Graph Learning for Anomaly Analytics: Algorithms, Applications, and Challenges

被引:25
作者
Ren, Jing [1 ]
Xia, Feng [1 ]
Lee, Ivan [2 ]
Hoshyar, Azadeh Noori [3 ]
Aggarwal, Charu [4 ]
机构
[1] Federat Univ Australia, Inst Innovat Sci & Sustainabil, Ballarat, Vic 3353, Australia
[2] Univ South Australia, STEM, Adelaide, SA 5001, Australia
[3] Federat Univ Australia, Inst Innovat Sci & Sustainabil, Brisbane, Qld 4000, Australia
[4] IBM TJ Watson Res Ctr, New York, NY 10598 USA
关键词
Anomaly analytics; anomaly detection; graph learning; graph neural networks; deep learning; SOCIAL NETWORKS;
D O I
10.1145/3570906
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly analytics is a popular and vital task in various research contexts that has been studied for several decades. At the same time, deep learning has shown its capacity in solving many graph-based tasks, like node classification, link prediction, and graph classification. Recently, many studies are extending graph learning models for solving anomaly analytics problems, resulting in beneficial advances in graph-based anomaly analytics techniques. In this survey, we provide a comprehensive overview of graph learning methods for anomaly analytics tasks. We classify them into four categories based on their model architectures, namely graph convolutional network, graph attention network, graph autoencoder, and other graph learning models. The differences between these methods are also compared in a systematic manner. Furthermore, we outline several graph-based anomaly analytics applications across various domains in the real world. Finally, we discuss five potential future research directions in this rapidly growing field.
引用
收藏
页数:29
相关论文
共 141 条
[41]   Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network [J].
Hosseinmardi, Homa ;
Mattson, Sabrina Arredondo ;
Ibn Rafiq, Rahat ;
Han, Richard ;
Lv, Qin ;
Mishra, Shivakant .
SOCIAL INFORMATICS (SOCINFO 2015), 2015, 9471 :49-66
[42]   Network embedding: Taxonomies, frameworks and applications [J].
Hou, Mingliang ;
Ren, Jing ;
Zhang, Da ;
Kong, Xiangjie ;
Zhang, Dongyu ;
Xia, Feng .
COMPUTER SCIENCE REVIEW, 2020, 38
[43]  
Hu BB, 2019, AAAI CONF ARTIF INTE, P946
[44]   Densely Connected Convolutional Networks [J].
Huang, Gao ;
Liu, Zhuang ;
van der Maaten, Laurens ;
Weinberger, Kilian Q. .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :2261-2269
[45]  
Huang H, 2021, PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, P1470
[46]   Careful what you share in six seconds: Detecting cyberbullying instances in Vine [J].
Ibn Rafiq, Rahat ;
Hosseinmardi, Homa ;
Han, Richard ;
Lv, Qin ;
Mishra, Shivakant ;
Mattson, Sabrina Arredondo .
PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, :617-622
[47]   Catching Social Media Advertisers with Strategy Analysis [J].
Jiang, Meng .
CYBERSAFETY 2016 WORKSHOP, 2016, :5-10
[48]   ANEMONE: Graph Anomaly Detection with Multi-Scale Contrastive Learning [J].
Jin, Ming ;
Liu, Yixin ;
Zheng, Yu ;
Chi, Lianhua ;
Li, Yuan-Fang ;
Pan, Shirui .
PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, :3122-3126
[49]   Unsupervised Anomaly Detection in Journal-Level Citation Networks [J].
Jolly, Baani Leen Kaur ;
Jain, Lavina ;
Bera, Debajyoti ;
Chakraborty, Tanmoy .
PROCEEDINGS OF THE ACM/IEEE JOINT CONFERENCE ON DIGITAL LIBRARIES IN 2020, JCDL 2020, 2020, :27-36
[50]   Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach [J].
Kaghazgaran, Parisa ;
Caverlee, James ;
Squicciarini, Anna .
WSDM'18: PROCEEDINGS OF THE ELEVENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2018, :306-314