{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:23Z","timestamp":1750220903056,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T00:00:00Z","timestamp":1578787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,12]]},"DOI":"10.1145\/3378936.3378981","type":"proceedings-article","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T12:09:51Z","timestamp":1583582991000},"page":"46-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Big Data Analyses of ZeroNet Sites for Exploring the New Generation DarkWeb"],"prefix":"10.1145","author":[{"given":"Jianwei","family":"Ding","sequence":"first","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, 30th Research Institute of China Electronics Technology Group Corporation, Chengdu, China"}]},{"given":"Xiaoyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, 30th Research Institute of China Electronics Technology Group Corporation, Chengdu, China"}]},{"given":"Zhouguo","family":"Chen","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, 30th Research Institute of China Electronics Technology Group Corporation, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Boswell W. (2016). How to mine the invisible web: The ultimate guide.  Boswell W. (2016). How to mine the invisible web: The ultimate guide."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5120\/2362-3099"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15)(pp. 33--48).","year":"2015","author":"Soska K.","key":"e_1_3_2_1_4_1"},{"volume-title":"Doppelg\u00e4ngers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. In The World Wide Web Conference (pp. 2225--2235)","year":"2019","author":"Yoon C.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"e_1_3_2_1_9_1","first-page":"25","article-title":"DeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference","volume":"12","author":"Niu F.","year":"2012","journal-title":"VLDS"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638196"},{"volume-title":"Twenty-Fourth International Joint Conference on Artificial Intelligence.","year":"2015","author":"Xu H.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Winterrose M. L. Carter K. M. Wagner N. & Streilein W. W. (2014). Adaptive attacker strategy development against moving target cyber defenses. arXiv preprint arXiv:1407.8540.  Winterrose M. L. Carter K. M. Wagner N. & Streilein W. W. (2014). Adaptive attacker strategy development against moving target cyber defenses. arXiv preprint arXiv:1407.8540."},{"key":"e_1_3_2_1_14_1","unstructured":"Foulds J. Geumlek J. Welling M. & Chaudhuri K. (2016). On the theory and practice of privacy-preserving Bayesian data analysis. arXiv preprint arXiv:1603.07294.  Foulds J. Geumlek J. Welling M. & Chaudhuri K. (2016). On the theory and practice of privacy-preserving Bayesian data analysis. arXiv preprint arXiv:1603.07294."},{"volume-title":"2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) (pp. 1216--1220)","year":"2019","author":"Yang Y.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808778"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Freeman D. Jain S. D\u00fcrmuth M. Biggio B. & Giacinto G. (2016 February). Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS (pp. 1--15).  Freeman D. Jain S. D\u00fcrmuth M. Biggio B. & Giacinto G. (2016 February). Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS (pp. 1--15).","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.063"},{"volume-title":"Research Methods for the Digital Humanities (pp. 31--51)","year":"2018","author":"Gehl R. W.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.12.003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2014.V4.430"},{"key":"e_1_3_2_1_23_1","unstructured":"Hoffman M. Bach F. R. & Blei D. M. (2010). Online learning for latent dirichlet allocation. In advances in neural information processing systems (pp. 856--864).  Hoffman M. Bach F. R. & Blei D. M. (2010). Online learning for latent dirichlet allocation. In advances in neural information processing systems (pp. 856--864)."}],"event":{"name":"ICSIM '20: The 3rd International Conference on Software Engineering and Information Management","sponsor":["University of Science and Technology of China University of Science and Technology of China"],"location":"Sydney NSW Australia","acronym":"ICSIM '20"},"container-title":["Proceedings of the 3rd International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378936.3378981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:48Z","timestamp":1750203888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,12]]},"references-count":23,"alternative-id":["10.1145\/3378936.3378981","10.1145\/3378936"],"URL":"https:\/\/doi.org\/10.1145\/3378936.3378981","relation":{},"subject":[],"published":{"date-parts":[[2020,1,12]]},"assertion":[{"value":"2020-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}