{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T12:23:24Z","timestamp":1776860604379,"version":"3.51.2"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:00:00Z","timestamp":1559260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Committee at the University of Macau","award":["MYRG2016-00137-FST and MYRG2018-00029-FST"],"award-info":[{"award-number":["MYRG2016-00137-FST and MYRG2018-00029-FST"]}]},{"name":"HKUST-NIE Social Media Lab., HKUST"},{"name":"Macau Science and Technology Development Fund","award":["FDCT\/022\/2017\/A1 and FDCT\/077\/2018\/A2"],"award-info":[{"award-number":["FDCT\/022\/2017\/A1 and FDCT\/077\/2018\/A2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"<jats:p>With the advancement of social media and mobile technology, any smartphone user can easily become a seller on social media and e-commerce platforms, such as Instagram and Carousell in Hong Kong or Taobao in China. A seller shows images of their products and annotates their images with suitable tags that can be searched easily by others. Those images could be taken by the seller, or the seller could use images shared by other sellers. Among sellers, some sell counterfeit goods, and these sellers may use disguising tags and language, which make detecting them a difficult task. This article proposes a framework to detect counterfeit sellers by using deep learning to discover connections among sellers from their shared images. Based on 473K shared images from Taobao, Instagram, and Carousell, it is proven that the proposed framework can detect counterfeit sellers. The framework is 30% better than approaches using object recognition in detecting counterfeit sellers. To the best of our knowledge, this is the first work to detect online counterfeit sellers from their shared images.<\/jats:p>","DOI":"10.1145\/3311785","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T12:28:42Z","timestamp":1559824122000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Online Counterfeit-goods Seller using Connection Discovery"],"prefix":"10.1145","volume":"15","author":[{"given":"Ming","family":"Cheung","sequence":"first","affiliation":[{"name":"HKUST-NIE Social Media Lab"}]},{"given":"James","family":"She","sequence":"additional","affiliation":[{"name":"HKUST-NIE Social Media Lab"}]},{"given":"Weiwei","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Faculty of Science and Technology, State Key Laboratory of Internet of Things for Smart City, University of Macau"}]},{"given":"Jiantao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Faculty of Science and Technology, State Key Laboratory of Internet of Things for Smart City, University of Macau"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035","author":"Arthur David","year":"2007","unstructured":"David Arthur and Sergei Vassilvitskii . 2007 . k-means++: The advantages of careful seeding . In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035 . David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035."},{"key":"e_1_2_1_2_1","volume-title":"Torr","author":"Bertinetto Luca","year":"2016","unstructured":"Luca Bertinetto , Jack Valmadre , Jo\u00e3o F. Henriques , Andrea Vedaldi , and Philip H. S . Torr . 2016 . Fully-convolutional siamese networks for object tracking. In Proceedings of the European Conference on Computer Visualization. Springer , 850--865. Luca Bertinetto, Jack Valmadre, Jo\u00e3o F. Henriques, Andrea Vedaldi, and Philip H. S. Torr. 2016. Fully-convolutional siamese networks for object tracking. In Proceedings of the European Conference on Computer Visualization. Springer, 850--865."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ken Chatfield Karen Simonyan Andrea Vedaldi and Andrew Zisserman. 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531.  Ken Chatfield Karen Simonyan Andrea Vedaldi and Andrew Zisserman. 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv preprint arXiv:1405.3531.","DOI":"10.5244\/C.28.6"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492637"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2460192"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406896"},{"key":"e_1_2_1_7_1","volume-title":"Characterizing user connections in social media through user shared image","author":"Cheung Ming","year":"2017","unstructured":"Ming Cheung , James She , and Ning Wang . 2017. Characterizing user connections in social media through user shared image . IEEE Trans. Big Data ( 2017 ). Ming Cheung, James She, and Ning Wang. 2017. Characterizing user connections in social media through user shared image. IEEE Trans. Big Data (2017)."},{"key":"e_1_2_1_8_1","unstructured":"Haoqiang Fan Zhimin Cao Yuning Jiang Qi Yin and Chinchilla Doudou. 2014. Learning deep face representation. arXiv preprint arXiv:1403.2802.  Haoqiang Fan Zhimin Cao Yuning Jiang Qi Yin and Chinchilla Doudou. 2014. Learning deep face representation. arXiv preprint arXiv:1403.2802."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_10_1","volume-title":"Proc. 31st Inform. Syst. Int. Conf. 79","author":"Heidemann Julia","year":"2010","unstructured":"Julia Heidemann , Mathias Klier , and Florian Probst . 2010 . Identifying key users in online social networks: A pagerank based approach . In Proc. 31st Inform. Syst. Int. Conf. 79 . Julia Heidemann, Mathias Klier, and Florian Probst. 2010. Identifying key users in online social networks: A pagerank based approach. In Proc. 31st Inform. Syst. Int. Conf. 79."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.242"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2690144"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2645404"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347123"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Conference on Web and Social Media (ICWSM\u201913)","author":"Mukherjee Arjun","unstructured":"Arjun Mukherjee , Vivek Venkataraman , Bing Liu , and Natalie S. Glance . 2013. What yelp fake review filter might be doing? In Proceedings of the International Conference on Web and Social Media (ICWSM\u201913) . 409--418. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Natalie S. Glance. 2013. What yelp fake review filter might be doing? In Proceedings of the International Conference on Web and Social Media (ICWSM\u201913). 409--418."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0263-7"},{"key":"e_1_2_1_19_1","volume-title":"Information Retrieval","author":"Van Rijsbergen C. J.","unstructured":"C. J. Van Rijsbergen . 1979. Information Retrieval ( 2 nd ed.). Butterworth-Heinemann , Newton, MA . C. J. Van Rijsbergen. 1979. Information Retrieval (2nd ed.). Butterworth-Heinemann, Newton, MA.","edition":"2"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0463-1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"e_1_2_1_22_1","volume-title":"Density Estimation for Statistics and Data Analysis","author":"Silverman Bernard W.","unstructured":"Bernard W. Silverman . 1986. Density Estimation for Statistics and Data Analysis . Vol. 26 . CRC Press . Bernard W. Silverman. 1986. Density Estimation for Statistics and Data Analysis. Vol. 26. CRC Press."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.40"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2013.861947"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.47.4.643"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Conference on on Security and Cryptography. IEEE, 1--10","author":"Wang Alex Hai","year":"2010","unstructured":"Alex Hai Wang . 2010 . Don\u2019t follow me: Spam detection in Twitter . In Proceedings of the International Conference on on Security and Cryptography. IEEE, 1--10 . Alex Hai Wang. 2010. Don\u2019t follow me: Spam detection in Twitter. In Proceedings of the International Conference on on Security and Cryptography. IEEE, 1--10."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.180"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299064"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2013.27"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:31Z","timestamp":1750206331000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,31]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3311785"],"URL":"https:\/\/doi.org\/10.1145\/3311785","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,31]]},"assertion":[{"value":"2018-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}