{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:16:54Z","timestamp":1775470614174,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2421864, 2421803, 2421865"],"award-info":[{"award-number":["2421864, 2421803, 2421865"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Academy of Engineering Grainger Foundation Frontiers of Engineering Grants"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3680096","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:11Z","timestamp":1729452851000},"page":"4760-4767","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-view Causal Graph Fusion Based Anomaly Detection in Cyber-Physical Infrastructures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5887-1915","authenticated-orcid":false,"given":"Arun Vignesh","family":"Malarkkan","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3948-0059","authenticated-orcid":false,"given":"Dongjie","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1767-8024","authenticated-orcid":false,"given":"Yanjie","family":"Fu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Chuadhry Ahmed Venkata Palleti and Aditya Mathur. 2017. WADI: a water distribution testbed for research in the design of secure cyber physical systems. 25--28. https:\/\/doi.org\/10.1145\/3055366.3055375","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE53184.2021"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/jhep08(2021)080"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031--33383--5_7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.70"},{"key":"e_1_3_2_1_7_1","volume-title":"Zain Patel, andWesley Leong.","author":"Beaumont Paul","year":"2021","unstructured":"Paul Beaumont, Ben Horsburgh, Philip Pilgerstorfer, Angel Droth, Richard Oentaryo, Steven Ler, Hiep Nguyen, Gabriel Azevedo Ferreira, Zain Patel, andWesley Leong. 2021. CausalNex. https:\/\/github.com\/quantumblacklabs\/causalnex"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591079"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853764"},{"key":"e_1_3_2_1_10_1","volume-title":"On causal discovery from time series data using FCI. Probabilistic graphical models","author":"Entner Doris","year":"2010","unstructured":"Doris Entner and Patrik O Hoyer. 2010. On causal discovery from time series data using FCI. Probabilistic graphical models (2010), 121--128."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"e_1_3_2_1_12_1","volume-title":"Khurum Nazir Junejo, and Aditya P. Mathur","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya P. Mathur. 2016. A Dataset to Support Research in the Design of SecureWater Treatment Systems. In Critical Information Infrastructures Security. https:\/\/api.semanticscholar.org\/ CorpusID:3075307"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_14_1","volume-title":"SCALA: Sparsification-based Contrastive Learning for Anomaly Detection on Attributed Networks. arXiv:2401.01625 [cs.SI]","author":"He Enbo","year":"2024","unstructured":"Enbo He, Yitong Hao, Yue Zhang, Guisheng Yin, and Lina Yao. 2024. SCALA: Sparsification-based Contrastive Learning for Anomaly Detection on Attributed Networks. arXiv:2401.01625 [cs.SI]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2013"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Eighth International Conference on Probabilistic Graphical Models (Proceedings of Machine Learning Research","volume":"227","author":"Hyttinen Antti","year":"2016","unstructured":"Antti Hyttinen, Sergey Plis, Matti J\u00e4rvisalo, Frederick Eberhardt, and David Danks. 2016. Causal Discovery from Subsampled Time Series Data by Constraint Optimization. In Proceedings of the Eighth International Conference on Probabilistic Graphical Models (Proceedings of Machine Learning Research, Vol. 52), Alessandro Antonucci, Giorgio Corani, and Campos (Eds.). PMLR, Lugano, Switzerland, 216--227. https:\/\/proceedings.mlr.press\/v52\/hyttinen16.html"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yuni Lai Marcin Waniek Liying Li Jingwen Wu Yulin Zhu Tomasz P. Michalak Talal Rahwan and Kai Zhou. 2023. Coupled-Space Attacks against Random- Walk-based Anomaly Detection. arXiv:2307.14387 [cs.CR]","DOI":"10.1109\/TIFS.2024.3468156"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024--3795(94)90486--3"},{"key":"e_1_3_2_1_23_1","volume-title":"DYNOTEARS: Structure Learning from Time-Series Data. arXiv:2002.00498 [stat.ML]","author":"Pamfil Roxana","year":"2020","unstructured":"Roxana Pamfil, Nisara Sriwattanaworachai, Shaan Desai, Philip Pilgerstorfer, Paul Beaumont, Konstantinos Georgatzis, and Bryon Aragam. 2020. DYNOTEARS: Structure Learning from Time-Series Data. arXiv:2002.00498 [stat.ML]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3282898"},{"key":"e_1_3_2_1_25_1","unstructured":"Tom\u00e1Pevn"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU58738.2023.10296546"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103570"},{"key":"e_1_3_2_1_29_1","unstructured":"Vecteezy. [n. d.]. Virus Vectors. https:\/\/www.vecteezy.com\/free-vector\/virus"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599392"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599849"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00012"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150501"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557660"},{"key":"e_1_3_2_1_35_1","volume-title":"Qian Li, Shaowu Liu, and Xianzhi Wang.","author":"Xu Guandong","year":"2020","unstructured":"Guandong Xu, Tri Dung Duong, Qian Li, Shaowu Liu, and Xianzhi Wang. 2020. Causality Learning: A New Perspective for Interpretable Machine Learning. arXiv:2006.16789 [cs.LG]"},{"key":"e_1_3_2_1_36_1","unstructured":"Muhan Zhang Zhicheng Cui Marion Neumann and Yixin Chen. 2018. An endto- end deep learning architecture for graph classification. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence (New Orleans Louisiana USA) (AAAI'18\/IAAI'18\/EAAI'18). AAAI Press Article 544 8 pages."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.04.020"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"PyOD: A Python Toolbox for Scalable Outlier Detection","volume":"20","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. Journal of Machine Learning Research 20, 96 (2019), 1--7. http:\/\/jmlr.org\/papers\/v20\/19-011.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.08.014"},{"key":"e_1_3_2_1_40_1","volume-title":"Xing","author":"Zheng Xun","year":"2018","unstructured":"Xun Zheng, Bryon Aragam, Pradeep Ravikumar, and Eric P. Xing. 2018. DAGs with NO TEARS: Continuous Optimization for Structure Learning. arXiv:1803.01422 [stat.ML]"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3680096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3680096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:18Z","timestamp":1750294698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3680096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":40,"alternative-id":["10.1145\/3627673.3680096","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3680096","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}