{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:32:23Z","timestamp":1762867943375,"version":"3.28.0"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/sp.2019.00025","type":"proceedings-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T02:03:02Z","timestamp":1568685782000},"page":"1311-1325","source":"Crossref","is-referenced-by-count":7,"title":["Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Joslin","sequence":"first","affiliation":[]},{"given":"Neng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660332"},{"journal-title":"Baidu-International Antivirus","year":"2018","key":"ref38"},{"journal-title":"Google adwords","year":"2018","key":"ref33"},{"journal-title":"Baidu Index","year":"2018","key":"ref32"},{"journal-title":"Sogou Pinyin Input Dictionaries","year":"2018","key":"ref31"},{"key":"ref30","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2014","journal-title":"CoRR"},{"journal-title":"Spamhaus","year":"2018","key":"ref37"},{"journal-title":"Safe Browsing api","year":"2018","key":"ref36"},{"journal-title":"Google Safe Browsing API","year":"2018","key":"ref35"},{"journal-title":"Google Translate API","year":"2018","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23036"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134002"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488474"},{"key":"ref63","article-title":"Understanding the Dark Side of Domain Parking","author":"alrwais","year":"2014","journal-title":"23rd USENIX Security Symposium"},{"key":"ref28","article-title":"Character-Aware Neural Language Models","author":"kim","year":"0","journal-title":"13th AAAI Conference on Artificial Intelligence (AAAI)"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23053"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1137"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems","year":"2015","author":"abadi","key":"ref29"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"journal-title":"Organic Search Drives 51% Of Traffic Social Only 5%","year":"2014","key":"ref2"},{"journal-title":"Number of Internet Users by Language","year":"2017","key":"ref1"},{"journal-title":"Public Notification &#x201C;Clalis&#x201D; Contains Hidden Drug Ingredient","year":"2015","key":"ref20"},{"journal-title":"Google organic click-through rates in 2014-moz","year":"2014","author":"petrescu","key":"ref22"},{"journal-title":"Search Engine Market Share","year":"2018","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"journal-title":"The First Page of Google&#x2019;s Search Results Is the Holy Grail for Marketers","year":"2014","author":"sharp","key":"ref23"},{"key":"ref26","article-title":"Measuring the Perpetrators and Funders of Typosquatting","author":"moore","year":"2010","journal-title":"14th International Conference on Financial Cryptography and Data Security"},{"key":"ref25","article-title":"Binary Codes Capable of Correcting Deletions, Insertions and Reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"journal-title":"Open Office Wiki Dictionaries","year":"2018","key":"ref50"},{"journal-title":"Assorted English Words List","year":"2018","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883008"},{"key":"ref58","article-title":"Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade","author":"leontiadis","year":"2011","journal-title":"20th USENIX Security Symposium"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046762"},{"key":"ref56","article-title":"deSEO: Combating Search-Result Poisoning","author":"john","year":"2011","journal-title":"20th USENIX Security Symposium"},{"journal-title":"Google Autocomplete Policies","year":"2018","key":"ref55"},{"key":"ref54","article-title":"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Program","author":"mccoy","year":"0","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"journal-title":"Value of Organic First-Page Results","year":"2015","author":"hodgdon","key":"ref53"},{"journal-title":"An English Word List","year":"1999","author":"lawler","key":"ref52"},{"journal-title":"Chinese Language Processing","year":"1997","author":"yuan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"journal-title":"Ranker","year":"2018","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"journal-title":"What Words Get Misspelled in Web Searches?","year":"2010","author":"valentino-devries","key":"ref14"},{"journal-title":"Is Wisconsin Really That Hard to Spell?","year":"2017","author":"mele","key":"ref15"},{"journal-title":"Google&#x2019;s Algorithm Update for Misspelled Words A Big Change for SEO","year":"2008","author":"meechan","key":"ref16"},{"key":"ref17","article-title":"The Examples Analysis of Chinese-Error Correction Function in Search Engines","author":"hu","year":"2008","journal-title":"Library and Information Service Online"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"journal-title":"VirusTotal","year":"2018","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"journal-title":"Search Engine Optimization Starter Guide","year":"2017","key":"ref3"},{"journal-title":"Targeting Keyword Variations for Increased Search & Pay per Click Traffic","year":"2007","author":"slegg","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"journal-title":"Snickers Misspelling Search Keyword Campaign Reached 50K People In 3 Days","year":"2015","author":"grover","key":"ref8"},{"journal-title":"German Court Orders Amazon to Stop &#x2018;Typo-Targeting&#x2019; Ads for Birkenstocks","year":"2017","author":"morris","key":"ref7"},{"journal-title":"Peter Norvig N-grams Dataset","year":"2018","author":"norvig","key":"ref49"},{"journal-title":"Nearly 60 Percent of Searches Now from Mobile Devices","year":"2016","author":"sterling","key":"ref9"},{"journal-title":"Alexa list","year":"2017","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.16"},{"journal-title":"Google Adwords Keyword Planner","year":"2018","key":"ref48"},{"key":"ref47","article-title":"The Long &#x201C;Taile&#x201D; of Typosquatting Domain Names","author":"szurdi","year":"2014","journal-title":"23rd USENIX Security Symposium"},{"journal-title":"Pharmaceutical Spam Keywords","year":"2017","key":"ref42"},{"journal-title":"Defense News","year":"2017","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"journal-title":"Kaggle datasets","year":"2017","key":"ref43"}],"event":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2019,5,19]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2019,5,23]]}},"container-title":["2019 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8826229\/8835208\/08835220.pdf?arnumber=8835220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:38Z","timestamp":1658094878000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8835220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/sp.2019.00025","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}