{"id":"https://openalex.org/W4401864185","doi":"https://doi.org/10.1145/3637528.3671929","title":"Graph Anomaly Detection with Few Labels: A Data-Centric Approach","display_name":"Graph Anomaly Detection with Few Labels: A Data-Centric Approach","publication_year":2024,"publication_date":"2024-08-24","ids":{"openalex":"https://openalex.org/W4401864185","doi":"https://doi.org/10.1145/3637528.3671929"},"language":"en","primary_location":{"id":"doi:10.1145/3637528.3671929","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3637528.3671929","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3637528.3671929","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3637528.3671929","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085139646","display_name":"Xiaoxiao Ma","orcid":"https://orcid.org/0000-0003-1270-4155"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Xiaoxiao Ma","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, New South Wales, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114859145","display_name":"Ruikun Li","orcid":"https://orcid.org/0009-0004-8654-8487"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ruikun Li","raw_affiliation_strings":["Business School, The University of Sydney, Sydney, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"Business School, The University of Sydney, Sydney, New South Wales, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049010710","display_name":"Fanzhen Liu","orcid":"https://orcid.org/0000-0002-4110-2893"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fanzhen Liu","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, New South Wales, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044455276","display_name":"Kaize Ding","orcid":"https://orcid.org/0000-0001-6684-6752"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaize Ding","raw_affiliation_strings":["Department of Statistics and Data Science, Northwestern University, Evanston, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"Department of Statistics and Data Science, Northwestern University, Evanston, Illinois, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009644404","display_name":"Jian Yang","orcid":"https://orcid.org/0000-0002-4408-1952"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jian Yang","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, New South Wales, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007475662","display_name":"Jia Wu","orcid":"https://orcid.org/0000-0002-1371-5801"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jia Wu","raw_affiliation_strings":["School of Computing, Macquarie University, Sydney, New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University, Sydney, New South Wales, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085139646"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":3.066,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92449797,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2153","last_page":"2164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6798458099365234},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6205124855041504},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5133063197135925},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3585706353187561},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3511376678943634},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.29517459869384766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6798458099365234},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6205124855041504},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5133063197135925},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3585706353187561},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3511376678943634},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29517459869384766}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3637528.3671929","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3637528.3671929","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3637528.3671929","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3637528.3671929","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3637528.3671929","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3637528.3671929","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8199999928474426,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401864185.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1978239142","https://openalex.org/W2022322548","https://openalex.org/W2064058256","https://openalex.org/W2089554624","https://openalex.org/W2944250323","https://openalex.org/W2945996535","https://openalex.org/W2963415211","https://openalex.org/W3068123808","https://openalex.org/W3093649180","https://openalex.org/W3102969158","https://openalex.org/W3129351934","https://openalex.org/W3133518153","https://openalex.org/W3134509497","https://openalex.org/W3156449551","https://openalex.org/W3206326321","https://openalex.org/W3206604724","https://openalex.org/W3209981603","https://openalex.org/W4226211505","https://openalex.org/W4280545892","https://openalex.org/W4285066127","https://openalex.org/W4318823263","https://openalex.org/W4321485229","https://openalex.org/W4367047347","https://openalex.org/W4396758724","https://openalex.org/W6790081443"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Anomalous":[0],"node":[1],"detection":[2,151],"in":[3,154,180],"a":[4,87,203],"static":[5],"graph":[6,42,58,111,149,181,195,205,240],"faces":[7],"significant":[8],"challenges":[9,29],"due":[10],"to":[11,32,108,123,194,208,217],"the":[12,17,55,70,76,81,98,109,136,142,155,164,173,178,199,237],"rarity":[13],"of":[14,20,57,69,83,144],"anomalies":[15,59],"and":[16,25,40,49,113,141,184],"substantial":[18],"cost":[19],"labeling":[21],"their":[22],"deviant":[23],"structure":[24],"attribute":[26,114],"patterns.":[27],"These":[28],"give":[30],"rise":[31],"data-centric":[33,99],"problems,":[34],"including":[35],"extremely":[36],"imbalanced":[37],"data":[38,85,147,233],"distributions":[39],"intricate":[41],"learning,":[43],"which":[44,212],"significantly":[45],"impede":[46],"machine":[47],"learning":[48,51],"deep":[50],"methods":[52,137],"from":[53,90,169],"discerning":[54],"patterns":[56],"with":[60,219],"few":[61],"labels.":[62],"While":[63],"these":[64,159],"issues":[65],"remain":[66,152],"crucial,":[67],"much":[68],"current":[71],"research":[72],"focuses":[73,95],"on":[74,96,131,172,226],"addressing":[75],"induced":[77],"technical":[78],"challenges,":[79],"treating":[80],"shortage":[82],"labeled":[84],"as":[86,120],"given.":[88],"Distinct":[89],"previous":[91],"efforts,":[92],"this":[93,118],"work":[94,218],"tackling":[97],"problems":[100],"by":[101,128],"generating":[102,139],"auxiliary":[103],"training":[104,129,210],"nodes":[105,140],"that":[106],"conform":[107],"original":[110],"topology":[112],"distribution.":[115],"We":[116],"categorize":[117],"approach":[119],"data-centric,":[121],"aiming":[122],"enhance":[124,236],"existing":[125,220],"anomaly":[126,150,196,221],"detectors":[127],"them":[130],"our":[132,170,231],"synthetic":[133,146],"data.":[134],"However,":[135],"for":[138,148,188],"effectiveness":[143],"utilizing":[145],"unexplored":[153],"realm.":[156],"To":[157],"answer":[158],"questions,":[160],"we":[161,176,201],"thoroughly":[162],"investigate":[163],"denoising":[165,190],"diffusion":[166,174],"model.":[167],"Drawing":[168],"observations":[171],"process,":[175],"illuminate":[177],"shifts":[179],"energy":[182],"distribution":[183],"establish":[185],"two":[186],"principles":[187],"designing":[189],"neural":[191],"networks":[192],"tailored":[193],"generation.":[197],"From":[198],"insights,":[200],"propose":[202],"diffusion-based":[204],"generation":[206],"method":[207],"synthesize":[209],"nodes,":[211],"can":[213,234],"be":[214],"promptly":[215],"integrated":[216],"detectors.":[222],"The":[223],"empirical":[224],"results":[225],"eight":[227],"widely-used":[228],"datasets":[229],"demonstrate":[230],"generated":[232],"effectively":[235],"nine":[238],"state-of-the-art":[239],"detectors'":[241],"performance.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
