{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:04Z","timestamp":1750221124294,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297264","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"530-535","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Chinese Domain Name Piracy"],"prefix":"10.1145","author":[{"given":"Dan","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Phishing Activity Trends Report 4st Quarter","author":"Anti-Phishing Working Group (APWG).","year":"2017","unstructured":"Anti-Phishing Working Group (APWG). Phishing Activity Trends Report 4st Quarter 2017 . 2018. http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2017.pdf Anti-Phishing Working Group (APWG). Phishing Activity Trends Report 4st Quarter 2017. 2018. http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2017.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Briefing on Handing of Phishing Websites","author":"Anti-Phishing","year":"2018","unstructured":"Anti-Phishing Alliance of China (APAC). Briefing on Handing of Phishing Websites in April 2018 . 2018. http:\/\/en.apac.cn\/Briefing_on_Handling_of_Phishing_Websites\/201805\/P020180515545876373680.pdf Anti-Phishing Alliance of China (APAC). Briefing on Handing of Phishing Websites in April 2018. 2018. http:\/\/en.apac.cn\/Briefing_on_Handling_of_Phishing_Websites\/201805\/P020180515545876373680.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833585"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Zhang Jian","year":"2008","unstructured":"Jian Zhang , Phillip A. Porras , and Johannes Ullrich . 2008 . Highly Predictive Blacklisting . In Proceedings of the 17th USENIX Security Symposium , July 28-August 1, 2008, San Jose, CA, USA. 107--122. http:\/\/www.usenix.org\/events\/sec08\/tech\/full\\_papers\/zhang\/zhang.pdf Jian Zhang, Phillip A. Porras, and Johannes Ullrich. 2008. Highly Predictive Blacklisting. In Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA. 107--122. http:\/\/www.usenix.org\/events\/sec08\/tech\/full\\_papers\/zhang\/zhang.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.5"},{"key":"e_1_3_2_1_7_1","unstructured":"The 39th China Statistical Report on Internet Development. 2017. http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201701\/P020170123364672657408.pdf  The 39th China Statistical Report on Internet Development. 2017. http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201701\/P020170123364672657408.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"The 41th China Statistical Report on Internet Development. 2018. http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201803\/P020180305409870339136.pdf  The 41th China Statistical Report on Internet Development. 2018. http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201803\/P020180305409870339136.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501473"},{"key":"e_1_3_2_1_10_1","unstructured":"Bo Hong Guanggang Geng Liming Wang and Wei Mao. 2013. Method to detect Chinese domain name homograph attack. Application Research of Computers 11 (12-2013) 3426--3429.  Bo Hong Guanggang Geng Liming Wang and Wei Mao. 2013. Method to detect Chinese domain name homograph attack. Application Research of Computers 11 (12-2013) 3426--3429."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0414-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx035"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03756-1_50"},{"key":"e_1_3_2_1_14_1","unstructured":"Dong Wang and Shihuan Xiong. 2013. New algorithm for similarity calculation of Chinese character glyph. Application Research of Computers 8 (10-2013) 2395--2397.  Dong Wang and Shihuan Xiong. 2013. New algorithm for similarity calculation of Chinese character glyph. Application Research of Computers 8 (10-2013) 2395--2397."},{"key":"e_1_3_2_1_15_1","unstructured":"Zhiqing Lin and Jun Guo. 2002. An Algorithm for the Recognition of Similar Chinese Characters. Journal of Chinese Information Processing 5 (3-2002) 44--48.  Zhiqing Lin and Jun Guo. 2002. An Algorithm for the Recognition of Similar Chinese Characters. Journal of Chinese Information Processing 5 (3-2002) 44--48."},{"key":"e_1_3_2_1_16_1","volume-title":"GB\/T 17698--2010","author":"Information","year":"2011","unstructured":"Information technology - Universal multiple-octet coded character set (CJK unified ideographs) 15\u00d716-dot matrix font : GB\/T 17698--2010 . 2011 . Standards . http:\/\/c.gb688.cn\/bzgk\/gb\/showGb?type=online&hcno=D213E624930ABEADB6DBDA92F97AB2BC Information technology - Universal multiple-octet coded character set (CJK unified ideographs) 15\u00d716-dot matrix font: GB\/T 17698--2010. 2011. Standards. http:\/\/c.gb688.cn\/bzgk\/gb\/showGb?type=online&hcno=D213E624930ABEADB6DBDA92F97AB2BC"},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/\u5bfc\u822a.\u4e2d\u56fd\/.  http:\/\/\u5bfc\u822a.\u4e2d\u56fd\/."}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"CSAI '18"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":17,"alternative-id":["10.1145\/3297156.3297264","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297264","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}