{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:56:05Z","timestamp":1764053765195,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506562","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"106-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Abused Webpage Detection Method Based on Screenshots Text Recognition"],"prefix":"10.1145","author":[{"given":"Yan-Ming","family":"Huang","sequence":"first","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Dong-Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhi-Wei","family":"Yan","sequence":"additional","affiliation":[{"name":"China Internet Network Information Center, Beijing, China"}]},{"given":"Yan-Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Guang-Gang","family":"Geng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768564"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258113"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2016.26.2.397"},{"volume-title":"Introduction to Natural Language Processing","author":"Han He","key":"e_1_3_2_1_5_1","unstructured":"He Han . 2019. Introduction to Natural Language Processing . The People's Posts and Telecommunications Press . He Han. 2019. Introduction to Natural Language Processing. The People's Posts and Telecommunications Press."},{"key":"e_1_3_2_1_6_1","first-page":"266","article-title":"Illegal Website Identification Method Based on Template Detection","volume":"3","author":"Han-Long Zhang","year":"2015","unstructured":"Zhang Han-Long , Shen Bei-Jun , and Wang Yong-Jian . 2015 . Illegal Website Identification Method Based on Template Detection . Journal of Nanjing University of Science and Technology 3 (2015), 266 -- 271 . Zhang Han-Long, Shen Bei-Jun, and Wang Yong-Jian. 2015. Illegal Website Identification Method Based on Template Detection. Journal of Nanjing University of Science and Technology 3 (2015), 266--271.","journal-title":"Journal of Nanjing University of Science and Technology"},{"key":"e_1_3_2_1_7_1","volume-title":"Web page classification: a survey of perspectives, gaps, and future directions. Multimedia Tools and Applications","author":"Hashemi Mahdi","year":"2020","unstructured":"Mahdi Hashemi . 2020. Web page classification: a survey of perspectives, gaps, and future directions. Multimedia Tools and Applications ( 2020 ), 1--25. Mahdi Hashemi. 2020. Web page classification: a survey of perspectives, gaps, and future directions. Multimedia Tools and Applications (2020), 1--25."},{"key":"e_1_3_2_1_8_1","volume-title":"Harmful content detection based on cascaded adaptive boosting. Journal of Sensors 2018","author":"Jang Seok-Woo","year":"2018","unstructured":"Seok-Woo Jang and Sang-Hong Lee . 2018. Harmful content detection based on cascaded adaptive boosting. Journal of Sensors 2018 ( 2018 ). Seok-Woo Jang and Sang-Hong Lee. 2018. Harmful content detection based on cascaded adaptive boosting. Journal of Sensors 2018 (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"Zhang Jia-Liang Lu Jiang-Bo Zhang Ming-Liang and Jia Yu. 2019. A Method for Identifying Harmful Information on webpages Based on Machine Learning.  Zhang Jia-Liang Lu Jiang-Bo Zhang Ming-Liang and Jia Yu. 2019. A Method for Identifying Harmful Information on webpages Based on Machine Learning."},{"key":"e_1_3_2_1_10_1","volume-title":"Identifying Gambling and Porn Websites with Image Recognition. In Pacific Rim Conference on Multimedia. Springer, 488--497","author":"Li Longxi","year":"2017","unstructured":"Longxi Li , Gaopeng Gou , Gang Xiong , Zigang Cao , and Zhen Li . 2017 . Identifying Gambling and Porn Websites with Image Recognition. In Pacific Rim Conference on Multimedia. Springer, 488--497 . Longxi Li, Gaopeng Gou, Gang Xiong, Zigang Cao, and Zhen Li. 2017. Identifying Gambling and Porn Websites with Image Recognition. In Pacific Rim Conference on Multimedia. Springer, 488--497."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-019-00320-5"},{"key":"e_1_3_2_1_12_1","volume-title":"An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition","author":"Shi Baoguang","year":"2016","unstructured":"Baoguang Shi , Xiang Bai , and Cong Yao . 2016. An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition . IEEE transactions on pattern analysis and machine intelligence 39, 11 ( 2016 ), 2298--2304. Baoguang Shi, Xiang Bai, and Cong Yao. 2016. An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition. IEEE transactions on pattern analysis and machine intelligence 39, 11 (2016), 2298--2304."},{"key":"e_1_3_2_1_13_1","volume-title":"Semantic Approach for Identifying Harmful Sites Using the Link Relations. In 2014 IEEE International Conference on Semantic Computing. IEEE, 256--257","author":"Shin Junghoon","year":"2014","unstructured":"Junghoon Shin , Sangjun Lee , and Taehyung Wang . 2014 . Semantic Approach for Identifying Harmful Sites Using the Link Relations. In 2014 IEEE International Conference on Semantic Computing. IEEE, 256--257 . Junghoon Shin, Sangjun Lee, and Taehyung Wang. 2014. Semantic Approach for Identifying Harmful Sites Using the Link Relations. In 2014 IEEE International Conference on Semantic Computing. IEEE, 256--257."},{"key":"e_1_3_2_1_14_1","volume-title":"The Research on the Measurement of China Internet Illegal and Harmful Content. In 2009 Fifth International Conference on Information Assurance and Security","volume":"1","author":"Song Qiang","year":"2009","unstructured":"Qiang Song and Gang Li . 2009 . The Research on the Measurement of China Internet Illegal and Harmful Content. In 2009 Fifth International Conference on Information Assurance and Security , Vol. 1 . IEEE, 705--709. Qiang Song and Gang Li. 2009. The Research on the Measurement of China Internet Illegal and Harmful Content. In 2009 Fifth International Conference on Information Assurance and Security, Vol. 1. IEEE, 705--709."},{"key":"e_1_3_2_1_15_1","first-page":"11","volume-title":"2010 International Conference on Computer Application and System Modeling (ICCASM","volume":"11","author":"Tian Xiao-Ping","year":"2010","unstructured":"Xiao-Ping Tian , Guang-Gang Geng , and Hong-Tao Li . 2010 . A framework for multi-features based web harmful information identification . In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Vol. 11 . IEEE, V 11 - 614 . Xiao-Ping Tian, Guang-Gang Geng, and Hong-Tao Li. 2010. A framework for multi-features based web harmful information identification. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Vol. 11. IEEE, V11-614."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00956"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.07.012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359817"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:48Z","timestamp":1750188648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":17,"alternative-id":["10.1145\/3491396.3506562","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506562","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}