[1]赵姝,刘晓曼,段震,等.社交关系挖掘研究综述[J].计算机学报,2017,40(03):535-555.
Zhao M., Liu X., Duan Z., et al. Research overview on social network relationship mining [J]. Journal of Computer Applications, 2017, 40(03): 535-555.
[2] 张吉祥,张祥森,武长旭,等.知识图谱构建技术综述[J].计算机工程,2022,48(03):23-37.DOI:10.19678/j.issn.1000-3428.0061803.
Zhang J., Zhang X., Wu C., et al. Survey of knowledge graph construction technology [J]. Journal of Computer Engineering, 2022, 48(03): 23-37. DOI:10.19678/j.issn.1000-3428.0061803.
[3] 刘真,吴向阳,郑秋华.动态网络可视化与可视分析综述[J].计算机辅助设计与图形学学报,2016,28(05):693-701.
Liu Z., Wu X., Zheng Q. Survey on visualization and analysis of dynamic networks [J]. Journal of Computer-Aided Design & Computer Graphics, 2016, 28(05): 693-701.
[4] Jiao P, Guo X, Jing X, He D, Wu H, Pan S, Gong M, Wang W. Temporal Network Embedding for Link Prediction via VAE Joint Attention Mechanism[J]. IEEE Transactions on Neural Networks and Learning Systems, 2022, 33(12): 7400-7413. DOI: 10.1109/TNNLS.2021.3084957.
[5] Yu W, Cheng W, Aggarwal C C, et al. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD'18).New York, NY, USA: Association for Computing Machinery,2018:2672–2681.DOI: https://doi.org/10.1145/3219819.3220024.
[6] Zheng L, Li Z, Li J, et al. AddGraph: Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19). AAAI Press, 2019: 4419–4425. DOI: https://doi.org/10.24963/ijcai.2019/614.
[7] 郭嘉琰,李荣华,张岩,等.基于图神经网络的动态网络异常检测算法[J].软件学报,2020,31(03):748-762.DOI:10.13328/j.cnki.jos.005903.
Guo J., Li R., Zhang Y., et al. Dynamic network anomaly detection algorithm based on graph neural networks [J]. Journal of Software, 2020, 31(03): 748-762. DOI:10.13328/j.cnki.jos.005903.
[8] 魏青松,王晓峻,魏源,等.HGAT:基于混合图注意力网络的多变量时序异常检测[J].计算机与现代化,2025,(07):97-105.
Wei Q., Wang X., Wei Y., et al. HGAT: Multivariate time series anomaly detection based on hybrid graph attention networks [J]. Computer Science and Modernization, 2025, (07): 97-105.
[9] 陈旭,张硕,景永俊,等.TRGATLog:基于日志时间图注意力网络的日志异常检测方法[J].计算机应用研究,2024,41(04):1034-1040.DOI:10.19734/j.issn.1001-3695.2023.07.0365.
Chen X., Zhang Y., Jing Y., et al. TRGATLog: Log anomaly detection method for temporal graph attention networks [J]. Journal of Computer Applications Research, 2024, 1(04): 1034-1040. DOI:10.19734/j.issn.1001-3695.2023.070365.
[10] 秦中元,马楠,余亚聪,等.基于双重图神经网络和自编码器的网络异常检测[J].信息网络安全,2023,23(09):1-11.
Qin Z., Ma Y., Yu Y., et al. Network anomaly detection based on dual graph neural networks and autoencoders [J]. Information Network Security, 2023, 23(09): 1-11.
[11] 衡红军,代栋炜.融合稀疏图注意力的多元时间序列异常检测方法[J].计算机工程与设计,2025,46(03):841-849.DOI:10.16208/j.issn1000-7024.2025.03.027.
Heng H., Dai Y. Multi-dimensional time series anomaly detection method based on fused sparse graph attention [J]. Journal of Computer Engineering and Design, 2025, 46(03): 841-849. DOI:10.16208/j.issn1000-7024.2025.03.027.
[12] Kipf T N, Welling M. Semi-Supervised Classification with Graph Convolutional Networks[C]//Proceedings of the 5th International Conference on Learning Representations (ICLR 2017). 2017. DOI: https://doi.org/10.48550/arXiv.1609.02907.
[13] Cai L, Chen Z, Luo C, et al. Structural Temporal Graph Neural Networks for Anomaly Detection in Dynamic Graphs[C]//Proceedings of the 30th ACM International Conference on Information & Knowledge Management (CIKM'21). New York, NY, USA: Association for Computing Machinery, 2021: 3747–3756. DOI: https://doi.org/10.1145/3459637.3481955.
[14] Liu Y, Pan S, Wang Y G, et al. Anomaly Detection in Dynamic Graphs via Transformer[J]. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(12): 12081–12094. DOI: https://doi.org/10.1109/TKDE.2021.3124061.
[15] Guo D Z,Liu Z W, Li R R. RegraphGAN: A graph generative adversarial network model for dynamic network anomaly detection[J].Neural Networks,2023,166: 273-285.DOI: https://doi.org/10.1016/j.neunet.2023.07.026.
[16] Wu Yuxia, Fang Yuan, Liao Lizi. On the Feasibility of Simple Transformer for Dynamic Graph Modeling[C]// Proceedings of the ACM Web Conference 2024. New York, NY, USA: Association for Computing Machinery, 2024: 870–880. DOI:10.1145/3589334.3645622.
[17] Lee Jongha, Kim Sunwoo, Shin Kijung. SLADE: Detecting Dynamic Anomalies in Edge Streams without Labels via Self-Supervised Learning[C]// Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York, NY, USA: Association for Computing Machinery, 2024: 1506–1517. DOI:10.1145/3637528.3671845.
[18] Yang Xiao, Zhao Xuejiao, Shen Zhiqi. A Generalizable Anomaly Detection Method in Dynamic Graphs[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2025, 39(20): 22001–22009. DOI:10.1609/aaai.v39i20.35508.
[19] Liu Y, Li Z, Pan S, et al. Anomaly Detection on Attributed Networks via Contrastive Self-Supervised Learning[J]. IEEE Transactions on Neural Networks and Learning Systems, 2021, 33(6): 2378–2392. DOI: https://doi.org/10.1109/TNNLS.2021.3068344.
[20] Gasteiger J, Weißenberger S, Günnemann S. Diffusion Improves Graph Learning[C]//Proceedings of the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019). Vancouver, Canada: Curran Associates Inc.,2019.DOI:https://doi.org/10.48550/arXiv.1911.05485.
[21] Hassani K, Khasahmadi A H. Contrastive Multi-View Representation Learning on Graphs[C]//Proceedings of the 37th International Conference on Machine Learning (ICML 2020). 2020. DOI: https://doi.org/10.48550/arXiv.2006.05582.
[22] Page L, Brin S, Motwani R, Winograd T. The PageRank citation ranking: Bringing order to the web[J]. Stanford InfoLab Technical Report, 1998. DOI: 10.1007/978-3-319-08789-4_10.
[23] Kondor R I, Lafferty J D. Diffusion kernels on graphs and other discrete input spaces[C]//Proceedings of the 19th International Conference on Machine Learning (ICML’02). San Francisco, CA, USA: Morgan Kaufmann Publishers, 2002: 315-322.
[24] De Choudhury M, Sundaram H, John A, Seligmann D D. Social synchrony: Predicting mimicry of user actions in online social media[C]// Proc. Int. Conf. Comput. Sci. Eng. 2009: 151–158.
[25] Opsahl T, Panzarasa P. Clustering in weighted networks[J]. Social Networks, 2009, 31(2): 155-163. DOI: 10.1016/j.socnet.2009.02.002.
[26] Kumar S, Spezzano F, Subrahmanian V S, Faloutsos C. Edge Weight Prediction in Weighted Signed Networks[C]//2016 IEEE 16th International Conference on Data Mining (ICDM). 2016: 221-230. DOI: 10.1109/ICDM.2016.0033.
[27] Kumar S, Hooi B, Makhija D, Kumar M, Faloutsos C, Subrahmanian V S. REV2: Fraudulent User Prediction in Rating Platforms[C]//Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). Marina Del Rey, CA, USA:ACM,2018: 333-341.DOI: 10.1145/3159652.3159729.
[28] von Luxburg U. A tutorial on spectral clustering[J]. Statistics and Computing, 2007, 17(4): 395-416. DOI: 10.1007/s11222-007-9033-z.
[29] Perozzi B, Al-Rfou R, Skiena S. DeepWalk: online learning of social representations[C]//Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14). New York, NY, USA: ACM, 2014: 701-710. DOI: 10.1145/2623330.2623732.
[30] Grover A, Leskovec J. node2vec: Scalable Feature Learning for Networks[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '16). San Francisco, CA, USA: ACM, 2016: 855-864. DOI: 10.1145/2939672.2939754.
|