{"id":"https://openalex.org/W7117317549","doi":"https://doi.org/10.1109/tifs.2025.3647221","title":"Learning Subgraph-Based Normality for Interpretable Graph-Level Anomaly Detection","display_name":"Learning Subgraph-Based Normality for Interpretable Graph-Level Anomaly Detection","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117317549","doi":"https://doi.org/10.1109/tifs.2025.3647221"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3647221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3647221","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066698067","display_name":"Ge Zhang","orcid":"https://orcid.org/0000-0001-6009-780X"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ge Zhang","raw_affiliation_strings":["School of Information and Intelligent Science, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Intelligent Science, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121302983","display_name":"Zhenyu Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhenyu Yang","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121335300","display_name":"Jia Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jia Wu","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101756116","display_name":"Pengfei Jiao","orcid":"https://orcid.org/0000-0002-8005-0707"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Jiao","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111085513","display_name":"Jian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jian Yang","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121338590","display_name":"Hao Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Peng","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101641900","display_name":"Xixun Lin","orcid":"https://orcid.org/0009-0004-6645-0597"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xixun Lin","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5066698067"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81915127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"288","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9517999887466431,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9517999887466431,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.024399999529123306,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13702","display_name":"Machine Learning in Healthcare","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8690999746322632},{"id":"https://openalex.org/keywords/normality","display_name":"Normality","score":0.6322000026702881},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6208000183105469},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5087000131607056},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4936000108718872},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.49000000953674316},{"id":"https://openalex.org/keywords/subgraph-isomorphism-problem","display_name":"Subgraph isomorphism problem","score":0.40290001034736633},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.3382999897003174}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8690999746322632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577000260353088},{"id":"https://openalex.org/C2776157432","wikidata":"https://www.wikidata.org/wiki/Q1375683","display_name":"Normality","level":2,"score":0.6322000026702881},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6208000183105469},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5087000131607056},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4936000108718872},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.49000000953674316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4765999913215637},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4530999958515167},{"id":"https://openalex.org/C131992880","wikidata":"https://www.wikidata.org/wiki/Q2528185","display_name":"Subgraph isomorphism problem","level":3,"score":0.40290001034736633},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3779999911785126},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.3382999897003174},{"id":"https://openalex.org/C106937863","wikidata":"https://www.wikidata.org/wiki/Q7236518","display_name":"Power graph analysis","level":3,"score":0.33149999380111694},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.3052000105381012},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C110893760","wikidata":"https://www.wikidata.org/wiki/Q3115590","display_name":"Named graph","level":5,"score":0.3019999861717224},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2639999985694885},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3647221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3647221","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W169140825","https://openalex.org/W2026653933","https://openalex.org/W2056562706","https://openalex.org/W2116448239","https://openalex.org/W2788919350","https://openalex.org/W2962810718","https://openalex.org/W2964311892","https://openalex.org/W2964321699","https://openalex.org/W3033892090","https://openalex.org/W3034090344","https://openalex.org/W3040266635","https://openalex.org/W3080290478","https://openalex.org/W3114932221","https://openalex.org/W3206604724","https://openalex.org/W3208688400","https://openalex.org/W4206593497","https://openalex.org/W4206912631","https://openalex.org/W4206991245","https://openalex.org/W4213224406","https://openalex.org/W4221145430","https://openalex.org/W4225163171","https://openalex.org/W4225977739","https://openalex.org/W4308671321","https://openalex.org/W4368232640","https://openalex.org/W4385815483","https://openalex.org/W4405304850","https://openalex.org/W4409671386","https://openalex.org/W4412196746","https://openalex.org/W4412877120","https://openalex.org/W7103750404"],"related_works":[],"abstract_inverted_index":{"Graph-level":[0],"anomaly":[1],"detection":[2,56,202],"(GLAD)":[3],"aims":[4],"to":[5,27,96,139],"identify":[6],"graphs":[7,99,124],"that":[8,76,83,102,103,150,195],"significantly":[9,197],"deviate":[10,107],"from":[11,100,108],"others":[12],"in":[13,122,177,201],"a":[14,73,126,130],"graph":[15,29,182],"dataset.":[16],"Existing":[17],"methods":[18,200],"predominantly":[19],"rely":[20],"on":[21,189],"standard":[22],"Graph":[23],"Neural":[24],"Networks":[25],"(GNNs)":[26],"learn":[28],"representations,":[30],"but":[31,58],"they":[32],"often":[33,104],"overlook":[34],"subgraph-level":[35],"information,":[36],"which":[37],"provides":[38],"essential":[39],"structural":[40],"and":[41,47,129,167,183,191],"semantic":[42],"cues":[43],"for":[44],"distinguishing":[45],"normal":[46,88,98,123],"anomalous":[48],"graphs.":[49,89],"This":[50],"limitation":[51],"not":[52],"only":[53,155],"compromises":[54],"the":[55,61,78,117,135,142,151,156,180],"performance":[57,203],"also":[59],"hinders":[60],"interpretability":[62],"of":[63,80,160],"GLAD":[64],"predictions.":[65],"To":[66],"address":[67],"these":[68,147],"challenges,":[69],"we":[70],"propose":[71],"NGLAD,":[72],"novel":[74],"framework":[75],"introduces":[77],"concept":[79],"normality-relevant":[81],"subgraphs":[82,91,136,153],"capture":[84],"shared":[85,118],"patterns":[86,120],"across":[87],"These":[90],"serve":[92],"as":[93],"key":[94],"indicators":[95],"distinguish":[97],"anomalies":[101,173],"lack":[105],"or":[106],"such":[109],"patterns.":[110],"During":[111,169],"model":[112],"training,":[113],"by":[114,174],"explicitly":[115],"modeling":[116],"subgraph":[119],"inherent":[121],"through":[125],"Subgraph":[127],"Extractor":[128],"Normality":[131],"Learner,":[132],"NGLAD":[133,171,196],"identifies":[134],"most":[137,157],"relevant":[138],"normality.":[140],"Leveraging":[141],"One-class":[143],"Information":[144],"Bottleneck":[145],"principle,":[146],"modules":[148],"ensure":[149],"extracted":[152,185],"retain":[154],"informative":[158],"features":[159],"normality":[161],"while":[162,204],"filtering":[163],"out":[164],"irrelevant":[165],"nodes":[166],"edges.":[168],"inference,":[170],"detects":[172],"evaluating":[175],"inconsistencies":[176],"representations":[178],"between":[179],"input":[181],"its":[184],"subgraph.":[186],"Extensive":[187],"evaluations":[188],"synthetic":[190],"real-world":[192],"datasets":[193],"demonstrate":[194],"outperforms":[198],"state-of-the-art":[199],"offering":[205],"interpretable":[206],"explanations.":[207]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-26T00:00:00"}
