{"id":"https://openalex.org/W3093773625","doi":"https://doi.org/10.1109/iscc50000.2020.9219684","title":"Anomaly Detection with Deep Graph Autoencoders on Attributed Networks","display_name":"Anomaly Detection with Deep Graph Autoencoders on Attributed Networks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093773625","doi":"https://doi.org/10.1109/iscc50000.2020.9219684","mag":"3093773625"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101091974","display_name":"Dali Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dali Zhu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043649466","display_name":"Yuchen Ma","orcid":"https://orcid.org/0000-0001-9520-2235"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchen Ma","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102790878","display_name":"Yinlong Liu","orcid":"https://orcid.org/0000-0002-5984-1299"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinlong Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101091974"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6795,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.77239201,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7350670099258423},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6839237213134766},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6765775084495544},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5818730592727661},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5455356240272522},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4727657437324524},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47076892852783203},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.46935945749282837},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45767778158187866},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4493086338043213},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.29607653617858887},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2764108180999756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7350670099258423},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6839237213134766},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6765775084495544},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5818730592727661},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5455356240272522},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4727657437324524},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47076892852783203},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.46935945749282837},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45767778158187866},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4493086338043213},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29607653617858887},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2764108180999756},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1492581097","https://openalex.org/W1522301498","https://openalex.org/W1888005072","https://openalex.org/W1904715515","https://openalex.org/W1983481354","https://openalex.org/W2032280284","https://openalex.org/W2079017595","https://openalex.org/W2090891622","https://openalex.org/W2097308346","https://openalex.org/W2108898793","https://openalex.org/W2129117219","https://openalex.org/W2134008243","https://openalex.org/W2134255060","https://openalex.org/W2144182447","https://openalex.org/W2147620601","https://openalex.org/W2338990760","https://openalex.org/W2393319904","https://openalex.org/W2396014138","https://openalex.org/W2415243320","https://openalex.org/W2519887557","https://openalex.org/W2554952599","https://openalex.org/W2583803680","https://openalex.org/W2621614835","https://openalex.org/W2741114205","https://openalex.org/W2808000122","https://openalex.org/W2963486145","https://openalex.org/W2964015378","https://openalex.org/W2964051675","https://openalex.org/W2964121744","https://openalex.org/W3011667710","https://openalex.org/W3105705953","https://openalex.org/W4239954780","https://openalex.org/W4322614756","https://openalex.org/W6631190155","https://openalex.org/W6726873649","https://openalex.org/W6730084236","https://openalex.org/W6748141922"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W3017266184","https://openalex.org/W3194885736","https://openalex.org/W3046391934","https://openalex.org/W4363671829","https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,29,77,128],"on":[2,138],"attributed":[3],"networks":[4],"aims":[5],"to":[6],"differentiate":[7],"rare":[8],"nodes":[9,49],"that":[10,41,142],"are":[11],"significantly":[12],"different":[13,56],"from":[14],"the":[15,44,61,82,99,103,106,114,119,131,145],"majority.":[16],"It":[17],"plays":[18],"an":[19,51],"important":[20],"role":[21],"in":[22,50,64,85],"various":[23,109],"practical":[24],"scenarios,":[25],"such":[26],"as":[27],"intrusion":[28],"and":[30,89,112,118],"fraud":[31],"detection.":[32],"However,":[33],"existing":[34],"graph-based":[35],"methods":[36],"mainly":[37],"adopt":[38],"shallow":[39],"models":[40],"cannot":[42],"capture":[43,81],"highly":[45],"non-linear":[46],"interactions":[47],"between":[48,116],"attribute":[52],"network":[53,104],"consisting":[54],"of":[55,102,108,134],"information":[57,101],"modalities.":[58],"To":[59],"tackle":[60],"above":[62],"issues,":[63],"this":[65],"paper,":[66],"we":[67],"propose":[68],"a":[69],"novel":[70],"deep":[71],"model":[72],"named":[73],"DeepAE":[74,143],"for":[75],"anomaly":[76,127],"which":[78],"(a)":[79],"can":[80],"high":[83],"non-linearity":[84],"both":[86],"topological":[87],"structure":[88],"nodal":[90],"attributes":[91],"through":[92],"graph":[93],"convolutional":[94],"autoencoder,":[95],"(b)":[96],"fully":[97],"exploits":[98],"intrinsic":[100],"with":[105],"description":[107],"proximities,":[110],"(c)":[111],"preserve":[113],"differences":[115],"anomalies":[117],"majority":[120],"by":[121,129],"applying":[122],"Laplacian":[123],"sharpening.":[124],"We":[125],"perform":[126],"measuring":[130],"reconstruction":[132],"errors":[133],"nodes.":[135],"Experimental":[136],"results":[137],"realworld":[139],"datasets":[140],"demonstrate":[141],"outperforms":[144],"stateof-art":[146],"baselines.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
