{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T06:29:07Z","timestamp":1762928947277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Sichuan University and Yibin Municipal People's Government University and City Strategic Cooperation Special Fund Project","award":["2020CDYB-29"],"award-info":[{"award-number":["2020CDYB-29"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802270;61802271;81602935;81773548"],"award-info":[{"award-number":["61802270;61802271;81602935;81773548"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Research Fund of China Ministry of Education and China Mobile Company","award":["CM20200409"],"award-info":[{"award-number":["CM20200409"]}]},{"name":"Key Research and Development Program of Science and Technology Department of Sichuan Province","award":["2020YFS0575"],"award-info":[{"award-number":["2020YFS0575"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3498469","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"458-466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["An Unsupervised Detection Framework for Chinese Jargons in the Darknet"],"prefix":"10.1145","author":[{"given":"Liang","family":"Ke","sequence":"first","affiliation":[{"name":"Sichuan University, Chengdu, Sichuan, China"}]},{"given":"Xinyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Sichuan University, Chengdu, Sichuan, China"}]},{"given":"Haizhou","family":"Wang","sequence":"additional","affiliation":[{"name":"Sichuan University, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Illicit firearms and other weapons on darknet markets. Trends and Issues in Crime and Criminal Justice","author":"Broadhurst Roderic","year":"2021","unstructured":"Roderic Broadhurst, Jack Foye, Chuxuan Jiang, and Matthew Ball. 2021. Illicit firearms and other weapons on darknet markets. Trends and Issues in Crime and Criminal Justice (2021)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.58"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 17th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL) .","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 17th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL) ."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1275"},{"key":"e_1_3_2_2_5_1","volume-title":"Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization","author":"Fachkha Claude","year":"2015","unstructured":"Claude Fachkha and Mourad Debbabi. 2015. Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization. IEEE Communications Surveys & Tutorials (2015)."},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 8th International Conference on Learning Representations (ICLR) .","author":"Lan Zhenzhong","year":"2020","unstructured":"Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2020. Albert: A lite bert for self-supervised learning of language representations. In Proceedings of the 8th International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_2_7_1","unstructured":"Zhengyi Li Xiangyu Du Xiaojing Liao Xiaoqian Jiang Tiffany Champagne-Langabeer et al. 2021. Demystifying the Dark Web Opioid Trade: Content Analysis on Anonymous Market Listings and Forum Posts. Journal of Medical Internet Research (2021)."},{"key":"e_1_3_2_2_8_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. Computing Research Repository","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. Computing Research Repository (2019)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-020-1647-3"},{"key":"e_1_3_2_2_12_1","volume-title":"Leo Yu Zhang, and Yang Xiang","author":"Sun Nan","year":"2018","unstructured":"Nan Sun, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, and Yang Xiang. 2018. Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials (2018)."},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 3rd International Conference on Computing, Electronics & Communications Engineering (iCCECE) .","author":"Takuro HADA","year":"2020","unstructured":"HADA Takuro, SEI Yuichi, Yasuyuki TAHARA, and Akihiko OHSUGA. 2020. Codewords detection in microblogs focusing on differences in word use between two corpora. In Proceedings of the 3rd International Conference on Computing, Electronics & Communications Engineering (iCCECE) ."},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 14th Annual Workshop on the Economics of Information Security (WEIS) .","author":"Thomas Kurt","year":"2015","unstructured":"Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, and Giovanni Vigna. 2015. Framing Dependencies Introduced by Underground Commoditization. In Proceedings of the 14th Annual Workshop on the Economics of Information Security (WEIS) ."},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 31th Advances in neural information processing systems (NeurIPS) .","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Proceedings of the 31th Advances in neural information processing systems (NeurIPS) ."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23071"},{"key":"e_1_3_2_2_17_1","unstructured":"Han Xiao. 2018. bert-as-service. https:\/\/github.com\/hanxiao\/bert-as-service ."},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 29th Advances in neural information processing systems (NeurIPS) .","author":"Xingjian SHI","year":"2015","unstructured":"SHI Xingjian, Zhourong Chen, Hao Wang, Dit-Yan Yeung, Wai-Kin Wong, and Wang-chun Woo. 2015. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. In Proceedings of the 29th Advances in neural information processing systems (NeurIPS) ."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359817"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.11"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080721"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX) .","author":"Yuan Kan","year":"2018","unstructured":"Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang. 2018. Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces. In Proceedings of the 27th USENIX Security Symposium (USENIX) ."},{"key":"e_1_3_2_2_23_1","volume-title":"Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection. Fuzzy Sets and Systems","author":"Yuan Zhong","year":"2020","unstructured":"Zhong Yuan, Hongmei Chen, Tianrui Li, Jia Liu, and Shu Wang. 2020. Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection. Fuzzy Sets and Systems (2020)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745450"},{"key":"e_1_3_2_2_25_1","volume-title":"Cosine Similarity Based Line Protection for Large Scale Wind Farms Part II-the Industrial Application","author":"Zheng Liming","year":"2021","unstructured":"Liming Zheng, Ke Jia, Wenqiang Wu, Qian Liu, Tianshu Bi, and Qixun Yang. 2021. Cosine Similarity Based Line Protection for Large Scale Wind Farms Part II-the Industrial Application. IEEE Transactions on Industrial Electronics (2021)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D13-1061"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3411954"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00075"}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event AZ USA","acronym":"WSDM '22"},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3498469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:19Z","timestamp":1750188679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3498469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":27,"alternative-id":["10.1145\/3488560.3498469","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3498469","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}