{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:50:21Z","timestamp":1777017021726,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799843","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"115-123","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Flex-GAD : Flexible Graph Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0821-3272","authenticated-orcid":false,"given":"Apu","family":"Chakraborty","sequence":"first","affiliation":[{"name":"IIT Bhilai, Durg, Chhattisgarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4230-8877","authenticated-orcid":false,"given":"Anshul","family":"Kumar","sequence":"additional","affiliation":[{"name":"IIT Bhilai, Durg, Chhattisgarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8568-2949","authenticated-orcid":false,"given":"Gagan Raj","family":"Gupta","sequence":"additional","affiliation":[{"name":"IIT Bhilai, Durg, Chhattisgarh, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371788"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371800"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412070"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"e_1_3_3_2_7_2","unstructured":"Jolly Ehiabhi and Haifeng Wang. 2022. An Unsupervised Anomaly Detection Model for Multivariate Time Series Data."},{"key":"e_1_3_3_2_8_2","unstructured":"Beno\u00eet\u00a0Corsini et al.2021. Self-Supervised Anomaly Detection in Static Attributed Graphs. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2103.06316 (2021)."},{"key":"e_1_3_3_2_9_2","volume-title":"Proceedings of the 34th Conference on Neural Information Processing Systems (NeurIPS)","author":"al. Gabriele\u00a0Corso et","year":"2020","unstructured":"Gabriele\u00a0Corso et al.2020. Principal Neighbourhood Aggregation for Graph Nets. In Proceedings of the 34th Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_3_2_10_2","volume-title":"Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI)","author":"al. Haoyi\u00a0Fan et","year":"2020","unstructured":"Haoyi\u00a0Fan et al.2020. Anomalydae: Dual autoencoder for attributed network anomaly detection with data augmentation. In Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI)."},{"key":"e_1_3_3_2_11_2","volume-title":"Proceedings of the 2021 IEEE International Conference on Big Data (Big Data)","author":"al. Haoyi\u00a0Fan et","year":"2021","unstructured":"Haoyi\u00a0Fan et al.2021. ANOMALYDAE: Dual Autoencoder for Anomaly Detection on Attributed Networks. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data)."},{"key":"e_1_3_3_2_12_2","volume-title":"Proceedings of the SIAM International Conference on Data Mining (SDM)","author":"al. Kaize\u00a0Ding et","year":"2019","unstructured":"Kaize\u00a0Ding et al.2019. Deep Anomaly Detection on Attributed Networks. In Proceedings of the SIAM International Conference on Data Mining (SDM). SIAM."},{"key":"e_1_3_3_2_13_2","volume-title":"Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM)","author":"al. Yingtong\u00a0Dou et","year":"2020","unstructured":"Yingtong\u00a0Dou et al.2020. Enhancing Graph Neural Network-Based Fraud Detectors Against Camouflaged Fraudsters. In Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM)."},{"key":"e_1_3_3_2_14_2","unstructured":"Yuan Gao Xiang Wang Xiangnan He Huamin Feng and Yongdong Zhang. 2022. Rumor Detection with Self-supervised Learning on Texts and Social Graph. arXiv:https:\/\/arXiv.org\/abs\/2204.08838\u00a0[cs.SI] https:\/\/arxiv.org\/abs\/2204.08838"},{"key":"e_1_3_3_2_15_2","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2016. Variational Graph Auto-Encoders. arXiv:https:\/\/arXiv.org\/abs\/1611.07308\u00a0[stat.ML] https:\/\/arxiv.org\/abs\/1611.07308"},{"key":"e_1_3_3_2_16_2","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. arXiv:https:\/\/arXiv.org\/abs\/1609.02907\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/1609.02907"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/299"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Fei\u00a0Tony Liu Kai\u00a0Ming Ting and Zhi-Hua Zhou. 2012. Isolation-Based Anomaly Detection. ACM Trans. Knowl. Discov. Data 6 1 Article 3 (mar 2012) 39\u00a0pages. 10.1145\/2133360.2133363","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_3_2_19_2","unstructured":"Kay Liu Yingtong Dou Yue Zhao Xueying Ding Xiyang Hu Ruitong Zhang Kaize Ding Canyu Chen Hao Peng Kai Shu Lichao Sun Jundong Li George\u00a0H. Chen Zhihao Jia and Philip\u00a0S. Yu. 2022. BOND: Benchmarking Unsupervised Outlier Node Detection on Static Attributed Graphs. arXiv:https:\/\/arXiv.org\/abs\/2206.10071\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2206.10071"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Yixin Liu Zhao Li Shirui Pan Chen Gong Chuan Zhou and George Karypis. 2022. Anomaly Detection on Attributed Networks via Contrastive Self-Supervised Learning. IEEE Transactions on Neural Networks and Learning Systems 33 6 (2022) 2378\u20132392. 10.1109\/TNNLS.2021.3068344","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498389"},{"key":"e_1_3_3_2_22_2","unstructured":"Guansong Pang Chunhua Shen and Anton van\u00a0den Hengel. 2019. Deep Anomaly Detection with Deviation Networks. arXiv:https:\/\/arXiv.org\/abs\/1911.08623\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/1911.08623"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/488"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Zhen Peng Minnan Luo Jundong Li Luguo Xue and Qinghua Zheng. 2022. A Deep Multi-View Framework for Anomaly Detection on Attributed Networks. IEEE Transactions on Knowledge and Data Engineering 34 6 (2022) 2539\u20132552. 10.1109\/TKDE.2020.3015098","DOI":"10.1109\/TKDE.2020.3015098"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3616855.3635767"},{"key":"e_1_3_3_2_26_2","unstructured":"T.\u00a0Konstantin Rusch Michael\u00a0M. Bronstein and Siddhartha Mishra. 2023. A Survey on Oversmoothing in Graph Neural Networks. arXiv:https:\/\/arXiv.org\/abs\/2303.10993\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2303.10993"},{"key":"e_1_3_3_2_27_2","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N. Gomez Lukasz Kaiser and Illia Polosukhin. 2023. Attention Is All You Need. arXiv:https:\/\/arXiv.org\/abs\/1706.03762\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/1706.03762"},{"key":"e_1_3_3_2_28_2","unstructured":"Xinyi Wu Amir Ajorlou Zihui Wu and Ali Jadbabaie. 2024. Demystifying Oversmoothing in Attention-Based Graph Neural Networks. arXiv:https:\/\/arXiv.org\/abs\/2305.16102\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2305.16102"},{"key":"e_1_3_3_2_29_2","unstructured":"Keyulu Xu Weihua Hu Jure Leskovec and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks? arXiv:https:\/\/arXiv.org\/abs\/1810.00826\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/1810.00826"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281280"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05936-0_35"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671990"},{"key":"e_1_3_3_2_33_2","unstructured":"Jiawei Zhang and Lin Meng. 2019. GResNet: Graph Residual Network for Reviving Deep GNNs from Suspended Animation. arXiv:https:\/\/arXiv.org\/abs\/1909.05729\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/1909.05729"},{"key":"e_1_3_3_2_34_2","unstructured":"Yu Zheng Ming Jin Yixin Liu Lianhua Chi Khoa\u00a0T. Phan and Yi-Ping\u00a0Phoebe Chen. 2024. From Unsupervised to Few-shot Graph Anomaly Detection: A Multi-scale Contrastive Learning Approach. arXiv:https:\/\/arXiv.org\/abs\/2202.05525\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2202.05525"}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:21:22Z","timestamp":1777015282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":33,"alternative-id":["10.1145\/3799830.3799843","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799843","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}