{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T20:02:25Z","timestamp":1759694545570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380263","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"1955-1965","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["eDarkFind: Unsupervised Multi-view Learning for Sybil Account Detection"],"prefix":"10.1145","author":[{"given":"Ramnath","family":"Kumar","sequence":"first","affiliation":[{"name":"Birla Institute of Technology and Science Hyderabad, India"}]},{"given":"Shweta","family":"Yadav","sequence":"additional","affiliation":[{"name":"Wright State University Dayton, Ohio, USA"}]},{"given":"Raminta","family":"Daniulaityte","sequence":"additional","affiliation":[{"name":"Wright State University Dayton, Ohio, USA"}]},{"given":"Francois","family":"Lamy","sequence":"additional","affiliation":[{"name":"Mahidol University Thailand"}]},{"given":"Krishnaprasad","family":"Thirunarayan","sequence":"additional","affiliation":[{"name":"Wright State University Dayton, Ohio, USA"}]},{"given":"Usha","family":"Lokala","sequence":"additional","affiliation":[{"name":"Wright State University Dayton, Ohio, USA"}]},{"given":"Amit","family":"Sheth","sequence":"additional","affiliation":[{"name":"University of South Carolina Columbia, South Carolina, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Dark Web Users Suspect \u201dDream Market\u201d Has Also Been Backdoored by Feds. https:\/\/thehackernews.com\/2017\/07\/dream-market-darkweb.html  2017. Dark Web Users Suspect \u201dDream Market\u201d Has Also Been Backdoored by Feds. https:\/\/thehackernews.com\/2017\/07\/dream-market-darkweb.html"},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Dark web marketplace Wall Street Market busted by international police. https:\/\/nakedsecurity.sophos.com\/2019\/05\/07\/dark-web-marketplace-wall-street-market-busted-by-international-police\/  2019. Dark web marketplace Wall Street Market busted by international police. https:\/\/nakedsecurity.sophos.com\/2019\/05\/07\/dark-web-marketplace-wall-street-market-busted-by-international-police\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.21"},{"key":"e_1_3_2_1_4_1","unstructured":"Douglas Bagnall. 2015. Author identification using multi-headed recurrent neural networks. arXiv preprint arXiv:1506.04891(2015).  Douglas Bagnall. 2015. Author identification using multi-headed recurrent neural networks. arXiv preprint arXiv:1506.04891(2015)."},{"volume-title":"Everything you always wanted to know about drug cryptomarkets*(* but were afraid to ask).The International journal on drug policy 35","year":"2016","author":"Barratt J","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-2003"},{"volume-title":"Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international 264","year":"2016","author":"Bros\u00e9us Julian","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.07.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/e473742008-115"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.04.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805(2018).","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186094"},{"volume-title":"Proceedings of the Eighth International Joint Conference on Natural Language Processing (Volume 1: Long Papers). 584\u2013593","year":"2017","author":"Ferracane Elisa","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqm023"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_14"},{"volume-title":"Application of Stylometry to DarkWeb Forum User Identification","author":"Ho Thanh\u00a0Nghia","key":"e_1_3_2_1_17_1"},{"volume-title":"Breakthroughs in statistics","author":"Hotelling Harold","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Patrick Juola 2008. Authorship attribution. Foundations and Trends\u00ae in Information Retrieval 1 3(2008) 233\u2013334.  Patrick Juola 2008. Authorship attribution. Foundations and Trends\u00ae in Information Retrieval 1 3(2008) 233\u2013334.","DOI":"10.1561\/1500000005"},{"volume-title":"Mortality in the United States","year":"2016","author":"Kochanek KD","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Kristy Kruithof. 2016. Internet-facilitated drugs trade: An analysis of the size scope and the role of the Netherlands. RAND.  Kristy Kruithof. 2016. Internet-facilitated drugs trade: An analysis of the size scope and the role of the Netherlands. RAND.","DOI":"10.7249\/RR1607"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2017.05.007"},{"volume-title":"International conference on machine learning. 1188\u20131196","year":"2014","author":"Le Quoc","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09283-0"},{"key":"e_1_3_2_1_25_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119."},{"key":"e_1_3_2_1_26_1","first-page":"275","article-title":"Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed Federalist Papers","volume":"58","author":"Mosteller Frederick","year":"1963","journal-title":"J. Amer. Statist. Assoc."},{"key":"e_1_3_2_1_27_1","unstructured":"Sebastian Ruder Parsa Ghaffari and John\u00a0G Breslin. 2016. Character-level and multi-channel convolutional neural networks for large-scale authorship attribution. arXiv preprint arXiv:1609.06686(2016).  Sebastian Ruder Parsa Ghaffari and John\u00a0G Breslin. 2016. Character-level and multi-channel convolutional neural networks for large-scale authorship attribution. arXiv preprint arXiv:1609.06686(2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2106"},{"key":"e_1_3_2_1_29_1","unstructured":"Kevin Smith. 2016. Tochka Market URL: Links - Buy Items from Tochka Darknet Marketplace. https:\/\/www.deepweb-sites.com\/tochka-market-url-links-darknet-reddit-review\/  Kevin Smith. 2016. Tochka Market URL: Links - Buy Items from Tochka Darknet Marketplace. https:\/\/www.deepweb-sites.com\/tochka-market-url-links-darknet-reddit-review\/"},{"volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 33\u201348.","author":"Soska Kyle","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1527090.1527102"},{"key":"e_1_3_2_1_32_1","unstructured":"Yichuan Tang. 2013. Deep learning using linear support vector machines. arXiv preprint arXiv:1306.0239(2013).  Yichuan Tang. 2013. Deep learning using linear support vector machines. arXiv preprint arXiv:1306.0239(2013)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11336-004-1168-9"},{"key":"e_1_3_2_1_34_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention Is All You Need. In NIPS.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention Is All You Need. In NIPS."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196529"},{"key":"e_1_3_2_1_36_1","unstructured":"Zack Whittaker. [n. d.]. Deep Dot Web Indictment. https:\/\/www.documentcloud.org\/documents\/5993699-Deep-Dot-Web-Indictment.html  Zack Whittaker. [n. d.]. Deep Dot Web Indictment. https:\/\/www.documentcloud.org\/documents\/5993699-Deep-Dot-Web-Indictment.html"},{"key":"e_1_3_2_1_37_1","unstructured":"Aaron\u00a0van Wirdum. 2019. Major Darknet Marketplace Wall Street Market Shuttered by Law...https:\/\/bitcoinmagazine.com\/articles\/major-darknet-marketplace-wall-street-market-shuttered-law-enforcement  Aaron\u00a0van Wirdum. 2019. Major Darknet Marketplace Wall Street Market Shuttered by Law...https:\/\/bitcoinmagazine.com\/articles\/major-darknet-marketplace-wall-street-market-shuttered-law-enforcement"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1294"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313537"}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:10Z","timestamp":1750199590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":39,"alternative-id":["10.1145\/3366423.3380263","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380263","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}