<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">MG-GNN: Enhancing GNNs for Anomaly Detection via Minority Class Sample Generation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ronghui</forename><surname>Guo</surname></persName>
							<email>ronghui_guo@tju.edu.cn</email>
							<affiliation key="aff0">
								<orgName type="department">College of Intelligence and Computing</orgName>
								<orgName type="institution">Tianjin University</orgName>
								<address>
									<postCode>300350</postCode>
									<settlement>Tianjin</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Minghui</forename><surname>Zou</surname></persName>
							<email>minghuizou@tju.edu.cn</email>
							<affiliation key="aff0">
								<orgName type="department">College of Intelligence and Computing</orgName>
								<orgName type="institution">Tianjin University</orgName>
								<address>
									<postCode>300350</postCode>
									<settlement>Tianjin</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sai</forename><surname>Zhang</surname></persName>
							<email>zhang_sai@tju.edu.cn</email>
							<affiliation key="aff0">
								<orgName type="department">College of Intelligence and Computing</orgName>
								<orgName type="institution">Tianjin University</orgName>
								<address>
									<postCode>300350</postCode>
									<settlement>Tianjin</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Xiaowang</forename><surname>Zhang</surname></persName>
							<email>xiaowangzhang@tju.edu.cn</email>
							<affiliation key="aff0">
								<orgName type="department">College of Intelligence and Computing</orgName>
								<orgName type="institution">Tianjin University</orgName>
								<address>
									<postCode>300350</postCode>
									<settlement>Tianjin</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Zhiyong</forename><surname>Feng</surname></persName>
							<email>zyfeng@tju.edu.cn</email>
							<affiliation key="aff0">
								<orgName type="department">College of Intelligence and Computing</orgName>
								<orgName type="institution">Tianjin University</orgName>
								<address>
									<postCode>300350</postCode>
									<settlement>Tianjin</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">MG-GNN: Enhancing GNNs for Anomaly Detection via Minority Class Sample Generation</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">19BF9FEA66A74F77CE3A4032C19384FB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Graph anomaly detection</term>
					<term>Class imbalance</term>
					<term>Graph neural networks</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Anomaly detection distinguishes anomalies from normals. In an anomaly graph, both anomalies and normals are represented as nodes, with their relationships denoted by edges. However, in graph anomaly detection, the number of anomalous nodes is typically far fewer than that of normal nodes. To address the issue of class imbalance, existing Graph Neural Networks (GNNs) tend to overlook anomalous (minority class) node samples, resulting in suboptimal performance. To solve this, we propose a method MG-GNN, which generates minority class samples for GNN in the hidden space, thereby improving the classification performance for anomalous nodes. Experiments have demonstrated the effectiveness of our method in solving this problem.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Typically, the graph anomaly detection (GAD) task is treated as a semi-supervised binary node classification problem (normal vs. anomalous). However, in an anomaly graph, the number of anomalies is significantly lower than normals. Generally, efforts to adapt GNNs to classimbalanced graphs can be broadly categorized into two types <ref type="bibr" target="#b0">[1]</ref>: data-level and algorithm-level methods. Data-level methods typically attempt to balance class distribution by pre-processing the training samples using oversampling or undersampling techniques <ref type="bibr" target="#b1">[2]</ref>. Algorithm-level methods consider misclassification costs to focus more on minority classes or to ignore majority classes, thereby mitigating the impact of class imbalance <ref type="bibr" target="#b2">[3]</ref>.</p><p>However, recent GAD methods struggle to adapt to this extreme class imbalance, leading to poor classification performance for anomalous nodes (minority class). Table <ref type="table">1</ref> summarizes the distribution of the two classes of nodes in the YelpChi <ref type="bibr" target="#b3">[4]</ref> and Amazon <ref type="bibr" target="#b4">[5]</ref> datasets, as well as the test accuracy of a recent GNN for these two classes. It is evident that anomalies constitute only a small portion of the total nodes, and the prediction accuracy for anomalies is significantly lower than that for normals.</p><p>In this poster, we propose a method MG-GNN to solve this problem, which generates minority class samples for GNN in the hidden space, mitigating the negative impact of class imbalances. Specifically, we first use a GNN to map the node feature and structural information into hidden</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The distribution of the number of nodes in the YelpChi and Amazon datasets, and the test accuracy of BWGNN <ref type="bibr" target="#b5">[6]</ref>  space. Then, based on the hidden representations of the minority class, we generate a large number of minority nodes to achieve a relatively balanced class distribution before performing classification. The experiments show that our method can handle the class imbalance issues.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Methodology</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Problem Definition</head><p>Given an anomaly graph 𝒢 containing both normal and anomalous nodes, the objective is to learn a classifier 𝑓 (•) based on the graph 𝒢 and a set of partially labeled nodes 𝑌 Train . The aims to predict the labels of the unlabeled nodes 𝑌 ˆTest, where 1 represents anomalies and 0 represents normal nodes. The task can be formalised as:</p><formula xml:id="formula_0">𝑓 (𝒢, 𝑌 𝑇 𝑟𝑎𝑖𝑛 ) → 𝑌 ˆ𝑇 𝑒𝑠𝑡<label>(1)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Model Overview</head><p>Our model, MG-GNN, consists of three main components. First, a GNN encoder transforms the node feature and structural information into hidden space. Next, based on the representation of the minority class in the hidden space, a large number of nodes representing the minority class are generated, ensuring that the numbers of normal and anomalous classes are relatively balanced. Finally, a classifier is used to perform classification under these balanced conditions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">GNN Decoder</head><p>To encode the anomaly graph, we utilize BWGNN as the backbone network due to its lowand band-pass characteristics. It is noteworthy that we do not use GCN <ref type="bibr" target="#b6">[7]</ref> as the encoder here because GCN is based on the homophily assumption and cannot adequately handle the heterophily of anomaly graphs. The decoder is defined as</p><formula xml:id="formula_1">𝐻 = BWGNN(𝐴, 𝑋)<label>(2)</label></formula><p>where 𝑋 ∈ R 𝑁 ×𝑑 represents the raw node features, 𝐴 is the adjacency matrix of the graph, and 𝐻 is the node representation in hidden space.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Synthetic Node Generator</head><p>After obtaining the node representations 𝐻, we use SMOTE <ref type="bibr" target="#b7">[8]</ref> to generate synthetic anomalies. The basic idea is to interpolate between samples of the target minority class and their nearest neighbors in the hidden space. Specifically, let ℎ 𝑣 ∈ 𝐻 represent the representation of an anomalous 𝑣. First, the nearest node ℎ 𝑢 ∈ 𝐻 of node 𝑣 is found based on Euclidean distance:</p><formula xml:id="formula_2">𝑢 = argmin 𝑚 ‖ℎ 𝑚 − ℎ 𝑣 ‖, ℎ 𝑚 ∈ 𝐻<label>(3)</label></formula><p>where, unlike <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>, we do not require node 𝑢 to necessarily be an anomaly class, as recent research <ref type="bibr" target="#b10">[11]</ref> has shown that this strategy can better expand the decision space of anomalies. Then, we generate a new minority class node ℎ 𝑢 through linear interpolation:</p><formula xml:id="formula_3">ℎ 𝑘 = 𝛿ℎ 𝑣 + (1 − 𝛿)ℎ 𝑢<label>(4)</label></formula><p>where 𝛿 ∈ [0, 1] is sampled from the Beta distribution. The synthesized node 𝑘 is labeled as an anomalous node. Therefore, we can obtain a large number of synthesized anomalous nodes. Additionally, we can select more nearest neighbors to get more synthetic anomalous nodes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Classifier</head><p>After synthesizing a large number of nodes, we stack the representations of the original nodes with the synthesized abnormal nodes to obtain a more balanced class, denoted as 𝐻 ′ . Finally, we use another MLP as a classifier for final prediction.</p><p>𝑌 ˆ= 𝑠𝑜𝑓 𝑡𝑚𝑎𝑥(𝑀 𝐿𝑃 (𝐻 ′ ))</p><p>Finally, the loss is calculated using cross-entropy. It is important to note that the loss is computed not only for the original nodes but also for the synthesized anomalous nodes. We employ three widely used class equalization metrics for fair comparisons, namely F1macro, AUC and GMean. The experimental results from Table <ref type="table" target="#tab_1">2</ref> show that after generating a large number of anomaly class nodes using our method, the class imbalance is better handled and the overall performance is improved. Additionally, from Table <ref type="table" target="#tab_2">3</ref> and Table <ref type="table">1</ref> we observe a significant improvement in the accuracy of anomalies, while the accuracy of correct nodes remains largely unaffected. This demonstrates that our method effectively mitigates the impact of class imbalance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Experiments</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>In this poster, we propose a method MG-GNN, which generates minority class samples for GNN in the hidden space. Experimental results demonstrate that our method can enhance the classification performance of anomalous nodes while having minimal impact on normal nodes.</p><p>In future work, we are interested in addressing the issue of class imbalance by leveraging the original distribution of the graph.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>for anomalies and normals.</figDesc><table><row><cell cols="4">Dataset # Nodes (Anomaly%) Anomaly Acc(%) Normal Acc(%)</cell></row><row><cell>YelpChi</cell><cell>45,954 (14.53%)</cell><cell>61.03</cell><cell>91.76</cell></row><row><cell>Amazon</cell><cell>11,944 (6.87%)</cell><cell>82.42</cell><cell>97.54</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Performance Results.</figDesc><table><row><cell>Dataset</cell><cell></cell><cell>YelpChi</cell><cell></cell><cell></cell><cell>Amazon</cell><cell></cell></row><row><cell>Metric</cell><cell cols="6">F1-macro AUC GMean F1-macro AUC GMean</cell></row><row><cell>BWGNN</cell><cell>76.92</cell><cell>90.47</cell><cell>75.68</cell><cell>91.45</cell><cell>96.61</cell><cell>90.12</cell></row><row><cell>MG-GNN</cell><cell>78.85</cell><cell>92.57</cell><cell>78.09</cell><cell>92.83</cell><cell>98.14</cell><cell>91.72</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>The test accuracy of MG-GNN for anomalies and normals.</figDesc><table><row><cell cols="3">Dataset Anomaly Acc(%) Normal Acc(%)</cell></row><row><cell>YelpChi</cell><cell>71.72</cell><cell>90.70</cell></row><row><cell>Amazon</cell><cell>85.42</cell><cell>97.21</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported by the Project of Science and Technology Research and Development Plan of China Railway Corporation (N2023J044).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Graphsr: A data augmentation algorithm for imbalanced node classification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Gong</surname></persName>
		</author>
		<idno type="DOI">10.1609/AAAI.V37I4.25622</idno>
		<ptr target="https://doi.org/10.1609/aaai.v37i4.25622.doi:10.1609/AAAI.V37I4.25622" />
	</analytic>
	<monogr>
		<title level="m">Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Williams</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Neville</surname></persName>
		</editor>
		<meeting><address><addrLine>Washington, DC, USA</addrLine></address></meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2023">February 7-14, 2023. 2023</date>
			<biblScope unit="page" from="4954" to="4962" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Pick and choose: A gnn-based imbalanced learning approach for fraud detection</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Ao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>He</surname></persName>
		</author>
		<idno type="DOI">10.1145/3442381.3449989</idno>
		<idno>doi:10.1145/3442381.3449989</idno>
		<ptr target="https://doi.org/10.1145/3442381.3449989" />
	</analytic>
	<monogr>
		<title level="m">WWW &apos;21: The Web Conference 2021, Virtual Event</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Grobelnik</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Najork</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Zia</surname></persName>
		</editor>
		<meeting><address><addrLine>Ljubljana, Slovenia</addrLine></address></meeting>
		<imprint>
			<publisher>ACM / IW3C2</publisher>
			<date type="published" when="2021">April 19-23, 2021. 2021</date>
			<biblScope unit="page" from="3168" to="3177" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">DAGAD: data augmentation for graph anomaly detection</title>
		<author>
			<persName><forename type="first">F</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Xue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Beheshti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">Z</forename><surname>Sheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Aggarwal</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICDM54844.2022.00036</idno>
		<ptr target="https://doi.org/10.1109/ICDM54844.2022.00036.doi:10.1109/ICDM54844.2022.00036" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Data Mining, ICDM 2022</title>
				<editor>
			<persName><forename type="first">X</forename><surname>Zhu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Ranka</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Thai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Washio</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Wu</surname></persName>
		</editor>
		<meeting><address><addrLine>Orlando, FL, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2022-12-01">November 28 -Dec. 1, 2022. 2022</date>
			<biblScope unit="page" from="259" to="268" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Collective opinion spam detection: Bridging review networks and metadata</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rayana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Akoglu</surname></persName>
		</author>
		<idno type="DOI">10.1145/2783258.2783370</idno>
		<idno>doi:10.1145/2783258.2783370</idno>
		<ptr target="https://doi.org/10.1145/2783258.2783370" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Cao</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Zhang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Joachims</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><forename type="middle">I</forename><surname>Webb</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Margineantu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Williams</surname></persName>
		</editor>
		<meeting>the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining<address><addrLine>Sydney, NSW, Australia</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">August 10-13, 2015. 2015</date>
			<biblScope unit="page" from="985" to="994" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Mcauley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
		<idno type="DOI">10.1145/2488388.2488466</idno>
		<idno>doi:10. 1145/2488388.2488466</idno>
		<ptr target="https://doi.org/10.1145/2488388.2488466" />
	</analytic>
	<monogr>
		<title level="m">International World Wide Web Conferences Steering Committee / ACM</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Schwabe</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><forename type="middle">A F</forename><surname>Almeida</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Glaser</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Baeza-Yates</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Moon</surname></persName>
		</editor>
		<meeting><address><addrLine>Rio de Janeiro, Brazil</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">May 13-17, 2013. 2013</date>
			<biblScope unit="page" from="897" to="908" />
		</imprint>
	</monogr>
	<note>22nd International World Wide Web Conference, WWW &apos;13</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Rethinking graph neural networks for anomaly detection</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<ptr target="https://proceedings.mlr.press/v162/tang22b.html" />
	</analytic>
	<monogr>
		<title level="m">International Conference on Machine Learning, ICML 2022</title>
				<editor>
			<persName><forename type="first">K</forename><surname>Chaudhuri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Jegelka</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Song</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Szepesvári</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Niu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Sabato</surname></persName>
		</editor>
		<meeting><address><addrLine>Baltimore, Maryland, USA; PMLR</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022-07">July 2022. 2022</date>
			<biblScope unit="volume">162</biblScope>
			<biblScope unit="page" from="21076" to="21089" />
		</imprint>
	</monogr>
	<note>Proceedings of Machine Learning Research</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Semi-supervised classification with graph convolutional networks</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Kipf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Welling</surname></persName>
		</author>
		<ptr target="https://openreview.net/forum?id=SJU4ayYgl" />
	</analytic>
	<monogr>
		<title level="m">5th International Conference on Learning Representations, ICLR 2017</title>
				<meeting><address><addrLine>Toulon, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">April 24-26, 2017. 2017</date>
		</imprint>
	</monogr>
	<note>Conference Track Proceedings, OpenReview.net</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">SMOTE: synthetic minority over-sampling technique</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">V</forename><surname>Chawla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">W</forename><surname>Bowyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">O</forename><surname>Hall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">P</forename><surname>Kegelmeyer</surname></persName>
		</author>
		<idno type="DOI">10.1613/JAIR.953</idno>
		<ptr target="https://doi.org/10.1613/jair.953.doi:10.1613/JAIR.953" />
	</analytic>
	<monogr>
		<title level="j">J. Artif. Intell. Res</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="321" to="357" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Over-sampling strategy in feature space for graphs based class-imbalanced bot detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Qiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yan</surname></persName>
		</author>
		<idno type="DOI">10.1145/3589335.3651544</idno>
		<idno>doi:10.1145/3589335.3651544</idno>
		<ptr target="https://doi.org/10.1145/3589335.3651544" />
	</analytic>
	<monogr>
		<title level="m">Companion Proceedings of the ACM on Web Conference 2024, WWW 2024</title>
				<editor>
			<persName><forename type="first">T</forename><surname>Chua</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Ngo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Lee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">W</forename><surname>Lauw</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2024">May 13-17, 2024. 2024</date>
			<biblScope unit="page" from="738" to="741" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Graphsmote: Imbalanced node classification on graphs with graph neural networks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.1145/3437963.3441720</idno>
		<idno>doi:10.1145/3437963.3441720</idno>
		<ptr target="https://doi.org/10.1145/3437963.3441720" />
	</analytic>
	<monogr>
		<title level="m">WSDM &apos;21, The Fourteenth ACM International Conference on Web Search and Data Mining, Virtual Event</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Lewin-Eytan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Carmel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Yom-Tov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Agichtein</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Gabrilovich</surname></persName>
		</editor>
		<meeting><address><addrLine>Israel</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2021">March 8-12, 2021. 2021</date>
			<biblScope unit="page" from="833" to="841" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Graphsha: Synthesizing harder samples for classimbalanced node classification</title>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lai</surname></persName>
		</author>
		<idno type="DOI">10.1145/3580305.3599374</idno>
		<idno>doi:10. 1145/3580305.3599374</idno>
		<ptr target="https://doi.org/10.1145/3580305.3599374" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023</title>
				<editor>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Sun</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Akoglu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Gunopulos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Yan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Ozcan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Ye</surname></persName>
		</editor>
		<meeting>the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023<address><addrLine>Long Beach, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2023">August 6-10, 2023. 2023</date>
			<biblScope unit="page" from="1328" to="1340" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
