{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T10:00:58Z","timestamp":1774605658986,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s00500-025-11059-z","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:38:51Z","timestamp":1770435531000},"page":"2659-2676","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of an improved method for dark web forum and image classification using multi-modal transformers, graph neural networks, and meta-transfer learning"],"prefix":"10.1007","volume":"30","author":[{"given":"Yogita H.","family":"Dhande","sequence":"first","affiliation":[]},{"given":"Amol V.","family":"Zade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"11059_CR1","doi-asserted-by":"publisher","first-page":"21746","DOI":"10.1109\/ACCESS.2021.3055532","volume":"9","author":"A Alharbi","year":"2021","unstructured":"Alharbi A et al (2021) Exploring the topological properties of the Tor dark web. IEEE Access 9:21746\u201321758. https:\/\/doi.org\/10.1109\/ACCESS.2021.3055532","journal-title":"IEEE Access"},{"issue":"1","key":"11059_CR2","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1093\/mnras\/stab3281","volume":"510","author":"MC Artale","year":"2021","unstructured":"Artale MC et al (2021) The large-scale distribution of ionized metals in IllustrisTNG. Mon Not R Astron Soc 510(1):399\u2013412. https:\/\/doi.org\/10.1093\/mnras\/stab3281","journal-title":"Mon Not R Astron Soc"},{"key":"11059_CR3","doi-asserted-by":"publisher","first-page":"35914","DOI":"10.1109\/ACCESS.2023.3255165","volume":"11","author":"J Bergman","year":"2023","unstructured":"Bergman J, Popov OB (2023) Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation. IEEE Access 11:35914\u201335933. https:\/\/doi.org\/10.1109\/ACCESS.2023.3255165","journal-title":"IEEE Access"},{"key":"11059_CR4","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1057\/s41599-023-02424-0","volume":"10","author":"Z Chen","year":"2023","unstructured":"Chen Z, Meng X, Wang CJ (2023) The dark web privacy dilemma: linguistic diversity, talkativeness, and user engagement on the cryptomarket forums. Humanit Soc Sci Commun 10:903. https:\/\/doi.org\/10.1057\/s41599-023-02424-0","journal-title":"Humanit Soc Sci Commun"},{"issue":"3","key":"11059_CR5","doi-asserted-by":"publisher","first-page":"4183","DOI":"10.1093\/mnras\/stac3766","volume":"519","author":"T Dome","year":"2023","unstructured":"Dome T, Fialkov A, Mocz P, Sch\u00e4fer BM, Boylan-Kolchin M, Vogelsberger M (2023) On the cosmic web elongation in fuzzy dark matter cosmologies: effects on density profiles, shapes, and alignments of haloes. Mon Not R Astron Soc 519(3):4183\u20134202. https:\/\/doi.org\/10.1093\/mnras\/stac3766","journal-title":"Mon Not R Astron Soc"},{"issue":"9","key":"11059_CR6","doi-asserted-by":"publisher","first-page":"7288","DOI":"10.1109\/JIOT.2020.3038689","volume":"8","author":"Y Huang","year":"2021","unstructured":"Huang Y, Qiao X, Ren P, Dustdar S, Chen J (2021) EdgeBooster: edge-assisted real-time image segmentation for the mobile web in WoT. IEEE Internet Things J 8(9):7288\u20137302. https:\/\/doi.org\/10.1109\/JIOT.2020.3038689","journal-title":"IEEE Internet Things J"},{"key":"11059_CR7","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s10207-023-00745-4","volume":"23","author":"P Jin","year":"2024","unstructured":"Jin P, Kim N, Lee S et al (2024) Forensic investigation of the dark web on the Tor network: pathway toward the surface web. Int J Inf Secur 23:331\u2013346. https:\/\/doi.org\/10.1007\/s10207-023-00745-4","journal-title":"Int J Inf Secur"},{"issue":"3","key":"11059_CR8","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TBDATASAMPLES.2017.2763164","volume":"8","author":"M Kejriwal","year":"2022","unstructured":"Kejriwal M, Szekely P (2022) Knowledge graphs for social good: an entity-centric search engine for the human trafficking domain. IEEE Trans Big Data 8(3):592\u2013606. https:\/\/doi.org\/10.1109\/TBDATASAMPLES.2017.2763164","journal-title":"IEEE Trans Big Data"},{"key":"11059_CR9","doi-asserted-by":"publisher","first-page":"70078","DOI":"10.1109\/ACCESS.2022.3187210","volume":"10","author":"M Kim","year":"2022","unstructured":"Kim M, Lee J, Kwon H, Hur J (2022) Get off of chain: unveiling dark web using multilayer bitcoin address clustering. IEEE Access 10:70078\u201370091. https:\/\/doi.org\/10.1109\/ACCESS.2022.3187210","journal-title":"IEEE Access"},{"key":"11059_CR10","doi-asserted-by":"publisher","first-page":"118903","DOI":"10.1109\/ACCESS.2024.3448247","volume":"12","author":"P K\u00fchn","year":"2024","unstructured":"K\u00fchn P, Wittorf K, Reuter C (2024) Navigating the shadows: manual and semi-automated evaluation of the dark web for cyber threat intelligence. IEEE Access 12:118903\u2013118922. https:\/\/doi.org\/10.1109\/ACCESS.2024.3448247","journal-title":"IEEE Access"},{"key":"11059_CR11","doi-asserted-by":"publisher","unstructured":"Kumar, Bhandari AK (2022) Unsupervised enhancement and web tool for perceptually invisible type degraded image. IEEE Trans Consum Electron 68(4):401\u2013410. https:\/\/doi.org\/10.1109\/TCE.2022.3209791","DOI":"10.1109\/TCE.2022.3209791"},{"key":"11059_CR12","doi-asserted-by":"publisher","first-page":"56044","DOI":"10.1109\/ACCESS.2022.3176965","volume":"10","author":"H Moraliyage","year":"2022","unstructured":"Moraliyage H, Sumanasena V, De Silva D, Nawaratne R, Sun L, Alahakoon D (2022) Multimodal classification of onion services for proactive cyber threat intelligence using explainable deep learning. IEEE Access 10:56044\u201356056. https:\/\/doi.org\/10.1109\/ACCESS.2022.3176965","journal-title":"IEEE Access"},{"issue":"1","key":"11059_CR13","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSC.2019.2947498","volume":"15","author":"ML Morgia","year":"2022","unstructured":"Morgia ML, Mei A, Nemmi EN, Raponi S, Stefa J (2022) Nationality and geolocation-based profiling in the dark(Web). IEEE Trans Serv Comput 15(1):429\u2013441. https:\/\/doi.org\/10.1109\/TSC.2019.2947498. (1 Jan.-Feb)","journal-title":"IEEE Trans Serv Comput"},{"key":"11059_CR14","doi-asserted-by":"publisher","first-page":"112871","DOI":"10.1109\/ACCESS.2021.3103319","volume":"9","author":"S Nazah","year":"2021","unstructured":"Nazah S, Huda S, Abawajy JH, Hassan MM (2021) An unsupervised model for identifying and characterizing dark web forums. IEEE Access 9:112871\u2013112892. https:\/\/doi.org\/10.1109\/ACCESS.2021.3103319","journal-title":"IEEE Access"},{"key":"11059_CR15","doi-asserted-by":"publisher","first-page":"4794","DOI":"10.1109\/ACCESS.2023.3235409","volume":"11","author":"K Oosthoek","year":"2023","unstructured":"Oosthoek K, Van Staalduinen M, Smaragdakis G (2023) Quantifying dark web shops\u2019 illicit revenue. IEEE Access 11:4794\u20134808. https:\/\/doi.org\/10.1109\/ACCESS.2023.3235409","journal-title":"IEEE Access"},{"key":"11059_CR16","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1007\/s10586-023-04189-2","volume":"27","author":"JM Ruiz R\u00f3denas","year":"2024","unstructured":"Ruiz R\u00f3denas JM, Pastor-Galindo J, G\u00f3mez M\u00e1rmol F (2024) A general and modular framework for dark web analysis. Cluster Comput 27:4687\u20134703. https:\/\/doi.org\/10.1007\/s10586-023-04189-2","journal-title":"Cluster Comput"},{"key":"11059_CR17","doi-asserted-by":"publisher","first-page":"42379","DOI":"10.1007\/s11042-023-17222-8","volume":"83","author":"JK Saini","year":"2024","unstructured":"Saini JK (2024) LSTM based deep learning approach to detect online violent activities over dark web. Multimed Tools Appl 83:42379\u201342390. https:\/\/doi.org\/10.1007\/s11042-023-17222-8","journal-title":"Multimed Tools Appl"},{"key":"11059_CR18","doi-asserted-by":"publisher","first-page":"42423","DOI":"10.1109\/ACCESS.2024.3373769","volume":"12","author":"J Saleem","year":"2024","unstructured":"Saleem J, Islam R, Islam MZ (2024) Darknet traffic analysis: a systematic literature review. IEEE Access 12:42423\u201342452. https:\/\/doi.org\/10.1109\/ACCESS.2024.3373769","journal-title":"IEEE Access"},{"key":"11059_CR19","doi-asserted-by":"publisher","first-page":"33628","DOI":"10.1109\/ACCESS.2022.3161547","volume":"10","author":"J Saleem","year":"2022","unstructured":"Saleem J, Islam R, Kabir MA (2022) The anonymity of the dark web: a survey. IEEE Access 10:33628\u201333660. https:\/\/doi.org\/10.1109\/ACCESS.2022.3161547","journal-title":"IEEE Access"},{"key":"11059_CR20","doi-asserted-by":"publisher","first-page":"99633","DOI":"10.1109\/ACCESS.2022.3206539","volume":"10","author":"SAA Shah","year":"2022","unstructured":"Shah SAA, Ali Masood M, Yasin A (2022) Dark web: e-commerce information extraction based on name entity recognition using Bidirectional-LSTM. IEEE Access 10:99633\u201399645. https:\/\/doi.org\/10.1109\/ACCESS.2022.3206539","journal-title":"IEEE Access"},{"key":"11059_CR21","doi-asserted-by":"publisher","unstructured":"Shin G-Y et al (2024) Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight, in IEEE Access, vol. 12, pp. 36361\u201336371. https:\/\/doi.org\/10.1109\/ACCESS.2023.3347737","DOI":"10.1109\/ACCESS.2023.3347737"},{"issue":"2","key":"11059_CR22","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TCE.2022.3175907","volume":"68","author":"N Singh","year":"2022","unstructured":"Singh N, Bhandari AK (2022) Noise aware L\u2082-LP decomposition-based enhancement in extremely low light conditions with web application. IEEE Trans Consum Electron 68(2):161\u2013169. https:\/\/doi.org\/10.1109\/TCE.2022.3175907","journal-title":"IEEE Trans Consum Electron"},{"issue":"3","key":"11059_CR23","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/TPC.2021.3091784","volume":"64","author":"A Strantz","year":"2021","unstructured":"Strantz A (2021) Using web standards to design accessible data visualizations in professional communication. IEEE Trans Prof Commun 64(3):288\u2013301. https:\/\/doi.org\/10.1109\/TPC.2021.3091784","journal-title":"IEEE Trans Prof Commun"},{"issue":"6","key":"11059_CR24","doi-asserted-by":"publisher","first-page":"3656","DOI":"10.1109\/TDSC.2021.3104869","volume":"19","author":"Q Yin","year":"2022","unstructured":"Yin Q et al (2022) An automated multi-tab website fingerprinting attack. IEEE Trans Depend Secure Comput 19(6):3656\u20133670. https:\/\/doi.org\/10.1109\/TDSC.2021.3104869","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"11059_CR27","doi-asserted-by":"publisher","unstructured":"Yogita D, Amol Z, Sonal P (2024) An Empirical Review of Dark Web Data Classification Methods Using NLP, SVM, CNN, and GAN\u201din IEEE xplore. Academy of Technology, Hooghly, Kolkata West Bengal 28\u201329. https:\/\/doi.org\/10.1109\/C3IT60531.2024","DOI":"10.1109\/C3IT60531.2024"},{"key":"11059_CR25","doi-asserted-by":"publisher","first-page":"5434","DOI":"10.1109\/TIFS.2024.3390553","volume":"19","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Zhang L, Yang G, Chen Y, Xu J, Yang M (2024) The dark forest: understanding security risks of Cross-Party delegated resources in mobile app In-App ecosystems. IEEE Trans Inf Forensics Secur 19:5434\u20135448. https:\/\/doi.org\/10.1109\/TIFS.2024.3390553","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-11059-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-11059-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-11059-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:24:27Z","timestamp":1774603467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-11059-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,7]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["11059"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-11059-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,7]]},"assertion":[{"value":"3 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest or competing interests in relation to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflincts of Interest"}}]}}