{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:20:30Z","timestamp":1757312430256,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508246","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:19:29Z","timestamp":1540509569000},"page":"375-382","source":"Crossref","is-referenced-by-count":5,"title":["Adult Content in Social Live Streaming Services: Characterizing Deviant Users and Relationships"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Lykousas","sequence":"first","affiliation":[]},{"given":"Vicenc","family":"Gomez","sequence":"additional","affiliation":[]},{"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"ref32","first-page":"331","article-title":"Crowdturfers, campaigns, and social media: tracking and revealing crowdsourced manipulation of social media","author":"lee","year":"2013","journal-title":"Seventh International AAAI Conference on Weblogs and Social Media"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/89\/38002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3083165.3083169"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2015.7365913"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025642"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2957265.2961845"},{"key":"ref15","first-page":"567","article-title":"Law infringements in social live streaming services","author":"zimmer","year":"2017","journal-title":"Human Aspects of Information Security, Privacy, and Trust"},{"key":"ref16","article-title":"From Meerkat to Periscope: Does intellectual property law prohibit the live streaming of commercial sporting events?","volume":"39","author":"edelman","year":"2016","journal-title":"Columbia J Law and the Arts"},{"key":"ref17","first-page":"236","article-title":"Are people really social in porn 2.0?","author":"tyson","year":"2015","journal-title":"9th International Conference on Web and Social Media ICWSM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110075"},{"key":"ref19","first-page":"27","article-title":"Exploring youporn categories, tags, and nicknames for pleasant recommendations","author":"schuhmacher","year":"2013","journal-title":"Search and Exploration of X-rated Information WSDM'13 Workshop Proceedings"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/IJICTHD.2017010102"},{"key":"ref27","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1633\/JISTaP.2016.4.2.1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987472"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987453"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2016.7813395"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9227-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858374"},{"journal-title":"Is live streaming your life good business or dangerous?","year":"2017","author":"bearne","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504739"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8216"},{"key":"ref21","first-page":"72","article-title":"On the behaviour of deviant communities in online social networks","author":"coletto","year":"2016","journal-title":"10th International Conference on web and Social Media"},{"key":"ref24","first-page":"61","article-title":"Antisocial Behavior in Online Discussion Communities","author":"cheng","year":"2015","journal-title":"9th International Conference on Web and Social Media ICWSM"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2762730"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0230-4"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2018,8,28]]},"location":"Barcelona","end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508246.pdf?arnumber=8508246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:48:49Z","timestamp":1643219329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508246","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}