{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:07Z","timestamp":1750221007633,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618629, CNS-1814825, CNS- 1845138 and OAC-1839909"],"award-info":[{"award-number":["CNS-1618629, CNS-1814825, CNS- 1845138 and OAC-1839909"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"WV HEPC Grant","award":["HEPC.dsr.18.5"],"award-info":[{"award-number":["HEPC.dsr.18.5"]}]},{"DOI":"10.13039\/100005289","name":"National Institute of Justice","doi-asserted-by":"publisher","award":["2018-75-CX-0032"],"award-info":[{"award-number":["2018-75-CX-0032"]}],"id":[{"id":"10.13039\/100005289","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,27]]},"DOI":"10.1145\/3341161.3343524","type":"proceedings-article","created":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T21:07:04Z","timestamp":1579122424000},"page":"1097-1104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["iTrustSO"],"prefix":"10.1145","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[{"name":"West Virginia University"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Case Western Reserve University"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Case Western Reserve University"}]},{"given":"Thirimachos","family":"Bourlai","sequence":"additional","affiliation":[{"name":"West Virginia University"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2020,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"You get where you're looking for the impact of information sources on code security,\" in S&P","author":"Acar Y.","year":"2016","unstructured":"Y. Acar , M. Backes , S. Fahl , D. Kim , M. L. Mazurek , and C. Stransky , \" You get where you're looking for the impact of information sources on code security,\" in S&P , 2016 . Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, \"You get where you're looking for the impact of information sources on code security,\" in S&P, 2016."},{"volume-title":"Understanding and evaluating the behavior of technical users. a study of developer interaction at stackoverflow,\" Hum. Cent. Comput. Inf. Sci","author":"Ahmed T.","key":"e_1_3_2_1_2_1","unstructured":"T. Ahmed and A. Srivastava , \" Understanding and evaluating the behavior of technical users. a study of developer interaction at stackoverflow,\" Hum. Cent. Comput. Inf. Sci ., vol. 7 , no. 8, 2017. T. Ahmed and A. Srivastava, \"Understanding and evaluating the behavior of technical users. a study of developer interaction at stackoverflow,\" Hum. Cent. Comput. Inf. Sci., vol. 7, no. 8, 2017."},{"key":"e_1_3_2_1_3_1","unstructured":"AttackFlow \"Watch out for insecure stackoverflow answers \" in https:\/\/www.attackflow.com\/Blog\/StackOverflow 2017.  AttackFlow \"Watch out for insecure stackoverflow answers \" in https:\/\/www.attackflow.com\/Blog\/StackOverflow 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Neural machine translation by jointly learning to align and translate,\" in ICLR","author":"Bahdanau D.","year":"2015","unstructured":"D. Bahdanau , K. Cho , and Y. Bengio , \" Neural machine translation by jointly learning to align and translate,\" in ICLR , 2015 . D. Bahdanau, K. Cho, and Y. Bengio, \"Neural machine translation by jointly learning to align and translate,\" in ICLR, 2015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"H. Cavusoglu Z. Li and K.-W. Huang \"Can gamification motivate voluntary contributions? the case of stackoverflow Q&A community \" in CSCW 2015.  H. Cavusoglu Z. Li and K.-W. Huang \"Can gamification motivate voluntary contributions? the case of stackoverflow Q&A community \" in CSCW 2015.","DOI":"10.1145\/2685553.2698999"},{"key":"e_1_3_2_1_6_1","first-page":"362","volume-title":"Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks,\" in Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC)","author":"Chen L.","year":"2017","unstructured":"L. Chen , S. Hou , and Y. Ye , \" Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks,\" in Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC) , 2017 , pp. 362 -- 372 . L. Chen, S. Hou, and Y. Ye, \"Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks,\" in Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), 2017, pp. 362--372."},{"key":"e_1_3_2_1_7_1","volume-title":"On the properties of neural machine translation: Encoder-decoder approaches,\" arXiv preprint arXiv:1409.1259","author":"Cho K.","year":"2014","unstructured":"K. Cho , B. Van Merri\u00ebnboer , D. Bahdanau , and Y. Bengio , \" On the properties of neural machine translation: Encoder-decoder approaches,\" arXiv preprint arXiv:1409.1259 , 2014 . K. Cho, B. Van Merri\u00ebnboer, D. Bahdanau, and Y. Bengio, \"On the properties of neural machine translation: Encoder-decoder approaches,\" arXiv preprint arXiv:1409.1259, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Learning phrase representations using rnn encoder-decoder for statistical machine translation,\" in arXiv:1406.1078","author":"Cho K.","year":"2014","unstructured":"K. Cho , B. van Merrienboer , C. Gulcehre , D. Bahdanau , F. Bougares , H. Schwenk , and Y. Bengio , \" Learning phrase representations using rnn encoder-decoder for statistical machine translation,\" in arXiv:1406.1078 , 2014 . K. Cho, B. van Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio, \"Learning phrase representations using rnn encoder-decoder for statistical machine translation,\" in arXiv:1406.1078, 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"Stackintheflow: Stackoverflow search engine,\" in VCU Capstone Design Expo Posters","author":"Coogle J.","year":"2017","unstructured":"J. Coogle , J. Gajjar , and C. Greco , \" Stackintheflow: Stackoverflow search engine,\" in VCU Capstone Design Expo Posters , 2017 . J. Coogle, J. Gajjar, and C. Greco, \"Stackintheflow: Stackoverflow search engine,\" in VCU Capstone Design Expo Posters, 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"Determining the popularity of design patterns used by programmers based on the analysis of questions and answers on stackoverflow.com social network,\" in CCIS","author":"Czyczyn-Egird D.","year":"2016","unstructured":"D. Czyczyn-Egird and R. Wojszczyk , \" Determining the popularity of design patterns used by programmers based on the analysis of questions and answers on stackoverflow.com social network,\" in CCIS , 2016 . D. Czyczyn-Egird and R. Wojszczyk, \"Determining the popularity of design patterns used by programmers based on the analysis of questions and answers on stackoverflow.com social network,\" in CCIS, 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"metapath2vec: Scalable representation learning for heterogeneous networks,\" in KDD","author":"Dong Y.","year":"2017","unstructured":"Y. Dong , N. V. Chawla , and A. Swami , \" metapath2vec: Scalable representation learning for heterogeneous networks,\" in KDD , 2017 . Y. Dong, N. V. Chawla, and A. Swami, \"metapath2vec: Scalable representation learning for heterogeneous networks,\" in KDD, 2017."},{"key":"e_1_3_2_1_12_1","first-page":"253","volume-title":"Gotcha-sly malware! scorpion: a metagraph2vec based malware detection system,\" in KDD","author":"Fan Y.","year":"2018","unstructured":"Y. Fan , S. Hou , Y. Zhang , Y. Ye , and M. Abdulhayoglu , \" Gotcha-sly malware! scorpion: a metagraph2vec based malware detection system,\" in KDD , 2018 , pp. 253 -- 262 . Y. Fan, S. Hou, Y. Zhang, Y. Ye, and M. Abdulhayoglu, \"Gotcha-sly malware! scorpion: a metagraph2vec based malware detection system,\" in KDD, 2018, pp. 253--262."},{"key":"e_1_3_2_1_13_1","volume-title":"Automatic opioid user detection from twitter: Transductive ensemble built on different meta-graph based similarities over heterogeneous information network,\" in IJCAI","author":"Fan Y.","year":"2018","unstructured":"Y. Fan , Y. Zhang , Y. Ye , and X. Li , \" Automatic opioid user detection from twitter: Transductive ensemble built on different meta-graph based similarities over heterogeneous information network,\" in IJCAI , 2018 . Y. Fan, Y. Zhang, Y. Ye, and X. Li, \"Automatic opioid user detection from twitter: Transductive ensemble built on different meta-graph based similarities over heterogeneous information network,\" in IJCAI, 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies,\" in CIKM","author":"Fan Y.","year":"2017","unstructured":"Y. Fan , Y. Zhang , Y. Ye , and W. Zheng , \" Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies,\" in CIKM , 2017 . Y. Fan, Y. Zhang, Y. Ye, and W. Zheng, \"Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies,\" in CIKM, 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"Stack overflow considered harmful? the impact of copy and paste on android application security,\" in S&P","author":"Fischer F.","year":"2017","unstructured":"F. Fischer , K. Bottinger , H. Xiao , C. Stransky , Y. Acar , M. Backes , and S. Fahl , \" Stack overflow considered harmful? the impact of copy and paste on android application security,\" in S&P , 2017 . F. Fischer, K. Bottinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, and S. Fahl, \"Stack overflow considered harmful? the impact of copy and paste on android application security,\" in S&P, 2017."},{"key":"e_1_3_2_1_16_1","unstructured":"A. Graves \"Generating sequences with recurrent neural networks \" in Arxiv preprint arXiv:1308.0850 2013.  A. Graves \"Generating sequences with recurrent neural networks \" in Arxiv preprint arXiv:1308.0850 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"node2vec: Scalable feature learning for networks,\" in KDD","author":"Grover A.","year":"2016","unstructured":"A. Grover and J. Leskovec , \" node2vec: Scalable feature learning for networks,\" in KDD , 2016 . A. Grover and J. Leskovec, \"node2vec: Scalable feature learning for networks,\" in KDD, 2016."},{"key":"e_1_3_2_1_18_1","volume-title":"Hindroid: An intelligent android malware detection system based on structured heterogeneous information network,\" in KDD","author":"Hou S.","year":"2017","unstructured":"S. Hou , Y. Ye , Y. Song , and M. Abdulhayoglu , \" Hindroid: An intelligent android malware detection system based on structured heterogeneous information network,\" in KDD , 2017 . S. Hou, Y. Ye, Y. Song, and M. Abdulhayoglu, \"Hindroid: An intelligent android malware detection system based on structured heterogeneous information network,\" in KDD, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Structured attention networks,\" arXiv preprint arXiv:1702.00887","author":"Kim Y.","year":"2017","unstructured":"Y. Kim , C. Denton , L. Hoang , and A. M. Rush , \" Structured attention networks,\" arXiv preprint arXiv:1702.00887 , 2017 . Y. Kim, C. Denton, L. Hoang, and A. M. Rush, \"Structured attention networks,\" arXiv preprint arXiv:1702.00887, 2017."},{"key":"e_1_3_2_1_20_1","first-page":"83","volume-title":"How do api changes trigger stack overflow discussions? a study on the android sdk,\" in ICPC '14","author":"Linares-Vasquez M.","year":"2014","unstructured":"M. Linares-Vasquez , G. Bavota , M. D. Penta , and R. Oliveto , \" How do api changes trigger stack overflow discussions? a study on the android sdk,\" in ICPC '14 , 2014 , pp. 83 -- 94 . M. Linares-Vasquez, G. Bavota, M. D. Penta, and R. Oliveto, \"How do api changes trigger stack overflow discussions? a study on the android sdk,\" in ICPC '14, 2014, pp. 83--94."},{"key":"e_1_3_2_1_21_1","first-page":"1794","volume-title":"Content to node: Self-translation network embedding,\" in KDD","author":"Liu J.","year":"2018","unstructured":"J. Liu , Z. He , L. Wei , and Y. Huang , \" Content to node: Self-translation network embedding,\" in KDD , 2018 , pp. 1794 -- 1802 . J. Liu, Z. He, L. Wei, and Y. Huang, \"Content to node: Self-translation network embedding,\" in KDD, 2018, pp. 1794--1802."},{"key":"e_1_3_2_1_22_1","first-page":"118","volume-title":"Mining stackoverflow for program repair,\" in SANER","author":"Liu X.","year":"2018","unstructured":"X. Liu and H. Zhong , \" Mining stackoverflow for program repair,\" in SANER 2018 , 2018, pp. 118 -- 129 . X. Liu and H. Zhong, \"Mining stackoverflow for program repair,\" in SANER 2018, 2018, pp. 118--129."},{"key":"e_1_3_2_1_23_1","volume-title":"Effective approaches to attention-based neural machine translation,\" arXiv preprint arXiv:1508.04025","author":"Luong M.-T.","year":"2015","unstructured":"M.-T. Luong , H. Pham , and C. D. Manning , \" Effective approaches to attention-based neural machine translation,\" arXiv preprint arXiv:1508.04025 , 2015 . M.-T. Luong, H. Pham, and C. D. Manning, \"Effective approaches to attention-based neural machine translation,\" arXiv preprint arXiv:1508.04025, 2015."},{"key":"e_1_3_2_1_24_1","volume-title":"Efficient estimation of word representations in vector space,\" in arXiv preprint arXiv:1301.3781","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov , K. Chen , G. Corrado , and J. Dean , \" Efficient estimation of word representations in vector space,\" in arXiv preprint arXiv:1301.3781 , 2013 . T. Mikolov, K. Chen, G. Corrado, and J. Dean, \"Efficient estimation of word representations in vector space,\" in arXiv preprint arXiv:1301.3781, 2013."},{"key":"e_1_3_2_1_25_1","volume-title":"Distributed representations of words and phrases and their compositionality,\" in NIPS","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov , I. Sutskever , K. Chen , G. S. Corrado , and J. Dean , \" Distributed representations of words and phrases and their compositionality,\" in NIPS , 2013 . T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, \"Distributed representations of words and phrases and their compositionality,\" in NIPS, 2013."},{"key":"e_1_3_2_1_26_1","first-page":"701","volume-title":"Deepwalk: Online learning of social representations,\" in KDD '14","author":"Perozzi B.","year":"2014","unstructured":"B. Perozzi , R. Al-Rfou , and S. Skiena , \" Deepwalk: Online learning of social representations,\" in KDD '14 , 2014 , pp. 701 -- 710 . B. Perozzi, R. Al-Rfou, and S. Skiena, \"Deepwalk: Online learning of social representations,\" in KDD '14, 2014, pp. 701--710."},{"key":"e_1_3_2_1_27_1","volume-title":"Semi-supervised sequence tagging with bidirectional language models,\" arXiv preprint arXiv:1705.00108","author":"Peters M. E.","year":"2017","unstructured":"M. E. Peters , W. Ammar , C. Bhagavatula , and R. Power , \" Semi-supervised sequence tagging with bidirectional language models,\" arXiv preprint arXiv:1705.00108 , 2017 . M. E. Peters, W. Ammar, C. Bhagavatula, and R. Power, \"Semi-supervised sequence tagging with bidirectional language models,\" arXiv preprint arXiv:1705.00108, 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"Metapath guided embedding for similarity search in large-scale heterogeneous information networks,\" in arXiv:1610.09769","author":"Shang J.","year":"2016","unstructured":"J. Shang , M. Qu , J. Liu , L. M. Kaplan , J. Han , and J. Peng , \" Metapath guided embedding for similarity search in large-scale heterogeneous information networks,\" in arXiv:1610.09769 , 2016 . J. Shang, M. Qu, J. Liu, L. M. Kaplan, J. Han, and J. Peng, \"Metapath guided embedding for similarity search in large-scale heterogeneous information networks,\" in arXiv:1610.09769, 2016."},{"key":"e_1_3_2_1_29_1","unstructured":"StackExchange \"Stackexchange statistics \" in https:\/\/stackexchange.com\/sites#traffic 2018.  StackExchange \"Stackexchange statistics \" in https:\/\/stackexchange.com\/sites#traffic 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"Pathsim: Meta path-based top-k similarity search in heterogeneous information networks,\" PVLDB","author":"Sun Y.","year":"2011","unstructured":"Y. Sun , J. Han , X. Yan , P. S. Yu , and T. Wu , \" Pathsim: Meta path-based top-k similarity search in heterogeneous information networks,\" PVLDB , 2011 . Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu, \"Pathsim: Meta path-based top-k similarity search in heterogeneous information networks,\" PVLDB, 2011."},{"key":"e_1_3_2_1_31_1","first-page":"3104","volume-title":"Sequence to sequence learning with neural networks,\" in NIPS","author":"Sutskever I.","year":"2014","unstructured":"I. Sutskever , O. Vinyals , and Q. V. Le , \" Sequence to sequence learning with neural networks,\" in NIPS , 2014 , pp. 3104 -- 3112 . I. Sutskever, O. Vinyals, and Q. V. Le, \"Sequence to sequence learning with neural networks,\" in NIPS, 2014, pp. 3104--3112."},{"key":"e_1_3_2_1_32_1","volume-title":"Line: Large-scale information network embedding,\" in WWW","author":"Tang J.","year":"2015","unstructured":"J. Tang , M. Qu , M. Wang , M. Zhang , J. Yan , and Q. Mei , \" Line: Large-scale information network embedding,\" in WWW , 2015 . J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, \"Line: Large-scale information network embedding,\" in WWW, 2015."},{"key":"e_1_3_2_1_33_1","volume-title":"Stackoverflow and github: Associations between software development and crowdsourced knowledge,\" in SocialCom","author":"Vasilescu B.","year":"2013","unstructured":"B. Vasilescu , V. Filkov , and A. Serebrenik , \" Stackoverflow and github: Associations between software development and crowdsourced knowledge,\" in SocialCom , 2013 . B. Vasilescu, V. Filkov, and A. Serebrenik, \"Stackoverflow and github: Associations between software development and crowdsourced knowledge,\" in SocialCom, 2013."},{"key":"e_1_3_2_1_34_1","first-page":"5998","volume-title":"Attention is all you need,\" in Advances in Neural Information Processing Systems","author":"Vaswani A.","year":"2017","unstructured":"A. Vaswani , N. Shazeer , N. Parmar , J. Uszkoreit , L. Jones , A. N. Gomez , \u0141. Kaiser, and I. Polosukhin , \" Attention is all you need,\" in Advances in Neural Information Processing Systems , 2017 , pp. 5998 -- 6008 . A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, \u0141. Kaiser, and I. Polosukhin, \"Attention is all you need,\" in Advances in Neural Information Processing Systems, 2017, pp. 5998--6008."},{"key":"e_1_3_2_1_35_1","volume-title":"Architectures and Applications","author":"Williams R.","year":"1995","unstructured":"R. Williams and D. Zipser , \" Gradient-based learning algorithms for recurrent networks and their computational complexity,\" in Back-propagation: Theory , Architectures and Applications , 1995 . R. Williams and D. Zipser, \"Gradient-based learning algorithms for recurrent networks and their computational complexity,\" in Back-propagation: Theory, Architectures and Applications, 1995."},{"key":"e_1_3_2_1_36_1","volume-title":"Network representation learning with rich text information,\" in IJCAI","author":"Yang C.","year":"2015","unstructured":"C. Yang , Z. Liu , D. Zhao , M. Sun , and E. Y. Chang , \" Network representation learning with rich text information,\" in IJCAI , 2015 . C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang, \"Network representation learning with rich text information,\" in IJCAI, 2015."},{"key":"e_1_3_2_1_37_1","volume-title":"W.-C. Lee, and Z. Lei, \"Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning,\" in CIKM","author":"T.","year":"2017","unstructured":"T. yang Fu , W.-C. Lee, and Z. Lei, \"Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning,\" in CIKM , 2017 . T. yang Fu, W.-C. Lee, and Z. Lei, \"Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning,\" in CIKM, 2017."},{"key":"e_1_3_2_1_38_1","volume-title":"Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection,\" in IJCAI","author":"Ye Y.","year":"2019","unstructured":"Y. Ye , S. Hou , L. Chen , J. Lei , W. Wan , J. Wang , Q. Xiong , and F. Shao , \" Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection,\" in IJCAI , 2019 . Y. Ye, S. Hou, L. Chen, J. Lei, W. Wan, J. Wang, Q. Xiong, and F. Shao, \"Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection,\" in IJCAI, 2019."},{"key":"e_1_3_2_1_39_1","volume-title":"Icsd: An automatic system for insecure code snippet detection in stack overflow over heterogeneous information network,\" in ACSAC","author":"Ye Y.","year":"2018","unstructured":"Y. Ye , S. Hou , L. Chen , X. Li , L. Zhao , S. Xu , J. Wang , and Q. Xiong , \" Icsd: An automatic system for insecure code snippet detection in stack overflow over heterogeneous information network,\" in ACSAC , 2018 . Y. Ye, S. Hou, L. Chen, X. Li, L. Zhao, S. Xu, J. Wang, and Q. Xiong, \"Icsd: An automatic system for insecure code snippet detection in stack overflow over heterogeneous information network,\" in ACSAC, 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Your style your identity: Leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network,\" in WWW","author":"Zhang Y.","year":"2019","unstructured":"Y. Zhang , Y. Fan , W. Song , S. Hou , Y. Ye , X. Li , L. Zhao , C. Shi , J. Wang , and Q. Xiong , \" Your style your identity: Leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network,\" in WWW , 2019 . Y. Zhang, Y. Fan, W. Song, S. Hou, Y. Ye, X. Li, L. Zhao, C. Shi, J. Wang, and Q. Xiong, \"Your style your identity: Leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network,\" in WWW, 2019."}],"event":{"name":"ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Vancouver British Columbia Canada","acronym":"ASONAM '19"},"container-title":["Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3343524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341161.3343524","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341161.3343524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:58Z","timestamp":1750206358000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3343524"}},"subtitle":["an intelligent system for automatic detection of insecure code snippets in stack overflow"],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":40,"alternative-id":["10.1145\/3341161.3343524","10.1145\/3341161"],"URL":"https:\/\/doi.org\/10.1145\/3341161.3343524","relation":{},"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"2020-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}