Guarding Graph Neural Networks for Unsupervised Graph Anomaly Detection

被引:0
作者
Bei, Yuanchen [1 ]
Zhou, Sheng [2 ]
Shi, Jinke [1 ]
Ma, Yao [3 ]
Wang, Haishuai [1 ]
Bu, Jiajun [2 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[2] Zhejiang Univ, Zhejiang Key Lab Accessible Percept & Intelligent, Hangzhou 310058, Peoples R China
[3] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
基金
中国国家自然科学基金;
关键词
Anomaly detection; Graph neural networks; Message passing; Encoding; Contrastive learning; Autoencoders; Representation learning; Correlation; Convolution; Topology; Graph anomaly detection; graph learning; graph neural networks (GNNs); unsupervised anomaly detection;
D O I
10.1109/tnnls.2025.3569526; 10.1109/TNNLS.2025.3569526
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unsupervised graph anomaly detection aims at identifying rare patterns that deviate from the majority in a graph without the aid of labels, which is important for a variety of real-world applications. Recent advances have utilized graph neural networks (GNNs) to learn effective node representations by aggregating information from neighborhoods. This is motivated by the hypothesis that nodes in the graph tend to exhibit consistent behaviors with their neighborhoods. However, such consistency can be disrupted by graph anomalies in multiple ways. Most existing methods directly employ GNNs to learn representations, disregarding the negative impact of graph anomalies on GNNs, resulting in suboptimal node representations and anomaly detection performance. While a few recent approaches have redesigned GNNs for graph anomaly detection under semi-supervised label guidance, how to address the adverse effects of graph anomalies on GNNs in unsupervised scenarios and learn effective representations for anomaly detection are still underexplored. To bridge this gap, in this articlae, we propose a simple, yet effective framework for guarding GNNs for unsupervised graph anomaly detection (G3AD). Specifically, G3AD first introduces two auxiliary networks along with correlation constraints to guard the GNNs against inconsistent information encoding. Furthermore, G3AD introduces an adaptive caching (AC) module to guard the GNNs from directly reconstructing the observed graph data that contains anomalies. Extensive experiments demonstrate that our G3AD can outperform 20 state-of-the-art methods on both synthetic and real-world graph anomaly datasets, with flexible generalization ability in different GNN backbones.
引用
收藏
页数:14
相关论文
共 66 条
[1]  
Abu-El-Haifa S, 2019, PR MACH LEARN RES, V97
[2]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[3]   The correlation coefficient:: An overview [J].
Asuero, AG ;
Sayago, A ;
González, AG .
CRITICAL REVIEWS IN ANALYTICAL CHEMISTRY, 2006, 36 (01) :41-59
[4]   Reinforcement Neighborhood Selection for Unsupervised Graph Anomaly Detection [J].
Beil, Yuanchen ;
Zhoult, Sheng ;
Tan, Qiaoyu ;
Xu, Hao ;
Chen, Hao ;
Li, Zhao ;
But, Jiajun .
23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, ICDM 2023, 2023, :11-20
[5]   A Local Feature Engineering Strategy to Improve Network Anomaly Detection † [J].
Carta, Salvatore ;
Podda, Alessandro Sebastian ;
Recupero, Diego Reforgiato ;
Saia, Roberto .
FUTURE INTERNET, 2020, 12 (10) :1-30
[6]  
Chai ZW, 2022, PROCEEDINGS OF THE THIRTY-FIRST INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2022, P1945
[7]  
Chen H., 2024, P ACM WEB C 2024, P3598, DOI DOI 10.1145/3589334.3645517
[8]   Exploiting Neighbor Effect: Conv-Agnostic GNN Framework for Graphs With Heterophily [J].
Chen, Jie ;
Chen, Shouzhen ;
Gao, Junbin ;
Huang, Zengfeng ;
Zhang, Junping ;
Pu, Jian .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (10) :13383-13396
[9]   Generative Adversarial Attributed Network Anomaly Detection [J].
Chen, Zhenxing ;
Liu, Bo ;
Wang, Meiqing ;
Dai, Peng ;
Lv, Jun ;
Bo, Liefeng .
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, :1989-1992
[10]   A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks [J].
Deldjoo, Yashar ;
Di Noia, Tommaso ;
Merra, Felice Antonio .
ACM COMPUTING SURVEYS, 2021, 54 (02)