{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:48:36Z","timestamp":1777301316097,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3774904.3792296","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:54:34Z","timestamp":1775771674000},"page":"1595-1604","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Doxing-as-a-Service: Demystifying the Chinese Online Doxing Ecosystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8396-9244","authenticated-orcid":false,"given":"Yiran","family":"Gao","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0201-3255","authenticated-orcid":false,"given":"Pengcheng","family":"Xia","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3982-4993","authenticated-orcid":false,"given":"Liu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5216-933X","authenticated-orcid":false,"given":"Tianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2025. Doxing on Rise After Info Leaks About Judge in DOGE Case: Privacy Expert. https:\/\/www.newsweek.com\/doxing-rise-after-info-leaks-about-judge-doge-case-privacy-expert-2032954."},{"key":"e_1_3_2_1_2_1","unstructured":"2025. The Escalating Threats of Doxxing and Swatting: An Analysis of Recent Developments and Legal Responses. https:\/\/www.naag.org\/attorney-general-journal\/the-escalating-threats-of-doxxing-and-swatting-an-analysis-of-recent-developments-and-legal-responses\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2025. Federal Grand Jury Charges Three Women with Following ICE Agent Home from Work and Livestreaming His Home Address on Instagram. https:\/\/www.justice.gov\/usao-cdca\/pr\/federal-grand-jury-charges-three-women-following-ice-agent-home-work-and-livestreaming."},{"key":"e_1_3_2_1_4_1","unstructured":"2025. People are getting fired for allegedly celebrating Charlie Kirk's murder. It looks like a coordinated effort. https:\/\/www.cnn.com\/2025\/09\/13\/business\/charlie-kirk-death-fired-comments."},{"key":"e_1_3_2_1_5_1","unstructured":"2025. Resources for Individuals on the Threat of Doxing. https:\/\/www.dhs.gov\/sites\/default\/files\/2024-01\/24_0117_ope_resources-for-individuals-on-the-threat-of-doxing-508.pdf ."},{"key":"e_1_3_2_1_6_1","unstructured":"2025. TDLib: getChatMember Class Reference. https:\/\/core.telegram.org\/tdlib\/docs\/classtd_1_1td__api_1_1get_chat_member.html ."},{"key":"e_1_3_2_1_7_1","unstructured":"2025. Telegram APIs. https:\/\/core.telegram.org\/api."},{"key":"e_1_3_2_1_8_1","volume-title":"Media, Culture","author":"Anderson Briony","year":"2025","unstructured":"Briony Anderson. 2025. Doxxing to destroy: The convergence of transphobic hate speech and non-consensual disclosure on X. Crime, Media, Culture (2025), 17416590251345736."},{"key":"e_1_3_2_1_9_1","volume-title":"Doxxing: A scoping review and typology. The Emerald international handbook of technology-facilitated violence and abuse","author":"Anderson Briony","year":"2021","unstructured":"Briony Anderson and Mark A Wood. 2021. Doxxing: A scoping review and typology. The Emerald international handbook of technology-facilitated violence and abuse (2021), 205--226."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-025-05972-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380727"},{"key":"e_1_3_2_1_12_1","volume-title":"Doxing: A conceptual analysis. Ethics and information technology 18, 3","author":"Douglas David M","year":"2016","unstructured":"David M Douglas. 2016. Doxing: A conceptual analysis. Ethics and information technology 18, 3 (2016), 199--210."},{"key":"e_1_3_2_1_13_1","volume-title":"Dark doxxing: How Dark Triad traits impact support for doxxing behaviors. Personality and individual differences 217","author":"Foster Stephen","year":"2024","unstructured":"Stephen Foster and Jasmine Cross. 2024. Dark doxxing: How Dark Triad traits impact support for doxxing behaviors. Personality and individual differences 217 (2024), 112432."},{"key":"e_1_3_2_1_14_1","volume-title":"Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures. Trends in Organized Crime","author":"Garkava Taisiia","year":"2024","unstructured":"Taisiia Garkava, Asier Moneva, and E Rutger Leukfeldt. 2024. Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures. Trends in Organized Crime (2024), 1--25."},{"key":"e_1_3_2_1_15_1","volume-title":"Cyberbullying via social media and well-being. Current opinion in psychology 45","author":"Giumetti Gary W","year":"2022","unstructured":"Gary W Giumetti and Robin M Kowalski. 2022. Cyberbullying via social media and well-being. Current opinion in psychology 45 (2022), 101314."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3700432"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/13569775.2018.1493629"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.09.009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/00111287221103753"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315518497-29"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555167"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipad011"},{"key":"e_1_3_2_1_23_1","volume-title":"Alberto Maria Mongardini, and Jie Wu","author":"Morgia Massimo La","year":"2021","unstructured":"Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, and Jie Wu. 2021. Uncovering the dark side of Telegram: Fakes, clones, scams, and conspiracy movements. arXiv preprint arXiv:2111.13530 (2021)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70053-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00037"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101762"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38703-6_44"},{"key":"e_1_3_2_1_28_1","volume-title":"Doxing Patterns Using Social Engineering in Cyberspace. In 2nd International Conference on Advance Research in Social and Economic Science (ICARSE","author":"Mukti Artanti Tertia","year":"2024","unstructured":"Artanti Tertia Mukti, Mochammad Tanzil Multazam, Emy Rosnawati, and Sarykulov Kurmangaly. 2024. Doxing Patterns Using Social Engineering in Cyberspace. In 2nd International Conference on Advance Research in Social and Economic Science (ICARSE 2023). Atlantis Press, 530--546."},{"key":"e_1_3_2_1_29_1","unstructured":"PCPD. 2025. A Female Arrested for Suspected Doxxing Arising from Online Shopping Dispute. https:\/\/www.pcpd.org.hk\/english\/news_events\/media_statements\/press_20250310.html."},{"key":"e_1_3_2_1_30_1","unstructured":"Reuters. 2025. China's Baidu denies data breach after executive's daughter leaks personal info. https:\/\/www.reuters.com\/technology\/cybersecurity\/chinas-baidu-denies-data-breach-after-executives-daughter-leaks-personal-info-2025-03--20\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Fndex: fake news and doxxing detection with explainable AI. arXiv preprint arXiv:2410.22390","author":"Sallami Dorsaf","year":"2024","unstructured":"Dorsaf Sallami and Esma A\u00efmeur. 2024. Fndex: fake news and doxxing detection with explainable AI. arXiv preprint arXiv:2410.22390 (2024)."},{"key":"e_1_3_2_1_32_1","volume-title":"Jason Bennet Thatcher, and Philip Roth","author":"Shan Guohou","year":"2024","unstructured":"Guohou Shan, Wenxi Pu, Jason Bennet Thatcher, and Philip Roth. 2024. How Doxing on Social Media Leads to Social Stigma and Perceived Dignity. (2024)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4337\/9781803924854.00018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131385"},{"key":"e_1_3_2_1_35_1","unstructured":"SpyCloud. 2025. A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem. https:\/\/spycloud.com\/blog\/deep-dive-chinese-cybercrime-ecosystem\/#elementor-toc__heading-anchor-2."},{"key":"e_1_3_2_1_36_1","unstructured":"Telemetr.io. 2025. Telemetr.io: Telegram Channel Statistics. https:\/\/telemetr.io."},{"key":"e_1_3_2_1_37_1","unstructured":"TGStat. 2025. TGStat: Telegram Analytics. https:\/\/tgstat.com."},{"key":"e_1_3_2_1_38_1","first-page":"387","article-title":"Trolls, hackers, anons: Conspiracy theories in the peripheries of the web","volume":"23","author":"Mattia Thibault","year":"2016","unstructured":"Mattia Thibault et al. 2016. Trolls, hackers, anons: Conspiracy theories in the peripheries of the web. Lexia 23 (2016), 387--408.","journal-title":"Lexia"},{"key":"e_1_3_2_1_39_1","unstructured":"Six Tone. 2025. 'Zero Tolerance': China Cracks Down on Doxxing. https:\/\/www.sixthtone.com\/news\/1017157."},{"key":"e_1_3_2_1_40_1","volume-title":"Digital vigilantism as weaponisation of visibility. Philosophy & technology 30, 1","author":"Trottier Daniel","year":"2017","unstructured":"Daniel Trottier. 2017. Digital vigilantism as weaponisation of visibility. Philosophy & technology 30, 1 (2017), 55--72."},{"key":"e_1_3_2_1_41_1","volume-title":"Denunciation and doxing: Towards a conceptual model of digital vigilantism. Global crime 21, 3--4","author":"Trottier Daniel","year":"2020","unstructured":"Daniel Trottier. 2020. Denunciation and doxing: Towards a conceptual model of digital vigilantism. Global crime 21, 3--4 (2020), 196--212."}],"event":{"name":"WWW '26: The ACM Web Conference 2026","location":"Dubai United Arab Emirates","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2026"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3774904.3792296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:00:33Z","timestamp":1777298433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774904.3792296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,12]]},"references-count":41,"alternative-id":["10.1145\/3774904.3792296","10.1145\/3774904"],"URL":"https:\/\/doi.org\/10.1145\/3774904.3792296","relation":{},"subject":[],"published":{"date-parts":[[2026,4,12]]},"assertion":[{"value":"2026-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}