{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:06:41Z","timestamp":1769548001205,"version":"3.49.0"},"reference-count":38,"publisher":"Tsinghua University Press","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Big Data Min. Anal."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.26599\/bdma.2025.9020012","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:44:53Z","timestamp":1752515093000},"page":"1075-1091","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection Using Graph Anomaly Rules"],"prefix":"10.26599","volume":"8","author":[{"given":"Bowen","family":"Dong","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University,Tianjin,China,300072"}]},{"given":"Wenjun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University,Tianjin,China,300072"}]},{"given":"Lifei","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University,Tianjin,China,300072"}]},{"given":"Xueli","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University,Tianjin,China,300072"}]},{"given":"Zhenzhen","family":"Mai","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University,Tianjin,China,300072"}]}],"member":"11138","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2019.00002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz718"},{"key":"ref3","first-page":"990","article-title":"Arnet Miner: Extraction and mining of academic social networks","volume-title":"Proc. 14th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining","author":"Tang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482195"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00072"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/261"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5572-1_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290964"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3609333"},{"key":"ref11","article-title":"Towards self-interpretable graph-level anomaly detection","author":"Liu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5409"},{"key":"ref13","first-page":"410","article-title":"Odd Ball: Spotting anomalies in weighted graphs","volume-title":"Proc. 14th Pacific-Asia Conf. Advances in Knowledge Discovery and Data Mining","author":"Akoglu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339670"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939747"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371788"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614857"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106463"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915232"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3287285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183753"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/3317315.3317318"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882937"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380585"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407795"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00075"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"ref31","volume-title":"Communication and Concurrency","author":"Milner","year":"1989"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2528937"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2508020.2489791"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492576"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920878"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557109"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2025.3540392"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2327058"}],"container-title":["Big Data Mining and Analytics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8254253\/11080149\/11080194.pdf?arnumber=11080194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:44:38Z","timestamp":1752601478000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11080194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":38,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.26599\/bdma.2025.9020012","relation":{},"ISSN":["2096-0654","2097-406X"],"issn-type":[{"value":"2096-0654","type":"print"},{"value":"2097-406X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}