{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:02:48Z","timestamp":1775815368998,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","funder":[{"name":"Specific Research Project of Guangxi for Research Bases and Talents","award":["GuiKe AD24010011"],"award-info":[{"award-number":["GuiKe AD24010011"]}]},{"DOI":"10.13039\/501100018571","name":"Key Research & Development Program Project of Guangxi","doi-asserted-by":"publisher","award":["GuiKe AB25069095"],"award-info":[{"award-number":["GuiKe AB25069095"]}],"id":[{"id":"10.13039\/501100018571","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3761125","type":"proceedings-article","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:29:28Z","timestamp":1762561768000},"page":"4379-4389","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["FreeGAD: A Training-Free yet Effective Approach for Graph Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5482-4454","authenticated-orcid":false,"given":"Yunfeng","family":"Zhao","sequence":"first","affiliation":[{"name":"Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4309-5076","authenticated-orcid":false,"given":"Yixin","family":"Liu","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4381-7497","authenticated-orcid":false,"given":"Shiyuan","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5506-8913","authenticated-orcid":false,"given":"Qingfeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0757-4210","authenticated-orcid":false,"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-527X","authenticated-orcid":false,"given":"Shirui","family":"Pan","sequence":"additional","affiliation":[{"name":"Griffith University, Gold Coast, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125216"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"e_1_3_2_1_4_1","volume-title":"Boosting Graph Anomaly Detection with Adaptive Message Passing. In The Twelfth International Conference on Learning Representations.","author":"Chen Jingyan","year":"2024","unstructured":"Jingyan Chen, Guanghui Zhu, Chunfeng Yuan, and Yihua Huang. 2024. Boosting Graph Anomaly Detection with Adaptive Message Passing. In The Twelfth International Conference on Learning Representations."},{"key":"e_1_3_2_1_5_1","volume-title":"Uncertainty-Aware Graph Neural Networks: A Multihop Evidence Fusion Approach","author":"Chen Qingfeng","year":"2025","unstructured":"Qingfeng Chen, Shiyuan Li, Yixin Liu, Shirui Pan, Geoffrey I Webb, and Shichao Zhang. 2025a. Uncertainty-Aware Graph Neural Networks: A Multihop Evidence Fusion Approach. IEEE Transactions on Neural Networks and Learning Systems (2025)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330925"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053387"},{"key":"e_1_3_2_1_9_1","volume-title":"Predict then propagate: Graph neural networks meet personalized pagerank. arXiv preprint arXiv:1810.05997","author":"Gasteiger Johannes","year":"2018","unstructured":"Johannes Gasteiger, Aleksandar Bojchevski, and Stephan G\u00fcnnemann. 2018. Predict then propagate: Graph neural networks meet personalized pagerank. arXiv preprint arXiv:1810.05997 (2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_11_1","volume-title":"Joint European conference on machine learning and knowledge discovery in databases. Springer, 225-241","author":"Huang Tianjin","year":"2022","unstructured":"Tianjin Huang, Yulong Pei, Vlado Menkovski, and Mykola Pechenizkiy. 2022. Hop-count based self-supervised anomaly detection on attributed networks. In Joint European conference on machine learning and knowledge discovery in databases. Springer, 225-241."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00197"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025685"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482057"},{"key":"e_1_3_2_1_15_1","volume-title":"Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907","author":"Kipf TN","year":"2016","unstructured":"TN Kipf. 2016. Semi-Supervised Classification with Graph Convolutional Networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/299"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679758"},{"key":"e_1_3_2_1_19_1","volume-title":"Assemble your crew: Automatic multi-agent communication topology design via autoregressive graph generation. arXiv preprint arXiv:2507.18224","author":"Li Shiyuan","year":"2025","unstructured":"Shiyuan Li, Yixin Liu, Qingsong Wen, Chengqi Zhang, and Shirui Pan. 2025. Assemble your crew: Automatic multi-agent communication topology design via autoregressive graph generation. arXiv preprint arXiv:2507.18224 (2025)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358074"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Pygod: A python library for graph outlier detection","volume":"25","author":"Liu Kay","year":"2024","unstructured":"Kay Liu, Yingtong Dou, Xueying Ding, Xiyang Hu, Ruitong Zhang, Hao Peng, Lichao Sun, and Philip S Yu. 2024b. Pygod: A python library for graph outlier detection. Journal of Machine Learning Research, Vol. 25, 141 (2024), 1-9.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_22_1","first-page":"27021","article-title":"Bond: Benchmarking unsupervised outlier node detection on static attributed graphs","volume":"35","author":"Liu Kay","year":"2022","unstructured":"Kay Liu, Yingtong Dou, Yue Zhao, Xueying Ding, Xiyang Hu, Ruitong Zhang, Kaize Ding, Canyu Chen, Hao Peng, Kai Shu, et al., 2022. Bond: Benchmarking unsupervised outlier node detection on static attributed graphs. Advances in Neural Information Processing Systems, Vol. 35 (2022), 27021-27035.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679829"},{"key":"e_1_3_2_1_24_1","first-page":"50772","article-title":"Arc: A generalist graph anomaly detector with in-context learning","volume":"37","author":"Liu Yixin","year":"2024","unstructured":"Yixin Liu, Shiyuan Li, Yu Zheng, Qingfeng Chen, Chengqi Zhang, and Shirui Pan. 2024c. Arc: A generalist graph anomaly detector with in-context learning. Advances in Neural Information Processing Systems, Vol. 37 (2024), 50772-50804.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"e_1_3_2_1_26_1","volume-title":"Graph-Augmented Large Language Model Agents: Current Progress and Future Prospects. arXiv preprint arXiv:2507.21407","author":"Liu Yixin","year":"2025","unstructured":"Yixin Liu, Guibin Zhang, Kun Wang, Shiyuan Li, and Shirui Pan. 2025. Graph-Augmented Large Language Model Agents: Current Progress and Future Prospects. arXiv preprint arXiv:2507.21407 (2025)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488466"},{"key":"e_1_3_2_1_29_1","volume-title":"BlindGuard: Safeguarding LLM-based Multi-Agent Systems under Unknown Attacks. arXiv preprint arXiv:2508.08127","author":"Miao Rui","year":"2025","unstructured":"Rui Miao, Yixin Liu, Yili Wang, Xu Shen, Yue Tan, Yiwei Dai, Shirui Pan, and Xin Wang. 2025. BlindGuard: Safeguarding LLM-based Multi-Agent Systems under Unknown Attacks. arXiv preprint arXiv:2508.08127 (2025)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i12.33356"},{"key":"e_1_3_2_1_31_1","volume-title":"PREM: A Simple Yet Effective Approach for Node-Level Graph Anomaly Detection. In 2023 IEEE International Conference on Data Mining (ICDM). IEEE, 1253-1258","author":"Pan Junjun","year":"2023","unstructured":"Junjun Pan, Yixin Liu, Yizhen Zheng, and Shirui Pan. 2023. PREM: A Simple Yet Effective Approach for Node-Level Graph Anomaly Detection. In 2023 IEEE International Conference on Data Mining (ICDM). IEEE, 1253-1258."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/488"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.24"},{"key":"e_1_3_2_1_34_1","volume-title":"A critical look at the evaluation of GNNs under heterophily: Are we really making progress? arXiv preprint arXiv:2302.11640","author":"Platonov Oleg","year":"2023","unstructured":"Oleg Platonov, Denis Kuznedelev, Michael Diskin, Artem Babenko, and Liudmila Prokhorenkova. 2023. A critical look at the evaluation of GNNs under heterophily: Are we really making progress? arXiv preprint arXiv:2302.11640 (2023)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113303"},{"key":"e_1_3_2_1_36_1","first-page":"49490","article-title":"Truncated affinity maximization: One-class homophily modeling for graph anomaly detection","volume":"36","author":"Qiao Hezhe","year":"2023","unstructured":"Hezhe Qiao and Guansong Pang. 2023. Truncated affinity maximization: One-class homophily modeling for graph anomaly detection. Advances in Neural Information Processing Systems, Vol. 36 (2023), 49490-49512.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_37_1","volume-title":"Deep graph anomaly detection: A survey and new perspectives. arXiv preprint arXiv:2409.09957","author":"Qiao Hezhe","year":"2024","unstructured":"Hezhe Qiao, Hanghang Tong, Bo An, Irwin King, Charu Aggarwal, and Guansong Pang. 2024. Deep graph anomaly detection: A survey and new perspectives. arXiv preprint arXiv:2409.09957 (2024)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_2_1_39_1","volume-title":"Collective classification in network data. AI magazine","author":"Sen Prithviraj","year":"2008","unstructured":"Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective classification in network data. AI magazine, Vol. 29, 3 (2008), 93-93."},{"key":"e_1_3_2_1_40_1","volume-title":"Understanding the Information Propagation Effects of Communication Topologies in LLM-based Multi-Agent Systems. arXiv preprint arXiv:2505.23352","author":"Shen Xu","year":"2025","unstructured":"Xu Shen, Yixin Liu, Yiwei Dai, Yili Wang, Rui Miao, Yue Tan, Shirui Pan, and Xin Wang. 2025. Understanding the Information Propagation Effects of Communication Topologies in LLM-based Multi-Agent Systems. arXiv preprint arXiv:2505.23352 (2025)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3025110"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6048"},{"key":"e_1_3_2_1_43_1","first-page":"29628","article-title":"Gadbench: Revisiting and benchmarking supervised graph anomaly detection","volume":"36","author":"Tang Jianheng","year":"2023","unstructured":"Jianheng Tang, Fengrui Hua, Ziqi Gao, Peilin Zhao, and Jia Li. 2023. Gadbench: Revisiting and benchmarking supervised graph anomaly detection. Advances in Neural Information Processing Systems, Vol. 36 (2023), 29628-29653.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_44_1","volume-title":"International Conference on Machine Learning. PMLR, 21076-21089","author":"Tang Jianheng","year":"2022","unstructured":"Jianheng Tang, Jiajin Li, Ziqi Gao, and Jia Li. 2022. Rethinking graph neural networks for anomaly detection. In International Conference on Machine Learning. PMLR, 21076-21089."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557109"},{"key":"e_1_3_2_1_46_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_47_1","volume-title":"Claudio Bellei, Tom Robinson, and Charles E Leiserson.","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I Weidele, Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)."},{"key":"e_1_3_2_1_48_1","volume-title":"International conference on machine learning. PMLR, 6861-6871","author":"Wu Felix","year":"2019","unstructured":"Felix Wu, Amauri Souza, Tianyi Zhang, Christopher Fifty, Tao Yu, and Kilian Weinberger. 2019. Simplifying graph convolutional networks. In International conference on machine learning. PMLR, 6861-6871."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the twenty-ninth international conference on international joint conferences on artificial intelligence. 1417-1423","author":"Yang Xiaoyu","year":"2021","unstructured":"Xiaoyu Yang, Yuefei Lyu, Tian Tian, Yifei Liu, Yudong Liu, and Xi Zhang. 2021. Rumor detection on social media with graph structured adversarial learning. In Proceedings of the twenty-ninth international conference on international joint conferences on artificial intelligence. 1417-1423."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539374"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3119326"}],"event":{"name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","location":"Seoul Republic of Korea","acronym":"CIKM '25","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T01:46:33Z","timestamp":1765503993000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3761125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":53,"alternative-id":["10.1145\/3746252.3761125","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3761125","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}