{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:56:17Z","timestamp":1761630977433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506525","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"94-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Darknet Public Hazard Entity Recognition Based on Deep Learning"],"prefix":"10.1145","author":[{"given":"Panpan","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xuebin","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jing","family":"Ya","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jiapeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Tingwen","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"103","article-title":"Anonymous communication and darknet: A survey","volume":"56","author":"Junzhou Luo","year":"2019","unstructured":"Luo Junzhou , Yang Ming , Ling Zhen , Wu Wenjia , and Gu Xiaodan . Anonymous communication and darknet: A survey . Journal of Computer Research and Development , 56 ( 1 ): 103 , 2019 . Luo Junzhou, Yang Ming, Ling Zhen, Wu Wenjia, and Gu Xiaodan. Anonymous communication and darknet: A survey. Journal of Computer Research and Development, 56(1):103, 2019.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Drugs and the internet. Drugs and the Internet.[7 ed.]","author":"Buskirk Joe Van","year":"2016","unstructured":"Joe Van Buskirk , Sundresan Naicker , Raimondo Bruno , Lucy Burns , C Breen , and Amanda Roxburgh . Drugs and the internet. Drugs and the Internet.[7 ed.] , pages 1 -- 14 , 2016 . Joe Van Buskirk, Sundresan Naicker, Raimondo Bruno, Lucy Burns, C Breen, and Amanda Roxburgh. Drugs and the internet. Drugs and the Internet.[7 ed.], pages 1--14, 2016."},{"key":"e_1_3_2_1_3_1","volume-title":"AIC Cannberra","author":"Broadhurst Roderic","year":"2020","unstructured":"Roderic Broadhurst , Jack Foye , Chuxian Jiang , and Matthew Ball . Illicit firearms and weapons on darknet markets. Broadhurst, R, J. Foye, J, Jiang and M. Ball, Illicit Firearms and Weapons on Darknet Markets, Trends and Issues in Criminal Justice , AIC Cannberra , Forthcoming , 2020 . Roderic Broadhurst, Jack Foye, Chuxian Jiang, and Matthew Ball. Illicit firearms and weapons on darknet markets. Broadhurst, R, J. Foye, J, Jiang and M. Ball, Illicit Firearms and Weapons on Darknet Markets, Trends and Issues in Criminal Justice, AIC Cannberra, Forthcoming, 2020."},{"issue":"04","key":"e_1_3_2_1_4_1","first-page":"100","article-title":"Shining light on the dark web","volume":"50","author":"Hurlburt George","year":"2017","unstructured":"George Hurlburt . Shining light on the dark web . IEEE Computer Architecture Letters , 50 ( 04 ): 100 -- 105 , 2017 . George Hurlburt. Shining light on the dark web. IEEE Computer Architecture Letters, 50(04):100--105, 2017.","journal-title":"IEEE Computer Architecture Letters"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756845"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1075\/li.30.1.03nad"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3115\/977035.977037"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-6-1"},{"key":"e_1_3_2_1_9_1","volume-title":"Maximum-entropy models in science and engineering","author":"Kapur Jagat Narain","year":"1989","unstructured":"Jagat Narain Kapur . Maximum-entropy models in science and engineering . John Wiley & Sons , 1989 . Jagat Narain Kapur. Maximum-entropy models in science and engineering. John Wiley & Sons, 1989."},{"key":"e_1_3_2_1_10_1","volume-title":"Hidden markov models. Current opinion in structural biology, 6(3):361--365","author":"Eddy Sean R","year":"1996","unstructured":"Sean R Eddy . Hidden markov models. Current opinion in structural biology, 6(3):361--365 , 1996 . Sean R Eddy. Hidden markov models. Current opinion in structural biology, 6(3):361--365, 1996."},{"key":"e_1_3_2_1_11_1","volume-title":"Support vector machines","author":"Hearst Marti A.","year":"1998","unstructured":"Marti A. Hearst , Susan T Dumais , Edgar Osuna , John Platt , and Bernhard Scholkopf . Support vector machines . IEEE Intelligent Systems and their applications, 13(4):18--28, 1998 . Marti A. Hearst, Susan T Dumais, Edgar Osuna, John Platt, and Bernhard Scholkopf. Support vector machines. IEEE Intelligent Systems and their applications, 13(4):18--28, 1998."},{"key":"e_1_3_2_1_12_1","volume-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"Lafferty John","year":"2001","unstructured":"John Lafferty , Andrew McCallum , and Fernando CN Pereira . Conditional random fields: Probabilistic models for segmenting and labeling sequence data . 2001 . John Lafferty, Andrew McCallum, and Fernando CN Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. 2001."},{"key":"e_1_3_2_1_13_1","volume-title":"A survey on recent advances in named entity recognition from deep learning models. arXiv preprint arXiv:1910.11470","author":"Yadav Vikas","year":"2019","unstructured":"Vikas Yadav and Steven Bethard . A survey on recent advances in named entity recognition from deep learning models. arXiv preprint arXiv:1910.11470 , 2019 . Vikas Yadav and Steven Bethard. A survey on recent advances in named entity recognition from deep learning models. arXiv preprint arXiv:1910.11470, 2019."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3038670"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1030"},{"key":"e_1_3_2_1_16_1","volume-title":"Bidirectional lstm-crf models for sequence tagging. arXiv preprint arXiv:1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang , Wei Xu , and Kai Yu . Bidirectional lstm-crf models for sequence tagging. arXiv preprint arXiv:1508.01991 , 2015 . Zhiheng Huang, Wei Xu, and Kai Yu. Bidirectional lstm-crf models for sequence tagging. arXiv preprint arXiv:1508.01991, 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942433"},{"key":"e_1_3_2_1_18_1","first-page":"012083","volume-title":"Journal of Physics: Conference Series","volume":"1848","author":"Gao Wenchao","unstructured":"Wenchao Gao , Xiaohui Zheng , and Shanshan Zhao . Named entity recognition method of chinese emr based on bert-bilstm-crf . In Journal of Physics: Conference Series , volume 1848 , page 012083 . IOP Publishing, 2021. Wenchao Gao, Xiaohui Zheng, and Shanshan Zhao. Named entity recognition method of chinese emr based on bert-bilstm-crf. In Journal of Physics: Conference Series, volume 1848, page 012083. IOP Publishing, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"Improving language understanding by generative pre-training","author":"Radford Alec","year":"2018","unstructured":"Alec Radford , Karthik Narasimhan , Tim Salimans , and Ilya Sutskever . Improving language understanding by generative pre-training . 2018 . Alec Radford, Karthik Narasimhan, Tim Salimans, and Ilya Sutskever. Improving language understanding by generative pre-training. 2018."},{"key":"e_1_3_2_1_20_1","volume-title":"Deep contextualized word representations. arXiv preprint arXiv:1802.05365","author":"Peters Matthew E","year":"2018","unstructured":"Matthew E Peters , Mark Neumann , Mohit Iyyer , Matt Gardner , Christopher Clark , Kenton Lee , and Luke Zettlemoyer . Deep contextualized word representations. arXiv preprint arXiv:1802.05365 , 2018 . Matthew E Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer. Deep contextualized word representations. arXiv preprint arXiv:1802.05365, 2018."},{"key":"e_1_3_2_1_21_1","first-page":"5998","volume-title":"Polosukhin Illia. Attention Is All You Need. In Proc. of NIPS","author":"Ashish Vaswani","year":"2017","unstructured":"Vaswani Ashish , Shazeer Noam , Parmar Niki , Uszkoreit Jakob , Jones Llion , N. Gomez Aidan , and Polosukhin Illia. Attention Is All You Need. In Proc. of NIPS , pages 5998 -- 6008 , 2017 . Vaswani Ashish, Shazeer Noam, Parmar Niki, Uszkoreit Jakob, Jones Llion, N. Gomez Aidan, and Polosukhin Illia. Attention Is All You Need. In Proc. of NIPS, pages 5998--6008, 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/614"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50496-4_20"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19060283"},{"key":"e_1_3_2_1_28_1","first-page":"933","volume-title":"International conference on machine learning","author":"Dauphin Yann N","year":"2017","unstructured":"Yann N Dauphin , Angela Fan , Michael Auli , and David Grangier . Language modeling with gated convolutional networks . In International conference on machine learning , pages 933 - 941 . PMLR, 2017 . Yann N Dauphin, Angela Fan, Michael Auli, and David Grangier. Language modeling with gated convolutional networks. In International conference on machine learning, pages 933-941. PMLR, 2017."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btx761"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00072-y"},{"key":"e_1_3_2_1_31_1","first-page":"4171","volume-title":"Toutanova Kristina. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proc. of NAACL-HLT","author":"Jacob Devlin","year":"2019","unstructured":"Devlin Jacob , Chang Ming-Wei , Lee Kenton , and Toutanova Kristina. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proc. of NAACL-HLT , pages 4171 -- 4186 , 2019 . Devlin Jacob, Chang Ming-Wei, Lee Kenton, and Toutanova Kristina. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proc. of NAACL-HLT, pages 4171--4186, 2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1356"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":32,"alternative-id":["10.1145\/3491396.3506525","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506525","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}