{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:48:42Z","timestamp":1770220122362,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1717028"],"award-info":[{"award-number":["CNS-1717028"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196529","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"431-442","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["You Are Your Photographs"],"prefix":"10.1145","author":[{"given":"Xiangwen","family":"Wang","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Peng","family":"Peng","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Chun","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Sadia Afroz Vaibhav Garg Damon McCoy and Rachel Greenstadt . 2013. Honor among thieves: A common's analysis of cybercrime economies Proc. of eCrime'13.  Sadia Afroz Vaibhav Garg Damon McCoy and Rachel Greenstadt . 2013. Honor among thieves: A common's analysis of cybercrime economies Proc. of eCrime'13.","DOI":"10.1109\/eCRS.2013.6805778"},{"key":"e_1_3_2_1_3_1","unstructured":"Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal . 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 (2017).  Arjun Nitin Bhagoji Daniel Cullina and Prateek Mittal . 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Danny Bradbury . 2014. Silk Road 2 Loses Over $2.6 Million in Bitcoins in Alleged Hack. (2014). deftempurl%https:\/\/www.coindesk.com\/silk-road-2-loses-bitcoins-hack tempurl  Danny Bradbury . 2014. Silk Road 2 Loses Over $2.6 Million in Bitcoins in Alleged Hack. (2014). deftempurl%https:\/\/www.coindesk.com\/silk-road-2-loses-bitcoins-hack tempurl"},{"key":"e_1_3_2_1_5_1","unstructured":"Gwern Branwen Nicolas Christin David D\u00e9cary-H\u00e9tu Rasmus Munksgaard Andersen StExo El Presidente Anonymous Daryl Lau Sohhlz Delyan Kratunov Vince Cakic Van Buskirk Whom Michael McKenna and Sigi Goode . 2015. Dark Net Market archives 2011--2015. (2015). https:\/\/www.gwern.net\/DNM-archives.  Gwern Branwen Nicolas Christin David D\u00e9cary-H\u00e9tu Rasmus Munksgaard Andersen StExo El Presidente Anonymous Daryl Lau Sohhlz Delyan Kratunov Vince Cakic Van Buskirk Whom Michael McKenna and Sigi Goode . 2015. Dark Net Market archives 2011--2015. (2015). https:\/\/www.gwern.net\/DNM-archives."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of USENIX Security'15","author":"Caliskan-Islam Aylin","year":"2015"},{"key":"e_1_3_2_1_7_1","unstructured":"Alfredo Canziani Adam Paszke and Eugenio Culurciello . 2016. An analysis of deep neural network models for practical applications. arXiv preprint arXiv:1605.07678 (2016).  Alfredo Canziani Adam Paszke and Eugenio Culurciello . 2016. An analysis of deep neural network models for practical applications. arXiv preprint arXiv:1605.07678 (2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner . 2017. Towards evaluating the robustness of neural networks Proc. of IEEE SP'17.  Nicholas Carlini and David Wagner . 2017. Towards evaluating the robustness of neural networks Proc. of IEEE SP'17.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kai San Choi Edmund Y. Lam and Kenneth K. Y. Wong . 2006. Source camera identification using footprints from lens aberration Proc. of SPIE Digital Photography II.  Kai San Choi Edmund Y. Lam and Kenneth K. Y. Wong . 2006. Source camera identification using footprints from lens aberration Proc. of SPIE Digital Photography II.","DOI":"10.1117\/12.649775"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1275"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S. Farooqi G. Jourjon M. Ikram M. A. Kaafar E. De Cristofaro Z. Shafiq A. Friedman and F. Zaffar . 2017. Characterizing key stakeholders in an online black-hat marketplace Proc. of eCrime'17.  S. Farooqi G. Jourjon M. Ikram M. A. Kaafar E. De Cristofaro Z. Shafiq A. Friedman and F. Zaffar . 2017. Characterizing key stakeholders in an online black-hat marketplace Proc. of eCrime'17.","DOI":"10.1109\/ECRIME.2017.7945050"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.553"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488428"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of ICLR'15","author":"Goodfellow Ian","year":"2015"},{"key":"e_1_3_2_1_19_1","unstructured":"Chuan Guo Mayank Rana Moustapha Cisse and Laurens van der Maaten . 2017. Countering Adversarial Images using Input Transformations. arXiv preprint arXiv:1711.00117 (2017).  Chuan Guo Mayank Rana Moustapha Cisse and Laurens van der Maaten . 2017. Countering Adversarial Images using Input Transformations. arXiv preprint arXiv:1711.00117 (2017)."},{"key":"e_1_3_2_1_20_1","volume-title":"All Your Cards Are Belong To Us: Understanding Online Carding Forums Proc. of eCrime'17","author":"Haslebacher Andreas","year":"2016"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_14"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786011003634415"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.464"},{"key":"e_1_3_2_1_25_1","unstructured":"Gao Huang Zhuang Liu Kilian Q Weinberger and Laurens van der Maaten . 2016. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993 (2016).  Gao Huang Zhuang Liu Kilian Q Weinberger and Laurens van der Maaten . 2016. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993 (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.923513"},{"key":"e_1_3_2_1_27_1","volume-title":"Foreebank: Syntactic analysis of customer support forums Proc. of EMNLP'15.","author":"Kaljahi Rasoul","year":"2015"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of CoNLL'10","author":"Kim Su Nam","year":"2010"},{"key":"e_1_3_2_1_29_1","unstructured":"Frederik Kratzert . 2016. Finetune AlexNet with Tensorflow. (2016). deftempurl%https:\/\/github.com\/kratzert\/finetune_alexnet_with_tensorflow tempurl  Frederik Kratzert . 2016. Finetune AlexNet with Tensorflow. (2016). deftempurl%https:\/\/github.com\/kratzert\/finetune_alexnet_with_tensorflow tempurl"},{"key":"e_1_3_2_1_30_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton . 2012. Imagenet classification with deep convolutional neural networks Proc. of NIPS'12.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton . 2012. Imagenet classification with deep convolutional neural networks Proc. of NIPS'12."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of ICLR workshop.","author":"Kurakin Alexey","year":"2017"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Yann LeCun Yoshua Bengio and Geoffrey Hinton . 2015. Deep learning. Nature Vol. 521 7553 (2015) 436--444.  Yann LeCun Yoshua Bengio and Geoffrey Hinton . 2015. Deep learning. Nature Vol. 521 7553 (2015) 436--444.","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_33_1","volume-title":"Australasian Language Technology Association Workshop","author":"Lui Marco","year":"2010"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_1_35_1","volume-title":"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs Proc. of UNENIX Security'12","author":"McCoy Damon","year":"2012"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard . 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks Proc. of CVPR'16.  Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard . 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks Proc. of CVPR'16.","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_1_39_1","unstructured":"NLTK . 2017. Natural Language Toolkit. (2017). http:\/\/www.nltk.org\/  NLTK . 2017. Natural Language Toolkit. (2017). http:\/\/www.nltk.org\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.222"},{"key":"e_1_3_2_1_41_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings Proc. of Euro SP'16","author":"Papernot Nicolas","year":"2016"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052600"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.12.011"},{"key":"e_1_3_2_1_44_1","volume-title":"Adversarial Diversity and Hard Positive Generation Proc. of CVPR Workshop.","author":"Rozsa Andras"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Hoo-Chang Shin Holger R Roth Mingchen Gao Le Lu Ziyue Xu Isabella Nogues Jianhua Yao Daniel Mollura and Ronald M Summers . 2016. Deep convolutional neural networks for computer-aided detection: CNN architectures dataset characteristics and transfer learning. IEEE transactions on medical imaging Vol. 35 5 (2016) 1285--1298.  Hoo-Chang Shin Holger R Roth Mingchen Gao Le Lu Ziyue Xu Isabella Nogues Jianhua Yao Daniel Mollura and Ronald M Summers . 2016. Deep convolutional neural networks for computer-aided detection: CNN architectures dataset characteristics and transfer learning. IEEE transactions on medical imaging Vol. 35 5 (2016) 1285--1298.","DOI":"10.1109\/TMI.2016.2528162"},{"key":"e_1_3_2_1_47_1","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).  Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_48_1","volume-title":"Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Proc. of USENIX Security'15","author":"Soska Kyle","year":"2015"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of LEET'11","author":"Stone-Gross Brett","year":"2011"},{"key":"e_1_3_2_1_50_1","unstructured":"Jiawei Su Danilo Vasconcellos Vargas and Sakurai Kouichi . 2017. One pixel attack for fooling deep neural networks. arXiv preprint arXiv:1710.08864 (2017).  Jiawei Su Danilo Vasconcellos Vargas and Sakurai Kouichi . 2017. One pixel attack for fooling deep neural networks. arXiv preprint arXiv:1710.08864 (2017)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Srikanth Sundaresan Damon McCoy Sadia Afroz and Vern Paxson . 2016. Profiling underground merchants based on network behavior Proc. of eCrime'16.  Srikanth Sundaresan Damon McCoy Sadia Afroz and Vern Paxson . 2016. Profiling underground merchants based on network behavior Proc. of eCrime'16.","DOI":"10.1109\/ECRIME.2016.7487943"},{"key":"e_1_3_2_1_52_1","volume-title":"Inception-ResNet and the Impact of Residual Connections on Learning Proc. of AAAI'17","author":"Szegedy Christian","year":"2017"},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of ICLR'14","author":"Szegedy Christian","year":"2014"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Nima Tajbakhsh Jae Y Shin Suryakanth R Gurudu R Todd Hurst Christopher B Kendall Michael B Gotway and Jianming Liang . 2016. Convolutional neural networks for medical image analysis: Full training or fine tuning? IEEE transactions on medical imaging Vol. 35 5 (2016) 1299--1312.  Nima Tajbakhsh Jae Y Shin Suryakanth R Gurudu R Todd Hurst Christopher B Kendall Michael B Gotway and Jianming Liang . 2016. Convolutional neural networks for medical image analysis: Full training or fine tuning? IEEE transactions on medical imaging Vol. 35 5 (2016) 1299--1312.","DOI":"10.1109\/TMI.2016.2535302"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2015.10.002"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Christopher Thomas and Adriana Kovashka . 2016. Seeing Behind the Camera: Identifying the Authorship of a Photograph Proc. of CVPR'16.  Christopher Thomas and Adriana Kovashka . 2016. Seeing Behind the Camera: Identifying the Authorship of a Photograph Proc. of CVPR'16.","DOI":"10.1109\/CVPR.2016.380"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073478"},{"key":"e_1_3_2_1_58_1","unstructured":"Nicky Woolf . 2015. Bitcoin \u201cexit scam\u201d: deep-web market operators disappear with $12m. (2015). deftempurl%https:\/\/www.theguardian.com\/technology\/2015\/mar\/18\/bitcoin-deep-web-evolution-exit-scam-12-million-dollars tempurl  Nicky Woolf . 2015. Bitcoin \u201cexit scam\u201d: deep-web market operators disappear with $12m. (2015). deftempurl%https:\/\/www.theguardian.com\/technology\/2015\/mar\/18\/bitcoin-deep-web-evolution-exit-scam-12-million-dollars tempurl"},{"key":"e_1_3_2_1_59_1","volume-title":"Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"M. Yip N. Shadbolt and C. Webber . 2012. Structural analysis of online criminal social networks Proc. of ISI'12.  M. Yip N. Shadbolt and C. Webber . 2012. Structural analysis of online criminal social networks Proc. of ISI'12.","DOI":"10.1109\/ISI.2012.6284092"},{"key":"e_1_3_2_1_61_1","unstructured":"Felix Yu . 2016. Fine-tune Convolutional Neural Network in Keras with ImageNet Pretrained Models. (2016). deftempurl%https:\/\/github.com\/flyyufelix\/cnn_finetune tempurl  Felix Yu . 2016. Fine-tune Convolutional Neural Network in Keras with ImageNet Pretrained Models. (2016). deftempurl%https:\/\/github.com\/flyyufelix\/cnn_finetune tempurl"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Stephan Zheng Yang Song Thomas Leung and Ian J. Goodfellow . 2016. Improving the Robustness of Deep Neural Networks via Stability Training Proc. of CVPR'16.  Stephan Zheng Yang Song Thomas Leung and Ian J. Goodfellow . 2016. Improving the Robustness of Deep Neural Networks via Stability Training Proc. of CVPR'16.","DOI":"10.1109\/CVPR.2016.485"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196529","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196529"}},"subtitle":["Detecting Multiple Identities of Vendors in the Darknet Marketplaces"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":62,"alternative-id":["10.1145\/3196494.3196529","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196529","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}