, Y. Zhang, and Y. Wang, \"Unified graph embedding-based anomalous edge detection,\" in 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1--8, IEEE, 2020."},{"key":"e_1_3_2_1_14_1","first-page":"589","volume-title":"F-fade: Frequency factorization for anomaly detection in edge streams,\" in Proceedings of the 14th ACM International Conference on Web Search and Data Mining","author":"Chang Y.-Y.","year":"2021","unstructured":"Y.-Y. Chang, P. Li, R. Sosic, M. Afifi, M. Schweighauser, and J. Leskovec, \"F-fade: Frequency factorization for anomaly detection in edge streams,\" in Proceedings of the 14th ACM International Conference on Web Search and Data Mining, pp. 589--597, 2021."},{"key":"e_1_3_2_1_15_1","first-page":"3280","volume-title":"Intention-aware heterogeneous graph attention networks for fraud transactions detection,\" in Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining","author":"Liu C.","year":"2021","unstructured":"C. Liu, L. Sun, X. Ao, J. Feng, Q. He, and H. Yang, \"Intention-aware heterogeneous graph attention networks for fraud transactions detection,\" in Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 3280--3288, 2021."},{"issue":"6","key":"e_1_3_2_1_16_1","first-page":"1690","article-title":"Hyperbolic graph attention network","volume":"8","author":"Zhang Y.","year":"2021","unstructured":"Y. Zhang, X. Wang, C. Shi, X. Jiang, and Y. Ye, \"Hyperbolic graph attention network,\" IEEE Transactions on Big Data, vol. 8, no. 6, pp. 1690--1701, 2021.","journal-title":"IEEE Transactions on Big Data"},{"volume-title":"Anomaly detection on attributed networks via contrastive self-supervised learning,\" IEEE transactions on neural networks and learning systems","author":"Liu Y.","key":"e_1_3_2_1_17_1","unstructured":"Y. Liu, Z. Li, S. Pan, C. Gong, C. Zhou, and G. Karypis, \"Anomaly detection on attributed networks via contrastive self-supervised learning,\" IEEE transactions on neural networks and learning systems, vol. 33, no. 6, pp. 2378--2392, 2021."},{"key":"e_1_3_2_1_18_1","first-page":"855","volume-title":"node2vec: Scalable feature learning for networks,\" in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining","author":"Grover A.","year":"2016","unstructured":"A. Grover and J. Leskovec, \"node2vec: Scalable feature learning for networks,\" in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855--864, 2016."},{"volume-title":"A survey on knowledge graphs: Representation, acquisition, and applications,\" IEEE transactions on neural networks and learning systems","author":"Ji S.","key":"e_1_3_2_1_19_1","unstructured":"S. Ji, S. Pan, E. Cambria, P. Marttinen, and S. Y. Philip, \"A survey on knowledge graphs: Representation, acquisition, and applications,\" IEEE transactions on neural networks and learning systems, vol. 33, no. 2, pp. 494--514, 2021."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2009.02.002"},{"key":"e_1_3_2_1_21_1","first-page":"151","volume-title":"Social synchrony: Predicting mimicry of user actions in online social media,\" in 2009 International conference on computational science and engineering","author":"De Choudhury M.","year":"2009","unstructured":"M. De Choudhury, H. Sundaram, A. John, and D. D. Seligmann, \"Social synchrony: Predicting mimicry of user actions in online social media,\" in 2009 International conference on computational science and engineering, vol. 4, pp. 151--158, IEEE, 2009."},{"key":"e_1_3_2_1_22_1","volume-title":"The network data repository with interactive graph analytics and visualization,\" in AAAI","author":"Rossi R. A.","year":"2015","unstructured":"R. A. Rossi and N. K. Ahmed, \"The network data repository with interactive graph analytics and visualization,\" in AAAI, 2015."},{"key":"e_1_3_2_1_23_1","first-page":"189","volume-title":"A scalable approach for outlier detection in edge streams using sketch-based approximations,\" in Proceedings of the 2016 SIAM international conference on data mining","author":"Ranshous S.","year":"2016","unstructured":"S. Ranshous, S. Harenberg, K. Sharma, and N. F. Samatova, \"A scalable approach for outlier detection in edge streams using sketch-based approximations,\" in Proceedings of the 2016 SIAM international conference on data mining, pp. 189--197, SIAM, 2016."},{"key":"e_1_3_2_1_24_1","first-page":"3747","volume-title":"Structural temporal graph neural networks for anomaly detection in dynamic graphs,\" in Proceedings of the 30th ACM international conference on Information & Knowledge Management","author":"Cai L.","year":"2021","unstructured":"L. Cai, Z. Chen, C. Luo, J. Gui, J. Ni, D. Li, and H. Chen, \"Structural temporal graph neural networks for anomaly detection in dynamic graphs,\" in Proceedings of the 30th ACM international conference on Information & Knowledge Management, pp. 3747--3756, 2021."}],"event":{"name":"ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Kusadasi Turkiye","acronym":"ASONAM '23"},"container-title":["Proceedings of the International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625007.3627502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:49Z","timestamp":1750178809000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":24,"alternative-id":["10.1145\/3625007.3627502","10.1145\/3625007"],"URL":"https:\/\/doi.org\/10.1145\/3625007.3627502","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"2024-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}