{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:29Z","timestamp":1750221269765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3138827","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2543-2545","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Ziqi","family":"Liu","sequence":"first","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Chaochao","family":"Chen","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Jun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Feng","family":"Xu","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Le","family":"Song","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group &amp; Georgia Institute of Technology, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Qiang Cao Xiaowei Yang Jieqi Yu and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM 477--488.","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_2_1","unstructured":"Hanjun Dai Bo Dai and Le Song 2016. Discriminative embeddings of latent variable models for structured data International Conference on Machine Learning. 2702--2711."},{"volume-title":"Socialwatch: detection of online service abuse via large-scale social graphs Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 143--148","author":"Huang Junxian","key":"e_1_3_2_1_3_1","unstructured":"Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, and Z Morley Mao 2013. Socialwatch: detection of online service abuse via large-scale social graphs Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 143--148."},{"key":"e_1_3_2_1_4_1","unstructured":"Gianluca Stringhini Pierre Mourlanne Gregoire Jacob Manuel Egele Christopher Kruegel and Giovanni Vigna 2015. Evilcohort: detecting communities of malicious accounts on online services. USENIX."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402979"},{"key":"e_1_3_2_1_6_1","volume-title":"NSDI","volume":"9","author":"Zhao Yao","year":"2009","unstructured":"Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum. 2009. BotGraph: Large Scale Spamming Botnet Detection.. NSDI, Vol. Vol. 9. 321--334. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3138827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:04Z","timestamp":1750212664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3138827"}},"subtitle":["Neural Network-based Graph Embedding for Malicious Accounts Detection"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":6,"alternative-id":["10.1145\/3133956.3138827","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3138827","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}