{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:30:13Z","timestamp":1773930613711,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3219925","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"811-820","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["NGUARD"],"prefix":"10.1145","author":[{"given":"Jianrong","family":"Tao","sequence":"first","affiliation":[{"name":"NetEase Fuxi AI Lab, Hangzhou, China"}]},{"given":"Jiarong","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Linxia","family":"Gong","sequence":"additional","affiliation":[{"name":"NetEase Fuxi AI Lab, Hangzhou, China"}]},{"given":"Yifu","family":"Li","sequence":"additional","affiliation":[{"name":"NetEase Fuxi AI Lab, Hangzhou, China"}]},{"given":"Changjie","family":"Fan","sequence":"additional","affiliation":[{"name":"NetEase Fuxi AI Lab, Hangzhou, China"}]},{"given":"Zhou","family":"Zhao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.307"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88690-7_6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102254.3102263"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/797159"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517498"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1545-2"},{"key":"e_1_3_2_1_7_1","volume-title":"Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. 12 (Nov","author":"Collobert Ronan","year":"2011","unstructured":"Ronan Collobert , Jason Weston , L\u00e9on Bottou , Michael Karlen , Koray Kavukcuoglu , and Pavel Kuksa . 2011. Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. 12 (Nov . 2011 ), 2493--2537. Ronan Collobert, Jason Weston, L\u00e9on Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. 12 (Nov. 2011), 2493--2537."},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Neural Information Processing Systems 28","author":"Dai Andrew M","unstructured":"Andrew M Dai and Quoc V Le. 2015. Semi-supervised Sequence Learning . In Advances in Neural Information Processing Systems 28 , C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett (Eds.). Curran Associates, Inc. , 3079--3087. Andrew M Dai and Quoc V Le. 2015. Semi-supervised Sequence Learning. In Advances in Neural Information Processing Systems 28, C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett (Eds.). Curran Associates, Inc., 3079--3087."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031667"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653694"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077246.1077255"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"S. Hilaire H. c. Kim and C. k. Kim. 2a010. How to deal with bot scum in MMORPGs? 1--6. S. Hilaire H. c. Kim and C. k. Kim. 2a010. How to deal with bot scum in MMORPGs? 1--6.","DOI":"10.1109\/CQR.2010.5619911"},{"key":"e_1_3_2_1_14_1","volume-title":"Aziz Mohaisen, and Huy Kang Kim.","author":"Kang Ah Reum","year":"2016","unstructured":"Ah Reum Kang , Seong Hoon Jeong , Aziz Mohaisen, and Huy Kang Kim. 2016 . Multimodal game bot detection using user behavioral characteristics. SpringerPlus 5, 1 (26 Apr 2016), 523. Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, and Huy Kang Kim. 2016. Multimodal game bot detection using user behavioral characteristics. SpringerPlus 5, 1 (26 Apr 2016), 523."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11589990_187"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623586"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Eunjo Lee Jiyoung Woo Hyoungshick Kim Aziz Mohaisen and Huy Kang Kim. 2016. You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. In NDSS. Eunjo Lee Jiyoung Woo Hyoungshick Kim Aziz Mohaisen and Huy Kang Kim. 2016. You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. In NDSS.","DOI":"10.14722\/ndss.2016.23436"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13356-0_32"},{"key":"e_1_3_2_1_19_1","volume-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 599--606","author":"Ma Q.","unstructured":"Q. Ma , S. Muthukrishnan , and W. Simpson . 2016. App2Vec: Vector modeling of mobile apps and applications . In 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 599--606 . Q. Ma, S. Muthukrishnan, and W. Simpson. 2016. App2Vec: Vector modeling of mobile apps and applications. In 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 599--606."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.222"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2011.6174239"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1944796.1944812"},{"key":"e_1_3_2_1_24_1","volume-title":"Advances in Neural Information Processing Systems 27","author":"Sutskever Ilya","unstructured":"Ilya Sutskever , Oriol Vinyals , and Quoc V Le. 2014. Sequence to Sequence Learning with Neural Networks . In Advances in Neural Information Processing Systems 27 , Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 3104--3112. Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to Sequence Learning with Neural Networks. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 3104--3112."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501750.1501770"},{"key":"e_1_3_2_1_26_1","first-page":"I","article-title":"Attention is All you Need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , \u0141ukasz Kaiser , and Illia Polosukhin . 2017 . Attention is All you Need . In Advances in Neural Information Processing Systems 30 , I . Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 6000--6010. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 6000--6010.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2425296.2425300"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018484"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324198.1324205"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3219925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T22:16:16Z","timestamp":1751753776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219925"}},"subtitle":["A Game Bot Detection Framework for NetEase MMORPGs"],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":29,"alternative-id":["10.1145\/3219819.3219925","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3219925","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}