{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:23:46Z","timestamp":1775067826278,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3176965","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T20:41:28Z","timestamp":1653338488000},"page":"56044-56056","source":"Crossref","is-referenced-by-count":24,"title":["Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep Learning"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6212-8312","authenticated-orcid":false,"given":"Harsha","family":"Moraliyage","sequence":"first","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]},{"given":"Vidura","family":"Sumanasena","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3878-5969","authenticated-orcid":false,"given":"Daswin","family":"De Silva","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6641-2153","authenticated-orcid":false,"given":"Rashmika","family":"Nawaratne","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]},{"given":"Lina","family":"Sun","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]},{"given":"Damminda","family":"Alahakoon","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800573"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5113-0_80"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339273"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1230819.1241670"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098193"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3161547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587404"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-018-0150-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2022.1740"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994542"},{"key":"ref11","first-page":"14","article-title":"Towards improved cyber security information sharing: Requirements for a cyber security data exchange and collaboration infrastructure (CDXI)","volume-title":"Proc. 5th Int. Conf. Cyber Confl. (CyCon)","author":"Dandurand"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/2362-3099"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474565"},{"key":"ref14","first-page":"689","article-title":"Multimodal deep learning","volume-title":"Proc. 28th Int. Conf. Mach. Learn. (ICML)","author":"Ngiam"},{"key":"ref15","article-title":"Explain images with multimodal recurrent neural networks","volume":"abs\/1410","author":"Mao","year":"2014","journal-title":"ArXiv"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.301"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43823-4_35"},{"key":"ref18","first-page":"1","article-title":"Open dataset of phishing and tor hidden services screen-captures","author":"Falconieri","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622074"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745437"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745435"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3322645.3322691"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3409289"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v10.i1.pp371-379"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8393318"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/584931.584952"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2007.4370847"},{"key":"ref28","article-title":"Automatic product categorization for anonymous marketplaces","author":"Graczyk","year":"2015","journal-title":"Comput. Sci."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.063"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.12.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-1004"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031178"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus49466.2020.9039341"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2017.0041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67180-2_58"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2018.8477735"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.12.049"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397411"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01228-7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC44109.2020.9175884"},{"key":"ref45","first-page":"3519","article-title":"Word embeddings, analogies, and machine learning: beyond king\u2014Man + woman = queen","volume-title":"Proc. COLING 26th Int. Conf. Comput. Linguist. COLING Tech. Papers","author":"Drozd"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2840738"},{"key":"ref47","article-title":"Word embeddings: A survey","volume":"abs\/1901","author":"Almeida","year":"2019","journal-title":"ArXiv"},{"key":"ref48","first-page":"1","article-title":"Efficient estimation of word representations in vector space","volume-title":"Proc. 1st Int. Conf. Learn. Represent., (ICLR)","author":"Mikolov"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.044"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1162"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref52","article-title":"A structured self-attentive sentence embedding","author":"Lin","year":"2017","journal-title":"arXiv:1703.03130"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.26.041002.131047"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3465055"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11945"},{"key":"ref57","volume-title":"MISP\/MISP-Taxonomies","year":"2020"},{"key":"ref58","article-title":"Multiple label classification for Amazon rainforest images","author":"Zhang","year":"2017"},{"key":"ref59","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. 3rd Int. Conf. Learn. Represent. Conf. Track","author":"Kingma"},{"key":"ref60","article-title":"An improvement of the convergence proof of the ADAM-Optimizer","volume":"abs\/1804","author":"Bock","year":"2018","journal-title":"ArXiv"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09779740.pdf?arnumber=9779740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:09:00Z","timestamp":1705961340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9779740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3176965","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}