Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity
Abstract
References
Index Terms
- Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity
Recommendations
Multi-representations Space Separation based Graph-level Anomaly-aware Detection
SSDBM '23: Proceedings of the 35th International Conference on Scientific and Statistical Database ManagementGraph structure patterns are widely used to model different area data recently. How to detect anomalous graph information on these graph data has become a popular research problem. The objective of this research is centered on the particular issue that ...
Towards Graph-level Anomaly Detection via Deep Evolutionary Mapping
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningGraph-level anomaly detection aims at capturing anomalous individual graphs in a graph set. Due to its significance in various real-world application fields, e.g., identifying rare molecules in chemistry and detecting potential frauds in online social ...
Discriminative Graph-Level Anomaly Detection via Dual-Students-Teacher Model
Advanced Data Mining and ApplicationsAbstractDifferent from the current node-level anomaly detection task, the goal of graph-level anomaly detection is to find abnormal graphs that significantly differ from others in a graph set. Due to the scarcity of research on the work of graph-level ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- ANR
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 39Total Downloads
- Downloads (Last 12 months)39
- Downloads (Last 6 weeks)11
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format