2021
DOI: 10.1109/access.2021.3073696
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous Subgraph Detection in Given Expected Degree Networks With Deep Learning

Abstract: Anomalous subgraph detection within networks is an important issue in many emerging applications. Existing algorithms, such as graph structure methods and spectral feature methods, usually focus on the special stochastic model (such as the Erdős-Rényi random graph) or may not efficiently extract the anomalous behaviors of the networks, which result in detection performance degradation. To mitigate the limitations, in this paper, we first present an anomalous subgraph detection framework associated with deep ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 27 publications
(33 reference statements)
0
2
0
Order By: Relevance
“…Luan et al. [ 45 ] proposed RM-CNN, a convolutional neural network classifying whether a network contains an anomalous community given an expected degrees model. They supplied the model with the residuals produced by subtracting the expected adjacency matrix of a random network generated by a given random network generating algorithm with a certain set of parameters from the actual adjacency matrix.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Luan et al. [ 45 ] proposed RM-CNN, a convolutional neural network classifying whether a network contains an anomalous community given an expected degrees model. They supplied the model with the residuals produced by subtracting the expected adjacency matrix of a random network generated by a given random network generating algorithm with a certain set of parameters from the actual adjacency matrix.…”
Section: Related Workmentioning
confidence: 99%
“…[ 5 ] demonstrated that by applying an anomaly detection algorithm on call recording logs of a country’s mobile network, they could classify events appearing in a particular time period as emergencies or not. While the majority of the conducted studies are mainly focused on uncovering anomalous vertices, only a handful focus on detecting anomalous communities [ 7 , 13 , 33 , 45 , 48 , 53 , 59 , 70 ].…”
Section: Introductionmentioning
confidence: 99%