{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:17Z","timestamp":1772119937246,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-2027127, IIS-2040144, IIS-1951504, CNS-2034470, CNS-1940859, CNS-1946327, CNS-1814825, OAC-1940855, and ECCS-2026612."],"award-info":[{"award-number":["IIS-2027127, IIS-2040144, IIS-1951504, CNS-2034470, CNS-1940859, CNS-1946327, CNS-1814825, OAC-1940855, and ECCS-2026612."]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DoJ\/NIJ","award":["NIJ 2018-75-CX-0032"],"award-info":[{"award-number":["NIJ 2018-75-CX-0032"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427603","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"669-680","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Yiyue","family":"Qian","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Yujie","family":"Fan","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, USA"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"West Virginia University, USA"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, China"}]},{"given":"Fudong","family":"Shao","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. BitBazaar Market. jcjbfbbyqhwmjslo.onion. 2019. BitBazaar Market. jcjbfbbyqhwmjslo.onion."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Dark Market. darkevuygggqkqhq.onion. 2019. Dark Market. darkevuygggqkqhq.onion."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Do Mexican drug cartels make 500 dollars billion a year?https:\/\/www.washingtonpost.com\/politics\/2019\/06\/24\/do-mexican-drug-cartels-make-billion-year\/. 2019. Do Mexican drug cartels make 500 dollars billion a year?https:\/\/www.washingtonpost.com\/politics\/2019\/06\/24\/do-mexican-drug-cartels-make-billion-year\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Monopoly Market. monopolyberbucxu.onion. 2019. Monopoly Market. monopolyberbucxu.onion."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Darknet Market Archives. https:\/\/www.gwern.net\/DNM-archives\/#download. 2020. Darknet Market Archives. https:\/\/www.gwern.net\/DNM-archives\/#download."},{"key":"e_1_3_2_1_6_1","volume-title":"S&P","author":"Afroz Sadia"},{"key":"e_1_3_2_1_7_1","volume-title":"Not an\u2019Ebay for Drugs\u2019: the Cryptomarket\u2019Silk Road\u2019as a paradigm shifting criminal innovation. SSRN 2436643","author":"Aldridge Judith","year":"2014"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.04.020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.52922\/sb85915","volume-title":"How much fentanyl is available on the darknet?SSRN 3362149","author":"Ball Matthew","year":"2019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1360-0443.2011.03709.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-018-9379-8"},{"key":"e_1_3_2_1_12_1","volume-title":"Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international 264","author":"Broseus Julian","year":"2016"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","volume-title":"Exposing computer generated images by eye\u2019s region classification via transfer learning of VGG19 CNN","author":"Carvalho Tiago","DOI":"10.1109\/ICMLA.2017.00-47"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In WWW. 213\u2013224. Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In WWW. 213\u2013224.","DOI":"10.21236\/ADA579383"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-016-9281-4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2015.01.008"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Yuxiao Dong Nitesh\u00a0V Chawla and Ananthram Swami. 2017. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. 135\u2013144. Yuxiao Dong Nitesh\u00a0V Chawla and Ananthram Swami. 2017. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. 135\u2013144.","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yujie Fan Yiming Zhang Yanfang Ye and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network.. In IJCAI. 3357\u20133363. Yujie Fan Yiming Zhang Yanfang Ye and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network.. In IJCAI. 3357\u20133363.","DOI":"10.24963\/ijcai.2018\/466"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Yujie Fan Yiming Zhang Yanfang Ye Xin Li and Wanhong Zheng. 2017. Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies. In CIKM. 1259\u20131267. Yujie Fan Yiming Zhang Yanfang Ye Xin Li and Wanhong Zheng. 2017. Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies. In CIKM. 1259\u20131267.","DOI":"10.1145\/3132847.3132857"},{"key":"e_1_3_2_1_20_1","unstructured":"Tao-yang Fu Wang-Chien Lee and Zhen Lei. 2017. Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning. In CIKM. 1797\u20131806. Tao-yang Fu Wang-Chien Lee and Zhen Lei. 2017. Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning. In CIKM. 1797\u20131806."},{"key":"e_1_3_2_1_21_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672\u20132680. Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NIPS. 2672\u20132680."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpt.561"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Shifu Hou Yujie Fan Yiming Zhang Yanfang Ye Jingwei Lei Wenqiang Wan Jiabin Wang Qi Xiong and Fudong Shao. 2019. \u03b1Cyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model. In CIKM. 609\u2013618. Shifu Hou Yujie Fan Yiming Zhang Yanfang Ye Jingwei Lei Wenqiang Wan Jiabin Wang Qi Xiong and Fudong Shao. 2019. \u03b1Cyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model. In CIKM. 609\u2013618.","DOI":"10.1145\/3357384.3357875"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_25_1","unstructured":"Binbin Hu Yuan Fang and Chuan Shi. 2019. Adversarial Learning on Heterogeneous Information Networks. In KDD. 120\u2013129. Binbin Hu Yuan Fang and Chuan Shi. 2019. Adversarial Learning on Heterogeneous Information Networks. In KDD. 120\u2013129."},{"key":"e_1_3_2_1_26_1","volume-title":"CVPR, Vol.\u00a01","author":"Ke Yan"},{"key":"e_1_3_2_1_27_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","author":"Kingma P","year":"2014"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ramnath Kumar Shweta Yadav Raminta Daniulaityte Francois Lamy Krishnaprasad Thirunarayan Usha Lokala and Amit Sheth. 2020. eDarkFind: Unsupervised Multi-view Learning for Sybil Account Detection. In WWW. 1955\u20131965. Ramnath Kumar Shweta Yadav Raminta Daniulaityte Francois Lamy Krishnaprasad Thirunarayan Usha Lokala and Amit Sheth. 2020. eDarkFind: Unsupervised Multi-view Learning for Sybil Account Detection. In WWW. 1955\u20131965.","DOI":"10.1145\/3366423.3380263"},{"key":"e_1_3_2_1_29_1","unstructured":"Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In ICML. 1188\u20131196. Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In ICML. 1188\u20131196."},{"key":"e_1_3_2_1_30_1","unstructured":"Xiang Li Yao Wu Martin Ester Ben Kao Xin Wang and Yudian Zheng. 2017. Semi-supervised clustering in attributed heterogeneous information networks. In WWW. 1621\u20131629. Xiang Li Yao Wu Martin Ester Ben Kao Xin Wang and Yudian Zheng. 2017. Semi-supervised clustering in attributed heterogeneous information networks. In WWW. 1621\u20131629."},{"key":"e_1_3_2_1_31_1","volume-title":"The triggering effect of alcohol and illicit drugs on violent crime in a remand prison population: a case crossover study. Drug and alcohol dependence 129, 1-2","author":"Lundholm Lena","year":"2013"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","volume-title":"Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs","author":"Martin James","DOI":"10.1057\/9781137399052"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_34_1","unstructured":"Alec Radford Luke Metz and Soumith Chintalaa. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. In arXiv preprint arXiv:1511.06434. Alec Radford Luke Metz and Soumith Chintalaa. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. In arXiv preprint arXiv:1511.06434."},{"key":"e_1_3_2_1_35_1","volume-title":"Increases in drug and opioid overdose deaths United States","author":"Rudd A","year":"2000"},{"key":"e_1_3_2_1_36_1","unstructured":"Yu Shi Fangqiu Han Xinwei He Xinran He Carl Yang Jie Luo and Jiawei Han. 2018. mvn2vec: Preservation and collaboration in multi-view network embedding. arXiv preprint arXiv:1801.06597(2018). Yu Shi Fangqiu Han Xinwei He Xinran He Carl Yang Jie Luo and Jiawei Han. 2018. mvn2vec: Preservation and collaboration in multi-view network embedding. arXiv preprint arXiv:1801.06597(2018)."},{"key":"e_1_3_2_1_37_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556(2014). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556(2014)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-1841-1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371211"},{"key":"e_1_3_2_1_40_1","first-page":"992","article-title":"Pathsim: Meta path-based top-k similarity search in heterogeneous information networks","volume":"4","author":"Sun Yizhou","year":"2011","journal-title":"VLDB"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2018.01.022"},{"key":"e_1_3_2_1_43_1","volume-title":"The recovery of online drug markets following law enforcement and other disruptions. Drug and alcohol dependence 173","author":"Van\u00a0Buskirk Joe","year":"2017"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2013.10.009"},{"key":"e_1_3_2_1_45_1","volume-title":"Evolution of the Darknet Workshop. 1\u20135.","author":"van Wegberg Rolf","year":"2018"},{"key":"e_1_3_2_1_46_1","volume-title":"Graphgan: Graph representation learning with generative adversarial nets. arXiv preprint arXiv:1711.08267(2017).","author":"Wang Hongwei","year":"2017"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Xiangwen Wang Peng Peng Chun Wang and Gang Wang. 2018. You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces. In ASIACCS. 431\u2013442. Xiangwen Wang Peng Peng Chun Wang and Gang Wang. 2018. You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces. In ASIACCS. 431\u2013442.","DOI":"10.1145\/3196494.3196529"},{"key":"e_1_3_2_1_48_1","volume-title":"\u03b1-Satellite: An AI-driven System and Benchmark Datasets for Dynamic COVID-19 Risk Assessment in the United States","author":"Ye Yanfang","year":"2020"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_1_50_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In NIPS. 649\u2013657. Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In NIPS. 649\u2013657."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Yiming Zhang Yujie Fan Wei Song Shifu Hou Yanfang Ye Xin Li Liang Zhao Chuan Shi Jiabin Wang and Qi Xiong. 2019. Your style your identity: Leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network. In WWW. 3448\u20133454. Yiming Zhang Yujie Fan Wei Song Shifu Hou Yanfang Ye Xin Li Liang Zhao Chuan Shi Jiabin Wang and Qi Xiong. 2019. Your style your identity: Leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network. In WWW. 3448\u20133454.","DOI":"10.1145\/3308558.3313537"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Yiming Zhang Yujie Fan Yanfang Ye Liang Zhao and Chuan Shi. 2019. Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework. In CIKM. 549\u2013558. Yiming Zhang Yujie Fan Yanfang Ye Liang Zhao and Chuan Shi. 2019. Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework. In CIKM. 549\u2013558.","DOI":"10.1145\/3357384.3357876"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/1115657.1115669"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":53,"alternative-id":["10.1145\/3427228.3427603","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427603","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}