{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T16:26:48Z","timestamp":1754152008497,"version":"3.41.2"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2025,7,31]]},"abstract":"<jats:p>This article examines a collection of assumptions used in the current literature on node anomaly detection in a network. The examination raises the question: What are anomalies in a network? Our attempt to answer this question has provided some interesting findings and led to some open questions. This is the first article which formally defines anomalies in a network and introduces the concept of self-verifiability of a detector without ground-truths in a network. They enable existing detectors to be categorized into two types along the line whether they are self-verifiable or not. We suggest a method to evaluate self-verifiable detectors without ground-truths as an alternative to the existing evaluation method that relies on ground-truths.<\/jats:p>","DOI":"10.1145\/3723007","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T12:36:51Z","timestamp":1748349411000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["What Are Anomalies in a Network?"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7892-6194","authenticated-orcid":false,"given":"Kai Ming","family":"Ting","sequence":"first","affiliation":[{"name":"National Key Laboratory for Novel Software Technology and School of Artificial Intelligence, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4262-8571","authenticated-orcid":false,"given":"Zhong","family":"Zhuang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology and School of Artificial Intelligence, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9877-2716","authenticated-orcid":false,"given":"Guansong","family":"Pang","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1389-7245","authenticated-orcid":false,"given":"Zongyou","family":"Liu","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology and School of Artificial Intelligence, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5136-1328","authenticated-orcid":false,"given":"Tianrun","family":"Liang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology and School of Artificial Intelligence, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3974-1279","authenticated-orcid":false,"given":"Qiuran","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology and School of Artificial Intelligence, Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,21]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"10","volume-title":"Proceedings of the Conference on Neural Information Processing Systems","author":"Ailon Nir","year":"2009","unstructured":"Nir Ailon, Ragesh Jaiswal, and Claire Monteleoni. 2009. Streaming k-means approximation. In Proceedings of the Conference on Neural Information Processing Systems, 10\u201318."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12156"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290964"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411903"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25907"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3312655"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053387"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3323274"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3117842"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00197"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2746403"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482057"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.016107"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382577.2382579"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641857"},{"key":"e_1_3_2_21_2","volume-title":"Proceedings of the 5th International Conference on Learning Representations","author":"Kipf Thomas N.","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In Proceedings of the 5th International Conference on Learning Representations."},{"key":"e_1_3_2_22_2","first-page":"392","volume-title":"Proceedings of the 24th International Conference on Very Large Data Bases","author":"Knorr Edwin M.","year":"1998","unstructured":"Edwin M. Knorr and Raymond T. Ng. 1998. Algorithms for mining distance-based outliers in large datasets. In Proceedings of the 24th International Conference on Very Large Data Bases, 392\u2013403."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358074"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3522690"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_26_2","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"Liu Kay","year":"2024","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, et al. 2024. BOND: Benchmarking unsupervised outlier node detection on static attributed graphs. In Proceedings of the 36th International Conference on Neural Information Processing Systems, Article 1959."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_28_2","unstructured":"Yixin Liu Shiyuan Li Yu Zheng Qingfeng Chen Chengqi Zhang and Shirui Pan. 2024. ARC: A generalist graph anomaly detector with in-context learning. arXiv:2405.16771. Retrieved from https:\/\/arxiv.org\/abs\/2405.16771"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"issue":"06","key":"e_1_3_2_31_2","first-page":"2539","article-title":"A deep multi-view framework for anomaly detection on attributed networks","volume":"34","author":"Peng Zhen","year":"2020","unstructured":"Zhen Peng, Minnan Luo, Jundong Li, Luguo Xue, and Qinghua Zheng. 2020. A deep multi-view framework for anomaly detection on attributed networks. IEEE Transactions on Knowledge and Data Engineering 34, 06 (2020), 2539\u20132552.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_32_2","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems, Article 2154","author":"Qiao Hezhe","year":"2024","unstructured":"Hezhe Qiao and Guansong Pang. 2024. Truncated affinity maximization: One-class homophily modeling for graph anomaly detection. In Proceedings of the 37th International Conference on Neural Information Processing Systems, Article 2154."},{"key":"e_1_3_2_33_2","unstructured":"Hezhe Qiao Qingsong Wen Xiaoli Li Ee-Peng Lim and Guansong Pang. 2024. Generative semi-supervised graph anomaly detection. arXiv:2402.11887. Retrieved from https:\/\/arxiv.org\/abs\/2402.11887"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.88"},{"issue":"3","key":"e_1_3_2_35_2","first-page":"83","article-title":"Agglomerative hierarchical clustering algorithm\u2014A review","volume":"3","author":"Sasirekha K.","year":"2013","unstructured":"K. Sasirekha and P. Baby. 2013. Agglomerative hierarchical clustering algorithm\u2014A review. International Journal of Scientific and Research Publications 3, 3 (2013), 83.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379473"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1009"},{"key":"e_1_3_2_38_2","first-page":"29628","article-title":"GADBench: Revisiting and benchmarking supervised graph anomaly detection","volume":"36","author":"Tang Jianheng","year":"2024","unstructured":"Jianheng Tang, Fengrui Hua, Ziqi Gao, Peilin Zhao, and Jia Li. 2024. GADBench: Revisiting and benchmarking supervised graph anomaly detection. In Proceedings of the Advances in Neural Information Processing Systems, Vol. 36, 29628\u201329653.","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_39_2","first-page":"21076","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In Proceedings of the International Conference on Machine Learning, 21076\u201321089."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403062"},{"issue":"03","key":"e_1_3_2_42_2","first-page":"2697","article-title":"Isolation distributional kernel: A new tool for point and group anomaly detections","volume":"35","author":"Ting Kai Ming","year":"2023","unstructured":"Kai Ming Ting, Bi-Cun Xu, Takashi Washio, and Zhi-Hua Zhou. 2023. Isolation distributional kernel: A new tool for point and group anomaly detections. IEEE Transactions on Knowledge and Data Engineering 35, 03 (2023), 2697\u20132710.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_43_2","first-page":"6436","article-title":"Wasserstein Weisfeiler\u2013Lehman graph kernels","volume":"32","author":"Togninalli Matteo","year":"2019","unstructured":"Matteo Togninalli, Elisabetta Ghisu, Felipe Llinares-L\u00f3pez, Bastian Rieck, and Karsten Borgwardt. 2019. Wasserstein Weisfeiler\u2013Lehman graph kernels. In Proceedings of the Advances in Neural Information Processing Systems, Vol. 32, 6436\u20136446.","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"issue":"11","key":"e_1_3_2_44_2","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten Laurens","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 11 (2008), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_45_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Veli\u010dkovi\u0107 Petar","year":"2018","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li\u00f2, and Yoshua Bengio. 2018. Graph attention networks. In Proceedings of the 6th International Conference on Learning Representations."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05924-9"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220024"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Jiaqiang Zhang Senzhang Wang and Songcan Chen. 2022. Reconstruction enhanced multi-view contrastive learning for anomaly detection on attributed networks. arXiv:2205.04816. Retrieved from https:\/\/arxiv.org\/abs\/2205.04816","DOI":"10.24963\/ijcai.2022\/330"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401165"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3119326"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch79"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T11:02:47Z","timestamp":1753095767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,21]]},"references-count":50,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,7,31]]}},"alternative-id":["10.1145\/3723007"],"URL":"https:\/\/doi.org\/10.1145\/3723007","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2025,7,21]]},"assertion":[{"value":"2024-04-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}