{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:54:57Z","timestamp":1776275697290,"version":"3.50.1"},"reference-count":186,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"College of Engineering, the Machine Intelligence and Data Science Center, and the Department of Computer Science at Tennessee Tech University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2024,9,30]]},"abstract":"<jats:p>This survey article presents a comprehensive and conceptual overview of anomaly detection (AD) using dynamic graphs. We focus on existing graph-based AD techniques and their applications to dynamic networks. The contributions of this survey article include the following: (i) a comparative study of existing surveys on AD; (ii) a<jats:bold>Dynamic Graph-based anomaly detection (DGAD)<\/jats:bold>review framework in which approaches for detecting anomalies in dynamic graphs are grouped based on traditional machine learning models, matrix transformations, probabilistic approaches, and deep learning approaches; (iii) a discussion of graphically representing both discrete and dynamic networks; and (iv) a discussion of the advantages of graph-based techniques for capturing the relational structure and complex interactions in dynamic graph data. Finally, this work identifies the potential challenges and future directions for detecting anomalies in dynamic networks. This<jats:italic>DGAD<\/jats:italic>survey approach aims to provide a valuable resource for researchers and practitioners by summarizing the strengths and limitations of each approach, highlighting current research trends, and identifying open challenges. In doing so, it can guide future research efforts and promote advancements in AD in dynamic graphs.<\/jats:p>","DOI":"10.1145\/3669906","type":"journal-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:08:08Z","timestamp":1716998888000},"page":"1-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Anomaly Detection in Dynamic Graphs: A Comprehensive Survey"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6204-0657","authenticated-orcid":false,"given":"Ocheme Anthony","family":"Ekle","sequence":"first","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1303-6102","authenticated-orcid":false,"given":"William","family":"Eberle","sequence":"additional","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1134271.1134277","volume-title":"Proceedings of the 3rd International Workshop on Link Discovery","author":"Adamic Lada A.","year":"2005","unstructured":"Lada A. Adamic and Natalie Glance. 2005. The political blogosphere and the 2004 US election: Divided they blog. In Proceedings of the 3rd International Workshop on Link Discovery. 36\u201343."},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","article-title":"A survey of anomaly detection techniques in financial domain","volume":"55","author":"Ahmed Mohiuddin","year":"2016","unstructured":"Mohiuddin Ahmed, Abdun Naser Mahmood, and Md Rafiqul Islam. 2016. A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems 55, 278\u2013288.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_1_4_2","unstructured":"Sajjad Ahmed Knut Hinkelmann and Flavio Corradini. 2022. Combining machine learning with knowledge engineering to detect fake news in social networks-a survey. arXiv:2201.08032."},{"issue":"14","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"4758","DOI":"10.3390\/s21144758","article-title":"Graph-based deep learning for medical diagnosis and analysis: Past, present and future","volume":"21","author":"Ahmedt-Aristizabal David","year":"2021","unstructured":"David Ahmedt-Aristizabal, Mohammad Ali Armin, Simon Denman, Clinton Fookes, and Lars Petersson. 2021. Graph-based deep learning for medical diagnosis and analysis: Past, present and future. Sensors 21, 14 (2021), 4758.","journal-title":"Sensors"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"100313","DOI":"10.1016\/j.cosrev.2020.100313","article-title":"Towards quantum computing based community detection","volume":"38","author":"Akbar Sana","year":"2020","unstructured":"Sana Akbar and Sri Khetwat Saritha. 2020. Towards quantum computing based community detection. Computer Science Review 38, 100313.","journal-title":"Computer Science Review"},{"key":"e_1_3_1_7_2","first-page":"701","volume-title":"Proceedings of the 8th IEEE International Conference on Data Mining","author":"Akoglu Leman","year":"2008","unstructured":"Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2008. RTM: Laws and a recursive generator for weighted time-evolving graphs. In Proceedings of the 8th IEEE International Conference on Data Mining. IEEE, 701\u2013706."},{"issue":"11","key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"807","DOI":"10.4236\/wsn.2010.211097","article-title":"Range-based localization in wireless networks using density-based outlier detection","volume":"2","author":"Almuzaini Khalid K.","year":"2010","unstructured":"Khalid K. Almuzaini and Aaron Gulliver. 2010. Range-based localization in wireless networks using density-based outlier detection. Wireless Sensor Network 2, 11 (2010), 807.","journal-title":"Wireless Sensor Network"},{"key":"e_1_3_1_9_2","first-page":"8017","article-title":"Subgraph neural networks","volume":"33","author":"Alsentzer Emily","year":"2020","unstructured":"Emily Alsentzer, Samuel Finlayson, Michelle Li, and Marinka Zitnik. 2020. Subgraph neural networks. Advances in Neural Information Processing Systems 33, 8017\u20138029.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_10_2","first-page":"1778","volume-title":"Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI)","author":"Bashar Md Abul","year":"2020","unstructured":"Md Abul Bashar and Richi Nayak. 2020. TAnoGAN: Time series anomaly detection with generative adversarial networks. In Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 1778\u20131785."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1145\/3394486.3403136","volume-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Belth Caleb","year":"2020","unstructured":"Caleb Belth, Xinyi Zheng, and Danai Koutra. 2020. Mining persistent activity in continually evolving networks. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 934\u2013944."},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"3371","DOI":"10.1145\/3442381.3450023","volume-title":"Proceedings of the Web Conference 2021","author":"Bhatia Siddharth","year":"2021","unstructured":"Siddharth Bhatia, Arjit Jain, Pan Li, Ritesh Kumar, and Bryan Hooi. 2021. Mstream: Fast anomaly detection in multi-aspect streams. In Proceedings of the Web Conference 2021. 3371\u20133382."},{"issue":"4","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3494564","article-title":"Real-time anomaly detection in edge streams","volume":"16","author":"Bhatia Siddharth","year":"2022","unstructured":"Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, and Christos Faloutsos. 2022. Real-time anomaly detection in edge streams. ACM Transactions on Knowledge Discovery from Data (TKDD) 16, 4 (2022), 1\u201322.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/3580305.3599504","volume-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"Bhatia Siddharth","year":"2023","unstructured":"Siddharth Bhatia, Mohit Wadhwa, Kenji Kawaguchi, Neil Shah, Philip S. Yu, and Bryan Hooi. 2023. Sketch-based anomaly detection in streaming graphs. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 93\u2013104."},{"key":"e_1_3_1_15_2","first-page":"1","volume-title":"Proceedings of the IEEE Symposium on Computers and Communications (ISCC)","author":"Bikos Anastasios N.","year":"2021","unstructured":"Anastasios N. Bikos and Sathish Kumar. 2021. Reinforcement learning-based anomaly detection for Internet of Things distributed ledger technology. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC). IEEE, 1\u20137."},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/342009.335388","volume-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data","author":"Breunig Markus M.","year":"2000","unstructured":"Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J\u00f6rg Sander. 2000. LOF: Identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. 93\u2013104."},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"3747","DOI":"10.1145\/3459637.3481955","volume-title":"Proceedings of the 30th ACM International Conference on Information & Knowledge Management","author":"Cai Lei","year":"2021","unstructured":"Lei Cai, Zhengzhang Chen, Chen Luo, Jiaping Gui, Jingchao Ni, Ding Li, and Haifeng Chen. 2021. Structural temporal graph neural networks for anomaly detection in dynamic graphs. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. 3747\u20133756."},{"key":"e_1_3_1_18_2","unstructured":"Daniel Gonzalez Cedre Sophia Abraham Lucas Parzianello and Eric Tsai. 2023. Temporal egonet subgraph transitions. arXiv:2303.14632."},{"key":"e_1_3_1_19_2","first-page":"91","volume-title":"Proceedings of the International Symposium on Innovations in Intelligent Systems and Applications","author":"\u00c7elik Mete","year":"2011","unstructured":"Mete \u00c7elik, Filiz Dadaser-\u00c7elik, and Ahmet Sakir Dokuz. 2011. Anomaly detection in temperature data using DBSCAN algorithm. In Proceedings of the International Symposium on Innovations in Intelligent Systems and Applications. IEEE, 91\u201395."},{"key":"e_1_3_1_20_2","first-page":"23","volume-title":"Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI)","author":"Chai Ziwei","year":"2022","unstructured":"Ziwei Chai, Siqi You, Yang Yang, Shiliang Pu, Jiarong Xu, Haoyang Cai, and Weihao Jiang. 2022. Can abnormality be detected by graph neural networks. In Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI). 23\u201329."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv:1901.03407.","DOI":"10.1145\/3394486.3406704"},{"key":"e_1_3_1_22_2","unstructured":"Yelp Dataset Challenge. [n. d.]. Yelp Dataset. Retrieved October 24 2023 from https:\/\/www.yelp.com\/dataset"},{"issue":"3","key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41, 3 (2009), 1\u201358.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1145\/3437963.3441806","volume-title":"Proceedings of the 14th ACM International Conference on Web Search and Data Mining","author":"Chang Yen-Yu","year":"2021","unstructured":"Yen-Yu Chang, Pan Li, Rok Sosic, MH Afifi, Marco Schweighauser, and Jure Leskovec. 2021. F-fade: Frequency factorization for anomaly detection in edge streams. In Proceedings of the 14th ACM International Conference on Web Search and Data Mining. 589\u2013597."},{"key":"e_1_3_1_25_2","first-page":"380","volume-title":"Proceedings of the 34th Annual ACM Symposium on Theory of Computing","author":"Charikar Moses S","year":"2002","unstructured":"Moses S Charikar. 2002. Similarity estimation techniques from rounding algorithms. In Proceedings of the 34th Annual ACM Symposium on Theory of Computing. 380\u2013388."},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","first-page":"121643","DOI":"10.1016\/j.eswa.2023.121643","article-title":"SCN \\(\\_\\) GNN: A GNN-based fraud detection algorithm combining strong node and graph topology information","volume":"237","author":"Chen Jing","year":"2024","unstructured":"Jing Chen, Quanzhen Chen, Feng Jiang, Xuyao Guo, Kaiyue Sha, and Yuxuan Wang. 2024. SCN \\(\\_\\) GNN: A GNN-based fraud detection algorithm combining strong node and graph topology information. Expert Systems with Applications 237, 121643.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2023.01.089","article-title":"AnomMAN: Detect anomalies on multi-view attributed networks","volume":"628","author":"Chen Ling-Hao","year":"2023","unstructured":"Ling-Hao Chen, He Li, Wanyuan Zhang, Jianbin Huang, Xiaoke Ma, Jiangtao Cui, Ning Li, and Jaesoo Yoo. 2023. AnomMAN: Detect anomalies on multi-view attributed networks. Information Sciences 628, 1\u201321.","journal-title":"Information Sciences"},{"issue":"12","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"9179","DOI":"10.1109\/JIOT.2021.3100509","article-title":"Learning graph structures with transformer for multivariate time-series anomaly detection in IoT","volume":"9","author":"Chen Zekai","year":"2021","unstructured":"Zekai Chen, Dingshuo Chen, Xiao Zhang, Zixuan Yuan, and Xiuzhen Cheng. 2021. Learning graph structures with transformer for multivariate time-series anomaly detection in IoT. IEEE Internet of Things Journal 9, 12 (2021), 9179\u20139189.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_1_29_2","first-page":"13260","article-title":"Principal neighbourhood aggregation for graph nets","volume":"33","author":"Corso Gabriele","year":"2020","unstructured":"Gabriele Corso, Luca Cavalleri, Dominique Beaini, Pietro Lio, and Petar Veli\u010dkovi\u0107. 2020. Principal neighbourhood aggregation for graph nets. Advances in Neural Information Processing Systems 33, 13260\u201313271.","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"2","key":"e_1_3_1_30_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3575637.3575646","article-title":"Data augmentation for deep graph learning: A survey","volume":"24","author":"Ding Kaize","year":"2022","unstructured":"Kaize Ding, Zhe Xu, Hanghang Tong, and Huan Liu. 2022a. Data augmentation for deep graph learning: A survey. ACM SIGKDD Explorations Newsletter 24, 2 (2022), 61\u201377.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"e_1_3_1_31_2","first-page":"315","volume-title":"Proceedings of the 29th ACM International Conference on Information & Knowledge Management","author":"Dou Yingtong","year":"2020","unstructured":"Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management. 315\u2013324."},{"key":"e_1_3_1_32_2","first-page":"953","volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM)","author":"Eswaran Dhivya","year":"2018","unstructured":"Dhivya Eswaran and Christos Faloutsos. 2018. Sedanspot: Detecting anomalies in edge streams. In Proceedings of the IEEE International Conference on Data Mining (ICDM). IEEE, 953\u2013958."},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","first-page":"1378","DOI":"10.1145\/3219819.3220040","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Eswaran Dhivya","year":"2018","unstructured":"Dhivya Eswaran, Christos Faloutsos, Sudipto Guha, and Nina Mishra. 2018. Spotlight: Detecting anomalies in streaming graphs. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 1378\u20131386."},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"2493","DOI":"10.1145\/3366423.3379997","volume-title":"Proceedings of the Web Conference 2020","author":"Eswaran Dhivya","year":"2020","unstructured":"Dhivya Eswaran, Srijan Kumar, and Christos Faloutsos. 2020. Higher-order label homogeneity and spreading in graphs. In Proceedings of the Web Conference 2020. 2493\u20132499."},{"key":"e_1_3_1_35_2","first-page":"417","article-title":"Graph neural networks for social recommendation","author":"Fan Wenqi","year":"2019","unstructured":"Wenqi Fan, Yao Ma, Qing Li, Yuan He, Eric Zhao, Jiliang Tang, and Dawei Yin. 2019. Graph neural networks for social recommendation. In Proceedings of the World Wide Web Conference. 417\u2013426.","journal-title":"Proceedings of the World Wide Web Conference"},{"key":"e_1_3_1_36_2","first-page":"1154","volume-title":"Proceedings of the VLDB Endowment","volume":"16","author":"Fang Lanting","year":"2023","unstructured":"Lanting Fang, Kaiyu Feng, Jie Gui, Shanshan Feng, and Aiqun Hu. 2023. Anonymous edge representation for inductive anomaly detection in dynamic bipartite graph. Proceedings of the VLDB Endowment 16, 5 (2023), 1154\u20131167."},{"key":"e_1_3_1_37_2","first-page":"3294","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Fey Matthias","year":"2021","unstructured":"Matthias Fey, Jan E. Lenssen, Frank Weichert, and Jure Leskovec. 2021. Gnnautoscale: Scalable and expressive graph neural networks via historical embeddings. In Proceedings of the International Conference on Machine Learning. PMLR, 3294\u20133304."},{"issue":"4","key":"e_1_3_1_38_2","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.socnet.2005.11.003","article-title":"Legislative cosponsorship networks in the US House and Senate","volume":"28","author":"Fowler James H.","year":"2006","unstructured":"James H. Fowler. 2006. Legislative cosponsorship networks in the US House and Senate. Social Networks 28, 4 (2006), 454\u2013465.","journal-title":"Social Networks"},{"key":"e_1_3_1_39_2","first-page":"9","volume-title":"Proceedings of the IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","author":"F\u00fc\u00dfl Anne","year":"2022","unstructured":"Anne F\u00fc\u00dfl and Volker Nissen. 2022. Interpretability of knowledge graph-based explainable process analysis. In Proceedings of the IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, 9\u201317."},{"key":"e_1_3_1_40_2","first-page":"1","volume-title":"Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN)","author":"Gallicchio Claudio","year":"2010","unstructured":"Claudio Gallicchio and Alessio Micheli. 2010. Graph echo state networks. In Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN). IEEE, 1\u20138."},{"key":"e_1_3_1_41_2","first-page":"1697","volume-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Gao Jianliang","year":"2020","unstructured":"Jianliang Gao, Tengfei Lyu, Fan Xiong, Jianxin Wang, Weimao Ke, and Zhao Li. 2020. MGNN: A multimodal graph neural network for predicting the survival of cancer patients. In Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. 1697\u20131700."},{"key":"e_1_3_1_42_2","first-page":"317","volume-title":"Proceedings of the International Conference on Machine Learning and Intelligent Systems Engineering (MLISE)","author":"Gao Peng","year":"2022","unstructured":"Peng Gao, Gu Feng, and Fei Liang. 2022. Anomaly detection in dynamic graph based on deep graph auto-encoder. In Proceedings of the International Conference on Machine Learning and Intelligent Systems Engineering (MLISE). IEEE, 317\u2013320."},{"key":"e_1_3_1_43_2","first-page":"357","volume-title":"Proceedings of the 16th ACM International Conference on Web Search and Data Mining","author":"Gao Yuan","year":"2023","unstructured":"Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, Huamin Feng, and Yongdong Zhang. 2023. Alleviating structural distribution shift in graph anomaly detection. In Proceedings of the 16th ACM International Conference on Web Search and Data Mining. 357\u2013365."},{"key":"e_1_3_1_44_2","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","article-title":"An empirical comparison of botnet detection methods","volume":"45","author":"Garcia Sebastian","year":"2014","unstructured":"Sebastian Garcia, Martin Grill, Jan Stiborek, and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. Computers & Security 45, 100\u2013123.","journal-title":"Computers & Security"},{"issue":"6","key":"e_1_3_1_45_2","doi-asserted-by":"crossref","first-page":"bbab159","DOI":"10.1093\/bib\/bbab159","article-title":"Utilizing graph machine learning within drug discovery and development","volume":"22","author":"Gaudelet Thomas","year":"2021","unstructured":"Thomas Gaudelet, Ben Day, Arian R. Jamasb, Jyothish Soman, Cristian Regep, Gertrude Liu, Jeremy B. R. Hayter, Richard Vickers, Charles Roberts, Jian Tang, David Roblin, Tom L. Blundell, Michael M. Bronstein, and Jake P. Taylor-King. 2021. Utilizing graph machine learning within drug discovery and development. Briefings in Bioinformatics 22, 6 (2021), bbab159.","journal-title":"Briefings in Bioinformatics"},{"key":"e_1_3_1_46_2","first-page":"1243","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Gehring Jonas","year":"2017","unstructured":"Jonas Gehring, Michael Auli, David Grangier, Denis Yarats, and Yann N. Dauphin. 2017. Convolutional sequence to sequence learning. In Proceedings of the International Conference on Machine Learning. PMLR, 1243\u20131252."},{"key":"e_1_3_1_47_2","first-page":"1705","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Gong Dong","year":"2019","unstructured":"Dong Gong, Lingqiao Liu, Vuong Le, Budhaditya Saha, Moussa Reda Mansour, Svetha Venkatesh, and Anton van den Hengel. 2019. Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 1705\u20131714."},{"key":"e_1_3_1_48_2","first-page":"9211","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Gong Liyu","year":"2019","unstructured":"Liyu Gong and Qiang Cheng. 2019. Exploiting edge features for graph neural networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 9211\u20139219."},{"issue":"11","key":"e_1_3_1_49_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow Ian","year":"2020","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks. Communications of the ACM 63, 11 (2020), 139\u2013144.","journal-title":"Communications of the ACM"},{"key":"e_1_3_1_50_2","first-page":"6737","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"36","author":"Goodge Adam","year":"2022","unstructured":"Adam Goodge, Bryan Hooi, See-Kiong Ng, and Wee Siong Ng. 2022. Lunar: Unifying local outlier detection methods via graph neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 6737\u20136745."},{"key":"e_1_3_1_51_2","first-page":"729","volume-title":"Proceedings of the IEEE International Joint Conference on Neural Networks","volume":"2","author":"Gori Marco","year":"2005","unstructured":"Marco Gori, Gabriele Monfardini, and Franco Scarselli. 2005. A new model for learning in graph domains. In Proceedings of the IEEE International Joint Conference on Neural Networks, Vol. 2. IEEE, 729\u2013734."},{"key":"e_1_3_1_52_2","doi-asserted-by":"crossref","first-page":"104816","DOI":"10.1016\/j.knosys.2019.06.024","article-title":"dyngraph2vec: Capturing network dynamics using dynamic graph representation learning","volume":"187","author":"Goyal Palash","year":"2020","unstructured":"Palash Goyal, Sujit Rokka Chhetri, and Arquimedes Canedo. 2020. dyngraph2vec: Capturing network dynamics using dynamic graph representation learning. Knowledge-Based Systems 187, 104816.","journal-title":"Knowledge-Based Systems"},{"key":"e_1_3_1_53_2","unstructured":"Palash Goyal Nitin Kamra Xinran He and Yan Liu. 2018. Dyngem: Deep embedding method for dynamic graphs. arXiv:1805.11273."},{"key":"e_1_3_1_54_2","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1145\/2939672.2939754","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Grover Aditya","year":"2016","unstructured":"Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 855\u2013864."},{"key":"e_1_3_1_55_2","first-page":"2712","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Guha Sudipto","year":"2016","unstructured":"Sudipto Guha, Nina Mishra, Gourav Roy, and Okke Schrijvers. 2016. Robust random cut forest based anomaly detection on streams. In Proceedings of the International Conference on Machine Learning. PMLR, 2712\u20132721."},{"key":"e_1_3_1_56_2","first-page":"475","volume-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"Guo Xingzhi","year":"2022","unstructured":"Xingzhi Guo, Baojian Zhou, and Steven Skiena. 2022. Subset node anomaly tracking over large dynamic graphs. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 475\u2013485."},{"key":"e_1_3_1_57_2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","article-title":"Real-time big data processing for anomaly detection: A survey","volume":"45","author":"Habeeb Riyaz Ahamed Ariyaluran","year":"2019","unstructured":"Riyaz Ahamed Ariyaluran Habeeb, Fariza Nasaruddin, Abdullah Gani, Ibrahim Abaker Targio Hashem, Ejaz Ahmed, and Muhammad Imran. 2019. Real-time big data processing for anomaly detection: A survey. International Journal of Information Management 45, 289\u2013307.","journal-title":"International Journal of Information Management"},{"key":"e_1_3_1_58_2","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in Neural Information Processing Systems 30, 1024\u20131034.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_59_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01588-5","volume-title":"Graph Representation Learning","author":"Hamilton William L.","year":"2020","unstructured":"William L. Hamilton. 2020. Graph Representation Learning. Morgan & Claypool Publishers."},{"issue":"4","key":"e_1_3_1_60_2","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1109\/TKDE.2019.2947676","article-title":"Extended isolation forest","volume":"33","author":"Hariri Sahand","year":"2019","unstructured":"Sahand Hariri, Matias Carrasco Kind, and Robert J. Brunner. 2019. Extended isolation forest. IEEE Transactions on Knowledge and Data Engineering 33, 4 (2019), 1479\u20131489.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_61_2","unstructured":"Enbo He Yitong Hao Yue Zhang Guisheng Yin and Lina Yao. 2024. SCALA: Sparsification-based contrastive learning for anomaly detection on attributed networks. arXiv:2401.01625."},{"key":"e_1_3_1_62_2","first-page":"770","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770\u2013778."},{"key":"e_1_3_1_63_2","unstructured":"Thi Kieu Khanh Ho Ali Karami and Narges Armanfard. 2023. Graph-based time-series anomaly detection: A survey. arXiv:2302.00058."},{"issue":"8","key":"e_1_3_1_64_2","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735\u20131780.","journal-title":"Neural Computation"},{"key":"e_1_3_1_65_2","first-page":"1","article-title":"Modern temporal network theory: A colloquium","volume":"88","author":"Holme Petter","year":"2015","unstructured":"Petter Holme. 2015. Modern temporal network theory: A colloquium. The European Physical Journal B 88, 1\u201330.","journal-title":"The European Physical Journal B"},{"issue":"3","key":"e_1_3_1_66_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.physrep.2012.03.001","article-title":"Temporal networks","volume":"519","author":"Holme Petter","year":"2012","unstructured":"Petter Holme and Jari Saram\u00e4ki. 2012. Temporal networks. Physics Reports 519, 3 (2012), 97\u2013125.","journal-title":"Physics Reports"},{"issue":"4","key":"e_1_3_1_67_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3056563","article-title":"Graph-based fraud detection in the face of camouflage","volume":"11","author":"Hooi Bryan","year":"2017","unstructured":"Bryan Hooi, Kijung Shin, Hyun Ah Song, Alex Beutel, Neil Shah, and Christos Faloutsos. 2017. Graph-based fraud detection in the face of camouflage. ACM Transactions on Knowledge Discovery from Data (TKDD) 11, 4 (2017), 1\u201326.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"e_1_3_1_68_2","first-page":"22118","article-title":"Open graph benchmark: Datasets for machine learning on graphs","volume":"33","author":"Hu Weihua","year":"2020","unstructured":"Weihua Hu, Matthias Fey, Marinka Zitnik, Yuxiao Dong, Hongyu Ren, Bowen Liu, Michele Catasta, and Jure Leskovec. 2020. Open graph benchmark: Datasets for machine learning on graphs. Advances in Neural Information Processing Systems 33, 22118\u201322133.","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"12","key":"e_1_3_1_69_2","doi-asserted-by":"crossref","first-page":"12249","DOI":"10.1109\/TKDE.2021.3117842","article-title":"Hybrid-order anomaly detection on attributed networks","volume":"35","author":"Huang Ling","year":"2021","unstructured":"Ling Huang, Ye Zhu, Yuefang Gao, Tuo Liu, Chao Chang, Caixing Liu, Yong Tang, and Chang-Dong Wang. 2021. Hybrid-order anomaly detection on attributed networks. IEEE Transactions on Knowledge and Data Engineering 35, 12 (2021), 12249\u201312263.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_70_2","doi-asserted-by":"crossref","unstructured":"Shenyang Huang Samy Coulombe Yasmeen Hitti Reihaneh Rabbany and Guillaume Rabusseau. 2023a. Laplacian change point detection for single and multi-view dynamic graphs. arXiv:2302.01204.","DOI":"10.1145\/3631609"},{"key":"e_1_3_1_71_2","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1145\/3394486.3403077","volume-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Huang Shenyang","year":"2020","unstructured":"Shenyang Huang, Yasmeen Hitti, Guillaume Rabusseau, and Reihaneh Rabbany. 2020. Laplacian change point detection for dynamic graphs. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 349\u2013358."},{"key":"e_1_3_1_72_2","doi-asserted-by":"crossref","first-page":"101860","DOI":"10.1016\/j.inffus.2023.101860","article-title":"Regret theory-based multivariate fusion prediction system and its application to interest rate estimation in multi-scale information systems","author":"Huang Xianfeng","year":"2023","unstructured":"Xianfeng Huang, Jianming Zhan, Weiping Ding, and Witold Pedrycz. 2023c. Regret theory-based multivariate fusion prediction system and its application to interest rate estimation in multi-scale information systems. Information Fusion, 101860.","journal-title":"Information Fusion"},{"key":"e_1_3_1_73_2","first-page":"141","volume-title":"Proceedings of the 16th ACM International Conference on Web Search and Data Mining","author":"Huang Zexi","year":"2023","unstructured":"Zexi Huang, Mert Kosan, Sourav Medya, Sayan Ranu, and Ambuj Singh. 2023b. Global counterfactual explainer for graph neural networks. In Proceedings of the 16th ACM International Conference on Web Search and Data Mining. 141\u2013149."},{"key":"e_1_3_1_74_2","first-page":"15820","article-title":"Generative models for graph-based protein design","volume":"32","author":"Ingraham John","year":"2019","unstructured":"John Ingraham, Vikas Garg, Regina Barzilay, and Tommi Jaakkola. 2019. Generative models for graph-based protein design. Advances in Neural Information Processing Systems 32, 15820\u201315831.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_75_2","doi-asserted-by":"crossref","first-page":"127068","DOI":"10.1016\/j.neucom.2023.127068","article-title":"A hybrid methodology for anomaly detection in Cyber\u2013Physical Systems","volume":"568","author":"Jeffrey Nicholas","year":"2024","unstructured":"Nicholas Jeffrey, Qing Tan, and Jos\u00e9 R. Villar. 2024. A hybrid methodology for anomaly detection in Cyber\u2013Physical Systems. Neurocomputing 568, 127068.","journal-title":"Neurocomputing"},{"issue":"4","key":"e_1_3_1_76_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2746403","article-title":"Catching synchronized behaviors in large networks: A graph mining approach","volume":"10","author":"Jiang Meng","year":"2016","unstructured":"Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016a. Catching synchronized behaviors in large networks: A graph mining approach. ACM Transactions on Knowledge Discovery from Data (TKDD) 10, 4 (2016), 1\u201327.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"1","key":"e_1_3_1_77_2","first-page":"2648","article-title":"Representation learning for dynamic graphs: A survey","volume":"21","author":"Kazemi Seyed Mehran","year":"2020","unstructured":"Seyed Mehran Kazemi, Rishab Goel, Kshitij Jain, Ivan Kobyzev, Akshay Sethi, Peter Forsyth, and Pascal Poupart. 2020. Representation learning for dynamic graphs: A survey. The Journal of Machine Learning Research 21, 1 (2020), 2648\u20132720.","journal-title":"The Journal of Machine Learning Research"},{"issue":"5","key":"e_1_3_1_78_2","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1080\/24725854.2021.2024925","article-title":"Contextual anomaly detection for high-dimensional data using Dirichlet process variational autoencoder","volume":"55","author":"Kim Hyojoong","year":"2023","unstructured":"Hyojoong Kim and Heeyoung Kim. 2023. Contextual anomaly detection for high-dimensional data using Dirichlet process variational autoencoder. IISE Transactions 55, 5 (2023), 433\u2013444.","journal-title":"IISE Transactions"},{"key":"e_1_3_1_79_2","article-title":"Graph anomaly detection with graph neural networks: Current status and challenges","author":"Kim Hwan","year":"2022","unstructured":"Hwan Kim, Byung Suk Lee, Won-Yong Shin, and Sungsu Lim. 2022. Graph anomaly detection with graph neural networks: Current status and challenges. IEEE Access (2022).","journal-title":"IEEE Access"},{"key":"e_1_3_1_80_2","unstructured":"Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv:1609.02907."},{"key":"e_1_3_1_81_2","doi-asserted-by":"crossref","DOI":"10.1109\/TQE.2024.3359574","article-title":"Network anomaly detection using quantum neural networks on noisy quantum computers","author":"Kukliansky Alon","year":"2024","unstructured":"Alon Kukliansky, Marko Orescanin, Chad Bollmann, and Theodore Huffmire. 2024. Network anomaly detection using quantum neural networks on noisy quantum computers. IEEE Transactions on Quantum Engineering.","journal-title":"IEEE Transactions on Quantum Engineering"},{"issue":"3","key":"e_1_3_1_82_2","article-title":"A survey of AI-based anomaly detection in IoT and sensor networks","volume":"23","author":"Kyle DeMedeiros","year":"2023","unstructured":"DeMedeiros Kyle, Hendawi Abdeltawab, and Alvarez Marco. 2023. A survey of AI-based anomaly detection in IoT and sensor networks. Sensors 23, 3 (2023).","journal-title":"Sensors"},{"key":"e_1_3_1_83_2","first-page":"706","volume-title":"Proceedings of the IEEE International Conference on Data Mining Workshops (ICDMW)","author":"Lamichhane Prabin B.","year":"2022","unstructured":"Prabin B. Lamichhane and William Eberle. 2022. Self-organizing map-based graph clustering and visualization on streaming graphs. In Proceedings of the IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 706\u2013713."},{"key":"e_1_3_1_84_2","unstructured":"Jure Leskovec. [n. d.]. Introduction to graph neural networks: Stanford lecture slides. Retrieved March November 21 2023 from https:\/\/snap.stanford.edu\/proj\/embeddings-www\/files\/nrltutorial-part2-gnns.pdf"},{"key":"e_1_3_1_85_2","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP datasets: Stanford large network dataset collection. Retrieved from http:\/\/snap.stanford.edu\/data"},{"issue":"5","key":"e_1_3_1_86_2","first-page":"1332","article-title":"Quantum KNN classification with K value selection and neighbor selection","volume":"43","author":"Li Jiaye","year":"2023","unstructured":"Jiaye Li, Jian Zhang, Jilian Zhang, and Shichao Zhang. 2023. Quantum KNN classification with K value selection and neighbor selection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 43, 5 (2023) 1332\u20131345.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_1_87_2","first-page":"63","article-title":"The expressive power of graph neural networks","volume":"69","author":"Li Pan","year":"2022","unstructured":"Pan Li and Jure Leskovec. 2022. The expressive power of graph neural networks. Graph Neural Networks: Foundations, Frontiers, and Applications 69, 63\u201398.","journal-title":"Graph Neural Networks: Foundations, Frontiers, and Applications"},{"issue":"5","key":"e_1_3_1_88_2","first-page":"3408","article-title":"Dynamic graph-based anomaly detection in the electrical grid","volume":"37","author":"Li Shimiao","year":"2021","unstructured":"Shimiao Li, Amritanshu Pandey, Bryan Hooi, Christos Faloutsos, and Larry Pileggi. 2021. Dynamic graph-based anomaly detection in the electrical grid. IEEE Transactions on Power Systems 37, 5 (2021), 3408\u20133422.","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_1_89_2","unstructured":"Shiyu Liang Yixuan Li and Rayadurgam Srikant. 2017. Enhancing the reliability of out-of-distribution image detection in neural networks. arXiv:1706.02690."},{"key":"e_1_3_1_90_2","article-title":"Fair feature selection: A causal perspective","author":"Ling Zhaolong","year":"2024","unstructured":"Zhaolong Ling, Enqi Xu, Peng Zhou, Liang Du, Kui Yu, and Xindong Wu. 2024. Fair feature selection: A causal perspective. ACM Transactions on Knowledge Discovery from Data.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"e_1_3_1_91_2","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/3-540-39945-3_11","volume-title":"Proceedings of the Recent Advances in Intrusion Detection: Third International Workshop, RAID","author":"Lippmann Richard","year":"2000","unstructured":"Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. 2000. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In Proceedings of the Recent Advances in Intrusion Detection: Third International Workshop, RAID. Springer, 162\u2013182."},{"key":"e_1_3_1_92_2","first-page":"413","volume-title":"Proceedings of the 8th IEEE International Conference on Data Mining","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In Proceedings of the 8th IEEE International Conference on Data Mining. IEEE, 413\u2013422."},{"key":"e_1_3_1_93_2","first-page":"27021","article-title":"Bond: Benchmarking unsupervised outlier node detection on static attributed graphs","volume":"35","author":"Liu Kay","year":"2022","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, Lichao Sun, Jundong Li, George H. Chen, Zhihao Jia, and Philip S. Yu. 2022. Bond: Benchmarking unsupervised outlier node detection on static attributed graphs. Advances in Neural Information Processing Systems 35, 27021\u201327035.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_94_2","first-page":"338","volume-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Liu Meng","year":"2020","unstructured":"Meng Liu, Hongyang Gao, and Shuiwang Ji. 2020. Towards deeper graph neural networks. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 338\u2013348."},{"key":"e_1_3_1_95_2","first-page":"12081","article-title":"Anomaly detection in dynamic graphs via transformer","volume":"35","author":"Liu Yixin","year":"2021","unstructured":"Yixin Liu, Shirui Pan, Yu Guang Wang, Fei Xiong, Liang Wang, Qingfeng Chen, and Vincent C. S. Lee. 2021. Anomaly detection in dynamic graphs via transformer. IEEE Transactions on Knowledge and Data Engineering 35, 12081\u201312094.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_96_2","first-page":"657","volume-title":"Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining","author":"Luo Xuexiong","year":"2022","unstructured":"Xuexiong Luo, Jia Wu, Amin Beheshti, Jian Yang, Xiankun Zhang, Yuan Wang, and Shan Xue. 2022. Comga: Community-aware attributed graph anomaly detection. In Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining. 657\u2013665."},{"key":"e_1_3_1_97_2","doi-asserted-by":"crossref","unstructured":"Minh-Thang Luong Hieu Pham and Christopher D. Manning. 2015. Effective approaches to attention-based neural machine translation. arXiv:1508.04025.","DOI":"10.18653\/v1\/D15-1166"},{"key":"e_1_3_1_98_2","first-page":"12012","article-title":"A comprehensive survey on graph anomaly detection with deep learning","volume":"35","author":"Ma Xiaoxiao","year":"2021","unstructured":"Xiaoxiao Ma, Jia Wu, Shan Xue, Jian Yang, Chuan Zhou, Quan Z. Sheng, Hui Xiong, and Leman Akoglu. 2021. A comprehensive survey on graph anomaly detection with deep learning. IEEE Transactions on Knowledge and Data Engineering 35, 12012\u201312038.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_99_2","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1145\/2939672.2939783","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Manzoor Emaad","year":"2016","unstructured":"Emaad Manzoor, Sadegh M. Milajerdi, and Leman Akoglu. 2016. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1035\u20131044."},{"key":"e_1_3_1_100_2","first-page":"1","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","author":"Md Vasimuddin","year":"2021","unstructured":"Vasimuddin Md, Sanchit Misra, Guixiang Ma, Ramanarayan Mohanty, Evangelos Georganas, Alexander Heinecke, Dhiraj Kalamkar, Nesreen K. Ahmed, and Sasikanth Avancha. 2021. Distgnn: Scalable distributed training for large-scale graph neural networks. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. 1\u201314."},{"issue":"2","key":"e_1_3_1_101_2","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1145\/3156693","article-title":"Elements of the theory of dynamic networks","volume":"61","author":"Michail Othon","year":"2018","unstructured":"Othon Michail and Paul G. Spirakis. 2018. Elements of the theory of dynamic networks. Communications of the ACM 61, 2 (2018), 72\u201372.","journal-title":"Communications of the ACM"},{"key":"e_1_3_1_102_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1298306.1298311","volume-title":"Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement","author":"Mislove Alan","year":"2007","unstructured":"Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. 29\u201342."},{"key":"e_1_3_1_103_2","first-page":"1993","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Na Gyoung S.","year":"2018","unstructured":"Gyoung S. Na, Donghyun Kim, and Hwanjo Yu. 2018. Dilof: Effective and memory efficient local outlier detection in data streams. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 1993\u20132002."},{"key":"e_1_3_1_104_2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198805090.001.0001","volume-title":"Networks","author":"Newman Mark","year":"2018","unstructured":"Mark Newman. 2018. Networks. Oxford University Press."},{"key":"e_1_3_1_105_2","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1145\/3437963.3441659","volume-title":"Proceedings of the 14th ACM International Conference on Web Search and Data Mining","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Longbing Cao, and Charu Aggarwal. 2021a. Deep learning for anomaly detection: Challenges, methods, and opportunities. In Proceedings of the 14th ACM International Conference on Web Search and Data Mining. 1127\u20131130."},{"issue":"2","key":"e_1_3_1_106_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439950","article-title":"Deep learning for anomaly detection: A review","volume":"54","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. 2021b. Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR) 54, 2 (2021), 1\u201338.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_1_107_2","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1145\/3292500.3330871","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Pang Guansong","year":"2019","unstructured":"Guansong Pang, Chunhua Shen, and Anton van den Hengel. 2019. Deep anomaly detection with deviation networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 353\u2013362."},{"key":"e_1_3_1_108_2","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1145\/3292500.3330855","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Park Namyong","year":"2019","unstructured":"Namyong Park, Andrey Kan, Xin Luna Dong, Tong Zhao, and Christos Faloutsos. 2019. Estimating node importance in knowledge graphs using graph neural networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 596\u2013606."},{"key":"e_1_3_1_109_2","first-page":"794","volume-title":"Proceedings of the 15th ACM International Conference on Web Search and data Mining","author":"Park Namyong","year":"2022","unstructured":"Namyong Park, Fuchen Liu, Purvanshi Mehta, Dana Cristofor, Christos Faloutsos, and Yuxiao Dong. 2022a. Evokg: Jointly modeling event time and network structure for reasoning over temporal knowledge graphs. In Proceedings of the 15th ACM International Conference on Web Search and data Mining. 794\u2013803."},{"key":"e_1_3_1_110_2","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1145\/3485447.3512160","volume-title":"Proceedings of the ACM Web Conference 2022","author":"Park Namyong","year":"2022","unstructured":"Namyong Park, Ryan Rossi, Eunyee Koh, Iftikhar Ahamath Burhanuddin, Sungchul Kim, Fan Du, Nesreen Ahmed, and Christos Faloutsos. 2022b. Cgc: Contrastive graph clustering forcommunity detection and tracking. In Proceedings of the ACM Web Conference 2022. 1115\u20131126."},{"key":"e_1_3_1_111_2","volume-title":"Proceedings of the 16th International Workshop on Mining and Learning with Graphs (MLG)","author":"Paudel Ramesh","year":"2020","unstructured":"Ramesh Paudel and William Eberle. 2020. Snapsketch: Graph representation approach for intrusion detection in a streaming graph. In Proceedings of the 16th International Workshop on Mining and Learning with Graphs (MLG)."},{"key":"e_1_3_1_112_2","unstructured":"Armin Danesh Pazho Ghazal Alinezhad Noghre Arnab A. Purkayastha Jagannadh Vempati Otto Martin and Hamed Tabkhi. 2022. A survey of graph-based deep learning for anomaly detection in distributed systems. arXiv:2206.04149."},{"key":"e_1_3_1_113_2","doi-asserted-by":"crossref","first-page":"108906","DOI":"10.1016\/j.comnet.2022.108906","article-title":"Personalized federated learning framework for network traffic anomaly detection","volume":"209","author":"Pei Jiaming","year":"2022","unstructured":"Jiaming Pei, Kaiyang Zhong, Mian Ahmad Jan, and Jinhai Li. 2022. Personalized federated learning framework for network traffic anomaly detection. Computer Networks 209, 108906.","journal-title":"Computer Networks"},{"key":"e_1_3_1_114_2","first-page":"997","volume-title":"Proceedings of the IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI)","author":"Penghui X","year":"2023","unstructured":"X Penghui, Debo Cheng, Zhenyun Deng, Guixian Zhang, and Shichao Zhang. 2023. LRAGAD: Local information recognition for attribute graph anomaly detection. In Proceedings of the IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 997\u20131001."},{"key":"e_1_3_1_115_2","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1145\/2623330.2623732","volume-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Perozzi Bryan","year":"2014","unstructured":"Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 701\u2013710."},{"key":"e_1_3_1_116_2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1137\/1.9781611974348.22","volume-title":"Proceedings of the 2016 SIAM International Conference on Data Mining","author":"Ranshous Stephen","year":"2016","unstructured":"Stephen Ranshous, Steve Harenberg, Kshitij Sharma, and Nagiza F. Samatova. 2016. A scalable approach for outlier detection in edge streams using sketch-based approximations. In Proceedings of the 2016 SIAM International Conference on Data Mining. SIAM, 189\u2013197."},{"issue":"3","key":"e_1_3_1_117_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1002\/wics.1347","article-title":"Anomaly detection in dynamic networks: A survey","volume":"7","author":"Ranshous Stephen","year":"2015","unstructured":"Stephen Ranshous, Shitian Shen, Danai Koutra, Steve Harenberg, Christos Faloutsos, and Nagiza F. Samatova. 2015. Anomaly detection in dynamic networks: A survey. Wiley Interdisciplinary Reviews: Computational Statistics 7, 3 (2015), 223\u2013247.","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"key":"e_1_3_1_118_2","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-030-96737-6_12","volume-title":"Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities","author":"Rida Amani Abou","year":"2022","unstructured":"Amani Abou Rida, Rabih Amhaz, and Pierre Parrend. 2022. Anomaly detection on static and dynamic graphs using graph convolutional neural networks. In Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Springer, 227\u2013248."},{"key":"e_1_3_1_119_2","doi-asserted-by":"crossref","unstructured":"Bodo Rosenhahn and Christoph Hirche. 2024. Quantum normalizing flows for anomaly detection. arXiv:2402.02866.","DOI":"10.1103\/PhysRevA.110.022443"},{"key":"e_1_3_1_120_2","first-page":"597","volume-title":"Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX","author":"Roy Jean","year":"2010","unstructured":"Jean Roy. 2010. Rule-based expert system for maritime anomaly detection. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX, Vol. 7666. SPIE, 597\u2013608."},{"key":"e_1_3_1_121_2","first-page":"756","volume-title":"Proceedings of the IEEE","volume":"109","author":"Ruff Lukas","year":"2021","unstructured":"Lukas Ruff, Jacob R. Kauffmann, Robert A. Vandermeulen, Gr\u00e9goire Montavon, Wojciech Samek, Marius Kloft, Thomas G. Dietterich, and Klaus-Robert M\u00fcller. 2021. A unifying review of deep and shallow anomaly detection. Proceedings of the IEEE 109, 5 (2021), 756\u2013795."},{"issue":"12","key":"e_1_3_1_122_2","doi-asserted-by":"crossref","first-page":"3246","DOI":"10.1109\/TKDE.2016.2597833","article-title":"Fast memory efficient local outlier detection in data streams","volume":"28","author":"Salehi Mahsa","year":"2016","unstructured":"Mahsa Salehi, Christopher Leckie, James C. Bezdek, Tharshan Vaithianathan, and Xuyun Zhang. 2016. Fast memory efficient local outlier detection in data streams. IEEE Transactions on Knowledge and Data Engineering 28, 12 (2016), 3246\u20133260.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_123_2","unstructured":"Aravind Sankar Yanhong Wu Liang Gou Wei Zhang and Hao Yang. 2018. Dynamic graph representation learning via self-attention networks. arXiv:1812.09430."},{"key":"e_1_3_1_124_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/3152494.3152501","volume-title":"Proceedings of the ACM India Joint International Conference on Data Science and Management of Data","author":"Saurav Sakti","year":"2018","unstructured":"Sakti Saurav, Pankaj Malhotra, Vishnu TV, Narendhar Gugulothu, Lovekesh Vig, Puneet Agarwal, and Gautam Shroff. 2018. Online anomaly detection with concept drift adaptation using recurrent neural networks. In Proceedings of the ACM India Joint International Conference on Data Science and Management of Data. 78\u201387."},{"issue":"1","key":"e_1_3_1_125_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","article-title":"The graph neural network model","volume":"20","author":"Scarselli Franco","year":"2008","unstructured":"Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini. 2008. The graph neural network model. IEEE Transactions on Neural Networks 20, 1 (2008), 61\u201380.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"e_1_3_1_126_2","unstructured":"Srijan Sengupta. 2018. Anomaly detection in static networks using egonets. arXiv:1807.08925."},{"key":"e_1_3_1_127_2","first-page":"327","volume-title":"Proceedings of the IEEE 16th International Conference on Data Mining Workshops (ICDMW)","author":"Shah Neil","year":"2016","unstructured":"Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Gunnemann, Disha Makhija, Mohit Kumar, and Christos Faloutsos. 2016. Edgecentric: Anomaly detection in edge-attributed networks. In Proceedings of the IEEE 16th International Conference on Data Mining Workshops (ICDMW). IEEE, 327\u2013334."},{"key":"e_1_3_1_128_2","doi-asserted-by":"crossref","unstructured":"Peter Shaw Jakob Uszkoreit and Ashish Vaswani. 2018. Self-attention with relative position representations. arXiv:1803.02155.","DOI":"10.18653\/v1\/N18-2074"},{"key":"e_1_3_1_129_2","first-page":"120","volume-title":"The Enron email dataset database schema and brief statistical report","author":"Shetty Jitesh","year":"2004","unstructured":"Jitesh Shetty and Jafar Adibi. 2004. The Enron email dataset database schema and brief statistical report. Information Sciences Institute Technical Report, University of Southern California, 120\u2013128."},{"key":"e_1_3_1_130_2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-319-46128-1_17","volume-title":"Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"Shin Kijung","year":"2016","unstructured":"Kijung Shin, Bryan Hooi, and Christos Faloutsos. 2016. M-zoom: Fast dense-block detection in tensors with quality guarantees. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 264\u2013280."},{"key":"e_1_3_1_131_2","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1145\/3097983.3098087","volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Shin Kijung","year":"2017","unstructured":"Kijung Shin, Bryan Hooi, Jisu Kim, and Christos Faloutsos. 2017. Densealert: Incremental dense-subtensor detection in tensor streams. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1057\u20131066."},{"key":"e_1_3_1_132_2","doi-asserted-by":"crossref","first-page":"79143","DOI":"10.1109\/ACCESS.2021.3082932","article-title":"Foundations and modeling of dynamic networks using dynamic graph neural networks: A survey","volume":"9","author":"Skarding Joakim","year":"2021","unstructured":"Joakim Skarding, Bogdan Gabrys, and Katarzyna Musial. 2021. Foundations and modeling of dynamic networks using dynamic graph neural networks: A survey. IEEE Access 9, 79143\u201379168.","journal-title":"IEEE Access"},{"issue":"5","key":"e_1_3_1_133_2","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","article-title":"Conditional anomaly detection","volume":"19","author":"Song Xiuyao","year":"2007","unstructured":"Xiuyao Song, Mingxi Wu, Christopher Jermaine, and Sanjay Ranka. 2007. Conditional anomaly detection. IEEE Transactions on knowledge and Data Engineering 19, 5 (2007), 631\u2013645.","journal-title":"IEEE Transactions on knowledge and Data Engineering"},{"issue":"3","key":"e_1_3_1_134_2","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/72.572108","article-title":"Supervised neural networks for the classification of structures","volume":"8","author":"Sperduti Alessandro","year":"1997","unstructured":"Alessandro Sperduti and Antonina Starita. 1997. Supervised neural networks for the classification of structures. IEEE Transactions on Neural Networks 8, 3 (1997), 714\u2013735.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"e_1_3_1_135_2","doi-asserted-by":"crossref","first-page":"2828","DOI":"10.1145\/3292500.3330672","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Su Ya","year":"2019","unstructured":"Ya Su, Youjian Zhao, Chenhao Niu, Rong Liu, Wei Sun, and Dan Pei. 2019. Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2828\u20132837."},{"key":"e_1_3_1_136_2","first-page":"374","volume-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Sun Jimeng","year":"2006","unstructured":"Jimeng Sun, Dacheng Tao, and Christos Faloutsos. 2006. Beyond streams and graphs: Dynamic tensor analysis. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 374\u2013383."},{"key":"e_1_3_1_137_2","article-title":"Gadbench: Revisiting and benchmarking supervised graph anomaly detection","volume":"36","author":"Tang Jianheng","year":"2024","unstructured":"Jianheng Tang, Fengrui Hua, Ziqi Gao, Peilin Zhao, and Jia Li. 2024. Gadbench: Revisiting and benchmarking supervised graph anomaly detection. Advances in Neural Information Processing Systems 36.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_138_2","first-page":"21076","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In Proceedings of the International Conference on Machine Learning. PMLR, 21076\u201321089."},{"key":"e_1_3_1_139_2","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1145\/2736277.2741093","volume-title":"Proceedings of the 24th International Conference on World Wide Web","author":"Tang Jian","year":"2015","unstructured":"Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web. 1067\u20131077."},{"key":"e_1_3_1_140_2","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1145\/3132847.3132964","volume-title":"Proceedings of the 2017 ACM on Conference on Information and Knowledge Management","author":"Teng Xian","year":"2017","unstructured":"Xian Teng, Yu-Ru Lin, and Xidao Wen. 2017. Anomaly detection in dynamic networks using multi-view time-series hypersphere learning. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 827\u2013836."},{"key":"e_1_3_1_141_2","first-page":"1","article-title":"A comprehensive survey of anomaly detection techniques for high dimensional big data","volume":"7","author":"Thudumu Srikanth","year":"2020","unstructured":"Srikanth Thudumu, Philip Branch, Jiong Jin, and Jugdutt Singh. 2020. A comprehensive survey of anomaly detection techniques for high dimensional big data. Journal of Big Data 7, 1\u201330.","journal-title":"Journal of Big Data"},{"key":"e_1_3_1_142_2","doi-asserted-by":"crossref","unstructured":"Sheng Tian Jihai Dong Jintang Li Wenlong Zhao Xiaolong Xu Bowen Song Changhua Meng Tianyi Zhang and Liang Chen. 2023. SAD: Semi-supervised anomaly detection on dynamic graphs. arXiv:2305.13573.","DOI":"10.24963\/ijcai.2023\/256"},{"key":"e_1_3_1_143_2","article-title":"Attention is all you need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u00c5ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_144_2","first-page":"10","article-title":"Graph attention networks","volume":"20","author":"Velickovic Petar","year":"2017","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. stat 1050, 20 (2017), 10\u201348550.","journal-title":"stat"},{"key":"e_1_3_1_145_2","unstructured":"Lilapati Waikhom and Ripon Patgiri. 2021. Graph neural networks: Methods applications and opportunities. arXiv:2108.10733."},{"key":"e_1_3_1_146_2","first-page":"385","volume-title":"Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","author":"Wang Chengwei","year":"2011","unstructured":"Chengwei Wang, Krishnamurthy Viswanathan, Lakshminarayan Choudur, Vanish Talwar, Wade Satterfield, and Karsten Schwan. 2011. Statistical techniques for online anomaly detection in data centers. In Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops. IEEE, 385\u2013392."},{"key":"e_1_3_1_147_2","doi-asserted-by":"crossref","first-page":"108760","DOI":"10.1016\/j.comnet.2022.108760","article-title":"Network traffic analysis over clustering-based collective anomaly detection","volume":"205","author":"Wang Chonghua","year":"2022","unstructured":"Chonghua Wang, Hao Zhou, Zhiqiang Hao, Shu Hu, Jun Li, Xueying Zhang, Bo Jiang, and Xuehong Chen. 2022. Network traffic analysis over clustering-based collective anomaly detection. Computer Networks 205, 108760.","journal-title":"Computer Networks"},{"key":"e_1_3_1_148_2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/3543873.3587299","volume-title":"Companion Proceedings of the ACM Web Conference 2023","author":"Wang Lili","year":"2023","unstructured":"Lili Wang, Chenghan Huang, Xinyuan Cao, Weicheng Ma, and Soroush Vosoughi. 2023. Graph-level embedding for time-evolving graphs. In Companion Proceedings of the ACM Web Conference 2023. 5\u20138."},{"key":"e_1_3_1_149_2","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1145\/3308558.3313562","volume-title":"Proceedings of the World Wide Web Conference","author":"Wang Xiao","year":"2019","unstructured":"Xiao Wang, Houye Ji, Chuan Shi, Bai Wang, Yanfang Ye, Peng Cui, and Philip S. Yu. 2019. Heterogeneous graph attention network. In Proceedings of the World Wide Web Conference. 2022\u20132032."},{"key":"e_1_3_1_150_2","doi-asserted-by":"crossref","unstructured":"Yu Wang Aniket Chakrabarti David Sivakoff and Srinivasan Parthasarathy. 2017. Fast change point detection on dynamic social networks. arXiv:1705.07325.","DOI":"10.24963\/ijcai.2017\/417"},{"key":"e_1_3_1_151_2","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11280-020-00849-0","article-title":"A survey of typical attributed graph queries","volume":"24","author":"Wang Yanhao","year":"2021","unstructured":"Yanhao Wang, Yuchen Li, Ju Fan, Chang Ye, and Mingke Chai. 2021. A survey of typical attributed graph queries. World Wide Web 24, 297\u2013346.","journal-title":"World Wide Web"},{"key":"e_1_3_1_152_2","unstructured":"Yuhang Wu Mengting Gu Lan Wang Yusan Lin Fei Wang and Hao Yang. 2021. Event2graph: Event-driven bipartite graph for multivariate time-series anomaly detection. arXiv:2108.06783."},{"key":"e_1_3_1_153_2","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.ins.2023.01.118","article-title":"Multi-view change point detection in dynamic networks","volume":"629","author":"Xie Yingjie","year":"2023","unstructured":"Yingjie Xie, Wenjun Wang, Minglai Shao, Tianpeng Li, and Yandong Yu. 2023. Multi-view change point detection in dynamic networks. Information Sciences 629, 344\u2013357.","journal-title":"Information Sciences"},{"key":"e_1_3_1_154_2","doi-asserted-by":"crossref","first-page":"4062","DOI":"10.1109\/TCE.2024.3355122","article-title":"Unsupervised anomaly detection on attributed networks with graph contrastive learning for consumer electronics security","volume":"70","author":"Xu Bo","year":"2024","unstructured":"Bo Xu, Jinpeng Wang, Zhehuan Zhao, Hongfei Lin, and Feng Xia. 2024. Unsupervised anomaly detection on attributed networks with graph contrastive learning for consumer electronics security. IEEE Transactions on Consumer Electronics 70, 4062\u20134072.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"e_1_3_1_155_2","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"32","author":"Yan Sijie","year":"2018","unstructured":"Sijie Yan, Yuanjun Xiong, and Dahua Lin. 2018. Spatial temporal graph convolutional networks for skeleton-based action recognition. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 32."},{"key":"e_1_3_1_156_2","doi-asserted-by":"crossref","unstructured":"Baosong Yang Longyue Wang Derek Wong Lidia S. Chao and Zhaopeng Tu. 2019. Convolutional self-attention networks. arXiv:1904.03107.","DOI":"10.18653\/v1\/N19-1407"},{"key":"e_1_3_1_157_2","unstructured":"Chenming Yang Liang Zhou Hui Wen Zhiheng Zhou and Yue Wu. 2020b. H-vgrae: A hierarchical stochastic spatial-temporal embedding method for robust anomaly detection in dynamic networks. arXiv:2007.06903."},{"key":"e_1_3_1_158_2","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-3-030-45442-5_53","volume-title":"Proceedings of the Advances in Information Retrieval: 42nd European Conference on IR Research, ECIR 2020","author":"Yang Luwei","year":"2020","unstructured":"Luwei Yang, Zhibo Xiao, Wen Jiang, Yi Wei, Yi Hu, and Hao Wang. 2020a. Dynamic heterogeneous graph embedding using hierarchical attentions. In Proceedings of the Advances in Information Retrieval: 42nd European Conference on IR Research, ECIR 2020, Part II 42. Springer, 425\u2013432."},{"issue":"6","key":"e_1_3_1_159_2","doi-asserted-by":"crossref","first-page":"2324","DOI":"10.1109\/TNNLS.2021.3132928","article-title":"Memory-augmented generative adversarial networks for anomaly detection","volume":"33","author":"Yang Ziyi","year":"2021","unstructured":"Ziyi Yang, Teng Zhang, Iman Soltani Bozchalooi, and Eric Darve. 2021. Memory-augmented generative adversarial networks for anomaly detection. IEEE Transactions on Neural Networks and Learning Systems 33, 6 (2021), 2324\u20132334.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_1_160_2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.neunet.2017.07.002","article-title":"Error bounds for approximations with deep ReLU networks","volume":"94","author":"Yarotsky Dmitry","year":"2017","unstructured":"Dmitry Yarotsky. 2017. Error bounds for approximations with deep ReLU networks. Neural Networks 94, 103\u2013114.","journal-title":"Neural Networks"},{"key":"e_1_3_1_161_2","unstructured":"Chengxuan Ying Tianle Cai Shengjie Luo Shuxin Zheng Guolin Ke Di He Yanming Shen and Tie-Yan Liu [n. d.]. Do transformers really perform bad for graph representation? arXiv:2106.05234."},{"key":"e_1_3_1_162_2","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1145\/3292500.3330946","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Yoon Minji","year":"2019","unstructured":"Minji Yoon, Bryan Hooi, Kijung Shin, and Christos Faloutsos. 2019. Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 647\u2013657."},{"key":"e_1_3_1_163_2","first-page":"2358","volume-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"You Jiaxuan","year":"2022","unstructured":"Jiaxuan You, Tianyu Du, and Jure Leskovec. 2022. ROLAND: graph learning framework for dynamic graphs. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 2358\u20132366."},{"key":"e_1_3_1_164_2","first-page":"10737","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"35","author":"You Jiaxuan","year":"2021","unstructured":"Jiaxuan You, Jonathan M. Gomes-Selman, Rex Ying, and Jure Leskovec. 2021. Identity-aware graph neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 35. 10737\u201310745."},{"issue":"1","key":"e_1_3_1_165_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2980765.2980767","article-title":"A survey on social media anomaly detection","volume":"18","author":"Yu Rose","year":"2016","unstructured":"Rose Yu, Huida Qiu, Zhen Wen, ChingYung Lin, and Yan Liu. 2016. A survey on social media anomaly detection. ACM SIGKDD Explorations Newsletter 18, 1 (2016), 1\u201314.","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"e_1_3_1_166_2","first-page":"455","volume-title":"Proceedings of the Tenth ACM International Conference on Web Search and Data Mining","author":"Yu Wenchao","year":"2017","unstructured":"Wenchao Yu, Charu C. Aggarwal, and Wei Wang. 2017. Temporally factorized network modeling for evolutionary network analysis. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. 455\u2013464."},{"key":"e_1_3_1_167_2","first-page":"2672","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Yu Wenchao","year":"2018","unstructured":"Wenchao Yu, Wei Cheng, Charu C. Aggarwal, Kai Zhang, Haifeng Chen, and Wei Wang. 2018. Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2672\u20132681."},{"key":"e_1_3_1_168_2","doi-asserted-by":"crossref","first-page":"2870","DOI":"10.1109\/TIFS.2023.3272731","article-title":"Motif-level anomaly detection in dynamic graphs","volume":"18","author":"Yuan Zirui","year":"2023","unstructured":"Zirui Yuan, Minglai Shao, and Qiben Yan. 2023. Motif-level anomaly detection in dynamic graphs. IEEE Transactions on Information Forensics and Security 18, 2870\u20132882.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_169_2","first-page":"11983","article-title":"Graph transformer networks","volume":"32","author":"Yun Seongjun","year":"2019","unstructured":"Seongjun Yun, Minbyul Jeong, Raehyun Kim, Jaewoo Kang, and Hyunwoo J. Kim. 2019. Graph transformer networks. Advances in Neural Information Processing Systems 32, 11983\u201311993.","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1","key":"e_1_3_1_170_2","doi-asserted-by":"crossref","first-page":"103570","DOI":"10.1016\/j.ipm.2023.103570","article-title":"Learning fair representations via rebalancing graph structure","volume":"61","author":"Zhang Guixian","year":"2024","unstructured":"Guixian Zhang, Debo Cheng, Guan Yuan, and Shichao Zhang. 2024a. Learning fair representations via rebalancing graph structure. Information Processing & Management 61, 1 (2024), 103570.","journal-title":"Information Processing & Management"},{"issue":"3","key":"e_1_3_1_171_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3474379","article-title":"efraudcom: An e-commerce fraud detection system via competitive graph neural networks","volume":"40","author":"Zhang Ge","year":"2022","unstructured":"Ge Zhang, Zhao Li, Jiaming Huang, Jia Wu, Chuan Zhou, Jian Yang, and Jianliang Gao. 2022b. efraudcom: An e-commerce fraud detection system via competitive graph neural networks. ACM Transactions on Information Systems (TOIS) 40, 3 (2022), 1\u201329.","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"e_1_3_1_172_2","first-page":"89:1","article-title":"Bayesian graph local extrema convolution with long-tail strategy for misinformation detection","volume":"18","author":"Zhang Guixian","year":"2024","unstructured":"Guixian Zhang, Shichao Zhang, and Guan Yuan. 2024b. Bayesian graph local extrema convolution with long-tail strategy for misinformation detection. ACM Transactions on Knowledge Discovery from Data 18, 89:1\u201389:21.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"e_1_3_1_173_2","first-page":"5165","article-title":"Link prediction based on graph neural networks","volume":"31","author":"Zhang Muhan","year":"2018","unstructured":"Muhan Zhang and Yixin Chen. 2018. Link prediction based on graph neural networks. Advances in Neural Information Processing Systems 31, 5165\u20135175.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_174_2","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1007\/s11280-018-0619-5","article-title":"Multiple-scale cost sensitive decision tree learning","volume":"21","author":"Zhang Shichao","year":"2018","unstructured":"Shichao Zhang. 2018. Multiple-scale cost sensitive decision tree learning. World Wide Web 21, 1787\u20131800.","journal-title":"World Wide Web"},{"issue":"7","key":"e_1_3_1_175_2","first-page":"7382","article-title":"Reachable distance function for KNN classification","volume":"35","author":"Zhang Shichao","year":"2022","unstructured":"Shichao Zhang, Jiaye Li, and Yangding Li. 2022a. Reachable distance function for KNN classification. IEEE Transactions on Knowledge and Data Engineering 35, 7 (2022), 7382\u20137396.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_1_176_2","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.1145\/3543507.3583511","volume-title":"Proceedings of the ACM Web Conference 2023","author":"Zhang Shichang","year":"2023","unstructured":"Shichang Zhang, Jiani Zhang, Xiang Song, Soji Adeshina, Da Zheng, Christos Faloutsos, and Yizhou Sun. 2023b. PaGE-Link: Path-based graph neural network explanation for heterogeneous link prediction. In Proceedings of the ACM Web Conference 2023. 3784\u20133793."},{"key":"e_1_3_1_177_2","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-981-97-2262-4_31","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Zhang Wenbo","year":"2024","unstructured":"Wenbo Zhang, Shuo Zhang, Xingbang Hu, and Hejiao Huang. 2024c. MSTAN: A multi-view spatio-temporal aggregation network learning irregular interval user activities for fraud detection. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 389\u2013401."},{"key":"e_1_3_1_178_2","doi-asserted-by":"crossref","first-page":"119164","DOI":"10.1016\/j.eswa.2022.119164","article-title":"Semi-supervised learning with graph convolutional extreme learning machines","volume":"213","author":"Zhang Zijia","year":"2023","unstructured":"Zijia Zhang, Yaoming Cai, and Wenyin Gong. 2023a. Semi-supervised learning with graph convolutional extreme learning machines. Expert Systems with Applications 213, 119164.","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"e_1_3_1_179_2","doi-asserted-by":"crossref","first-page":"2393","DOI":"10.1109\/TNNLS.2021.3102609","article-title":"A synergistic approach for graph anomaly detection with pattern mining and feature learning","volume":"33","author":"Zhao Tong","year":"2021","unstructured":"Tong Zhao, Tianwen Jiang, Neil Shah, and Meng Jiang. 2021. A synergistic approach for graph anomaly detection with pattern mining and feature learning. IEEE Transactions on Neural Networks and Learning Systems 33, 6 (2021), 2393\u20132405.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_1_180_2","first-page":"1","volume-title":"Proceedings of the International Joint Conference on Neural Networks (IJCNN\u201918)","author":"Zhao Yue","year":"2018","unstructured":"Yue Zhao and Maciej K. Hryniewicki. 2018. Xgbod: improving supervised outlier detection with unsupervised representation learning. In Proceedings of the International Joint Conference on Neural Networks (IJCNN\u201918). IEEE, 1\u20138."},{"key":"e_1_3_1_181_2","first-page":"4419","volume-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI\u201919)","volume":"3","author":"Zheng Li","year":"2019","unstructured":"Li Zheng, Zhenpeng Li, Jian Li, Zhao Li, and Jun Gao. 2019. AddGraph: Anomaly detection in dynamic graph using attention-based temporal GCN. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI\u201919), Vol. 3. 4419\u20134425."},{"key":"e_1_3_1_182_2","first-page":"24017","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Zhou Beitong","year":"2023","unstructured":"Beitong Zhou, Jing Lu, Kerui Liu, Yunlu Xu, Zhanzhan Cheng, and Yi Niu. 2023. HyperMatch: Noise-tolerant semi-supervised learning via relaxed contrastive constraint. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 24017\u201324026."},{"key":"e_1_3_1_183_2","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1145\/3097983.3098052","volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Zhou Chong","year":"2017","unstructured":"Chong Zhou and Randy C. Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 665\u2013674."},{"key":"e_1_3_1_184_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph neural networks: A review of methods and applications","volume":"1","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou, Ganqu Cui, Shengding Hu, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, Lifeng Wang, Changcheng Li, and Maosong Sun. 2020. Graph neural networks: A review of methods and applications. AI Open 1, 57\u201381.","journal-title":"AI Open"},{"key":"e_1_3_1_185_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.inffus.2021.07.013","article-title":"Interpretable learning based dynamic graph convolutional networks for alzheimer\u2019s disease analysis","volume":"77","author":"Zhu Yonghua","year":"2022","unstructured":"Yonghua Zhu, Junbo Ma, Changan Yuan, and Xiaofeng Zhu. 2022. Interpretable learning based dynamic graph convolutional networks for alzheimer\u2019s disease analysis. Information Fusion 77, 53\u201361.","journal-title":"Information Fusion"},{"issue":"14","key":"e_1_3_1_186_2","doi-asserted-by":"crossref","first-page":"i190","DOI":"10.1093\/bioinformatics\/btx252","article-title":"Predicting multicellular function through multi-layer tissue networks","volume":"33","author":"Zitnik Marinka","year":"2017","unstructured":"Marinka Zitnik and Jure Leskovec. 2017. Predicting multicellular function through multi-layer tissue networks. Bioinformatics 33, 14 (2017), i190\u2013i198.","journal-title":"Bioinformatics"},{"key":"e_1_3_1_187_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In Proceedings of the International Conference on Learning Representations."}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:42Z","timestamp":1750291542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":186,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,9,30]]}},"alternative-id":["10.1145\/3669906"],"URL":"https:\/\/doi.org\/10.1145\/3669906","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"2023-11-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}