Journal of Computer Applications ›› 2026, Vol. 46 ›› Issue (2): 458-466.DOI: 10.11772/j.issn.1001-9081.2025020216
• Cyber security • Previous Articles
Limei DONG1,2, Yanzi LI1,2, Jiayin LI1,2, Li XU1,2(
)
Received:2025-03-06
Revised:2025-04-27
Accepted:2025-05-07
Online:2025-05-16
Published:2026-02-10
Contact:
Li XU
About author:DONG Limei, born in 2001, M. S. candidate. Her research interests include anomaly detection, network and information security.Supported by:
董莉梅1,2, 李雁姿1,2, 李家印1,2, 许力1,2(
)
通讯作者:
许力
作者简介:董莉梅(2001—),女,四川达州人,硕士研究生,主要研究方向:异常检测、网络与信息安全基金资助:CLC Number:
Limei DONG, Yanzi LI, Jiayin LI, Li XU. Neighborhood-enhanced unsupervised graph anomaly detection[J]. Journal of Computer Applications, 2026, 46(2): 458-466.
董莉梅, 李雁姿, 李家印, 许力. 基于邻域增强的无监督图异常检测[J]. 《计算机应用》唯一官方网站, 2026, 46(2): 458-466.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2025020216
| 数据集 | 节点数 | 边数 | 特征数 | 异常数 |
|---|---|---|---|---|
| Cora | 2 078 | 5 429 | 1 433 | 150 |
| CiteSeer | 3 327 | 4 732 | 3 703 | 150 |
| PubMed | 19 717 | 88 648 | 500 | 600 |
| ACM | 16 484 | 71 980 | 8 337 | 650 |
| Flickr | 7 575 | 239 738 | 12 407 | 450 |
Tab. 1 Statistics of datasets
| 数据集 | 节点数 | 边数 | 特征数 | 异常数 |
|---|---|---|---|---|
| Cora | 2 078 | 5 429 | 1 433 | 150 |
| CiteSeer | 3 327 | 4 732 | 3 703 | 150 |
| PubMed | 19 717 | 88 648 | 500 | 600 |
| ACM | 16 484 | 71 980 | 8 337 | 650 |
| Flickr | 7 575 | 239 738 | 12 407 | 450 |
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| DOMINANT[ | 0.812 8 | 0.819 7 | 0.789 6 | 0.756 1 | 0.743 6 |
| CoLA[ | 0.904 6 | 0.889 4 | 0.946 8 | 0.837 5 | 0.761 6 |
| ANEMONE[ | 0.920 7 | 0.928 2 | 0.953 4 | 0.849 2 | 0.767 9 |
| GRADATE[ | 0.903 2 | 0.890 4 | 0.945 0 | 0.858 0 | 0.752 2 |
| SL-GAD[ | 0.917 8 | 0.922 1 | 0.962 7 | 0.814 3 | 0.796 5 |
| Sub-CR[ | 0.902 3 | 0.972 7 | 0.968 7 | 0.806 0 | 0.792 1 |
| PREM[ | 0.951 0 | 0.977 9 | 0.971 9 | 0.905 6 | 0.861 3 |
| RAND[ | 0.923 8 | 0.954 7 | 0.952 3 | 0.844 2 | 0.762 5 |
| ARISE[ | 0.943 8 | 0.931 0 | 0.971 2 | 0.874 2 | 0.703 8 |
| DE-GAD[ | 0.926 7 | 0.938 0 | 0.974 2 | 0.875 4 | 0.815 2 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
Tab. 2 AUC comparison of different methods on five datasets
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| DOMINANT[ | 0.812 8 | 0.819 7 | 0.789 6 | 0.756 1 | 0.743 6 |
| CoLA[ | 0.904 6 | 0.889 4 | 0.946 8 | 0.837 5 | 0.761 6 |
| ANEMONE[ | 0.920 7 | 0.928 2 | 0.953 4 | 0.849 2 | 0.767 9 |
| GRADATE[ | 0.903 2 | 0.890 4 | 0.945 0 | 0.858 0 | 0.752 2 |
| SL-GAD[ | 0.917 8 | 0.922 1 | 0.962 7 | 0.814 3 | 0.796 5 |
| Sub-CR[ | 0.902 3 | 0.972 7 | 0.968 7 | 0.806 0 | 0.792 1 |
| PREM[ | 0.951 0 | 0.977 9 | 0.971 9 | 0.905 6 | 0.861 3 |
| RAND[ | 0.923 8 | 0.954 7 | 0.952 3 | 0.844 2 | 0.762 5 |
| ARISE[ | 0.943 8 | 0.931 0 | 0.971 2 | 0.874 2 | 0.703 8 |
| DE-GAD[ | 0.926 7 | 0.938 0 | 0.974 2 | 0.875 4 | 0.815 2 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| DOMINANT[ | 0.447 4 | 0.330 8 | OOM | 0.355 3 | |
| CoLA[ | 0.506 5 | 0.430 3 | 0.416 9 | 0.321 4 | |
| ANEMONE[ | 0.532 0 | 0.628 1 | 0.427 4 | 0.353 9 | |
| SL-GAD[ | 0.602 2 | 0.526 3 | 0.635 1 | 0.388 6 | |
| Sub-CR[ | 0.592 2 | 0.608 3 | 0.585 4 | 0.346 9 | |
| RAND[ | 0.497 9 | 0.544 0 | 0.445 4 | 0.392 0 | 0.367 0 |
| 本文方法 | 0.669 3 | 0.773 6 | 0.686 1 | 0.561 5 | 0.473 6 |
Tab. 3 AUPRC comparison of different methods on five datasets
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| DOMINANT[ | 0.447 4 | 0.330 8 | OOM | 0.355 3 | |
| CoLA[ | 0.506 5 | 0.430 3 | 0.416 9 | 0.321 4 | |
| ANEMONE[ | 0.532 0 | 0.628 1 | 0.427 4 | 0.353 9 | |
| SL-GAD[ | 0.602 2 | 0.526 3 | 0.635 1 | 0.388 6 | |
| Sub-CR[ | 0.592 2 | 0.608 3 | 0.585 4 | 0.346 9 | |
| RAND[ | 0.497 9 | 0.544 0 | 0.445 4 | 0.392 0 | 0.367 0 |
| 本文方法 | 0.669 3 | 0.773 6 | 0.686 1 | 0.561 5 | 0.473 6 |
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-en | 0.735 4 | 0.779 5 | 0.874 8 | 0.722 9 | 0.697 3 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
Tab. 4 Ablation study of adaptive neighborhood selection on five datasets(AUC)
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-en | 0.735 4 | 0.779 5 | 0.874 8 | 0.722 9 | 0.697 3 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-ano | 0.895 6 | 0.949 4 | 0.937 4 | 0.882 0 | 0.802 9 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
Tab. 5 Ablation study of anonymous message passing on five datasets(AUC)
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-ano | 0.895 6 | 0.949 4 | 0.937 4 | 0.882 0 | 0.802 9 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-wed | 0.888 1 | 0.941 8 | 0.905 4 | 0.864 0 | 0.840 5 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
Tab. 6 Ablation study of weighted computation on five datasets (AUC)
| 方法 | Cora | CiteSeer | PubMed | ACM | Flickr |
|---|---|---|---|---|---|
| N-wed | 0.888 1 | 0.941 8 | 0.905 4 | 0.864 0 | 0.840 5 |
| 本文方法 | 0.966 1 | 0.988 5 | 0.976 4 | 0.917 8 | 0.882 0 |
| [1] | 樊琳娜,李城龙,吴毅超,等. 物联网设备识别及异常检测研究综述[J]. 软件学报, 2024, 35(1): 288-308. |
| FAN L N, LI C L, WU Y C, et al. Survey on IoT device identification and anomaly detection[J]. Journal of Software, 2024, 35(1): 288-308. | |
| [2] | 孙澈,武玉伟,贾云得. 上下文建模与推理的视频异常事件检测[J]. 计算机学报, 2024, 47(10): 2368-2386. |
| SUN C, WU Y W, JIA Y D. Context modeling and reasoning for video anomaly event detection[J]. Chinese Journal of Computers, 2024, 47(10): 2368-2386. | |
| [3] | LI A, QIU C, KLOFT M, et al. Deep anomaly detection under labeling budget constraints[C]// Proceedings of the 40th International Conference on Machine Learning. New York: JMLR.org, 2023: 19882-19910. |
| [4] | LIU Y, DING K, LIU H, et al. GOOD-D: on unsupervised graph out-of-distribution detection[C]// Proceedings of the 16th ACM International Conference on Web Search and Data Mining. New York: ACM, 2023: 339-347. |
| [5] | 方介泼,陶重犇. 应对零日攻击的混合车联网入侵检测系统[J]. 计算机应用, 2024, 44(9): 2763-2769. |
| FANG J P, TAO C B. Hybrid internet of vehicles intrusion detection system for zero-day attacks[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. | |
| [6] | AHMED I, HU X B, ACHARYA M P, et al. Neighborhood structure assisted non-negative matrix factorization and its application in unsupervised point-wise anomaly detection[J]. Journal of Machine Learning Research, 2021, 22: 1-32. |
| [7] | WEI Z, XIE X, ZHANG X. Maritime anomaly detection based on a support vector machine[J]. Soft Computing, 2022, 26(21): 11553-11566. |
| [8] | CHOI H, KIM M, LEE G, et al. Unsupervised learning approach for network intrusion detection system using autoencoders[J]. The Journal of Supercomputing, 2019, 75(9): 5597-5621. |
| [9] | KIPF T N, WELLING M. Variational graph auto-encoders[EB/OL]. [2025-04-24].. |
| [10] | YUAN X, HUANG B, WANG Y, et al. Deep learning-based feature representation and its application for soft sensor modeling with variable-wise weighted SAE[J]. IEEE Transactions on Industrial Informatics, 2018, 14(7): 3235-3243. |
| [11] | SCHLEGL T, SEEBÖCK P, WALDSTEIN S M, et al. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery[C]// Proceedings of the 2017 International Conference on Information Processing in Medical Imaging, LNCS 10265. Cham: Springer, 2017: 146-157. |
| [12] | DEECKE L, VANDERMEULEN R, RUFF L, et al. Image anomaly detection with generative adversarial networks[C]// Proceedings of the 2018 Joint European Conference on Machine Learning and Knowledge Discovery in Databases, LNCS 11051. Cham: Springer, 2019: 3-17. |
| [13] | SCHLEGL T, SEEBÖCK P, WALDSTEIN S M, et al. f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks[J]. Medical Image Analysis, 2019, 54: 30-44. |
| [14] | DING K, LI J, BHANUSHALI R, et al. Deep anomaly detection on attributed networks[C]// Proceedings of the 2019 SIAM International Conference on Data Mining. Philadelphia, PA: SIAM, 2019: 594-602. |
| [15] | FAN H, ZHANG F, LI Z. AnomalyDAE: dual autoencoder for anomaly detection on attributed networks[C]// Proceedings of the 2020 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway: IEEE, 2020: 5685-5689. |
| [16] | LIU F, MA X, WU J, et al. DAGAD: data augmentation for graph anomaly detection[C]// Proceedings of the 2022 IEEE International Conference on Data Mining. Piscataway: IEEE, 2022: 259-268. |
| [17] | LIU Y, LI Z, PAN S, et al. Anomaly detection on attributed networks via contrastive self-supervised learning[J]. IEEE Transactions on Neural Networks and Learning Systems, 2022, 33(6): 2378-2392. |
| [18] | JIN M, LIU Y, ZHENG Y, et al. ANEMONE: graph anomaly detection with multi-scale contrastive learning[C]// Proceedings of the 30th ACM International Conference on Information and Knowledge Management. New York: ACM, 2021: 3122-3126. |
| [19] | ZHANG J, WANG S, CHEN S. Reconstruction enhanced multi-view contrastive learning for anomaly detection on attributed networks[C]// Proceedings of the 31st International Joint Conference on Artificial Intelligence. California: ijcai.org, 2022: 2376-2382. |
| [20] | ZHENG Y, JIN M, LIU Y, et al. Generative and contrastive self-supervised learning for graph anomaly detection[J]. IEEE Transactions on Knowledge and Data Engineering, 2023, 35(12): 12220-12233. |
| [21] | GU X, AKOGLU L, RINALDO A. Statistical analysis of nearest neighbor methods for anomaly detection[C]// Proceedings of the 33rd International Conference on Neural Information Processing Systems. Red Hook: Curran Associates Inc., 2019: 10923-10933. |
| [22] | LI J, DANI H, HU X, et al. Radar: residual analysis for anomaly detection in attributed networks[C]// Proceedings of the 26th International Joint Conference on Artificial Intelligence. California: ijcai.org, 2017: 2152-2158. |
| [23] | PENG Z, LUO M, LI J, et al. ANOMALOUS: a joint modeling approach for anomaly detection on attributed networks[C]// Proceedings of the 27th International Joint Conference on Artificial Intelligence. California: ijcai.org, 2018: 3513-3519. |
| [24] | DING K, LI J, AGARWAL N, et al. Inductive anomaly detection on attributed networks[C]// Proceedings of the 29th International Joint Conferences on Artificial Intelligence. California: ijcai.org, 2020: 1288-1294. |
| [25] | BO D, WANG X, SHI C, et al. Beyond low-frequency information in graph convolutional networks[C]// Proceedings of the 35th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2021: 3950-3957. |
| [26] | MA M, NA S, WANG H. AEGCN: an autoencoder-constrained graph convolutional network[J]. Neurocomputing, 2021, 432: 21-31. |
| [27] | HE J, XU Q, JIANG Y, et al. ADA-GAD: anomaly-denoised autoencoders for graph anomaly detection[C]// Proceedings of the 38th AAAI International Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2024: 8481-8489. |
| [28] | CHANG W, LIU K, DING K, et al. Multitask active learning for graph anomaly detection[EB/OL]. [2025-04-24].. |
| [29] | DUAN J, WANG S, ZHANG P, et al. Graph anomaly detection via multi-scale contrastive learning networks with augmented view[C]// Proceedings of the 37th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2023: 7459-7467. |
| [30] | DUAN J, ZHANG P, WANG S, et al. Normality learning-based graph anomaly detection via multi-scale contrastive learning[C]// Proceedings of the 31st ACM International Conference on Multimedia. New York: ACM, 2023: 7502-7511. |
| [31] | PAN J, LIU Y, ZHENG Y, et al. PREM: a simple yet effective approach for node-level graph anomaly detection[C]// Proceedings of the 2023 IEEE International Conference on Data Mining. Piscataway: IEEE, 2023: 1253-1258. |
| [32] | BEI Y, ZHOU S, TAN Q, et al. Reinforcement neighborhood selection for unsupervised graph anomaly detection[C]// Proceedings of the 2023 IEEE International Conference on Data Mining. Piscataway: IEEE, 2023: 11-20. |
| [33] | DUAN J, XIAO B, WANG S, et al. ARISE: graph anomaly detection on attributed networks via substructure awareness[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024, 35(12): 18172-18185. |
| [34] | KONG X, LIU J, LI H, et al. Graph anomaly detection via diffusion enhanced multi-view contrastive learning[J]. Knowledge-Based Systems, 2025, 311: No.113093. |
| [1] | Hu LUO, Mingshu ZHANG. Rumor detection method based on cross-modal attention mechanism and contrastive learning [J]. Journal of Computer Applications, 2026, 46(2): 361-367. |
| [2] | Qi ZHONG, Shufen ZHANG, Zhenbo ZHANG, Yinlong JIAN, Zhongrui JING. Detection and defense mechanism for poisoning attacks to federated learning [J]. Journal of Computer Applications, 2026, 46(2): 445-457. |
| [3] | Wen LI, Kairong LI, Kai YANG. Subgraph-aware contrastive learning with data augmentation [J]. Journal of Computer Applications, 2026, 46(1): 1-9. |
| [4] | Xingyao YANG, Zheng QI, Jiong YU, Zulian ZHANG, Shuai MA, Hongtao SHEN. Session-based recommendation model based on time-aware and space-enhanced dual channel graph neural network [J]. Journal of Computer Applications, 2026, 46(1): 104-112. |
| [5] | Ziyang CHENG, Ruizhang HUANG, Jingjing XUE. Deep evolutionary topic clustering model [J]. Journal of Computer Applications, 2026, 46(1): 85-94. |
| [6] | Chao LIU, Yanhua YU. Knowledge-aware recommendation model combining denoising strategy and multi-view contrastive learning [J]. Journal of Computer Applications, 2025, 45(9): 2827-2837. |
| [7] | Zhixiong XU, Bo LI, Xiaoyong BIAN, Qiren HU. Adversarial sample embedded attention U-Net for 3D medical image segmentation [J]. Journal of Computer Applications, 2025, 45(9): 3011-3016. |
| [8] | Zhiyuan WANG, Tao PENG, Jie YANG. Integrating internal and external data for out-of-distribution detection training and testing [J]. Journal of Computer Applications, 2025, 45(8): 2497-2506. |
| [9] | Jin XIE, Surong CHU, Yan QIANG, Juanjuan ZHAO, Hua ZHANG, Yong GAO. Dual-branch distribution consistency contrastive learning model for hard negative sample identification in chest X-rays [J]. Journal of Computer Applications, 2025, 45(7): 2369-2377. |
| [10] | Zhenzhou WANG, Fangfang GUO, Jingfang SU, He SU, Jianchao WANG. Robustness optimization method of visual model for intelligent inspection [J]. Journal of Computer Applications, 2025, 45(7): 2361-2368. |
| [11] | Yulin HE, Xu LI, Yingting HE, Laizhong CUI, Zhexue HUANG. Subspace Gaussian mixture model clustering ensemble algorithm based on maximum mean discrepancy [J]. Journal of Computer Applications, 2025, 45(6): 1712-1723. |
| [12] | Mingfeng YU, Yongbin QIN, Ruizhang HUANG, Yanping CHEN, Chuan LIN. Multi-label text classification method based on contrastive learning enhanced dual-attention mechanism [J]. Journal of Computer Applications, 2025, 45(6): 1732-1740. |
| [13] | Wenjing YAN, Ruidong WANG, Min ZUO, Qingchuan ZHANG. Recipe recommendation model based on hierarchical learning of flavor embedding heterogeneous graph [J]. Journal of Computer Applications, 2025, 45(6): 1869-1878. |
| [14] | Ying HUANG, Shengmei GAO, Guang CHEN, Su LIU. Low-light image enhancement network combining signal-to-noise ratio guided dual-branch structure and histogram equalization [J]. Journal of Computer Applications, 2025, 45(6): 1971-1979. |
| [15] | Chaoying JIANG, Qian LI, Ning LIU, Lei LIU, Lizhen CUI. Readmission prediction model based on graph contrastive learning [J]. Journal of Computer Applications, 2025, 45(6): 1784-1792. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||