{"id":"https://openalex.org/W4410397895","doi":"https://doi.org/10.32473/flairs.38.1.138971","title":"RQPool: A Novel Multi-Branch Graph-Level Anomaly Detection","display_name":"RQPool: A Novel Multi-Branch Graph-Level Anomaly Detection","publication_year":2025,"publication_date":"2025-05-14","ids":{"openalex":"https://openalex.org/W4410397895","doi":"https://doi.org/10.32473/flairs.38.1.138971"},"language":"en","primary_location":{"id":"doi:10.32473/flairs.38.1.138971","is_oa":true,"landing_page_url":"https://doi.org/10.32473/flairs.38.1.138971","pdf_url":"https://journals.flvc.org/FLAIRS/article/download/138971/144050","source":{"id":"https://openalex.org/S4210205383","display_name":"Proceedings of the ... International Florida Artificial Intelligence Research Society Conference","issn_l":"2334-0754","issn":["2334-0754","2334-0762"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310320363","host_organization_name":"George A. Smathers Libraries","host_organization_lineage":["https://openalex.org/P4310320363"],"host_organization_lineage_names":["George A. Smathers Libraries"],"type":"conference"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International FLAIRS Conference Proceedings","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://journals.flvc.org/FLAIRS/article/download/138971/144050","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117555442","display_name":"Aaron Alex Philip","orcid":null},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Aaron Alex Philip","raw_affiliation_strings":["University of Windsor"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Windsor","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056407977","display_name":"Ziad Kobti","orcid":"https://orcid.org/0000-0001-9503-9730"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ziad Kobti","raw_affiliation_strings":["School of Computer Science, University of Windsor"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Windsor","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5117555442"],"corresponding_institution_ids":["https://openalex.org/I74413500"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6525396108627319},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5038463473320007},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46483373641967773},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4638412594795227},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23320409655570984},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2097950279712677},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1622936725616455}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6525396108627319},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5038463473320007},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46483373641967773},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4638412594795227},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23320409655570984},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2097950279712677},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1622936725616455},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32473/flairs.38.1.138971","is_oa":true,"landing_page_url":"https://doi.org/10.32473/flairs.38.1.138971","pdf_url":"https://journals.flvc.org/FLAIRS/article/download/138971/144050","source":{"id":"https://openalex.org/S4210205383","display_name":"Proceedings of the ... International Florida Artificial Intelligence Research Society Conference","issn_l":"2334-0754","issn":["2334-0754","2334-0762"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310320363","host_organization_name":"George A. Smathers Libraries","host_organization_lineage":["https://openalex.org/P4310320363"],"host_organization_lineage_names":["George A. Smathers Libraries"],"type":"conference"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International FLAIRS Conference Proceedings","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e85b50233c864be8ab081d7dfd83e234","is_oa":true,"landing_page_url":"https://doaj.org/article/e85b50233c864be8ab081d7dfd83e234","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the International Florida Artificial Intelligence Research Society Conference, Vol 38, Iss 1 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.32473/flairs.38.1.138971","is_oa":true,"landing_page_url":"https://doi.org/10.32473/flairs.38.1.138971","pdf_url":"https://journals.flvc.org/FLAIRS/article/download/138971/144050","source":{"id":"https://openalex.org/S4210205383","display_name":"Proceedings of the ... International Florida Artificial Intelligence Research Society Conference","issn_l":"2334-0754","issn":["2334-0754","2334-0762"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310320363","host_organization_name":"George A. Smathers Libraries","host_organization_lineage":["https://openalex.org/P4310320363"],"host_organization_lineage_names":["George A. Smathers Libraries"],"type":"conference"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International FLAIRS Conference Proceedings","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410397895.pdf","grobid_xml":"https://content.openalex.org/works/W4410397895.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W2284900416","https://openalex.org/W2998336824","https://openalex.org/W3042313988","https://openalex.org/W3126525704","https://openalex.org/W4220727981","https://openalex.org/W4385562644","https://openalex.org/W4386798174","https://openalex.org/W4387427388","https://openalex.org/W4387963933","https://openalex.org/W4394643150","https://openalex.org/W4399399007","https://openalex.org/W4400025318","https://openalex.org/W4400267372","https://openalex.org/W4400374198","https://openalex.org/W4401906858","https://openalex.org/W4403345209","https://openalex.org/W6758313303","https://openalex.org/W6809820091","https://openalex.org/W7037116381"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Anomaly":[0,150],"Detection":[1,151],"(AD)":[2],"is":[3],"crucial":[4],"across":[5,155],"various":[6],"domains,as":[7],"it":[8,84],"identifies":[9],"irregularities":[10],"or":[11,168],"unusual":[12],"patternsthat,":[13],"if":[14],"quickly":[15],"addressed,":[16],"can":[17,52],"prevent":[18,25],"financial":[19],"and":[20,24,44,117,127,143,162],"datalosses,":[21],"protect":[22],"health,":[23],"disasters.":[26],"Many":[27],"systemssuch":[28],"as":[29,42,46,115],"social":[30],"networks,":[31],"communication":[32],"systems,and":[33],"biological":[34],"networks":[35],"are":[36,55],"naturally":[37],"represented":[38],"asgraphs":[39],"with":[40],"entities":[41],"nodes":[43],"interactions":[45],"edges.By":[47],"analyzing":[48],"these":[49,131],"structures,":[50],"we":[51,133],"uncover":[53],"anomaliesthat":[54],"not":[56],"apparent":[57],"using":[58],"traditional":[59],"methods.However,":[60],"current":[61,172],"Graph-based":[62],"AD":[63],"techniques":[64],"face":[65],"significantchallenges,":[66],"particularly":[67,175],"low":[68],"accuracy":[69],"on":[70,102,112,177],"largerdatasets.":[71],"As":[72],"datasets":[73],"grow":[74],"larger,":[75],"the":[76,171],"complexity":[77,82],"ofthe":[78],"graphs":[79],"increases.":[80],"This":[81],"makes":[83],"morechallenging":[85],"for":[86],"models":[87],"to":[88],"distinguish":[89],"normal":[90],"variationsfrom":[91],"true":[92],"anomalies.":[93],"Moreover,":[94],"existing":[95],"Graph":[96],"NeuralNetwork":[97],"(GNN)":[98],"algorithms":[99,110],"focus":[100],"primarily":[101],"spatialdomain":[103],"features":[104],"while":[105,119],"neglecting":[106],"spectral":[107,167],"properties.Furthermore,":[108],"most":[109],"concentrate":[111],"intra-graphproperties":[113],"such":[114],"edges":[116],"nodes,":[118],"overlookingrich":[120],"global":[121],"inter-graph":[122,144],"relationships":[123],"like":[124],"GraphSimilarity":[125],"Measures":[126],"Cross-Graph":[128],"Connectivity.":[129],"Toaddress":[130],"challenges,":[132],"propose":[134],"a":[135],"novel":[136],"hybridmethod,":[137],"RQPool,":[138],"which":[139],"integrates":[140],"intra-graph":[141],"spectralproperties":[142],"spatial":[145,169],"properties":[146],"intoa":[147],"unified":[148],"Graph-level":[149],"classifier.":[152],"Inempirical":[153],"evaluations":[154],"multiple":[156],"datasets,":[157],"RQPoolconsistently":[158],"achieves":[159],"higher":[160],"AUC":[161],"macro-F1":[163],"scores":[164],"compared":[165],"topurely":[166],"baselines,":[170],"state-of-the-art":[173],"approaches,":[174],"excelling":[176],"large-scalegraphs.":[178]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
