{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:57Z","timestamp":1750309557599,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,8]]},"DOI":"10.1145\/3716895.3716998","type":"proceedings-article","created":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T12:07:14Z","timestamp":1742558834000},"page":"581-586","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection of Power Time Series Data with Multi-Head Graph Attention Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0684-8999","authenticated-orcid":false,"given":"Wuqiang","family":"Shen","sequence":"first","affiliation":[{"name":"Guangdong Power Grid Corporation, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0330-6251","authenticated-orcid":false,"given":"Tao","family":"Dai","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, CSG, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2516-9512","authenticated-orcid":false,"given":"Zhaopeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Power Grid Corporation, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5241-2280","authenticated-orcid":false,"given":"Jinran","family":"Du","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, CSG, Guangzhou, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_3_1_1_2","DOI":"10.1016\/j.neucom.2021.02.046"},{"key":"e_1_3_3_1_2_2","volume-title":"Linked: The new science of networks","author":"Barabasi A.-L.","year":"2003","unstructured":"A.-L. Barabasi, \u201cLinked: The new science of networks,\u201d 2003."},{"issue":"23","key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","first-page":"238701","DOI":"10.1103\/PhysRevLett.96.238701","article-title":"Complex network from pseudoperiodic time series: Topology versus dynamics","volume":"96","author":"Zhang J.","year":"2006","unstructured":"J. Zhang and M. Small, \u201cComplex network from pseudoperiodic time series: Topology versus dynamics,\u201d Physical review letters, vol. 96, no. 23, p. 238701, 2006","journal-title":"Physical review letters"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_4_2","DOI":"10.1016\/j.engappai.2022.105503"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","first-page":"108009","DOI":"10.1016\/j.ymssp.2021.108009","article-title":"Structural anomaly detection based on probabilistic distance measures of transmissibility function and statistical threshold selection scheme","volume":"162","author":"Yan W.-J.","year":"2022","unstructured":"W.-J. Yan, D. Chronopoulos, K.-V. Yuen, and Y.-C. Zhu, \u201cStructural anomaly detection based on probabilistic distance measures of transmissibility function and statistical threshold selection scheme,\u201d Mechanical Systems and Signal Processing, vol. 162, p. 108009, 2022.","journal-title":"Mechanical Systems and Signal Processing"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/ACCESS.2021.3131220","article-title":"Energy theft in smart grids: a survey on data-driven attack strategies and detection methods","volume":"9","author":"Althobaiti A.","year":"2021","unstructured":"A. Althobaiti, A. Jindal, A. K. Marnerides, and U. Roedig, \u201cEnergy theft in smart grids: a survey on data-driven attack strategies and detection methods,\u201d IEEE access, vol. 9, pp. 159 291\u2013159 312, 2021.","journal-title":"IEEE access"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_7_2","DOI":"10.1007\/s10462-023-10465-9"},{"key":"e_1_3_3_1_8_2","first-page":"2273","volume-title":"Proceedings of the ACM Web Conference 2023","author":"Dai E.","year":"2023","unstructured":"E. Dai, M. Lin, X. Zhang, and S. Wang, \u201cUnnoticeable backdoor attacks on graph neural networks,\u201d in Proceedings of the ACM Web Conference 2023, 2023, pp. 2263\u20132273."},{"key":"e_1_3_3_1_9_2","first-page":"23","volume-title":"International Conference on Machine Learning. PMLR","author":"Wang X.","year":"2022","unstructured":"X. Wang and M. Zhang, \u201cHow powerful are spectral graph neural networks,\u201d in International Conference on Machine Learning. PMLR, 2022, pp. 23 341\u201323 362."},{"key":"e_1_3_3_1_10_2","first-page":"883","volume-title":"International conference on machine learning. PMLR","author":"Bianchi F. M.","year":"2020","unstructured":"F. M. Bianchi, D. Grattarola, and C. Alippi, \u201cSpectral clustering with graph neural networks for graph pooling,\u201d in International conference on machine learning. PMLR, 2020, pp. 874\u2013883."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","first-page":"106044","DOI":"10.1016\/j.engappai.2023.106044","article-title":"Spatial temporal complex graph convolution network for traffic flow prediction","volume":"121","author":"Bao Y.","year":"2023","unstructured":"Y. Bao, J. Huang, Q. Shen, Y. Cao, W. Ding, Z. Shi, and Q. Shi, \u201cSpatial temporal complex graph convolution network for traffic flow prediction,\u201d Engineering Applications of Artificial Intelligence, vol. 121, p. 106044, 2023.","journal-title":"Engineering Applications of Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_12_2","DOI":"10.1109\/CVPR.2017.576"},{"volume-title":"A comprehensive survey on graph neural networks","author":"Wu Z.","unstructured":"Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and S. Y. Philip, \u201cA comprehensive survey on graph neural networks,\u201d IEEE transactions on neural networks and learning systems, vol. 32, no. 1, pp. 4\u201324, 2020.","key":"e_1_3_3_1_13_2"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_14_2","DOI":"10.1073\/pnas.0709247105"},{"key":"e_1_3_3_1_15_2","volume-title":"How attentive are graph attention net works?","author":"Brody S.","year":"2021","unstructured":"S. Brody, U. Alon, and E. Yahav, \u201cHow attentive are graph attention net works?\u201d arXiv preprint arXiv:2105.14491, 2021."},{"issue":"3","key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","first-page":"624","DOI":"10.3390\/electronics12030624","article-title":"Dual-channel edge-featured graph attention networks for aspect-based sentiment analysis","volume":"12","author":"Lu J.","year":"2023","unstructured":"J. Lu, L. Shi, G. Liu, and X. Zhan, \u201cDual-channel edge-featured graph attention networks for aspect-based sentiment analysis,\u201d Electronics, vol. 12, no. 3, p. 624, 2023.","journal-title":"Electronics"},{"key":"e_1_3_3_1_17_2","article-title":"A framework for anomaly detection in blockchain networks with sketches","author":"Voronov T.","year":"2023","unstructured":"T. Voronov, D. Raz, and O. Rottenstreich, \u201cA framework for anomaly detection in blockchain networks with sketches,\u201d IEEE\/ACM Transactions on Networking, 2023.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_3_1_18_2","first-page":"532","volume-title":"2023 IEEE International Conference on Metaverse Computing, Networking and Applications (Meta Com). IEEE","author":"Su S.","year":"2023","unstructured":"S.Su, Y.Tan, Y.Xue, C.Wang, H.Lu, Z.Tian, C.Shan, and X.Du, \u201cDetecting smart contract project anomalies in metaverse,\u201d in 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (Meta Com). IEEE, 2023, pp. 524\u2013532."},{"issue":"1","key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJCAC.331752","article-title":"The meta-fusion: A cloud-integrated study on blockchain technology enabling secure and efficient virtual worlds","volume":"13","author":"Aldweesh A.","year":"2023","unstructured":"A. Aldweesh, M. Alauthman, M. Al Khaldy, A. Ishtaiwi, A. Al-Qerem, A. Almoman, and B. B. Gupta, \u201cThe meta-fusion: A cloud-integrated study on blockchain technology enabling secure and efficient virtual worlds,\u201d International Journal of Cloud Applications and Computing (IJCAC), vol. 13, no. 1, pp. 1\u201324, 2023.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"volume-title":"Why resnet works? residuals generalize","author":"He F.","unstructured":"F. He, T. Liu, and D. Tao, \u201cWhy resnet works? residuals generalize,\u201d IEEE transactions on neural networks and learning systems, vol. 31, no. 12, pp. 5349\u20135362, 2020.","key":"e_1_3_3_1_20_2"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/nar\/gkh081","article-title":"Brenda, the enzyme database: updates and major new developments","volume":"32","author":"Schomburg I.","year":"2004","unstructured":"I. Schomburg, A. Chang, C. Ebeling, M. Gremse, C. Heldt, G. Huhn, and D. Schomburg, \u201cBrenda, the enzyme database: updates and major new developments,\u201d Nucleic acids research, vol. 32, no. suppl 1, pp. D431\u2013D433, 2004.","journal-title":"Nucleic acids research"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_22_2","DOI":"10.1093\/bioinformatics\/bti1007"},{"issue":"9","key":"e_1_3_3_1_23_2","article-title":"Weisfeiler-lehman graph kernels","volume":"12","author":"Shervashidze N.","year":"2011","unstructured":"N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt, \u201cWeisfeiler-lehman graph kernels.\u201d Journal of Machine Learning Research, vol. 12, no. 9, 2011.","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_24_2","DOI":"10.1038\/s41467-023-38192-3"},{"issue":"10","key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","first-page":"6596","DOI":"10.1021\/acs.jmedchem.0c01675","article-title":"Structure guided design of the first noncovalent small-molecule inhibitor of crm1","volume":"64","author":"Lei Y.","year":"2021","unstructured":"Y.Lei, Q.An, X.-F. Shen, M.Sui, C.Li, D.Jia, Y.Luo, and Q.Sun, \u201cStructure guided design of the first noncovalent small-molecule inhibitor of crm1,\u201d Journal of Medicinal Chemistry, vol. 64, no. 10, pp. 6596\u20136607, 2021.","journal-title":"Journal of Medicinal Chemistry"},{"key":"e_1_3_3_1_26_2","volume-title":"Order matters: Sequence to sequence for sets","author":"Vinyals O.","year":"2015","unstructured":"O. Vinyals, S. Bengio, and M. Kudlur, \u201cOrder matters: Sequence to sequence for sets,\u201d arXiv preprint arXiv:1511.06391, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_27_2","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"e_1_3_3_1_28_2","volume-title":"Advances in neural information processing systems","author":"Ying Z.","year":"2018","unstructured":"Z. Ying, J. You, C. Morris, X. Ren, W. Hamilton, and J. Leskovec, \u201cHierarchical graph representation learning with differentiable pooling,\u201d Advances in neural information processing systems, vol. 31, 2018."}],"event":{"acronym":"ICAICE 2024","name":"ICAICE 2024: The 5th International Conference on Artificial Intelligence and Computer Engineering","location":"Wuhu Shandong China"},"container-title":["Proceedings of the 5th International Conference on Artificial Intelligence and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716895.3716998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716895.3716998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:55Z","timestamp":1750295935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716895.3716998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":28,"alternative-id":["10.1145\/3716895.3716998","10.1145\/3716895"],"URL":"https:\/\/doi.org\/10.1145\/3716895.3716998","relation":{},"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"2025-03-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}