{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:52:23Z","timestamp":1725807143003},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313537","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"3448-3454","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Yujie","family":"Fan","sequence":"additional","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"Department of CSEE West Virginia University, WV, USA"}]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of IST George Mason University, VA, USA"}]},{"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science BUPT, Beijing, China"}]},{"given":"Jiabin","family":"Wang","sequence":"additional","affiliation":[{"name":"Tecent Security Lab Tecent, Guangdong, China"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tecent Security Lab Tecent, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132959"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"volume-title":"Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international264","year":"2016","author":"Brose\u00b4us Julian","key":"e_1_3_2_1_3_1","unstructured":"Julian Brose\u00b4us , Damien Rhumorbarbe , Caroline Mireault , Vincent Ouellette , Frank Crispino , and David De\u00b4cary-He\u00b4tu . 2016. Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international264 ( 2016 ), 7-14. Julian Brose\u00b4us, Damien Rhumorbarbe, Caroline Mireault, Vincent Ouellette, Frank Crispino, and David De\u00b4cary-He\u00b4tu. 2016. Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international264 (2016), 7-14."},{"key":"e_1_3_2_1_4_1","unstructured":"Julia Buxton and Tim Bingham. 2015. The rise and challenge of dark net drug markets. Policy Brief7(2015). Julia Buxton and Tim Bingham. 2015. The rise and challenge of dark net drug markets. Policy Brief7(2015)."},{"key":"e_1_3_2_1_5_1","first-page":"974","article-title":"Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns","author":"Chairunnanda Prima","year":"2011","unstructured":"Prima Chairunnanda , Nam Pham , and Urs Hengartner . 2011 . Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns .. In SocialCom\/PASSAT. 974 - 980 . Prima Chairunnanda, Nam Pham, and Urs Hengartner. 2011. Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns.. In SocialCom\/PASSAT. 974-980.","journal-title":"SocialCom\/PASSAT."},{"key":"e_1_3_2_1_6_1","first-page":"125","article-title":"Proactive defense for evolving cyber threats","author":"Colbaugh Richard","year":"2011","unstructured":"Richard Colbaugh and Kristin Glass . 2011 . Proactive defense for evolving cyber threats . In ISI. IEEE , 125 - 130 . Richard Colbaugh and Kristin Glass. 2011. Proactive defense for evolving cyber threats. In ISI. IEEE, 125-130.","journal-title":"ISI. IEEE"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744078_23"},{"volume-title":"The Global Afghan Opium Trade: A Threat Assessment. UNODC Report","year":"2011","author":"Demirbuken Hakan","key":"e_1_3_2_1_8_1","unstructured":"Hakan Demirbuken and others. 2011. The Global Afghan Opium Trade: A Threat Assessment. UNODC Report ( 2011 ), 3-4. Hakan Demirbuken and others. 2011. The Global Afghan Opium Trade: A Threat Assessment. UNODC Report (2011), 3-4."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219862"},{"key":"e_1_3_2_1_12_1","first-page":"3357","article-title":"Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network","author":"Fan Yujie","year":"2018","unstructured":"Yujie Fan , Yiming Zhang , Yanfang Ye , and Xin Li . 2018 . Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network .. In IJCAI. 3357 - 3363 . Yujie Fan, Yiming Zhang, Yanfang Ye, and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network.. In IJCAI. 3357-3363.","journal-title":"IJCAI."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132857"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132953"},{"volume-title":"A visual embedding for the unsupervised extraction of abstract semantics. Cognitive Systems Research42","year":"2017","author":"Garcia-Gasulla Dario","key":"e_1_3_2_1_15_1","unstructured":"Dario Garcia-Gasulla , Eduard Ayguade\u00b4 , Jes\u00fas Labarta , Javier Be\u00b4jar , Ulises Corte\u00b4s , Toyotaro Suzumura , and R Chen . 2017. A visual embedding for the unsupervised extraction of abstract semantics. Cognitive Systems Research42 ( 2017 ), 73-81. Dario Garcia-Gasulla, Eduard Ayguade\u00b4, Jes\u00fas Labarta, Javier Be\u00b4jar, Ulises Corte\u00b4s, Toyotaro Suzumura, and R Chen. 2017. A visual embedding for the unsupervised extraction of abstract semantics. Cognitive Systems Research42 (2017), 73-81."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2017.05.052"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"P. Griffiths and J. Mounteney. 2017. Disruptive potential of the internet to transform illicit drug markets and impact on future patterns of drug consumption. Clinical Pharmacology & Therapeutics101 2 (2017). P. Griffiths and J. Mounteney. 2017. Disruptive potential of the internet to transform illicit drug markets and impact on future patterns of drug consumption. Clinical Pharmacology & Therapeutics101 2 (2017).","DOI":"10.1002\/cpt.561"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"volume-title":"Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups","year":"2012","author":"Hinton Geoffrey","key":"e_1_3_2_1_19_1","unstructured":"Geoffrey Hinton , Li Deng , Dong Yu , George E Dahl , Abdel-rahman Mohamed, Navdeep Jaitly , Andrew Senior , Vincent Vanhoucke , Patrick Nguyen , Tara N Sainath , and others. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups . IEEE Signal processing magazine29, 6 ( 2012 ), 82-97. Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath, and others. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine29, 6 (2012), 82-97."},{"volume-title":"Application of stylometry to darkweb forum user identification","author":"Ho Thanh Nghia","key":"e_1_3_2_1_20_1","unstructured":"Thanh Nghia Ho and Wee Keong Ng. 2016. Application of stylometry to darkweb forum user identification . In ICS. Springer , 173-183. Thanh Nghia Ho and Wee Keong Ng. 2016. Application of stylometry to darkweb forum user identification. In ICS. Springer, 173-183."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_22_1","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167(2015). Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167(2015)."},{"key":"e_1_3_2_1_23_1","unstructured":"Dev Kar and Joseph Spanjers. 2017. Transnational crime and the developing world. (2017). Dev Kar and Joseph Spanjers. 2017. Transnational crime and the developing world. (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.303"},{"key":"e_1_3_2_1_25_1","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov . 2014 . Distributed representations of sentences and documents . In ICML. 1188 - 1196 . Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In ICML. 1188-1196.","journal-title":"ICML."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052576"},{"key":"e_1_3_2_1_27_1","unstructured":"Dream Market. 2018. Dream Market. http:\/\/6khhxwj7viwe5xjm.onion. Dream Market. 2018. Dream Market. http:\/\/6khhxwj7viwe5xjm.onion."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"James Martin. 2014. Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. (2014). James Martin. 2014. Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. (2014).","DOI":"10.1057\/9781137399052"},{"key":"e_1_3_2_1_29_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013). Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013)."},{"key":"e_1_3_2_1_30_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119. Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"volume-title":"Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic science international267","year":"2016","author":"Rhumorbarbe Damien","key":"e_1_3_2_1_32_1","unstructured":"Damien Rhumorbarbe , Ludovic Staehli , Julian Broseus , Quentin Rossy , and Pierre Esseiva . 2016. Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic science international267 ( 2016 ), 173-182. Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, and Pierre Esseiva. 2016. Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic science international267 (2016), 173-182."},{"key":"e_1_3_2_1_33_1","unstructured":"SilkRoad. 2018. SilkRoad. http:\/\/silkroad7rn2puhj.onion. SilkRoad. 2018. SilkRoad. http:\/\/silkroad7rn2puhj.onion."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.47"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"volume-title":"How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities32, 5","year":"1998","author":"Tweedie Fiona J","key":"e_1_3_2_1_36_1","unstructured":"Fiona J Tweedie and R Harald Baayen . 1998. How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities32, 5 ( 1998 ), 323-352. Fiona J Tweedie and R Harald Baayen. 1998. How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities32, 5 (1998), 323-352."},{"key":"e_1_3_2_1_37_1","unstructured":"Valhalla. 2018. Valhalla. http:\/\/valhallaxmn3fydu.onion. Valhalla. 2018. Valhalla. http:\/\/valhallaxmn3fydu.onion."},{"volume-title":"The closure of the Silk Road: What has this meant for online drug trading?Addiction109, 4","year":"2014","author":"Buskirk Joe Van","key":"e_1_3_2_1_38_1","unstructured":"Joe Van Buskirk , Amanda Roxburgh , Michael Farrell , and Lucy Burns . 2014. The closure of the Silk Road: What has this meant for online drug trading?Addiction109, 4 ( 2014 ). Joe Van Buskirk, Amanda Roxburgh, Michael Farrell, and Lucy Burns. 2014. The closure of the Silk Road: What has this meant for online drug trading?Addiction109, 4 (2014)."},{"volume-title":"International Journal of Drug Policy26, 11","year":"2015","author":"Buskirk Joe Van","key":"e_1_3_2_1_39_1","unstructured":"Joe Van Buskirk , Amanda Roxburgh , Sundresan Naicker , and Lucinda Burns . 2015. A response to Dolliver's \u201cEvaluating drug trafficking on the Tor network \u201d. International Journal of Drug Policy26, 11 ( 2015 ). Joe Van Buskirk, Amanda Roxburgh, Sundresan Naicker, and Lucinda Burns. 2015. A response to Dolliver's \u201cEvaluating drug trafficking on the Tor network\u201d. International Journal of Drug Policy26, 11 (2015)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196529"},{"key":"e_1_3_2_1_41_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649-657. Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649-657."},{"key":"e_1_3_2_1_42_1","first-page":"1071","article-title":"iDetector","author":"Zhang Yiming","year":"2018","unstructured":"Yiming Zhang , Yujie Fan , Shifu Hou , Jian Liu , Yanfang Ye , and Thirimachos Bourlai . 2018 . iDetector : Automate Underground Forum Analysis Based on Heterogeneous Information Network. In ASONAM. IEEE , 1071 - 1078 . Yiming Zhang, Yujie Fan, Shifu Hou, Jian Liu, Yanfang Ye, and Thirimachos Bourlai. 2018. iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network. In ASONAM. IEEE, 1071-1078.","journal-title":"In ASONAM. IEEE"},{"key":"e_1_3_2_1_43_1","first-page":"154","article-title":"KADetector","author":"Zhang Yiming","year":"2018","unstructured":"Yiming Zhang , Yujie Fan , Yanfang Ye , Liang Zhao , Jiabin Wang , Qi Xiong , and Fudong Shao . 2018 . KADetector : Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network. In ICBK. IEEE , 154 - 161 . Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, Jiabin Wang, Qi Xiong, and Fudong Shao. 2018. KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network. In ICBK. IEEE, 154-161.","journal-title":"In ICBK. IEEE"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T07:47:31Z","timestamp":1681804051000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":43,"alternative-id":["10.1145\/3308558.3313537","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313537","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}