{"id":"https://openalex.org/W4414603502","doi":"https://doi.org/10.1109/tkde.2025.3613344","title":"Address Anomalies at Critical Crossroads for Graph Anomaly Detection","display_name":"Address Anomalies at Critical Crossroads for Graph Anomaly Detection","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4414603502","doi":"https://doi.org/10.1109/tkde.2025.3613344"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2025.3613344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3613344","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020918907","display_name":"Junyi Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junyi Yan","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047166646","display_name":"Enguang Zuo","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Enguang Zuo","raw_affiliation_strings":["Department of Electronic Engineering, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009525613","display_name":"Ke Liang","orcid":"https://orcid.org/0000-0002-4837-455X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Liang","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100457574","display_name":"Meng Liu","orcid":"https://orcid.org/0000-0003-3900-4204"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Liu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461526","display_name":"Miaomiao Li","orcid":"https://orcid.org/0000-0001-7678-687X"},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miaomiao Li","raw_affiliation_strings":["College of Electronic Information and Electrical Engineering, Changsha University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Information and Electrical Engineering, Changsha University, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101727888","display_name":"Xinwang Liu","orcid":"https://orcid.org/0000-0001-9066-1475"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinwang Liu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaoyi Lv","orcid":"https://orcid.org/0000-0001-6855-7428"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyi Lv","raw_affiliation_strings":["School of Software, Xinjiang University, Urumqi, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Xinjiang University, Urumqi, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kai Lu","orcid":"https://orcid.org/0000-0003-2284-7897"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Lu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5020918907"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13702364,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"12","first_page":"6877","last_page":"6890"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6733999848365784},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4986000061035156},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4796999990940094},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.47119998931884766},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.43950000405311584},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.40529999136924744},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3919000029563904},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3725999891757965},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.36910000443458557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112999796867371},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6733999848365784},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5558000206947327},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4986000061035156},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4796999990940094},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.47119998931884766},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.43950000405311584},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.40529999136924744},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3725999891757965},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.36910000443458557},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3578000068664551},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.34360000491142273},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3400000035762787},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.33570000529289246},{"id":"https://openalex.org/C116409475","wikidata":"https://www.wikidata.org/wiki/Q1385056","display_name":"External Data Representation","level":2,"score":0.33149999380111694},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32519999146461487},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2881999909877777},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C143271835","wikidata":"https://www.wikidata.org/wiki/Q254515","display_name":"Similitude","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2025.3613344","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3613344","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2277931485","display_name":null,"funder_award_id":"62421002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2455478723","display_name":null,"funder_award_id":"62276271","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G392162762","display_name":null,"funder_award_id":"62506371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5729763073","display_name":null,"funder_award_id":"62325604","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6562299470","display_name":null,"funder_award_id":"62441618","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W2046253692","https://openalex.org/W2089554624","https://openalex.org/W2133299088","https://openalex.org/W2153959628","https://openalex.org/W2808544127","https://openalex.org/W2943860728","https://openalex.org/W2944250323","https://openalex.org/W2954152666","https://openalex.org/W2998496395","https://openalex.org/W3015799890","https://openalex.org/W3034122135","https://openalex.org/W3081203761","https://openalex.org/W3133518153","https://openalex.org/W3192436896","https://openalex.org/W3198839083","https://openalex.org/W3203965336","https://openalex.org/W3206326321","https://openalex.org/W3206604724","https://openalex.org/W3209441117","https://openalex.org/W3210350882","https://openalex.org/W4205942400","https://openalex.org/W4213448848","https://openalex.org/W4221166060","https://openalex.org/W4281955767","https://openalex.org/W4283796272","https://openalex.org/W4285194161","https://openalex.org/W4289533805","https://openalex.org/W4298371664","https://openalex.org/W4312251623","https://openalex.org/W4321485229","https://openalex.org/W4322706754","https://openalex.org/W4324116430","https://openalex.org/W4362681502","https://openalex.org/W4367047347","https://openalex.org/W4375798894","https://openalex.org/W4380303532","https://openalex.org/W4382239148","https://openalex.org/W4382318469","https://openalex.org/W4385270355","https://openalex.org/W4385825792","https://openalex.org/W4386172495","https://openalex.org/W4388430454","https://openalex.org/W4394994664","https://openalex.org/W4398787710","https://openalex.org/W4400910532","https://openalex.org/W4402302050","https://openalex.org/W4408441345","https://openalex.org/W4409364445","https://openalex.org/W4411550850","https://openalex.org/W4413277726"],"related_works":[],"abstract_inverted_index":{"Graph":[0],"anomaly":[1,190],"detection":[2,191],"(GAD)":[3],"on":[4,125,164,177],"attributed":[5],"networks":[6],"aims":[7],"to":[8,34,116,133,138,171],"capture":[9],"abnormal":[10,32,51,82],"nodes":[11,33,52,69],"whose":[12],"attributes":[13],"or":[14],"structures":[15],"differ":[16],"significantly":[17],"from":[18],"most":[19],"nodes.":[20],"The":[21,193],"existing":[22],"GAD":[23],"models":[24,45],"amplify":[25],"the":[26,47,59,65,77,81,112,121,130,140,144,150,154,159,169],"representation":[27],"differences":[28],"between":[29],"normal":[30],"and":[31,76,128,153,188],"identify":[35],"anomalies":[36,60],"via":[37],"carefully":[38],"designed":[39],"feature":[40],"extraction":[41],"modules.":[42],"However,":[43],"these":[44],"ignore":[46],"bottlenecks":[48],"encountered":[49],"by":[50,97,143],"in":[53],"message":[54,186],"passing.":[55],"In":[56,136],"particular,":[57],"when":[58],"occurs":[61],"at":[62,198],"critical":[63,126],"crossroads,":[64,127],"information":[66],"of":[67,149],"multiple":[68],"is":[70,196],"compressed":[71],"into":[72],"a":[73],"fixed-length":[74],"representation,":[75],"resulting":[78],"over-squashing":[79],"weakens":[80],"information.":[83],"To":[84],"address":[85],"this,":[86],"we":[87,104,157],"propose":[88],"an":[89],"unsupervised":[90],"<bold":[91],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[92,99,200],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><u>ST</u></b>ructural":[93],"optimization":[94],"model":[95,170],"guided":[96],"s<bold":[98],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><u>IM</u></b>ilarity":[100],"reconstruction":[101],"(STIM).":[102],"Specifically,":[103],"define":[105],"redundant":[106,118],"edges":[107,119],"that":[108,181],"cause":[109],"over-squashing,":[110],"design":[111,158],"Neighbor-Structure":[113],"Optimization":[114],"module":[115,162],"filter":[117],"through":[120],"edge-dropping":[122,155],"strategy":[123],"based":[124,163],"optimize":[129,185],"graph":[131],"structure":[132],"alleviate":[134,139],"over-squashing.":[135],"addition,":[137],"over-smoothing":[141],"caused":[142],"high":[145],"inter-class":[146,173],"node":[147],"similarity":[148,165],"data":[151],"itself":[152],"strategy,":[156],"Neighbor-Similarity":[160],"Reconstruction":[161],"calculation,":[166],"which":[167],"guides":[168],"expand":[172],"variation.":[174],"Extensive":[175],"experiments":[176],"benchmark":[178],"datasets":[179],"show":[180],"STIM":[182],"can":[183],"effectively":[184],"passing":[187],"improve":[189],"performance.":[192],"source":[194],"code":[195],"available":[197],"<uri":[199],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/Junyi-Yan/STIM</uri>.":[201]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
