<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Multi-Perspective Anomaly Detection on Bipartite Multi-Layer Social Interaction Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Asep Maulana</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Atzmueller</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>German Research Center for Artificial Intelligence (DFKI)</institution>
          ,
          <addr-line>Berghofstraße 11, 49090 Osnabrück</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Langlangbuana University, Department of Informatics Engineering</institution>
          ,
          <addr-line>Jl. Karapitan No.116, Bandung</addr-line>
          ,
          <country country="ID">Indonesia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Semantic Information Systems Group, Osnabrück University</institution>
          ,
          <addr-line>Wachsbleiche 27, 49090 Osnabrück</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Simula Research Laboratory</institution>
          ,
          <addr-line>Kristian</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Anomaly detection is a prominent research direction in machine learning and complex network analysis. In this paper, we target a special type of complex networks, i. e., bipartite multi-layer networks. Here, we exploit the properties of such a complex network, i. e., the partitioning of the set of nodes into two groups, and its multi-layer characteristics. Our proposed approach includes many-objective optimization, correlation analysis and clustering - based on Eigenvector centrality - incorporated into a novel framework for identifying candidates for anomalous nodes from multiple perspectives, in a human-centered interpretable way. We exemplify the application of the proposed approach in a case study using a real-world dataset on socio-spatial interaction data.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>these are based on the notion of centrality, specifically Eigenvector centrality for anomaly
detection, forming a combined interpretable approach including many-objective optimization,
as well as correlation and cluster analysis. These methods are combined into a methodological
framework, for providing the diferent perspectives and to enable assessment by also analyzing
potential commonalities and diferences pointed to by the incorporated methods, respectively.</p>
      <p>
        We build on our previous works [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] for (1) anomaly detection using multi-objective
optimization, as well as (2) a complementing approach for applying Eigenvector centrality for
anomaly detection in a human-centered approach. In particular, in this paper we integrate these
methods into a novel framework for recognizing and finding anomalous behavior in a complex
network represented as a bipartite multi-layer network, e. g., relating to diferent relationships
or edge types connecting the respective nodes of the network.
      </p>
      <p>In short, our presented approach starts by making projections of the bipartite network. Then,
from those projections and each layer, we estimate the centrality of all its contained nodes.
Next, we apply many objective optimization to identify the Pareto Front, as a basis for finding
a set of anomalous nodes with minimal centrality. In addition, we apply correlation analysis
on the centrality properties, and can further categorize nodes using clustering into positively
correlated, negatively correlated (i. e., very diferent) or non-correlated nodes, as complementing
perspectives in assessing anomalous nodes in an interpretable way.</p>
      <p>In more detail, our proposed approach consists of the following steps:
1. Given the network represented as a bipartite multi-layer graph, we perform
manyobjective optimization based on minimizing eigenvector centrality on bipartite projections
of the multi-layer network. With the minimization, we aim at obtaining the set of the
least important nodes according to eigenvector centrality, as candidates for anomalous
nodes. This provides us with our first perspective for identifying anomalies, given by
the Pareto-Front of the least important nodes according to their (minimized) eigenvector
centrality.
2. Using the vector of centrality values for a node in each layer, we perform correlation
analysis with respect to all other nodes, resulting in a correlation matrix and according
heatmap perspective, respectively, to visually inspect anomalies.
3. Finally, we can apply clustering on the correlation matrix for obtaining clusters of nodes,
as another perspective for detecting (sets of) anomalous nodes.</p>
      <p>Overall, this enables the identification of anomaly candidates from multiple perspectives; this
then facilitates a human-centered process for analysis and assessment with a human-in-the-loop.
In particular, by making use of interpretable representations and visualizations, e. g., given by
subnetwork visualizations of anomaly candidates, heatmap visualizations of clusters at the level
of node vectors as well as comprehensive cluster diagrams. Then, this thus further provides for
a transparent process and comprehensible approach.</p>
      <p>
        It is important to note, that our approach tackles the novel problem of anomaly detection
on bipartite multi-layer networks. There exist methods for anomaly detection in bipartite
networks [
        <xref ref-type="bibr" rid="ref4">4, 5</xref>
        ], and multi-layer networks [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ], however, to the best of the authors’ knowledge,
there is no approach tackling the combined setting of anomaly detection on bipartite multi-layer
networks. Compared to our previous work in [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ], we specifically extend on the integration
of the methods on bipartite multi-layer networks, and present a framework which integrates
diferent methods for anomaly detection, while providing distinctive and complementing
perspectives for analysis in a human-centered approach. This also facilitiates interpretability and
explainability of the whole approach and its respective results in anomaly detection.
      </p>
      <p>Our contributions are summarized as follows:
1. We present a novel framework incorporating many-objective optimization and
centralitybased analysis for identifying a set of anomalous nodes on bipartite multi-layers networks,
using complementing distinctive perspectives.
2. We exemplify our proposed approach using a case study. Our context is given by a
real-world dataset of socio-spatial interactions [6]. Applying our approach on the dataset,
we illustrate the key steps providing simple to interpret perspectives on the respective
network structures; altogether, this demonstrates the efectiveness of our approach in
this real-world dataset.</p>
      <p>The rest of the paper is organized as follows: Section 2 discusses related work. After that,
Section 3 describes our approach in detail. Next, Section 4 presents and discusses our results.
Finally, Section 5 concludes with a summary and outlines several interesting directions for
future research.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work and Background</title>
      <p>In the following, we briefly introduce basic notation and background on the foundational
concepts of bipartite and multi-layer networks, represented as graphs. After that, we summarize
related work on anomaly detection, also considering methods for bipartite and multi-layer
networks.</p>
      <sec id="sec-2-1">
        <title>2.1. Bipartite and Multi-Layer Complex Networks</title>
        <p>Formally, a bipartite Graph  is given by a triple  = (, , ) with  ,  being sets of
vertices, where  ∩  = ∅. Furthermore, for the set of edges  it holds that for every edge
 ∈  :  = (, ) with  ∈ ,  ∈  or vice versa  ∈ ,  ∈  .</p>
        <p>For multi-layer (or multiplex) networks, we distinguish a set of layers – modeling sets of
edges corresponding to relations, denoted by  ⊆ ,  ∈ {1...}, where  indicates the
number of layers. A multiplex network  can then be represented formally as follows:
 = (1, 2, . . . , , . . . , ), where  = (, ),  ⊆  . Figure 1 shows an illustration
of a multi-layer network. Here, each network  is represented by the adjacency matrix  with
the elements  , for which  &gt; 0, if there is a positive weight of the link between the pair of
nodes  and , ,  ∈  in layer , and  = 0 otherwise. To simplify the formalization
of weighted multiplex networks, we will consider only taking a positive integer value or zero
with respect to the link between any pair of such nodes  and  in layer .</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Anomaly Detection in Complex Networks</title>
        <p>
          Detecting anomalies in (complex) networks data is a prominent research direction, with many
practical applications. A classical definition of an anomaly [ 7] states it as “an outlier is an
observation that difers so much from other observations as to arouse suspicion that it was
generated by a diferent mechanism” [ 7]. Furthermore, for anomalies in complex networks,
the general graph anomaly detection problem can be defined as follows: “Given a [. . . ] graph
database, find the graph objects [. . . ] that are rare and that difer significantly from the majority
of the reference objects in the graph” [8]. However, as we have already discussed in [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3, 9</xref>
          ] in
real-world networks often more complex phenomena are modeled using richer representations.
For example, if there are multiple relationships between nodes, and/or multiple types of nodes,
then these instantiations are dificult to capture only using simple networks/graphs.
        </p>
        <p>
          Beyond simple graphs and multi-layer networks, we extend our view on more complex
structures, i. e., towards (multi-layer) bipartite graph representations, as discussed below in
more detail. In particular, our proposed approach builds on our
multi-objective-optimizationbased method for anomaly detection in multi-layer networks [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ] which we integrate for
obtaining candidates for anomalous nodes – being complemented by additional methods for
anomaly assessment from multiple (multi-layer) perspectives. Regarding bipartite networks,
[
          <xref ref-type="bibr" rid="ref4">4, 10</xref>
          ] investigate neighborhood formation and anomaly detection in bipartite networks, for (1)
identifying similar nodes (relevance) and finding anomalous ones based on their neighborhood
structure. They evaluate their algorithm on synthetic data. Furthermore, [5] discuss anomaly
detection on bipartite graphs in a supervised setting, exploring the bipartite structure of the
networks.
        </p>
        <p>
          We have proposed a method in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] which employs many-objective optimization based on
minimizing a given centrality measure. As already discussed, we directly integrate this method
in our proposed approach. Next, [11] discuss anomaly detection in multiplex networks via a
cross-layer metric indicating anomalous nodes. Furthermore, [12] focus on anomaly detection
in social networks, while [13] presents a method for anomaly detection on attributed multiplex
networks.
        </p>
        <p>Altogether, in contrast to those approaches discussed above, we provide an unsupervised
exploratory anomaly detection approach, embedded into a human-centered process, focusing
on interpretable representations and visualizations. Furthermore, we focus on the novel special
case of bipartite multi-layer networks, and present a novel combined approach tackling this. In
a case study using a real-world dataset, we also discuss respective implications.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Method</title>
      <p>Below, we first provide a bird’s eye view on our proposed approach, before we discuss two
of its core components, i. e., network centrality, and the applied method for many-objective
optimization. Due to the limited space, we summarize correlation and -means clustering below
and refer to e. g., [14, 15] for details.</p>
      <sec id="sec-3-1">
        <title>3.1. Analytical Framework – A Bird’s Eye View</title>
        <p>Below, we outline the individual steps of proposed approach:
1. We start with the bipartite multi-layer network; here, each layer is a bipartite network.</p>
        <p>
          We preprocess the network, constructing according bipartite projections for the individual
layers of the given multi-layer network. That is, for  = (, , ) an edge is created
concerning a pair of nodes in  ( , respectively), whenever their intersection  of
connected nodes in  ( , respectively), is not empty, for which we then assign || as the
new weight of that edge.
2. Given the preprocessed network, we perform many-objective optimization using
minimization on the eigenvector centrality values applying the method presented in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
This means, that we aim to identify the Pareto-Front of the least important nodes in the
network w.r.t. the nodes’ eigenvector centrality.
3. Using the obtained centrality values, we perform correlation analysis on the multi-layer
network for each node: We create a vector for each node consisting of the centrality
values of each layer. That means, for  layers, we create a tuple (1, . . . , ) where 
denotes the centrality value of layer . Using these tuples, we create a correlation matrix
 between all nodes, denoting the (Pearson) correlation between every pair of nodes,
such that an entry  in the matrix  indicates the correlation between node  and
node . Using a heatmap, this can then be visually inspected.
4. In addition, we perform -means clustering on a set of nodes, e. g., the Pareto Front
given the correlation matrix  . Here  is selectable by the user, e. g., in an interactive
approach. For  = 3, for example, we can aim to cluster according to positively correlated,
negatively correlated (i. e., very diferent) and non-correlated nodes. From each cluster,
we can then calculate the average of the node centrality values. The cluster with the
lowest average of the node centrality values can then be used as an indicator regarding
the most anomalous set of nodes.
        </p>
        <p>Starting Point:</p>
        <p>Bipartite Network / Layers
(I)</p>
        <p>(II)
Methological Process - Overview
(III)</p>
        <p>Preprocessed
Multi-Layer
Bipartite
Projections</p>
        <p>Constructing Multi-Layer Bipartite Projected Networks</p>
        <p>Many-Objective
Optimization
è Pareto Front</p>
        <p>Multi-Perspective Analysis
(1) Pareto Front View
(2) Correlation View
(3) Clustering View</p>
        <p>Semi-Automatic &amp;
Human-in-the-loop</p>
        <p>Assessment</p>
        <p>
          With this approach, we can identify anomaly candidates from those given multiple
perspectives. First, the obtained Pareto-Front can be applied in order to find a group of nodes as
candidates for anomalies – i. e., having the least importance with respect to their centrality,
as we have discussed in [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ]. Second, the correlation analysis together with its heatmap
representation provides a summarized view on the multi-layer centralities which is further
condensed using the clustering approach, as the most abstracted representation. In this way,
these perspectives are both complementary as well as providing diferent levels of abstraction. In
a human-centered-approach – similar to the Information Seeking Mantra by Shneiderman [16] –
the respective operations overview, browse and zoom and details-on-demand are then enabled
by our presented perspectives.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Centrality-Based Many-Objective Optimization Approach</title>
        <p>
          In network science, there are special methods for finding the most influential nodes [ 17] in the
network using the notion of the so-called network centrality, which considers, for example,
degree or the connection (structure) to other nodes. In particular, there is Eigenvector centrality,
which considers the number of links from other nodes, their importance, and to how many
these other nodes the respective nodes themselves point to, e. g., [18, 19]. For our proposed
approach, we apply eigenvector centrality, since this precisely corresponds to our intuition for
estimating the notion of connections to important nodes and/or parts of the network, which is
relevant for anomaly detection, as discussed in [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ].
        </p>
        <p>
          In particular, in our proposed approach, we integrate a method which we presented in [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ]. In
summary, it estimates the centrality of all nodes on all layers of multi-layer network, followed by
applying many-objective optimization with full enumeration of all layers based on a minimation
problem to find the Pareto Front. That is, we utilize the Pareto Front as a non-dominated solution
generated by many-objective optimization for minimization as a basis to extract a set of anomaly
candidates, i. e., a set of suspected anomalous nodes from the network. For a detailed discussion,
we refer to [
          <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Case Study: Results and Discussion</title>
      <p>Below, we present the results of a case study exemplifying the presented approach in the context
of a real-world socio-spatial dataset capturing human interactions [6]. Before that, we briefly
summarize the applied dataset and its characteristics.</p>
      <sec id="sec-4-1">
        <title>4.1. Applied Dataset: Interactions, Preferences and Perceptions</title>
        <p>For demonstrating our approach, we provide a case study using a real-world dataset of bipartite
network data. For details on the dataset, we refer to [6]. Essentially, the dataset is given by
a set of bipartite networks which form a multiplex network, capturing interactions as well
as preferences and perception of students attending a student career day; here, face-to-face
proximity contacts between participants and companies were estimated between stationary
sensors (denoting companies) and a wearable sensors worn by the participants with diferent
signal strength thresholds, resulting in three diferent interaction networks. Furthermore,
participants indicated preferences with respect to companies, as well as their perception which
company they had really visited.</p>
        <p>In total, for 59 participants as well as for 26 companies information is modeled. Specifically,
the applied dataset [6] contains the following networks, as described in [6] in detail:
1. Socio-spatial interaction networks, taking the proximity contacts and a threshold on
the received signal strength indicator (RSSI), selecting the contacts (as edges) that are
stronger than the applied threshold. As individual thresholds, values of RSSI={-90, -93,
-95} dBm, relating to stronger to weaker contacts were applied, resulting in the according
networks. For a more detailed discussion we refer to [6].
2. A preference network [6]: An edge is created between participant  and company 
whenever  selected  as a preference.
3. A perception network [6]: Here, an edge is created between participant  and company 
whenever  perceived having visited .</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Case Study: Anomaly Detection in Socio-Spatial Interactions</title>
        <p>In the following, we apply our approach and its proposed methods for identifying a set of
anomalous nodes on the applied bipartite multi-layer network. Since the bipartite network
consists of nodes in the participant as well as the company group, we first apply respective
bipartite projections of the respective bipartite networks to those groups, respectively their
nodes. The applied bipartite network data consists of five single networks, i. e., on the applied
90, 93, and 95 RSSI thresholds, as well as the perception and preference networks (corresponding
to the layers  1, . . .  5 in the tables below). After performing the projections, we merge the
single networks into a multi-layer network. With this, we thus overall obtain two multi-layer
networks, focusing on the student or the company view. With this, each multi layer network
consists of the described 5 layers. In a next step, we estimate the centrality for all nodes in all
layers and applying many-objective optimization through minimization. Via many-objective
optimization (as our first perspective), for the student multi-layer network (59 nodes), we found
18 nodes contained in the Pareto Front as shown in Table 1; from the multi-layer company
network (26 nodes), we found 6 nodes contained in the Pareto Front, as shown in Table 2.
(nodes are marked in green color). F1 is a node centrality in layer1, F2 is a node centrality in layer2,</p>
        <p>Using the set of nodes in the Pareto Front as a candidate basis of anomalous nodes, we can
apply correlation analysis as a complementing perspective (visualized as a heatmap) in order
to understand the correlation and the proximity of each node compared to all other nodes in
the Pareto Front better in the context of node centrality. For this, we compute the Pearson
correlation values as described above. In Figure 3 we show the resulting heatmaps. The cluster
perspectives are shown in Figure 4 given the respective Pareto fronts and visualization the
according dimensions as discussed above.</p>
        <p>As shown in Figure 3, for the correlation analysis in the student multi-layer network, we
observe that the node of student 1 (NS1) is highly correlated regarding centrality (i. e., with
very similar role of centrality) compared to the nodes NS58, NS6 and NS59 that are depicted in
dark blue color; on the contrary, node NS1 is conflicting (i. e., with a diferent role of centrality)
compared to nodes NS19, NS27, NS25, and NS57. Also, it is visible that NS1 has a considerable
“conflict” with node NS14 (depicted in darker red color). Likewise, for the correlation analysis in
the company multi-layer network, we can identify some distinctive results, regarding the set of
nodes in the Pareto Front. In Figure 3, for example, we observe that the node of company 1 (NC1)
is highly correlated with nodes NC14, NC22, NC24 and NC26; however, here we also observe
that node NC1 is conflicting with NC17. For grouping the nodes according to their correlation,
we utilize -means clustering for further assessing interesting nodes (in the Pareto Front and/or
as indicated by correlation analysis). Then, from the formed clusters, we continue by calculating
the average of the centrality for each cluster and compare these centrality averages to all other
clusters in order to estimate the lowest average centrality. This lowest average centrality of a
cluster can then be applied in categorizing clusters of anomalous nodes in the network.</p>
        <p>In our case, considering the nodes in the respective Pareto Fronts, for the student
multi-layer network we obtained 18 nodes, consisting of 3 clusters, for which 1 =
{NS1 , NS6 , NS7 , NS9 , NS11 , NS16 , NS18 NS58 }, 2 = {NS14 , NS19 , NS25 , NS26 }
and 3 = {NS8 , NS22 , NS27 , NS33 , NS58 , NS59 }. From those clusters, we
observe that cluster 3 has the lowest average centrality, and therefore the nodes
NS8 , NS22 , NS27 , NS33 , NS58 , NS59 can be categorized as anomalous node candidates for
the student network. Likewise, from the company multi-layer network, we obtain 3 clusters,
1 = {NC17 }, 2 = NC14 }, and 3 = {NC1 , NC22 , NC24 , NC26 }, where the lowest
average centrality is found at cluster 1.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>In this paper, we proposed an approach for anomaly detection on bipartite multi-layer networks.
We exemplified the approach in the context of socio-spatial interactions using a real-world
dataset of human interactions. Specifically, our proposed approach integrates many-objective
optimization, correlation analysis, as well as clustering for obtaining diferent yet complementing
perspectives for anomaly detection in a human-centered way. This is facilitated, in particular, by
the transparent and interpretable representations and visualizations, as we have also exemplified
in our case study. For future work, we intend to extend the analysis by incorporating further
methods and metrics investigating further real-world phenomena about potential anomalies [20],
e. g., also including profiling [ 21] as well as exceptional subgraph mining techniques [22]. In
addition, we aim to extend the analysis by incorporating attributed network information into
the detection algorithms, e. g., [23, 24].
[5] H. Li, C. Zhao, Y. Liu, X. Zhang, Anomaly detection by discovering bipartite structure on
complex networks, Computer Networks 190 (2021) 107899.
[6] M. Atzmueller, C. Güven, S. Masiala, R. Mackenbach, P. Shayan, W. Liebregts, Behavioral
Analysis on Socio-Spatial Interaction Networks concerning User Preferences, Interactions
and their Perception, in: Proc. ABIS 2019/ACM Hypertext 2019, ACM, 2019.
[7] D. Hawkins, Identification of Outliers, Monographs on Statistics and Applied Probability,</p>
      <p>Springer Netherlands, 1980.
[8] L. Akoglu, H. Tong, D. Koutra, Graph Based Anomaly Detection and Description, Data</p>
      <p>Min Knowl Disc 29 (2015) 626–688.
[9] A. Maulana, M. T. Emmerich, Towards many-objective optimization of eigenvector
centrality in multiplex networks, in: Proc. International Conference on Control, Decision and
Information Technologies, IEEE, 2017, pp. 0729–0734.
[10] J. Sun, H. Qu, D. Chakrabarti, C. Faloutsos, Relevance search and anomaly detection in
bipartite graphs, ACM SIGKDD Explorations Newsletter 7 (2005) 48–55.
[11] R. Mittal, M. Bhatia, Anomaly detection in multiplex networks, Procedia Computer Science
125 (2018) 609–616.
[12] P. Bindu, P. S. Thilagam, D. Ahuja, Discovering suspicious behavior in multilayer social
networks, Computers in Human Behavior 73 (2017).
[13] M. Bansal, D. Sharma, Ranking and discovering anomalous neighborhoods in attributed
multiplex networks, in: Proc. ACM IKDD CoDS and 25th COMAD, ACM, 2020, pp. 46–54.
[14] J. MacQueen, Some Methods for Classification and Analysis of Multivariate Observations,</p>
      <p>Fifth Berkeley Symposium on Mathematical Statistics and Probability 1 (1967) 281–297.
[15] L. Sachs, Angewandte Statistik: Anwendung Statistischer Methoden, Springer, 2013.
[16] B. Shneiderman, The Eyes Have It: A Task by Data Type Taxonomy for Information
Visualizations, in: Proc. IEEE Symposium on Visual Languages, Boulder, Colorado, 1996,
pp. 336–343.
[17] P. Bonacich, P. Lloyd, Eigenvector-like measures of centrality for asymmetric relations,</p>
      <p>Social networks 23 (2001) 191–201.
[18] M. Barthelemy, Betweenness centrality in large complex networks, The European physical
journal B 38 (2004) 163–168.
[19] L. Page, S. Brin, R. Motwani, T. Winograd, The PageRank citation ranking: Bringing order
to the web., Technical Report, Stanford InfoLab, 1999.
[20] M. Atzmueller, Onto Model-based Anomalous Link Pattern Mining on Feature-Rich Social</p>
      <p>Interaction Networks, in: Proc. WWW (Companion), IW3C2 / ACM, 2019.
[21] M. Atzmueller, F. Lemmerich, B. Krause, A. Hotho, Who are the Spammers? Understandable
Local Patterns for Concept Description, in: Proc. 7th Conference on Computer Methods
and Systems, Oprogramowanie Nauko-Techniczne, Krakow, Poland, 2009.
[22] M. Atzmueller, H. Soldano, G. Santini, D. Bouthinon, MinerLSD: Eficient Mining of Local</p>
      <p>Patterns on Attributed Networks, Applied Network Science 4 (2019).
[23] R. Interdonato, M. Atzmueller, S. Gaito, R. Kanawati, C. Largeron, A. Sala, Feature-Rich
Networks: Going Beyond Complex Network Topologies, Applied Network Science 4
(2019).
[24] M. Atzmueller, S. Günnemann, A. Zimmermann, Mining communities and their
descriptions on attributed graphs: a survey, DMKD 35 (2021).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Koptelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Crémilleux</surname>
          </string-name>
          , L. Soualmia,
          <article-title>Link prediction via community detection in bipartite multi-layer graphs</article-title>
          ,
          <source>in: Proc. Annual ACM Symposium on Applied Computing</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>430</fpage>
          -
          <lpage>439</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Maulana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Atzmueller</surname>
          </string-name>
          ,
          <article-title>Centrality-based anomaly detection on multi-layer networks using many-objective optimization</article-title>
          ,
          <source>in: Proc. International Conference on Control, Decision and Information Technologies</source>
          , volume
          <volume>1</volume>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>633</fpage>
          -
          <lpage>638</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Maulana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Atzmueller</surname>
          </string-name>
          ,
          <article-title>Many-objective optimization for anomaly detection on multilayer complex interaction networks</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>4005</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Qu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chakrabarti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Faloutsos</surname>
          </string-name>
          ,
          <article-title>Neighborhood formation and anomaly detection in bipartite graphs</article-title>
          ,
          <source>in: Proc. IEEE ICDM, IEEE</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>8</fpage>
          -pp.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>