<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">JDS</journal-id>
<journal-title-group><journal-title>Journal of Data Science</journal-title></journal-title-group>
<issn pub-type="epub">1683-8602</issn><issn pub-type="ppub">1680-743X</issn><issn-l>1680-743X</issn-l>
<publisher>
<publisher-name>School of Statistics, Renmin University of China</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">JDS1047</article-id>
<article-id pub-id-type="doi">10.6339/22-JDS1047</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Data Science Reviews</subject></subj-group></article-categories>
<title-group>
<article-title>A Review on Graph Neural Network Methods in Financial Applications</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Wang</surname><given-names>Jianian</given-names></name><xref ref-type="aff" rid="j_jds1047_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Zhang</surname><given-names>Sheng</given-names></name><xref ref-type="aff" rid="j_jds1047_aff_001">1</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Xiao</surname><given-names>Yanghua</given-names></name><email xlink:href="mailto:shawyh@fudan.edu.cn">shawyh@fudan.edu.cn</email><xref ref-type="aff" rid="j_jds1047_aff_002">2</xref><xref ref-type="corresp" rid="cor1">∗</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Song</surname><given-names>Rui</given-names></name><email xlink:href="mailto:rsong@ncsu.edu">rsong@ncsu.edu</email><xref ref-type="aff" rid="j_jds1047_aff_001">1</xref><xref ref-type="corresp" rid="cor1">∗</xref>
</contrib>
<aff id="j_jds1047_aff_001"><label>1</label>Department of Statistics, <institution>North Carolina State University</institution>, Raleigh, <country>United States</country></aff>
<aff id="j_jds1047_aff_002"><label>2</label>School of Computer Science, <institution>Fudan University, Shanghai</institution>, <country>China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author. Email: <ext-link ext-link-type="uri" xlink:href="mailto:shawyh@fudan.edu.cn">shawyh@fudan.edu.cn</ext-link> or <ext-link ext-link-type="uri" xlink:href="mailto:rsong@ncsu.edu">rsong@ncsu.edu</ext-link>.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2022</year></pub-date><pub-date pub-type="epub"><day>2</day><month>5</month><year>2022</year></pub-date><volume>20</volume><issue>2</issue><fpage>111</fpage><lpage>134</lpage><supplementary-material id="S1" content-type="document" xlink:href="jds1047_s001.pdf" mimetype="application" mime-subtype="pdf">
<caption>
<title>Supplementary Material</title>
<p>In the supplementary materials, we present materials that are not covered in the main text. The supplementary materials contain the summary table for each financial application, figures categorizing major GNN methodologies for each graph type and acronyms used in the text.</p>
</caption>
</supplementary-material><history><date date-type="received"><day>3</day><month>11</month><year>2021</year></date><date date-type="accepted"><day>10</day><month>4</month><year>2022</year></date></history>
<permissions><copyright-statement>2022 The Author(s). Published by the School of Statistics and the Center for Applied Statistics, Renmin University of China.</copyright-statement><copyright-year>2022</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>With multiple components and relations, financial data are often presented as graph data, since it could represent both the individual features and the complicated relations. Due to the complexity and volatility of the financial market, the graph constructed on the financial data is often heterogeneous or time-varying, which imposes challenges on modeling technology. Among the graph modeling technologies, graph neural network (GNN) models are able to handle the complex graph structure and achieve great performance and thus could be used to solve financial tasks. In this work, we provide a comprehensive review of GNN models in recent financial context. We first categorize the commonly-used financial graphs and summarize the feature processing step for each node. Then we summarize the GNN methodology for each graph type, application in each area, and propose some potential research areas.</p>
</abstract>
<kwd-group>
<label>Keywords</label>
<kwd>deep learning</kwd>
<kwd>finance</kwd>
<kwd>graph convolutional network</kwd>
<kwd>graph representation learning</kwd>
</kwd-group>
</article-meta>
</front>
<back>
<ref-list id="j_jds1047_reflist_001">
<title>References</title>
<ref id="j_jds1047_ref_001">
<mixed-citation publication-type="other"> <string-name><surname>Araci</surname> <given-names>D</given-names></string-name> (2019). Finbert: Financial sentiment analysis with pre-trained language models. <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/1908.10063</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_002">
<mixed-citation publication-type="chapter"> <string-name><surname>Cer</surname> <given-names>D</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kong</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hua</surname> <given-names>N</given-names></string-name>, <string-name><surname>Limtiaco</surname> <given-names>N</given-names></string-name>, <string-name><surname>John</surname> <given-names>RS</given-names></string-name> <etal>et al.</etal> (<year>2018</year>). <chapter-title>Universal sentence encoder for english</chapter-title>. In: <source>Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing: System Demonstrations</source>, <fpage>169</fpage>–<lpage>174</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_003">
<mixed-citation publication-type="chapter"> <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wei</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>X</given-names></string-name> (<year>2018</year>). <chapter-title>Incorporating corporation relationship via graph convolutional neural networks for stock price prediction</chapter-title>. In: <source>Proceedings of the 27th ACM International Conference on Information and Knowledge Management</source>, <fpage>1655</fpage>–<lpage>1658</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_004">
<mixed-citation publication-type="chapter"> <string-name><surname>Cheng</surname> <given-names>D</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name> (<year>2020</year>). <chapter-title>Contagious chain risk rating for networked-guarantee loans</chapter-title>. In: <source>Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining</source>, <fpage>2715</fpage>–<lpage>2723</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_005">
<mixed-citation publication-type="chapter"> <string-name><surname>Cheng</surname> <given-names>D</given-names></string-name>, <string-name><surname>Tu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>L</given-names></string-name> (<year>2019</year>). <chapter-title>Risk assessment for networked-guarantee loans using high-order graph attention representation</chapter-title>. In: <source>Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19</source>, <fpage>5822</fpage>–<lpage>5828</lpage>. <comment>International Joint Conferences on Artificial Intelligence Organization</comment>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_006">
<mixed-citation publication-type="chapter"> <string-name><surname>Cheng</surname> <given-names>D</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>L</given-names></string-name> (<year>2020</year>). <chapter-title>Risk guarantee prediction in networked-loans</chapter-title>. In: <source>Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI-20</source> (<string-name><given-names>C</given-names> <surname>Bessiere</surname></string-name>, ed.), <fpage>4483</fpage>–<lpage>4489</lpage>. <comment>International Joint Conferences on Artificial Intelligence Organization. Special Track on AI in FinTech</comment>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_007">
<mixed-citation publication-type="chapter"> <string-name><surname>Cho</surname> <given-names>K</given-names></string-name>, <string-name><surname>van Merrienboer</surname> <given-names>B</given-names></string-name>, <string-name><surname>Gulcehre</surname> <given-names>C</given-names></string-name>, <string-name><surname>Bougares</surname> <given-names>F</given-names></string-name>, <string-name><surname>Schwenk</surname> <given-names>H</given-names></string-name>, <string-name><surname>Bengio</surname> <given-names>Y</given-names></string-name> (<year>2014</year>). <chapter-title>Learning phrase representations using rnn encoder-decoder for statistical machine translation</chapter-title>. In: <source>Conference on Empirical Methods in Natural Language Processing (EMNLP 2014)</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_008">
<mixed-citation publication-type="chapter"> <string-name><surname>Devlin</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chang</surname> <given-names>MW</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>K</given-names></string-name>, <string-name><surname>Toutanova</surname> <given-names>K</given-names></string-name> (<year>2019</year>). <chapter-title>BERT: Pre-training of deep bidirectional transformers for language understanding</chapter-title>. In: <source>Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)</source>, <fpage>4171</fpage>–<lpage>4186</lpage>. <publisher-name>Association for Computational Linguistics</publisher-name>, <publisher-loc>Minneapolis, Minnesota</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_009">
<mixed-citation publication-type="chapter"> <string-name><surname>Dou</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>L</given-names></string-name>, <string-name><surname>Deng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>H</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>PS</given-names></string-name> (<year>2020</year>). <chapter-title>Enhancing graph neural network-based fraud detectors against camouflaged fraudsters</chapter-title>. In: <source>Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management</source>, <fpage>315</fpage>–<lpage>324</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_010">
<mixed-citation publication-type="journal"> <string-name><surname>Feng</surname> <given-names>F</given-names></string-name>, <string-name><surname>He</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>C</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chua</surname> <given-names>TS</given-names></string-name> (<year>2019</year>). <article-title>Temporal relational ranking for stock prediction</article-title>. <source>ACM Transactions on Information Systems (TOIS)</source>, <volume>37</volume>(<issue>2</issue>): <fpage>1</fpage>–<lpage>30</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_011">
<mixed-citation publication-type="chapter"> <string-name><surname>Gori</surname> <given-names>M</given-names></string-name>, <string-name><surname>Monfardini</surname> <given-names>G</given-names></string-name>, <string-name><surname>Scarselli</surname> <given-names>F</given-names></string-name> (<year>2005</year>). <chapter-title>A new model for learning in graph domains</chapter-title>. In: <source>Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005</source>, volume <volume>2</volume>, <fpage>729</fpage>–<lpage>734</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_012">
<mixed-citation publication-type="journal"> <string-name><surname>Harl</surname> <given-names>M</given-names></string-name>, <string-name><surname>Weinzierl</surname> <given-names>S</given-names></string-name>, <string-name><surname>Stierle</surname> <given-names>M</given-names></string-name>, <string-name><surname>Matzner</surname> <given-names>M</given-names></string-name> (<year>2020</year>). <article-title>Explainable predictive business process monitoring using gated graph neural networks</article-title>. <source>Journal of Decision Systems</source>, <fpage>1</fpage>–<lpage>16</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_013">
<mixed-citation publication-type="journal"> <string-name><surname>Hochreiter</surname> <given-names>S</given-names></string-name>, <string-name><surname>Schmidhuber</surname> <given-names>J</given-names></string-name> (<year>1997</year>). <article-title>Long short-term memory</article-title>. <source>Neural computation</source>, <volume>9</volume>(<issue>8</issue>): <fpage>1735</fpage>–<lpage>1780</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_014">
<mixed-citation publication-type="chapter"> <string-name><surname>Hu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>C</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Qi</surname> <given-names>Y</given-names></string-name> (<year>2019</year>). <chapter-title>Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism</chapter-title>. In: <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>, volume <volume>33</volume>, <fpage>946</fpage>–<lpage>953</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_015">
<mixed-citation publication-type="chapter"> <string-name><surname>Hu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Fang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Fang</surname> <given-names>Y</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <chapter-title>Loan default analysis with multiplex graph learning</chapter-title>. In: <source>Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management</source>, <fpage>2525</fpage>–<lpage>2532</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_016">
<mixed-citation publication-type="journal"> <string-name><surname>Huang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chai</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cho</surname> <given-names>S</given-names></string-name> (<year>2020</year>). <article-title>Deep learning in finance and banking: A literature review and classification</article-title>. <source>Frontiers of Business Research in China</source>, <volume>14</volume>: <fpage>1</fpage>–<lpage>24</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_017">
<mixed-citation publication-type="chapter"> <string-name><surname>Jiang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Choo</surname> <given-names>KKR</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>C</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>M</given-names></string-name>, <etal>et al.</etal> (<year>2019</year>). <chapter-title>Anomaly detection with graph convolutional networks for insider threat and fraud detection</chapter-title>. In: <source>MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM)</source>, <fpage>109</fpage>–<lpage>114</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_018">
<mixed-citation publication-type="other"> <string-name><surname>Jiang</surname> <given-names>W</given-names></string-name> (2021). Applications of deep learning in stock market prediction: Recent progress. <italic>Expert Systems with Applications</italic>, 115537.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_019">
<mixed-citation publication-type="chapter"> <string-name><surname>Kipf</surname> <given-names>TN</given-names></string-name>, <string-name><surname>Welling</surname> <given-names>M</given-names></string-name> (<year>2017</year>). <chapter-title>Semi-supervised classification with graph convolutional networks</chapter-title>. In: <source>International Conference on Learning Representations (ICLR)</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_020">
<mixed-citation publication-type="journal"> <string-name><surname>Kudo</surname> <given-names>W</given-names></string-name>, <string-name><surname>Nishiguchi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Toriumi</surname> <given-names>F</given-names></string-name> (<year>2020</year>). <article-title>Gcnext: Graph convolutional network with expanded balance theory for fraudulent user detection</article-title>. <source>Social Network Analysis and Mining</source>, <volume>10</volume>(<issue>1</issue>): <fpage>1</fpage>–<lpage>12</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_021">
<mixed-citation publication-type="journal"> <string-name><surname>Kurshan</surname> <given-names>E</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>H</given-names></string-name> (<year>2020</year>). <article-title>Graph computing for financial crime and fraud detection: Trends, challenges and outlook</article-title>. <source>International Journal of Semantic Computing</source>, <volume>14</volume>(<issue>04</issue>): <fpage>565</fpage>–<lpage>589</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_022">
<mixed-citation publication-type="journal"> <string-name><surname>Lee</surname> <given-names>JB</given-names></string-name>, <string-name><surname>Rossi</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ahmed</surname> <given-names>NK</given-names></string-name>, <string-name><surname>Koh</surname> <given-names>E</given-names></string-name> (<year>2019</year>). <article-title>Attention models in graphs: A survey</article-title>. <source>ACM Transactions on Knowledge Discovery from Data (TKDD)</source>, <volume>13</volume>(<issue>6</issue>): <fpage>1</fpage>–<lpage>25</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_023">
<mixed-citation publication-type="journal"> <string-name><surname>Lee</surname> <given-names>JW</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>WK</given-names></string-name>, <string-name><surname>Sohn</surname> <given-names>SY</given-names></string-name> (<year>2021</year>). <article-title>Graph convolutional network-based credit default prediction utilizing three types of virtual distances among borrowers</article-title>. <source>Expert Systems with Applications</source>, <volume>168</volume>: <fpage>114411</fpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_024">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>A</given-names></string-name>, <string-name><surname>Qin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>D</given-names></string-name> (<year>2019</year>a). <chapter-title>Spam review detection with graph convolutional networks</chapter-title>. In: <source>Proceedings of the 28th ACM International Conference on Information and Knowledge Management</source>, <fpage>2703</fpage>–<lpage>2711</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_025">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>C</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>K</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>CJR</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>H</given-names></string-name> (<year>2019</year>b). <chapter-title>Hierarchical representation learning for bipartite graphs</chapter-title>. In: <source>IJCAI</source>, <fpage>2873</fpage>–<lpage>2879</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_026">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>W</given-names></string-name>, <string-name><surname>Bao</surname> <given-names>R</given-names></string-name>, <string-name><surname>Harimoto</surname> <given-names>K</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Su</surname> <given-names>Q</given-names></string-name> (<year>2020</year>a). <chapter-title>Modeling the stock relation with graph network for overnight stock movement prediction</chapter-title>. In: <source>no. CONF</source>, <fpage>4541</fpage>–<lpage>4547</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_027">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Han</surname> <given-names>X</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>C</given-names></string-name>, <string-name><surname>Hooi</surname> <given-names>B</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>b). <chapter-title>Flowscope: Spotting money laundering based on graphs</chapter-title>. In: <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>, volume <volume>34</volume>, <fpage>4731</fpage>–<lpage>4738</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_028">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Saúde</surname> <given-names>J</given-names></string-name>, <string-name><surname>Reddy</surname> <given-names>P</given-names></string-name>, <string-name><surname>Veloso</surname> <given-names>M</given-names></string-name> (<year>2019</year>c). <chapter-title>Classifying and understanding financial data using graph neural network</chapter-title>. In: <source>AAAI Workshop on Knowledge Discovery from Unstructured Data in Financial Services 2020</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_029">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zemel</surname> <given-names>R</given-names></string-name>, <string-name><surname>Brockschmidt</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tarlow</surname> <given-names>D</given-names></string-name> (<year>2016</year>). <chapter-title>Gated graph sequence neural networks</chapter-title>. In: <source>Proceedings of ICLR’16</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_030">
<mixed-citation publication-type="chapter"> <string-name><surname>Li</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>X</given-names></string-name>, <string-name><surname>Jiao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zou</surname> <given-names>P</given-names></string-name>, <string-name><surname>Meng</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>c). <chapter-title>Hierarchical bipartite graph neural networks: Towards large-scale e-commerce applications</chapter-title>. In: <source>2020 IEEE 36th International Conference on Data Engineering (ICDE)</source>, <fpage>1677</fpage>–<lpage>1688</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_031">
<mixed-citation publication-type="chapter"> <string-name><surname>Liang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal> (<year>2019</year>). <chapter-title>Uncovering insurance fraud conspiracy with network learning</chapter-title>. In: <source>Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>, <fpage>1181</fpage>–<lpage>1184</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_032">
<mixed-citation publication-type="chapter"> <string-name><surname>Liang</surname> <given-names>T</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhong</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Chi</surname> <given-names>J</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ao</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal> (<year>2021</year>). <chapter-title>Credit risk and limits forecasting in e-commerce consumer lending service via multi-view-aware mixture-of-experts nets</chapter-title>. In: <source>Proceedings of the 14th ACM International Conference on Web Search and Data Mining</source>, <fpage>229</fpage>–<lpage>237</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_033">
<mixed-citation publication-type="chapter"> <string-name><surname>Liou</surname> <given-names>YT</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>CC</given-names></string-name>, <string-name><surname>Tang</surname> <given-names>TH</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>HH</given-names></string-name> (<year>2021</year>). <chapter-title>Finsense: An assistant system for financial journalists and investors</chapter-title>. In: <source>Proceedings of the 14th International Conference on Web Search and Data Mining</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_034">
<mixed-citation publication-type="chapter"> <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>C</given-names></string-name>, <string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Song</surname> <given-names>L</given-names></string-name>, <etal>et al.</etal> (<year>2019</year>). <chapter-title>Geniepath: Graph neural networks with adaptive receptive paths</chapter-title>. In: <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>, volume <volume>33</volume>, <fpage>4424</fpage>–<lpage>4431</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_035">
<mixed-citation publication-type="chapter"> <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>C</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Song</surname> <given-names>L</given-names></string-name> (<year>2018</year>). <chapter-title>Heterogeneous graph neural networks for malicious account detection</chapter-title>. In: <source>Proceedings of the 27th ACM International Conference on Information and Knowledge Management</source>, <fpage>2077</fpage>–<lpage>2085</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_036">
<mixed-citation publication-type="chapter"> <string-name><surname>Lv</surname> <given-names>L</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>N</given-names></string-name>, <string-name><surname>Fan</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name> (<year>2019</year>). <chapter-title>Auto-encoder based graph convolutional networks for online financial anti-fraud</chapter-title>. In: <source>2019 IEEE Conference on Computational Intelligence for Financial Engineering &amp; Economics (CIFEr)</source>, <fpage>1</fpage>–<lpage>6</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_037">
<mixed-citation publication-type="journal"> <string-name><surname>Ma</surname> <given-names>X</given-names></string-name>, <string-name><surname>Sha</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>X</given-names></string-name> (<year>2018</year>). <article-title>Study on a prediction of p2p network loan default based on the machine learning lightgbm and xgboost algorithms according to different high dimensional data cleaning</article-title>. <source>Electronic Commerce Research and Applications</source>, <volume>31</volume>: <fpage>24</fpage>–<lpage>39</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_038">
<mixed-citation publication-type="other"> <string-name><surname>Matsunaga</surname> <given-names>D</given-names></string-name>, <string-name><surname>Suzumura</surname> <given-names>T</given-names></string-name>, <string-name><surname>Takahashi</surname> <given-names>T</given-names></string-name> (2019). Exploring graph neural networks for stock market predictions with rolling window analysis. <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/1909.10660</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_039">
<mixed-citation publication-type="other"> <string-name><surname>Ozbayoglu</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Gudelek</surname> <given-names>MU</given-names></string-name>, <string-name><surname>Sezer</surname> <given-names>OB</given-names></string-name> (2020). Deep learning for financial applications: A survey. <italic>Applied Soft Computing</italic>, 106384.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_040">
<mixed-citation publication-type="chapter"> <string-name><surname>Pareja</surname> <given-names>A</given-names></string-name>, <string-name><surname>Domeniconi</surname> <given-names>G</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ma</surname> <given-names>T</given-names></string-name>, <string-name><surname>Suzumura</surname> <given-names>T</given-names></string-name>, <string-name><surname>Kanezashi</surname> <given-names>H</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <chapter-title>Evolvegcn: Evolving graph convolutional networks for dynamic graphs</chapter-title>. In: <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>, volume <volume>34</volume>, <fpage>5363</fpage>–<lpage>5370</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_041">
<mixed-citation publication-type="chapter"> <string-name><surname>Pennington</surname> <given-names>J</given-names></string-name>, <string-name><surname>Socher</surname> <given-names>R</given-names></string-name>, <string-name><surname>Manning</surname> <given-names>CD</given-names></string-name> (<year>2014</year>). <chapter-title>Glove: Global vectors for word representation</chapter-title>. In: <source>Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>, <fpage>1532</fpage>–<lpage>1543</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_042">
<mixed-citation publication-type="other"> <string-name><surname>Rao</surname> <given-names>SX</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Han</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Min</surname> <given-names>W</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shan</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>C</given-names></string-name> (2020). Suspicious massive registration detection via dynamic heterogeneous graph neural networks. <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/2012.10831</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_043">
<mixed-citation publication-type="other"> <string-name><surname>Rao</surname> <given-names>SX</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Han</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Min</surname> <given-names>W</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Z</given-names></string-name>, et al. (2020). xfraud: Explainable fraud transaction detection on heterogeneous graphs. <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/2011.12193</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_044">
<mixed-citation publication-type="chapter"> <string-name><surname>Sawhney</surname> <given-names>R</given-names></string-name>, <string-name><surname>Agarwal</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wadhwa</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>R</given-names></string-name> (<year>2020</year>a). <chapter-title>Deep attentive learning for stock movement prediction from social media text and company correlations</chapter-title>. In: <source>Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>, <fpage>8415</fpage>–<lpage>8426</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_045">
<mixed-citation publication-type="chapter"> <string-name><surname>Sawhney</surname> <given-names>R</given-names></string-name>, <string-name><surname>Khanna</surname> <given-names>P</given-names></string-name>, <string-name><surname>Aggarwal</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jain</surname> <given-names>T</given-names></string-name>, <string-name><surname>Mathur</surname> <given-names>P</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>R</given-names></string-name> (<year>2020</year>b). <chapter-title>Voltage: Volatility forecasting via text-audio fusion with graph convolution networks for earnings calls</chapter-title>. In: <source>Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)</source>, <fpage>8001</fpage>–<lpage>8013</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_046">
<mixed-citation publication-type="journal"> <string-name><surname>Turiel</surname> <given-names>J</given-names></string-name>, <string-name><surname>Aste</surname> <given-names>T</given-names></string-name> (<year>2020</year>). <article-title>Peer-to-peer loan acceptance and default prediction with artificial intelligence</article-title>. <source>Royal Society Open Science</source>, <volume>7</volume>(<issue>6</issue>): <fpage>191649</fpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_047">
<mixed-citation publication-type="chapter"> <string-name><surname>Veličković</surname> <given-names>P</given-names></string-name>, <string-name><surname>Cucurull</surname> <given-names>G</given-names></string-name>, <string-name><surname>Casanova</surname> <given-names>A</given-names></string-name>, <string-name><surname>Romero</surname> <given-names>A</given-names></string-name>, <string-name><surname>Liò</surname> <given-names>P</given-names></string-name>, <string-name><surname>Bengio</surname> <given-names>Y</given-names></string-name> (<year>2018</year>). <chapter-title>Graph attention networks</chapter-title>. In: <source>International Conference on Learning Representations</source>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_048">
<mixed-citation publication-type="journal"> <string-name><surname>Vrandečić</surname> <given-names>D</given-names></string-name>, <string-name><surname>Krötzsch</surname> <given-names>M</given-names></string-name> (<year>2014</year>). <article-title>Wikidata: A free collaborative knowledgebase</article-title>. <source>Communications of the ACM</source>, <volume>57</volume>(<issue>10</issue>): <fpage>78</fpage>–<lpage>85</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_049">
<mixed-citation publication-type="chapter"> <string-name><surname>Wang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cui</surname> <given-names>P</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Fang</surname> <given-names>Y</given-names></string-name>, <etal>et al.</etal> (<year>2019</year>). <chapter-title>A semi-supervised graph attentive network for financial fraud detection</chapter-title>. In: <source>2019 IEEE International Conference on Data Mining (ICDM)</source>, <fpage>598</fpage>–<lpage>607</lpage>. <publisher-name>IEEE Computer Society</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_050">
<mixed-citation publication-type="other"> <string-name><surname>Weber</surname> <given-names>M</given-names></string-name>, <string-name><surname>Domeniconi</surname> <given-names>G</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Weidele</surname> <given-names>DKI</given-names></string-name>, <string-name><surname>Bellei</surname> <given-names>C</given-names></string-name>, <string-name><surname>Robinson</surname> <given-names>T</given-names></string-name>, et al. (2019). Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/1908.02591</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_051">
<mixed-citation publication-type="chapter"> <string-name><surname>Wu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>F</given-names></string-name>, <string-name><surname>Long</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Philip</surname> <given-names>SY</given-names></string-name> (<year>2020</year>). <chapter-title>A comprehensive survey on graph neural networks</chapter-title>. In: <source>IEEE Transactions on Neural Networks and Learning Systems</source>, <fpage>4</fpage>–<lpage>24</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_052">
<mixed-citation publication-type="chapter"> <string-name><surname>Xu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>B</given-names></string-name>, <string-name><surname>An</surname> <given-names>R</given-names></string-name>, <string-name><surname>Cao</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>X</given-names></string-name> (<year>2021</year>). <chapter-title>Towards consumer loan fraud detection: Graph neural networks with role-constrained conditional random field</chapter-title>. In: <source>Proceedings of the AAAI Conference on Artificial Intelligence</source>, volume <volume>35</volume>, <fpage>4537</fpage>–<lpage>4545</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_053">
<mixed-citation publication-type="other"> <string-name><surname>Xu</surname> <given-names>K</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name>, <string-name><surname>Jegelka</surname> <given-names>S</given-names></string-name> (2018). How powerful are graph neural networks? <italic>arXiv preprint:</italic> <uri>https://arxiv.org/abs/1810.00826</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_054">
<mixed-citation publication-type="chapter"> <string-name><surname>Yang</surname> <given-names>H</given-names></string-name> (<year>2019</year>). <chapter-title>Aligraph: A comprehensive graph neural network platform</chapter-title>. In: <source>Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining</source>, <fpage>3165</fpage>–<lpage>3166</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_055">
<mixed-citation publication-type="chapter"> <string-name><surname>Yang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhong</surname> <given-names>X</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <chapter-title>Financial risk analysis for smes with graph-based supply chain mining</chapter-title>. In: <source>Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence</source>, <fpage>4661</fpage>–<lpage>4667</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_056">
<mixed-citation publication-type="chapter"> <string-name><surname>Yang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wei</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>L</given-names></string-name> (<year>2019</year>). <chapter-title>Using external knowledge for financial event prediction based on graph neural networks</chapter-title>. In: <source>Proceedings of the 28th ACM International Conference on Information and Knowledge Management</source>, <fpage>2161</fpage>–<lpage>2164</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_057">
<mixed-citation publication-type="other"> <string-name><surname>Ying</surname> <given-names>R</given-names></string-name>, <string-name><surname>Bourgeois</surname> <given-names>D</given-names></string-name>, <string-name><surname>You</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zitnik</surname> <given-names>M</given-names></string-name>, <string-name><surname>Leskovec</surname> <given-names>J</given-names></string-name> (2019). GNN explainer: A tool for post-hoc explanation of graph neural networks. <italic>CoRR</italic>, arXiv preprint: <uri>https://arxiv.org/abs/abs/1903.03894</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_058">
<mixed-citation publication-type="chapter"> <string-name><surname>Ying</surname> <given-names>X</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>C</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Z</given-names></string-name> (<year>2020</year>). <chapter-title>Time-aware graph relational attention network for stock recommendation</chapter-title>. In: <source>Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management</source>, <fpage>2281</fpage>–<lpage>2284</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_059">
<mixed-citation publication-type="other"> <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name> (2018). Link prediction based on graph neural networks. <italic>Advances in Neural Information Processing Systems</italic>, 31.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_060">
<mixed-citation publication-type="journal"> <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>H</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Maciejewski</surname> <given-names>R</given-names></string-name> (<year>2019</year>). <article-title>Graph convolutional networks: a comprehensive review</article-title>. <source>Computational Social Networks</source>, <volume>6</volume>(<issue>1</issue>): <fpage>1</fpage>–<lpage>23</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_061">
<mixed-citation publication-type="chapter"> <string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Yin</surname> <given-names>H</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Hung</surname> <given-names>QVN</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Cui</surname> <given-names>L</given-names></string-name> (<year>2020</year>). <chapter-title>Gcn-based user representation learning for unifying robust recommendation and fraudster detection</chapter-title>. In: <source>Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>, <fpage>689</fpage>–<lpage>698</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_062">
<mixed-citation publication-type="chapter"> <string-name><surname>Zhao</surname> <given-names>T</given-names></string-name>, <string-name><surname>Deng</surname> <given-names>C</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>K</given-names></string-name>, <string-name><surname>Jiang</surname> <given-names>T</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Jiang</surname> <given-names>M</given-names></string-name> (<year>2021</year>). <chapter-title>Gnn-based graph anomaly detection with graph anomaly loss</chapter-title>. In: <source>The Second International Workshop on Deep Learning on Graphs: Methods and Applications (DLG-KDD’20)</source>. <comment>Available at:</comment> <uri>https://deep-learning-graphs.bitbucket.io/dlg-kdd20/</uri>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_063">
<mixed-citation publication-type="journal"> <string-name><surname>Zhou</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cui</surname> <given-names>G</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <article-title>Graph neural networks: A review of methods and applications</article-title>. <source>AI Open</source>, <volume>1</volume>: <fpage>57</fpage>–<lpage>81</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1047_ref_064">
<mixed-citation publication-type="chapter"> <string-name><surname>Zhu</surname> <given-names>YN</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>X</given-names></string-name>, <string-name><surname>Li</surname> <given-names>YF</given-names></string-name>, <string-name><surname>Bu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>W</given-names></string-name>, <etal>et al.</etal> (<year>2020</year>). <chapter-title>Heterogeneous mini-graph neural network and its application to fraud invitation detection</chapter-title>. In: <source>2020 IEEE International Conference on Data Mining (ICDM)</source>, <fpage>891</fpage>–<lpage>899</lpage>. <publisher-name>IEEE</publisher-name>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
