{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:42:36Z","timestamp":1760078556482,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819530717","type":"print"},{"value":"9789819530724","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3072-4_8","type":"book-chapter","created":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:09Z","timestamp":1760077269000},"page":"87-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FCA-XLNet-BiGRU Multi-task Framework for Darknet Transactions"],"prefix":"10.1007","author":[{"given":"Dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,11]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Per Hakon, M., Fahmy, Y.F.B., Guttorm, S.: The ransomware-as-a-service economy within the darknet. Comput. Secur. 92, 101762 (2020)","DOI":"10.1016\/j.cose.2020.101762"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Alnabulsi, H., Islam, R.: Identification of illegal forum activities inside the dark net. In: International Conference on Machine Learning. (2018)","DOI":"10.1109\/iCMLDE.2018.00015"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Seyler, D., Liu, W., Wang, X., Zhai, C.: Towards dark jargon interpretation in underground forums. In: ECIR (2), pp. 393\u2013400 (2021)","DOI":"10.1007\/978-3-030-72240-1_40"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Al-Nabki, M.W., Ferm\u00e9, E., Amig\u00f3, E., de Pablo, I.: Classifying illegal activities on tor network based on web textual contents. In: Conference of the European Chapter of the Association for Computational Linguistics. (2017)","DOI":"10.18653\/v1\/E17-1004"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"He, S., He, Y., Li, M.: Classification of illegal activities on the dark web. In: Proceedings of the 2nd International Conference on Information Science and Systems, pp. 73\u201378 (2019)","DOI":"10.1145\/3322645.3322691"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Z., Wang, W., Cai, Q., Yin, M., Feng, X.: Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery. In: IEEE Conference on Computer Communications. (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796703"},{"key":"8_CR7","unstructured":"Ammar, H., Miled, N., Mtibaa, M.: Survey on formal concept analysis based supervised classification techniques. In: International Conference on Machine Learning, pp. 21\u201329 (2020)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Jin, Y., et al.: DarkBERT: a Language Model for the Dark Side of the Internet. Comput. Res. Repository, 7515\u20137533 (2023)","DOI":"10.18653\/v1\/2023.acl-long.415"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Srivatsav, V., Rezaei, N., Diepenbroek, G.V., Siolas, G.: VendorLink: an NLP approach for identifying and linking vendor migrants and potential aliases on darknet markets. In: Annual Meeting of the Association for Computational Linguistics, pp. 8619\u20138639 (2023)","DOI":"10.18653\/v1\/2023.acl-long.481"},{"key":"8_CR10","unstructured":"Liang, K., Chen, X., Wang, H.: An unsupervised detection framework for chinese jargons in the darknet. In: Web Search and Data Mining. (2022)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Faizan, M., Khan, R.A.: Exploring and analyzing the dark web: a new alchemy. First Monday (2019)","DOI":"10.5210\/fm.v24i5.9473"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3072-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T06:21:13Z","timestamp":1760077273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3072-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,11]]},"ISBN":["9789819530717","9789819530724"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3072-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,11]]},"assertion":[{"value":"11 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem2025.scimeeting.cn\/en\/web\/index\/27434","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}