{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:25:09Z","timestamp":1742923509106,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031265525"},{"type":"electronic","value":"9783031265532"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26553-2_20","type":"book-chapter","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T11:33:31Z","timestamp":1676806411000},"page":"373-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HinPage: Illegal and\u00a0Harmful Webpage Identification Using Transductive Classification"],"prefix":"10.1007","author":[{"given":"Yunfan","family":"Li","sequence":"first","affiliation":[]},{"given":"Lingjing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,19]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-06028-6_18","volume-title":"Advances in Information Retrieval","author":"C Luo","year":"2014","unstructured":"Luo, C., Guan, R., Wang, Z., Lin, C.: HetPathMine: a novel transductive classification algorithm on heterogeneous information networks. In: de Rijke, M., et al. (eds.) ECIR 2014. LNCS, vol. 8416, pp. 210\u2013221. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06028-6_18"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Yang, H., Du, K., Zhang, Y., et al.: Casino Royale: a deep exploration of illegal online gambling. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 500\u2013513 (2019)","DOI":"10.1145\/3359789.3359817"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Farman, A., Pervez, K., Kashif, R., et al.: A fuzzy ontology and SVM-based Web content classification system. IEEE Access 25781\u201325797 (2017)","DOI":"10.1109\/ACCESS.2017.2768564"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-319-77383-4_48","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2017","author":"L Li","year":"2018","unstructured":"Li, L., Gou, G., Xiong, G., Cao, Z., Li, Z.: Identifying gambling and porn websites with image recognition. In: Zeng, B., Huang, Q., El Saddik, A., Li, H., Jiang, S., Fan, X. (eds.) PCM 2017. LNCS, vol. 10736, pp. 488\u2013497. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77383-4_48"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Hu, W., Wu, O., Chen, Z., et al.: Recognition of pornographic web pages by classifying texts and images. IEEE Trans. Pattern Anal. 1019\u20131034 (2007)","DOI":"10.1109\/TPAMI.2007.1133"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Y., Liu, D., Yan, Z., et al.: An abused webpage detection method based on screenshots text recognition. In: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, pp. 106\u2013110 (2021)","DOI":"10.1145\/3491396.3506562"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zheng, R., Zhou, A., et al.: Automatic detection of pornographic and gambling websites based on visual and textual content using a decision mechanism. Sensors (2020)","DOI":"10.3390\/s20143989"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Yang, R., Liu, J., Gu, L., et al.: Search & catch: detecting promotion infection in the underground through search engines. In: IEEE TrustCom, pp. 1566\u20131571 (2020)","DOI":"10.1109\/TrustCom50675.2020.00216"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Starov, O., Zhou, Y., Zhang, X., et al.: Betrayed by your dashboard: discovering malicious campaigns via web analytics. In: Proceedings of the World Wide Web Conference, pp. 227\u2013236 (2018)","DOI":"10.1145\/3178876.3186089"},{"key":"20_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-319-17398-6_25","volume-title":"Pattern Analysis, Intelligent Security and the Internet of Things","author":"H Salam","year":"2015","unstructured":"Salam, H., Maarof, M.A., Zainal, A.: Design consideration for improved term weighting scheme for pornographic web sites. In: Abraham, A., Muda, A.K., Choo, Y.-H. (eds.) Pattern Analysis, Intelligent Security and the Internet of Things. AISC, vol. 355, pp. 275\u2013285. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17398-6_25"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.patrec.2020.09.027","volume":"140","author":"L Wang","year":"2020","unstructured":"Wang, L., Zhang, J., Wang, M., Tian, J., Zhuo, L.: Multilevel fusion of multimodal deep features for porn streamer recognition in live video. Pattern Recogn. Lett. 140, 150\u2013157 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1016\/j.asoc.2010.05.003","volume":"11","author":"A Ahmadi","year":"2011","unstructured":"Ahmadi, A., Fotouhi, M., Khaleghi, M.: Intelligent classification of webpages using contextual and visual features. Appl. Soft Comput. 11, 1638\u20131647 (2011)","journal-title":"Appl. Soft Comput."},{"key":"20_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-76351-4_30","volume-title":"Hybrid Intelligent Systems","author":"M Maktabar","year":"2018","unstructured":"Maktabar, M., Zainal, A., Maarof, M.A., Kassim, M.N.: Content based fraudulent website detection using supervised machine learning techniques. In: Abraham, A., Muhuri, P.K., Muda, A.K., Gandhi, N. (eds.) HIS 2017. AISC, vol. 734, pp. 294\u2013304. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76351-4_30"},{"key":"20_CR14","unstructured":"European Commission. Illegal and Harmful Content on the Internet COM(96)487final (1996)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Shin, J., Lee, S., Wang, T.: Semantic approach for identifying harmful sites using the link relations. In: Proceedings of the 2014 IEEE International Conference on Semantic Computing, pp. 16\u201318 (2014)","DOI":"10.1109\/ICSC.2014.53"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Farooq, M.S., Khan, M.A., Abbas, S., et al.: Skin detection based pornography filtering using adaptive back propagation neural network. In: 8th International Conference on Information and Communication Technologies, pp. 106\u2013112 (2019)","DOI":"10.1109\/ICICT47744.2019.9001915"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Yaqub, W., Mohanty, M., et al.: Encrypted domain skin tone detection for pornographic image filtering. In: 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, pp. 1\u20135 (2018)","DOI":"10.1109\/AVSS.2018.8639350"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Granizo, S.L., Caraguay, \u00c1.L., L\u00f3pez, L.I., Hern\u00e1ndez-\u00c1lvarez, M.: Detection of possible illicit messages using natural language processing and computer vision on twitter and linked websites. IEEE Access (2020)","DOI":"10.1109\/ACCESS.2020.2976530"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Lee, P.Y., Hui, S.C., Fong, A.C.M.: An intelligent categorization engine for bilingual web content filtering. IEEE Trans. Multimed. 1183\u20131190 (2005)","DOI":"10.1109\/TMM.2005.858414"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Sun, X., et al.: Towards automatic detection of child pornography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 5332\u20135336 (2014)","DOI":"10.1109\/ICIP.2014.7026079"},{"key":"20_CR21","unstructured":"Zhou, D., Bousquet, O., Lal, T.N., Weston, J., Sch\u00f6lkopf, B.: Learning with local and global consistency. In: Advances in Neural Information Processing Systems, pp. 321\u2013328 (2004)"},{"key":"20_CR22","unstructured":"Chrome DevTools. https:\/\/chromedevtools.github.io\/devtools-protocol\/1-3\/Page\/"},{"key":"20_CR23","unstructured":"OpenCV. https:\/\/opencv.org\/"},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"992","DOI":"10.14778\/3402707.3402736","volume":"4","author":"Y Sun","year":"2011","unstructured":"Sun, Y., Han, J., Yan, X., et al.: PathSim: meta path-based top-k similarity search in heterogeneous information networks. Proc. VLDB Endow. 4, 992\u20131003 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"20_CR25","unstructured":"Symantec sitereview. https:\/\/sitereview.bluecoat.com\/"},{"key":"20_CR26","unstructured":"Baidu Security Platform. https:\/\/bsb.baidu.com\/"},{"key":"20_CR27","unstructured":"Evaluation Standard of Baidu Security Platform. https:\/\/bsb.baidu.com\/standard"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1002\/scj.10425","volume":"35","author":"S Nomura","year":"2004","unstructured":"Nomura, S., Oyama, S., Hayamizu, T., et al.: Analysis and improvement of HITS algorithm for detecting web communities. Syst. Comput. 35, 32\u201342 (2004)","journal-title":"Syst. Comput."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Dong, Y., Chawla, N.V., Swami, A.: metapath2vec: scalable representation learning for heterogeneous networks. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 135\u2013144 (2017)","DOI":"10.1145\/3097983.3098036"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Sokolov, M., Olufowobi, K., Herndon, N.: Visual spoofing in content-based spam detection. In: 13th International Conference on Security of Information and Networks (2020)","DOI":"10.1145\/3433174.3433605"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Yuan, K., et al.: Stealthy porn: understanding real-world adversarial images for illicit online promotion. In: IEEE Symposium on Security and Privacy (SP) (2019)","DOI":"10.1109\/SP.2019.00032"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Tong, S., Zhang, H, Shen, B., et al.: Detecting gambling sites from post behaviors. In: IEEE 11th Conference on Industrial Electronics and Applications, pp. 2495\u20132500 (2016)","DOI":"10.1109\/ICIEA.2016.7604012"},{"key":"20_CR33","unstructured":"Moustafa, M., et al.: Applying deep learning to classify pornographic images and videos. arXiv Preprint arxiv:1511.08899 (2015)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26553-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T12:17:27Z","timestamp":1680610647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26553-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031265525","9783031265532"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26553-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sklois.cn\/inscrypt2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}