{"id":"https://openalex.org/W4321521181","doi":"https://doi.org/10.1145/3539597.3572989","title":"From Classic GNNs to Hyper-GNNs for Detecting Camouflaged Malicious Actors","display_name":"From Classic GNNs to Hyper-GNNs for Detecting Camouflaged Malicious Actors","publication_year":2023,"publication_date":"2023-02-22","ids":{"openalex":"https://openalex.org/W4321521181","doi":"https://doi.org/10.1145/3539597.3572989"},"language":"en","primary_location":{"id":"doi:10.1145/3539597.3572989","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3539597.3572989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054873024","display_name":"Venus Haghighi","orcid":"https://orcid.org/0000-0002-5036-8984"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Venus Haghighi","raw_affiliation_strings":["Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5054873024"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":1.7394,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86182941,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1220","last_page":"1221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9509999752044678,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9509999752044678,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10565","display_name":"Psychopathy, Forensic Psychiatry, Sexual Offending","score":0.9154000282287598,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.9293659925460815},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122333288192749},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5122672915458679},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4792340099811554},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.44695624709129333},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.43777161836624146},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4320544898509979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4233006238937378},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.22032690048217773}],"concepts":[{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.9293659925460815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122333288192749},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5122672915458679},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4792340099811554},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.44695624709129333},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.43777161836624146},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4320544898509979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4233006238937378},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.22032690048217773},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3539597.3572989","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3539597.3572989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W3093814892","https://openalex.org/W3100646853","https://openalex.org/W3128443161","https://openalex.org/W4206991245","https://openalex.org/W4224310669"],"related_works":["https://openalex.org/W2978048274","https://openalex.org/W2348329006","https://openalex.org/W2379031960","https://openalex.org/W2376458710","https://openalex.org/W2231217681","https://openalex.org/W2914759737","https://openalex.org/W2984158411","https://openalex.org/W4253283976","https://openalex.org/W4231347762","https://openalex.org/W374553806"],"abstract_inverted_index":{"Graph":[0],"neural":[1,108],"networks":[2,109],"(GNNs),":[3],"which":[4,90],"extend":[5],"deep":[6],"learning":[7],"models":[8,26,41,67,93],"to":[9,29,55,71,84,94,111],"graph-structured":[10],"data,":[11],"have":[12],"achieved":[13],"great":[14],"success":[15],"in":[16],"many":[17],"applications":[18],"such":[19],"as":[20],"detecting":[21],"malicious":[22,33,77,121],"activities.":[23],"However,":[24],"GNN-based":[25,40,66,92],"are":[27],"vulnerable":[28],"camouflage":[30,96],"behavior":[31,97],"of":[32,38,98,119],"actors,":[34],"i.e.,":[35],"the":[36,64],"performance":[37],"existing":[39,65],"has":[42],"been":[43],"hindered":[44],"significantly.":[45],"In":[46,79],"this":[47,57,80],"research":[48,53,102],"proposal,":[49],"we":[50,82],"follow":[51],"two":[52],"directions":[54],"address":[56],"challenge.":[58],"One":[59],"direction":[60,103],"focuses":[61],"on":[62,105],"enhancing":[63],"and":[68,75],"enabling":[69],"them":[70],"identify":[72],"both":[73],"camouflaged":[74,120],"non-camouflaged":[76],"actors.":[78,122],"regard,":[81],"propose":[83],"explore":[85],"an":[86],"adaptive":[87],"aggregation":[88],"strategy,":[89],"empowers":[91],"handle":[95],"fraudsters.":[99],"The":[100],"other":[101],"concentrates":[104],"leveraging":[106],"hypergraph":[107],"(hyper-GNNs)":[110],"learn":[112],"nodes'":[113],"representation":[114],"for":[115],"more":[116],"effective":[117],"identification":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
