{"id":"https://openalex.org/W3132426156","doi":"https://doi.org/10.1109/trustcom50675.2020.00117","title":"A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks","display_name":"A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3132426156","doi":"https://doi.org/10.1109/trustcom50675.2020.00117","mag":"3132426156"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom50675.2020.00117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101091974","display_name":"Dali Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dali Zhu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043649466","display_name":"Yuchen Ma","orcid":"https://orcid.org/0000-0001-9520-2235"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuchen Ma","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102790878","display_name":"Yinlong Liu","orcid":"https://orcid.org/0000-0002-5984-1299"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinlong Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101091974"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.0661,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.76915104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"870","last_page":"875"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8080133199691772},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6539140343666077},{"id":"https://openalex.org/keywords/snapshot","display_name":"Snapshot (computer storage)","score":0.5786125659942627},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5141949653625488},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5114044547080994},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.5025711059570312},{"id":"https://openalex.org/keywords/dynamism","display_name":"Dynamism","score":0.4352717697620392},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4278150200843811},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34177255630493164},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3237708806991577},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.31108421087265015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8080133199691772},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6539140343666077},{"id":"https://openalex.org/C55282118","wikidata":"https://www.wikidata.org/wiki/Q252683","display_name":"Snapshot (computer storage)","level":2,"score":0.5786125659942627},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5141949653625488},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5114044547080994},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.5025711059570312},{"id":"https://openalex.org/C2775836275","wikidata":"https://www.wikidata.org/wiki/Q3502310","display_name":"Dynamism","level":2,"score":0.4352717697620392},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4278150200843811},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34177255630493164},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3237708806991577},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31108421087265015},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom50675.2020.00117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom50675.2020.00117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7262002286","display_name":null,"funder_award_id":"XDC02011000","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1924770834","https://openalex.org/W1986644953","https://openalex.org/W2052104835","https://openalex.org/W2089554624","https://openalex.org/W2108614537","https://openalex.org/W2109026675","https://openalex.org/W2163557584","https://openalex.org/W2393319904","https://openalex.org/W2415243320","https://openalex.org/W2473813716","https://openalex.org/W2510664603","https://openalex.org/W2519887557","https://openalex.org/W2583803680","https://openalex.org/W2621614835","https://openalex.org/W2734601503","https://openalex.org/W2784511520","https://openalex.org/W2805516822","https://openalex.org/W2806983170","https://openalex.org/W2808000122","https://openalex.org/W2808771744","https://openalex.org/W2906694449","https://openalex.org/W2910068345","https://openalex.org/W2962975498","https://openalex.org/W2963123724","https://openalex.org/W2964015378","https://openalex.org/W2964121744","https://openalex.org/W2966841471","https://openalex.org/W2998313947","https://openalex.org/W3011667710","https://openalex.org/W3125626040","https://openalex.org/W3160202947","https://openalex.org/W6716303938","https://openalex.org/W6757634740"],"related_works":["https://openalex.org/W2000438032","https://openalex.org/W2775384662","https://openalex.org/W2385556862","https://openalex.org/W4297288183","https://openalex.org/W4297802007","https://openalex.org/W2117883229","https://openalex.org/W2367908682","https://openalex.org/W3126342311","https://openalex.org/W2586399084","https://openalex.org/W3122659832"],"abstract_inverted_index":{"Anomaly":[0],"Detection":[1],"in":[2,9,31,110,179],"Dynamic":[3],"Networks":[4],"plays":[5],"a":[6,94],"critical":[7],"role":[8],"various":[10],"real-world":[11,168],"applications":[12],"such":[13],"as":[14,83],"cyberse-curity,":[15],"e-commerce,":[16],"and":[17,34,77,129],"social":[18],"media.":[19],"Recent":[20],"approaches":[21],"based":[22],"on":[23,40,102,166],"graph":[24,127,140],"neural":[25],"networks":[26,85],"have":[27],"achieved":[28],"fruitful":[29],"results":[30,165],"static":[32],"networks,":[33,49,104],"most":[35],"of":[36,75,79,138],"the":[37,46,60,72,81,135,139,158,161,175],"researches":[38],"focus":[39],"learning":[41,109],"node":[42,120],"embeddings":[43],"to":[44,63,71,156],"represent":[45],"large-scale":[47],"complex":[48],"thereby":[50],"facilitating":[51],"downstream":[52],"anomaly":[53,148,180],"detection":[54,101],"task.":[55],"However,":[56],"these":[57],"methods":[58,178],"require":[59],"whole":[61],"network":[62],"extract":[64],"intrinsic":[65],"properties,":[66],"so":[67],"they":[68],"are":[69],"sensitive":[70],"frequent":[73],"changes":[74],"nodes":[76],"incapable":[78],"capturing":[80],"dynamism":[82],"realworld":[84],"evolve":[86],"over":[87],"time.":[88],"In":[89,114],"this":[90],"paper,":[91],"we":[92],"propose":[93],"novel":[95],"framework":[96],"DynAD":[97,116,172],"for":[98,147],"anomalous":[99],"edge":[100],"time-evolving":[103],"which":[105],"performs":[106],"adaptive":[107],"parameter":[108],"an":[111,151],"end-to-end":[112],"manner.":[113],"particular,":[115],"first":[117],"extracts":[118],"fixed-size":[119],"embedding":[121],"from":[122],"each":[123],"snapshot":[124],"with":[125],"temporal":[126,136],"convolution":[128],"pooling":[130],"operations.":[131],"Then,":[132],"it":[133],"captures":[134],"information":[137],"sequence":[141],"using":[142],"Gated":[143],"recurrent":[144],"units":[145],"(GRU)":[146],"detection,":[149],"where":[150],"attention":[152],"mechanism":[153],"is":[154],"employed":[155],"highlight":[157],"differences":[159],"between":[160],"dynamic":[162],"patterns.":[163],"Experimental":[164],"three":[167],"datasets":[169],"illustrate":[170],"that":[171],"significantly":[173],"outperforms":[174],"state-of-the-art":[176],"baseline":[177],"detection.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
