{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:47:12Z","timestamp":1730321232999,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T00:00:00Z","timestamp":1563408000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["71473183, 61876003"]},{"name":"Fundamental Research Funds for the Central Universities","award":["18lgpy62"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,18]]},"DOI":"10.1145\/3331184.3331197","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T17:40:26Z","timestamp":1563558026000},"page":"365-374","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Finding Camouflaged Needle in a Haystack?"],"prefix":"10.1145","author":[{"given":"Guoxiu","family":"He","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Yangyang","family":"Kang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Zhe","family":"Gao","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Zhuoren","family":"Jiang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Changlong","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Xiaozhong","family":"Liu","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Sunnyvale, CA, USA"}]},{"given":"Luo","family":"Si","sequence":"additional","affiliation":[{"name":"Alibaba Group, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"volume-title":"International Conference on Learning Representations","year":"2015","author":"Bahdanau Dzmitry","key":"e_1_3_2_2_2_1"},{"volume-title":"The design of browsing and berrypicking techniques for the online search interface. Online review","year":"1989","author":"Bates Marcia J.","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944966"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806572"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/297427.297440"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555","year":"2014","author":"Chung Junyoung","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/13673279810249369"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556217"},{"key":"e_1_3_2_2_11_1","first-page":"98","article-title":"Distributional Footprints of Deceptive Product Reviews","volume":"12","author":"Feng Song","year":"2012","journal-title":"ICWSM"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052706"},{"volume-title":"Proceedings of the 34th International Conference on Machine Learning-Volume 70","author":"Gehring Jonas","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234944.3234947"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0335980100"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271694"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210032"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1052"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1062"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035216659299"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"volume-title":"International Conference for Learning Representations. 1--15","author":"Diederik","key":"e_1_3_2_2_25_1"},{"volume-title":"Information-seeking behavior: Patterns and concepts. Drexel library quarterly","year":"1983","author":"Krikelas James","key":"e_1_3_2_2_26_1"},{"volume-title":"Deep learning. nature","year":"2015","author":"LeCun Yann","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542182.2542191"},{"volume-title":"Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In Fifth International AAAI Conference on Weblogs and Social Media. 185--192","year":"2011","author":"Lee Kyumin","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1477"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464470"},{"volume-title":"Efficient Estimation of Word Representations in Vector Space. Computer Science","year":"2013","author":"Mikolov Tomas","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"Mikolov Tomas","year":"2010","journal-title":"Interspeech"},{"key":"e_1_3_2_2_34_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119. Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_2_35_1","volume-title":"Aistats","volume":"5","author":"Morin Frederic","year":"2005"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187864"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1041"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186079"},{"volume-title":"LSTM-based deep learning models for non-factoid answer selection. arXiv preprint arXiv:1511.04108","year":"2015","author":"Tan Ming","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems. 5998--6008. Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems. 5998--6008."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1122"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098140"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.09.011"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.62"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505700"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23528-8_17"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/N15-1091"},{"volume-title":"A C-LSTM neural network for text classification. arXiv preprint arXiv:1511.08630","year":"2015","author":"Zhou Chunting","key":"e_1_3_2_2_49_1"}],"event":{"name":"SIGIR '19: The 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Paris France","acronym":"SIGIR '19"},"container-title":["Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331184.3331197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T20:58:35Z","timestamp":1673125115000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331184.3331197"}},"subtitle":["Pornographic Products Detection via Berrypicking Tree Model"],"short-title":[],"issued":{"date-parts":[[2019,7,18]]},"references-count":49,"alternative-id":["10.1145\/3331184.3331197","10.1145\/3331184"],"URL":"https:\/\/doi.org\/10.1145\/3331184.3331197","relation":{},"subject":[],"published":{"date-parts":[[2019,7,18]]},"assertion":[{"value":"2019-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}